AWS Transit Gateway
Secure your Managed Service for TimescaleDB instance with Transit Gateway on AWS
AWS Transit Gateway (TGW) enables transitive routing from on-premises networks through VPN and from other VPC. By creating a Transit Gateway VPC attachment, MST services in an MST Project VPC can route traffic to all other networks attached - directly or indirectly - to the Transit Gateway.
Before you begin
Section titled “Before you begin”- Set up a VPC peering for your project in MST.
- In your AWS console, go to
My Accountand make a note of youraccount ID. - In your AWS console, go to
Transit Gateways, find the transit gateway that you want to attach, and make a note of the ID.
Attaching a VPC to an AWS Transit Gateway
Section titled “Attaching a VPC to an AWS Transit Gateway”- Select the VPC connection
In MST Console, click
VPCand select the VPC connection that you created. - Select
Transit Gateway VPC AttachmentIn the
VPC Peering connectionspage selectTransit Gateway VPC Attachment. - Enter your AWS account ID
Type the account ID of your AWS account in
AWS Account ID. - Enter the Transit Gateway ID
Type the ID of the Transit Gateway of AWS in
Transit Gateway ID. - Set the IP range
Type the IP range in the
Network cidrsfield.Each Transit Gateway has a route table of its own, and by default routes traffic to each attached network directly to attached VPCs or indirectly through VPN attachments. The attached VPCs’ route tables need to be updated to include the TGW as a target for any IP range (CIDR) that should be routed using the VPC attachment. These IP ranges must be configured when creating the attachment for an MST Project VPC.
- Add the peering connection
Click
Add peering connection.A new connection with a status of
Pending Acceptanceis listed in your AWS console. Verify that the account ID and transit gateway ID match those listed in MST Console. - Accept the request in AWS
In the AWS console, go to
Actionsand selectAccept Request. Update your AWS route tables to match your Managed Service for TimescaleDB CIDR settings.After you accept the request in AWS Console, the peering connection is active in the MST Console.