AWS re:Invent 2018: [NEW LAUNCH!] Introducing AWS Transit Gateway (NET331)
By Amazon Web Services
Summary
Topics Covered
- Replace VPC Peering Mesh with Single Gateway
- Multiple Route Tables Enable Routing Domains
- Isolate VPCs While Sharing VPN Connectivity
- Centralize Internet Access via Transit Gateway
- Inter-Region Transit Gateways Build Global Networks
Full Transcript
so good morning we're gonna get started welcome to this session on the newly announced AWS transit gateway hope you're all pretty excited about that and we certainly are to get it out there and
my name is Steve Seymour I'm a principal Solutions Architect I'm one of our networking specialists I went with our customers across Europe Middle East and Africa and have deep dive conversations around networking so this is a really
cool topic to be up here talking about this is Thomas friendly he's the general manager for transit gateway and for our VPN service and and let's just get this out of the way right now the right word
is route okay we're not gonna be talking about routing but actually I guess out of respect for my co-presenter here maybe I'll slip the occasional route into the to the discussion that we're
gonna be having here we'll see how I get on with that it feels a bit alien so some of you might have already seen some of these new icons in some of the other sessions and I think this is pretty
self-explanatory here we've got a cloud environment we want to be able to route things within it that's what transit gateway is all about so it's a new service that enables you to interconnect thousands of V pcs and
your on-premises networks and that's what we're going to be spending the next hour talking about in a bit more detail so what is transit gateway so let's be clear it's not a physical device it's a
fully managed fully distributed AWS service and when we started the journey with transit gateway we wanted to make sure that we could connect the pieces together and help them do that for
customers simply and so as you would expect transit gateway allows you to have the capabilities to allow you to connect thousands of V pcs together at
scale and across accounts and so whether you start your a double journey with two V pcs or if you have thousands of epcs transit gateway allows you to make simple and complex routing decisions
based on your requirements one of the other things that we heard from our customers is application teams can move very quickly by adding new V pcs while networking teams would move a little
slowly trying to connect their on-premise networks to AWS and so with transit V PC or a transit gate weight excuse me transit gateway Freudian slip so with Jazze gateway
you're able to share that on-premise connectivity across all your V pcs allowing your teams to be agile to meet business requirements and then lastly we
want it to be able to provide our customers with unique advanced routing features that allows you to build flexible Network topologies and so we created a the ability to have multiple
route tables and with these route tables you'll hear this concept of routing domains and Steve's going to go into that a little bit more in this session but with Ronnie domains you can actually
create very unique routing topologies and and allow you to isolate or create an any - anywhere network thank you okay
so taking those those three concepts we've got that interconnecting VPC is that consolidating edge connectivity and that flexibility with the routing domains let's just dive into what that might actually look like so taking our
example here we've got a typical customer scenario we've got four VP C's here if you wanted to connect those together before yesterday you would have done that using vp c peering so you
would create a vp c peering connection between each of the VP CS in this case we actually want all of the VP C's to communicate with each other perhaps these are all development environments maybe some dependencies between them so
we're going to have to create a full mesh of vp c peering connections so just with those four vp C's we've already got six V peering connections in place now what you can see here is that if we drop
the new transit gateway into this topology what we actually have are just four simple attachments to that transit gateway let's go back to our scenario again with our full VP C's and with our
clearing connections in place and now add the fact that these development teams want to be able to connect back to our on-premises Network so that's fine we're going to have a customer gateway the end of a VPN connection that exists
within a customer's network and we're now going to build VPN connections out to each of those V pcs and for those of you familiar with VPNs you're aware that those VPN connections terminate on the virtual private gateway for each V PC
each of those connections is actually two tunnels for resilience we have two endpoints on the AWS side for each of those VPN connections so this is what it would look like in a world before transit gateway but
now that we have transit gateway in the mix it's as simple as creating a single VPN connection to the transit gateway itself it still consists of two tunnels
it's still resilient on the AWS side so this now vastly simplifies your setup now let's go back to that scenario we've got our VPN connections in place we've said that they're highly available on
the AWS side we have two endpoints for you to connect to but obviously our recommendation to you is that you have a highly available pair of endpoints on your end of the connection so what that means is there's going to be two customer gateways within your
infrastructure and we're now going to create additional VPN connections from each V PC back to that pair of customer gateway devices well of course you can see where this is going when we put transit gateway into the mix
it's as simple as creating two VPN connections a total of four tunnels and you have resilient connectivity from an on-premises network so all four of our V
pcs thanks T so obviously I think you get the concepts out of high level Steve did a good job of presenting it at a 10,000 foot view so let's take it down to a thousand foot view and see what it looks like to actually create the
