AWS Transit Gateway isolated routing with Shared Services

0

Hello,

We are working with a client that has the following setup: 1 TGW that has 5 VPC attachments

  • non-prod a attachment
  • non-prod b attachment
  • prod-a attachment
  • prod-b attachment
  • shared-services attachment

Requirements: The client would like to allow only for inter-communication of both the non-prod VPCs, as well as the prod VPCs. Additionally, the client would like for shared-services to be able to reach any of the VPCs.

My initial approach and the problem: Initially, my thought was to create 3 isolated routing domains, which were represented by 3 separate TGW route tables. I was unable to achieve this because there is a limitation of only being able to associate 1 attachment with 1 TGW route table. If we were able to make more than one attachment for the same VPC, we could get around this issue, but unfortunately that is not possible.

Looking for recommendations on the best way to address the above requirements.

The only other option I can think of to accomplish these requirements is to use 1 TGW route table, associate all of the attachments with it, and then ultimately use NACLs in the individual VPCs to restrict traffic. To me, this seems like a pain to maintain, so I wanted to see if there are any other ways to address this problem.


More Information on what I've already tried

My initial idea was to have 3 TGW route tables (one for each "routing domain"):

  • non-prod (associated with the non-prod-* attachments)
  • prod (associated with the prod-* attachments)
  • shared (associated with all attachments)

The problem with this approach is the shared TGW route table because as I mentioned above, you can't associate an attachment with more than one route table. In essence this is a "flat" routing architecture rather than isolated and directly contradicts with what I'm trying to do causing this problem.

Thanks in advance!

1개 답변
0
수락된 답변

I think this gets what you need?

NPA and NPB attachment Route Table:

NPA CIDR --> NPA attachment
NPB CIDR --> NPB attachment
SS CIDR --> SS attachment

Traffic arriving from NPA or NPB attachment can go SS, NPA, or NPB

PRA and PRB attachment route table

PRA CIDR --> PRA attachment
PRB CIDR --> PRB attachment
SS CIDR --> SS attachment

Traffic arriving from PRA or PRB attachment can go SS, PRA or PRB

SS Attachment route table

NPA CIDR --> NPA attachment
NPB CIDR --> NPB attachment
PRA CIDR --> PRA attachment
PRB CIDR --> PRB attachment

Traffic from SS attachment can go NPA, NPB, PRA, or PRB

AWS
전문가
mhjwork
답변함 4년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