VPC peering will not work with the added location.


We are using VPC Peering with Gamelift Managed Fleet. We have created a VPC in US-WEST-2 and the fleet is also using US-WEST-2. I registered CREATE-VPC-PEERING-AUTHORIZATION as root account in advance, and it is automatically processing VPC Peering when CREATE-FLEET as a user with a separate role. FLEET_VPC_PEERING_SUCCEEDED is also checked and the connection with the machine in the location of us-west-2 is also checked. However, since we are aiming for multiple locations, we have deployed additional machines in sa-east-1 and ap-southeast-1, but we are not able to communicate with them.

Do you think we are missing something?

And, do you separate role or policy for Gamelift's VPC Peering. I'm using it by adding the following Policies, but VPC fail is reported in fleet event.

{ "Sid".
	"Sid": "GameliftVPCPeering",
	"Effect": "Allow",
	"Action": [
	"Resource": [
preguntada hace 2 meses136 visualizaciones
2 Respuestas
Respuesta aceptada


Unfortunately, GameLift currently does not have cross region support for VPC Peering. Also you could see the same limitation mentioned in the API docs : The VPC must be in the same Region as your fleet.

Our team has already marked it as FeatureRequest and added to their backlog. However, we would not be able to provide an ETA regarding the release

I would suggest keeping an eye on our News page/blog for future announcements :

  1. AWS blogs
  2. What's New
respondido hace 2 meses
profile picture
revisado hace 7 días
profile picture
revisado hace 2 meses
  • Does this mean I can only be in the same location as my Gamelift Fleet's Home Region? For example, Fleet HomeRegion: us-west-2 & Fleet Location: us-west-2 & My_VPC: us-west-2 => Available, Fleet HomeRegion: us-west-2 & Fleet Location: ap-northeast-2 & My_VPC: us-west-2 => Not Yet

  • Yes, you can only access in same region Fleet HomeRegion: us-west-2 & Fleet Location: us-west-2 & My_VPC: us-west-2 => Possible Fleet HomeRegion: us-west-2 & Fleet Location: ap-northeast-2 & My_VPC: us-west-2 => Not Yet Possible


AWS allows VPC peering across different regions. This setup enables full bidirectional connectivity between the VPCs, meaning each VPC in the peering relationship can initiate communication with the other. Remember, VPC peering connections are not transitive, which means if VPC A is connected to VPC B, and VPC A is also connected to VPC C, VPC B cannot communicate with VPC C through VPC A. Each pair of VPCs that need to communicate must have their direct peering connection. If you are using Terraform for infrastructure as code, ensure you're correctly setting up the VPC peering for each region. This includes defining the VPC IDs and regions correctly in your Terraform scripts. You also need to configure the security groups correctly to allow the necessary traffic between the peered VPCs. This approach helps in ensuring that instances across different regions and VPCs can communicate seamlessly through the peering connections​. When creating peering connections, especially across regions, you need to manually accept the peering connection in the accepter region. This is a two-step process: first, creating the peering connection from the requester's VPC dashboard, and then, accepting the request from the accepter's VPC dashboard. Keep in mind that the peering connection might take some time to be fully provisioned and operational

profile picture
respondido hace 2 meses

No has iniciado sesión. Iniciar sesión para publicar una respuesta.

Una buena respuesta responde claramente a la pregunta, proporciona comentarios constructivos y fomenta el crecimiento profesional en la persona que hace la pregunta.

Pautas para responder preguntas