components of a transit gateway so let's take the scenario where you have a development environment where you have four V pcs each of those V pcs need to communicate with each other and you also have the additional requirement to
connect back to on-premise resources using a VPN connection so you might be doing that because you're accessing a code repo or a user needs to be able to test from on-prem and so one of the
things that we want to make sure that we're able to do here is we want to allow our development teams to be able to add new V pcs or destroy the PCs on the fly without having to worry about
creating new VPN connections or reconfiguring the on-premise router so the first step here let's go ahead and create 4 V pcs in our development
account let's put them in with into the 10/8 range so we've got our 10.1 10.2 10.32 enough for V pcs and then each of these V pcs has a subnet into
availability zones first we'll go off and create in our console on our V PC console a transit gateway and all you need to provide is just a name and so here
we're just gonna use the defaults for the rest of the parameters when the transit gateway gets created you'll see here that the state becomes available for use now one of the things to call
out here is a transit gateway as a regional object it's highly available and highly scaleable so how did we do that so if you were here at reinvent last
year and you happen to catch our talk or discussion around hyperplane technology that we discussed you'll know that it's highly scalable and highly available and
a transit gateway is built on that building block so we've created our transit gateway in the console the next step is to attach our V pcs to the
transit gateway and so this is actually pretty easy all you do is select the transit gateway that you want to use select the attachment type which is a V PC and then just provide the subnet of
the availability zones that your V PC is in now again just remember the transit gateways of regional object it has zonal attachments and you only need to provide
one subnet for each availability zone that you're in that V PC we repeat that process three times very simple very
easy for each of the other V pcs so now we have a transit gateway we have attachments we've attached our V pcs to the transit gateway and you see here
that each of the attachments are available and all the default parameters are applied in the screen below now now we got to make sure that basically we
have a route from the transit gateway back to our V pcs and so looking at the transit gateway route table you see here the list of all the ciders of our V pcs
you also see the attachment IDs so this help helps confirm that we have a route basically from our transit V PC or transit gateway to our V pcs okay now we
also have to think about the return path so how do we know that we can get traffic from our V pcs to the transit gateway so in our V PC route table we
need to put a 10/8 destination address and with a target of transit gateway
in the target field and that's it so how do we know it's working so we created the transit gateway we attach the VP C's
we updated the routes from the the transit gateway to the VP C's and the VP see rail table back to a transit gateway so here we set up basically four ec2
instances in each of the VP C's in the dot 50 subnet and logged into the ec2 instance in the 10.1 V PC ping to the
other three ping the other three VP C's or three other ec2 instances and you see they all responded and so what you're seeing here is the actual screenshots and an actual deployment and we just
created in any - anywhere connectivity between these VP C's that's it now if you remember the original scenario we needed to be able to connect back to
on-premise through a VPN connection so it's as simple as going back to the attachment selecting transit gateway selecting VPN and here you can either
use an existing customer gateway or create a new one and as you know the customer gateway has the IP address as
well as the ASN number for BGP we switch over to the VPN , and you download the VPN configs template and you just up
that update that to your customer gateway router and you only need to do this one time and so once your VPN
tunnels come up the bgp sessions are established you'll see here that the 10.99 prefix in the route table via the
VPN connection so now you have a path back and again how do we know it's working so right here we jump back on our two
ec2 instance in our 10.1 V PC we ping back our customer gateway and we see that it's reachable no other
configuration is required so from the on-premise side from our customer gateway how do we know we have connectivity so if we look at our you peer out table what we see here is
the Syrus of all the attached V pcs available and we see two paths each each for the two tunnels that were created automatically with our AWS VPN and then
lastly obviously you could do all this through the AWS console you can do this through the ABS command-line you could do it through a direct API call and for those customers who use VPN today you
see here that the only change to what you do today is you can either pass a parameter of transit gateway or pass a parameter of Virtual Private Gateway
cool so you've seen the basic concepts here and how it works but I wanted to go into a little bit more detail here so first of all there are two really
important key concepts for transit gateway the first one are attachments so we've talked about attaching V pcs we're going to dive into that in a little bit more detail the second really important
concept for a transit gateway is route tables and within route tables we have two topics to discuss around Association and propagation so let's have a look at
each of those concepts in turn so this is the new icon for the transit gateway you're gonna be seeing a lot of this and this is where we're starting from we create our transit gateway first you saw
that example in the console and the next thing we did was to attach some V pcs to that transit gateway so what you're seeing here are two of the V pcs from previous example 10.1 and 10.2 they're
