Skip to main content
Version 1 Documentation
This is Version 1 documentation for the Cloud Posse Reference Architecture. To determine which version you're using, please see Version Identification. To understand why this version changed, please see the blog post.
Version: v1

Decide on Transit Gateway Requirements

Context and Problem Statement

The AWS Transit Gateway connects VPCs located in any account or organization (and on-premises networks) through a centrally managed network hub. This simplifies the work of connecting networks and puts an end to complex VPC peering connections. Think of it like a cloud router, where each new connection is only made once.

As you expand globally, inter-region peering connections, the AWS Transit Gateway helps establish a global network. All data is automatically encrypted and never travels over the public internet.

With this in mind, the transit gateway needs to be configured to support the specific For example:

  • In which accounts will certain services live (e.g. Automation/Spacelift Runners, custom apps, etc)?

  • Where will the VPN solution be deployed, if there is one?

  • In which accounts will EKS clusters be deployed to?

  • Do certain stages need to communicate with one another (e.g. staging → prod and prod → staging)?

Considered Options

Cloud Posse recommends Option 1 because it enables the use of automation to perform changes as well as any other

business requirement

  • Connect all accounts with the auto account to enable automation (Spacelift, GitHub Action Runners, etc)

  • Connect all accounts with the network account to use it as the entry-point for VPN connections

  • Any other requirements that are business driven (e.g. dev → staging, staging → prod, dev → dev, etc)

Consequences

  • Can use automation (Spacelift) to handle changes to infrastructure

  • Can create private EKS clusters, accessible via automation and human (via VPN)

References