AWS Transit Gateway (TGW) enables transitive routing from on-premises networks through VPN and from other VPCs. By creating a Transit Gateway VPC attachment, services in an Timescale Cloud Project VPC can route traffic to all other networks attached - directly or indirectly - to the Transit Gateway.
Set up a Project VPC
Follow the instructions in the VPC help article to set up a Project VPC to the same region as your Transit Gateway is located in. Note that cross-region attachments are not currently supported by TGW.
Setting up a VPC attachment for your Project VPC
Locate your AWS account and Transit Gateway IDs
To attach a VPC to a Transit Gateway in a different account, the AWS account ID must be included. This ID is 12-digits and will be referred below to as
In addition the ID of the Transit Gateway itself is needed. This is has the format
tgw-... with the dots being 17 hexadecimal characters. It will be referred to as
Share the Transit Gateway with the Timescale Cloud AWS account
Before the Timescale Cloud platform can attach the Project VPC located in the Timescale Cloud AWS account with the Transit Gateway in your account, the TGW needs to be shared using AWS Resource Access Manager. Sharing the TGW allows the Timescale Cloud account to describe the TGW and its route table(s), and to request attaching VPCs (and VPNs) to it. Note that attachments are not automatically created when the VPC and TGW reside in different accounts - the TGW owner account needs to accept a VPC attachment, similar to how VPC peering connections are before they become
A resource share can be created using the AWS RAM console, or the AWS CLI using the create-resource-share command. Please add the Transit Gateway as a resource to the share, and the Timescale CloudAWS account ID as a principal. The Timescale Cloud AWS account ID is
Find your Project VPC ID
avn vpc list to find the ID for your Project VPC. The
project_vpc_id value (a UUID4 string) will be referred to as
Determine the IP ranges to route from the Project VPC to the Transit Gateway
While a Transit Gateway has a route table of its own, and will by default route traffic to each attached network (directly to attached VPCs or indirectly via VPN attachments), attached VPCs' route tables need to be updated to include the TGW as a target for any IP range (CIDR) that should be routed using the VPC attachment. These IP ranges must be configured when creating the attachment for an Timescale CloudProject VPC.
The IPv4 range will be referred below to as
Create Timescale Cloud peering connection
A Transit Gateway VPC attachment is created by making a request to the Timescale Cloud API for a peering connection. The Timescale CloudAPI handles both actual AWS VPC peering connections and AWS Transit Gateway VPC attachments as peering connections.
avn vpc peering-connection create --project-vpc-id $aws_vpc --peer-cloud-account $user_account_id --peer-vpc $user_tgw_id --user-peer-network-cidr $user_peer_network_cidr
Note that you can use the
--user-peer-network-cidr argument multiple times to define more than one peer network CIDR. It's also possible to create the attachment without any CIDRs and add them later (though the attachment will be not be of any use until that is done since no addresses will be routed through the TGW from the Project VPC).
Accept Transit Gateway VPC attachment
vpc peering-connection create command the state of the Timescale Cloud peering connection is
APPROVED. Once the Timescale Cloud platform has built the connection by creating an AWS Transit Gateway VPC attachment, the state changes to
PENDING_PEER if everything went well. Otherwise the state information will indicate why the attachment failed to be created. Note that it may take up to a few minutes before building the attachment has completed.
The state can be checked for using
avn vpc peering-connection --project-vpc-id $project_vpc_id --peer-cloud-account $user_account_id --peer-vpc $user_tgw_id -v
Once the state is
PENDING_PEER, the output will contain a message instructing to accept a VPC attachment in your AWS account. TheTimescale Cloud platform monitors the attachment until it has been accepted, and once that is detected the state changes to
ACTIVE indicating the VPC attachment is operational, the Project VPC route table has been updated to route
$user_peer_network_cidrs to the Transit Gateway, and service nodes in the Project VPC have opened firewall access to those networks.