the ones we're going to be working with and we're going to attach those to the transit gateway so in this case I've called the two attachments attachment red and attachment blue obviously these
show up as identify as in the console but these are our two attachments now once we attach them to our transit gateway remember there is a route table involved here and that route table
exists inside the transit gateway itself now when you attach a V PC to the transit gateway you actually have to identify a route table to associate with now when we creates the transit gateway
earlier we left all of the defaults in place so what that means is if we look back in the console we can see that there is a default route table for Association and the Association is
enabled and we also have propagate enable to that same root table so what does that actually mean well here we are we've got our attachments associated with the single root table that we have inside the transit gateway what that
means is when traffic comes in from that particular VPC to the transit gateway this route table is the list of instructions that are going to be followed in identifies the next hop and where traffic should flow to but I
should we don't have any entries inside that root table at the moment so if a packet did come in from one of those V pcs perhaps from the the 10.1 V PC and is trying to get to 10.2 it would come in to the Associated root table but
there's no entries in there so it would effectively get dropped what we have here is the concept of propagation so propagation is an automatic way of taking the side arrange for a particular
attachment in this case of V PC and propagating it into the root table so in this case we've got 10.1 being propagated over that red attachment and 10 dot due to being propagated over the
blue attachment so now we have a route table that is actually useful it has entries in it that tell us how to get somewhere so that's it that's our route table complete that's effectively what a
default deployment actually looks like um but we talked about needing to configure the V PC side of things as well so let's just go to the V pcs remember we do need to add an entry in
there that says if I have traffic that is trying to get to in this case 10/8 then let's put an entry in the route table and we just specify the next hop as the tgw identifier so this is the
same as you're probably used to creating you know a default route to the internet gateway perhaps all routes to a vgw for on-premises connectivity in the past it's exactly the same concept so we put
those entries into the route table that's the default so this is the the situation we actually created earlier and the screenshots you saw those are real screenshots of exactly all of the
steps involved in getting to the point that we showed you this is the the result we had here we had a VPN connection obviously we had 4 v pcs in this example we're showing two of them we were automatically associating all of
those attachments with the same route table and we were automatically propagating all of the routes into that same single route table so that's the default that's how easy it is to connect all of these things together
but I think all of you would like to move a little bit beyond those basics and let's look at some of the other capabilities here so here's our scenario what if we want to have more than one route table inside our transit gateway
so we could have two what about having three well we had three attachments that we've been talking about here we had two v pcs and we had a VPN so let's actually create a route table for each one of
those attachments its associated with that route table and now we need to consider what's actually going to end up inside these route tables and that's the the topic of propagation that I
mentioned now this is the overall concept of creating routing domains so you can create a route table here to decide where traffic flows in different situations so we are creating these
separate domains of behavior and that's what we have inside the transit gateway so our first step is we're going to propagate 10.1 but instead of letting the defaults happen we've actually specifically chosen here that we're
going to propagate 10.1 into the route table that is being used by the VPN attachment we're going to do exactly the same with 10.2 so now we know that if
traffic comes in from the VPN it knows how to get to those two V pcs okay well what about traffic flowing the other way the traffic that is going to be coming perhaps from one of those V pcs it needs
to know how to get to a VPN so again we can choose to propagate the routes from the VPN attachment into the two route tables at the top here so this is now what we have configured here this is
what we're going to be seeing for our traffic flow now remember you could use that propagate option and it makes things nice and easy it means as you update say the side arranges for your V
PC or you change your BGP announcements from an on-premises environment it automatically will update in these route tables now that we've turned on propagation but these are just route tables so you can put static entries in there if you like you can put a static
entry and that specifies an attachment as the next hop that's all the propagation is doing but it's doing it automatically for you so just consider that that you have options in the future to put static entries in and that might
be quite useful so let's just recap what route tables give you the ability to do here first of all a route table is all about identifying the next hop for traffic you can put those static entries in if you like
you can even create what we call blackhole entries so what that means is if you have traffic destined to a particular IP address but you actually don't want it to flow for a particular reason you can actually just put a black hole entry straight into the route table
and that packet will get dropped it's important to remember when you have static entries and black hole entries in your route table that they take precedence over anything that is coming in dynamically ie anything that's coming
fire that propagation process I talked about so effectively the static and the black hole entries override anything that's coming VAR a propagated entry you've seen that by default when you
create a transit gateway it has one route table that's being created all the attachments you then make to this transit gateway are automatically associated to that particular route
table again also by default propagation is turned on we've done this so that it makes it really simple for you to get started but it means that everything can route to everything the next step beyond
that was that we said we could have multiple route tables inside our transit gateway it's important to remember an attachment can only be associated with one route table remember it's the set of instructions that are followed for
traffic flowing into the transit gateway but an attachment can propagate its routes to any number of the route tables that you want so this gives you the idea that with a bit of extra configuration and a bit of architecture that I'm
thinking around this you can actually build some really quite interesting setups here and have full control of the routing within the transit gateway itself now the concept of routing here
you might be struggling a little bit just to think about how these packets are flowing around basically it's all about thinking about what is the next hop on a path you know if you were driving somewhere it's the decision you
would make at a particular turning or a particular Junction and I find when looking at things like this it's actually really helpful to visualize that and actually visualize it from both perspectives because traffic needs to
flow in both directions so let's go back to our our setup here we're going to introduce Dave into the equation here Dave is in our on premises environment and he has a packet that he wants to get
to 10.10 dot 50 so it's in the 10.1 VPC now the first thing that Dave is going to do is look at the on-premises environment and look do I have a route to get to a 10.1 now we know that 10.1
is going to be advertised from the transit gateway Oh the VPN connection to the on-premises environment and you can see it there it's being received by BGP so Davey's going to follow that path into the transit gateway now that he's inside the
transit gateway we're going to look at the route table that is associated with that VPN attachment in that route table remember we've got the entry that we propagated to it earlier so we've got
10.1 and we know that to get to 10.1 we go via attachment red so that's fine Dave now follows that step via attachment red and is now inside our 10.1 DPC so life is good but now he
realizes he actually needs to go back home again so how does he do that he's gonna look for an entry in the local VPC route tables to get back to 10.99 the on-premises environment where is that
entry well remember we created it in the route tables inside the V PC and we have a next hop here that is the transit gateway so great Dave follows that back we have the route table here associated
with the red attachment Dave looks at that entry sees an entry there that says 10.99 that's the on-premises environment I'm trying to get to remember that was propagated earlier from the VPN
attachment so Dave follows that we come down to the VPN needs to look where do I go next well we're receiving an announcement of the on-premises environment the 10.99 coming over that
bgp session so great dave is back home and it's really quite easy when you just follow those steps so the idea of this is just to give you a way of thinking about this and as you build some creative route tables here and decide
how you want your traffic to flow that's the kind of process I go through when I'm thinking about how is this traffic going to get both to and from two attachments on a particular transit gateway so you've seen a couple of
different transit gateway architectures here you've seen any - any which is the default very easy and quick to get started you've also seen a scenario here where we've shared some edge connectivity we've got that VPN
connection giving you access to two V pcs but what about if you wanted to have a slightly different setup here perhaps these two V pcs actually should never be able to talk to each other which does
remember our default situation but they both want to share that connectivity back to the on-premises environment you don't want to go back and create multiple VPNs just to isolate them so could we perhaps do that with transit
gateway and the answer is of course yes and actually it's what we had in place a moment ago so if we put Dave back into his VPC here at 10.1 and we say I want to get to 10.2
the other VPC so remember the first step here is to look at the root table inside the VPC we're going to follow that and we're going to end up at the transit gateway now the root table that is associated with this attachment doesn't
have an entry in it for 10.2 we didn't propagate from the 10.2 attachment into this particular root table so at this point there is nowhere for Dave to go the packet drops there we stop so in
that scenario we built we actually already have isolation between these two VP C's but the ability to share that VPN connection back to the on-premises environment now you can see that this is
just the start of some really quite interesting architecture possibilities here with transit gateway and I put a few examples up on the screen here and you can actually even have multiple
transit gateways attached to a V PC so you can see how this would become really quite interesting there is a session on Thursday Mick Matthews is presenting that on transit gateway architectures so if you're really interested in some of
these design patterns some of the ideas that we have here in some of the the things that we've seen customers want to use transit gateway for I'd really suggest you go along to next session and
see what he's got to share there now I mentioned the other concept here of VPC attachments but we haven't looked at it from the VPC side of things so first of
all let's just remind ourselves transit gateway is this regional object it is something that is a single target for those route tables inside your V PC but we said you needed to identify which availability zones you were using and
you had to choose just one subnet in each of those availability zones for this to attach to your V PC one of the options you have here is to use some existing subnets that's absolutely fine
but if you're building a new environment here or you have spare address space within your V PC my suggestion would actually be that you create new subnets purely for this attachment and you'll see why in a moment it gives you some
really interesting options of how you route traffic inside your V PC but you can use those existing ones if you need to so here's what is probably a pretty
familiar architect for you we've got our VP see we've got some public subnets one in each availability zone we've got three availability zones here there's a route table that is
with those particular subnets and the default route is via the Internet gateway we think of some private subnets there's a route table that we're using for those private subnets and actually the entries in that route table are going to be a little bit different and
we'll look at that in a moment I think created three more subnets that I'm going to use for connectivity these are the ones that I'm going to be using with the transit gateway itself so when I attach the transit gateway what you'll
actually see in your V PC is three network interfaces get created and you can see these if you go and look in the network interfaces part of the console one of the route tables look like well I mentioned that the public subnets will
have a route to the internet gateway that's pretty standard we've actually put some nat gateways into those public subnets so as you might expect the private subnets then have a next hop of default route that goes by those NAT
gateways but what about the route table I'm using for those connectivity subnets well actually I don't need to do anything with them we've got just our default in there the local entry that is always created in a route table that's
fine we can just leave that alone for the moment so at this point we have our transit gateway attached to our V PC and it's going to work in the way that we've
already described the the thing just to consider is back on the private subnet here I have added that route the 10.8 via the transit gateway so this is how we're going to establish connectivity
from anything that is in the private subnets to the rest of our Vee pcs that are attached to the transit gateway that's the only place that I've put 10.8 ok so this is where it gets interesting
with the inbound routing side of things what do I mean by that well here's our V PC that's now pretty familiar to us we've got the three network interfaces from the transit gateway one per availability zone and remember that
route table that we looked at doesn't actually have to have anything in it just got the local entry we have a packet coming in this is Dave again he's coming in from the transit gateway he's trying to get to the ec2 instance that
was 10.1 0.50 well the entries in that route table tell him that that's local to the V PC and of course that's fine so dave is now quite happily over at that ec2 instance he's got the 10/8 route back to the transit gateway so that's
how traffic will normally flow if you don't change anything else but we can actually be a bit more creative here so we can go back to the route table that is inside the transit gateway and statically add an entry to it now in
this case I'm actually creating a default route so I'm introducing a 0 0 dot 0 dot 0 / 0 route into the transit gateway route table and what I've actually specified here is that if the
traffic doesn't match any of the other more specific entries in that route table send the traffic to the attachment read so I'm sending it into my V PC now I've simplified the VPC diagram a little bit here I've just removed the other
subnets and the other availability zones but we now can see that that traffic is going to flow into this V PC so what happens next we're inside the V PC we've got the
route table that earlier didn't have any other entries in it but actually the traffic that's coming in from the transit gateway will obey that route table so we can actually add an entry in there that says if you receive a packet
and it's not for this V PC it's addressed to perhaps something out on the internet let's just send that traffic to the nat gateway so now we have centralized our outbound internet access from all of
the other attached v pcs to our transit gateway through this particular V PC so that's the inbound routing capability that you have by modifying that route table now the important thing to remember here is if we're sending that
traffic out to the nat gateway remember in our route tables earlier when we looked at the public subnet we didn't have an entry in there for the return path so let's go back to thinking about dave if his packet gets out there it
gets translated how does he get back we just need to go and put an entry into the route table for those public subnets now that identifies 10/8 is available
via the transit gateway so this is all about next top routing this is that inbound traffic coming into our V PC and if you're going to be using this you do need to consider the fact that it will come in on one of those particular
network interfaces and you want to consider that you want to keep that traffic ideally within the same availability zone so it's a concept that we call AZ independence and therefore you might actually choose to have a
separate route table for each of those connectivity subnets just to keep the traffic aligned to that particular availability zone that would be our best practice recommendation and therefore that next hop would effectively be one
per AZ so let's go back to our V PC here I've taken out the public subnets this is now a V PC that doesn't have internet connectivity doesn't have an Internet gateway but we still have our connection to the Tran
Gateway what if we want to use things like the newly announced route 53 resolver service the endpoints that you create for that well what does route 53 resolver do it creates endpoints by
putting an en I into your subnets what about if we look at V PC interface endpoints perhaps you're accessing some of the other AWS services via those endpoints again what does it actually do
it creates a network interface that is inside the subnets inside your V PC so these have an IP address that is within the side arrange for that particular subnet private link is exactly the same
it creates a network interface inside your V PC and again another IP address from your range of IPs well what does all of that mean it means well where we have a connection to a transit gateway here all of the other V pcs can actually
access any of these endpoints because they're just IP addresses within the 10.1 V PC so again you can see this gives you options perhaps to centralize connectivity to some of these other services and other endpoints that you
might be using but there's kind of an important thing to remember here whilst there is no specific configuration required from a routing perspective you do need to step back and think about how are people actually accessing these
endpoints so they're probably using DNS you know if you're calling some of our api's you're using our standard endpoints where we have changed the endpoint IP address to now be with inside that V PC so you just need to
consider that perhaps from your other V pcs you need to do something with DNS and route 53 resolver that we announced a couple of weeks ago actually is a really good way of doing this so you can
manipulate and control how traffic is routed from a DNS perspective and return particular entries for those services so if you're going to be doing this have a
closer look at route 53 resolver now I use the example there of an @ gateway so an AWS managed service for sending that traffic out to the internet but obviously you could actually do this
with any ec2 instance inside your V PC you know some of you may already be doing this routing your traffic pad through something from the market place that you've deployed to manage or monitor or control access out to the
internet but you can absolutely do the same thing here but it's actually quite interesting that you might want to be able to route traffic through a middle box between two other attachments so we'll come on to that in a little bit
more detail the important thing to remember is if you're going to be setting up a middle box type architecture here you want to put the next hop the ec2 instance in a
different subnet to the connectivity subnet so I showed you earlier so what does that actually look like well here's the example here we've got our root table we're saying that this time the
traffic is going by an en I so a market place instance that we've deployed in here and the next hop is that en I obviously that instance is probably in a public subnet but in this case what we're actually considering is that we
don't use this to get out to the Internet we want to use it as a path for traffic between two V pcs that are attached to our transit gateway so think about what we can use that inbound routing for here here's our next hop
we've got that en I to the middle box but what if we actually look at the route table for the middle box subnet and send it back to the transit gateway so this is where we can use that concept of having to route tables inside our
transit gateway one that is associated to the attachment that determines traffic coming into the VP's into the transit gateway but for traffic leaving we can actually put an entry in there so we've got a default route here that says
send all traffic via this particular V PC it comes in it goes to the middle box we can then send it back again so that might be kind of interesting as well from an architecture perspective
obviously in this scenario you still need to consider the AZ independence that I mentioned so perhaps deploying multiple instances and aligning your traffic to those particular AZ's the other scenario though that you could do
here is actually to use VPN connections so you could host ec2 instances in another V PC give them an elastic IP address and build VPN connections back to the transit gateway and that gives you some pretty creative options that
Thomas is going to talk a little bit more about later on thanks Steve so Steve did a great job of going from the thousand foot view to 100 foot view and
so let's talk about what other capabilities that are available in the transit gave me so we've talked about VPN attachments and how simple and easy that is to do on a transit gateway today
but one of the things that our customers have talked to us about is is how do I get more than a gigabyte exact raft bandwidth to AWS and so when VPN
connections are actually attached to transit gateway transit gateways supports equal cost multi pathing and so what does that allow you to do so think
of equal cost multi pathing as a routing strategy that where the next hop goes to a single destination but there's multiple best paths right and so in this case if we basically advertise the same
IP prefix across all the VPN connections transit gateway will distribute that traffic across all those connections that allows you now to create elastic bandwidth across those VPN connections
and so why would I use that so for example a customer who may be using a 10 gig direct connect might want to back up previously they would only have a one
gig VPN connection in this case they could actually create an 8 VPN connections against a transit gateway and create equivalently a 10 gig pipe
the other playing that we started off with was transit gateway supports thousands of V PC connections and so we know that we want to be able to support multiple accounts across all those
connections and so how do we do this so transit gateway uses the newly announced resource access manager to centrally manage resource sharing and I
think I hit the wrong button sorry about that yeah research very sorry here I think I had two slides too many apologies here ok
so so how do you do that technical difficulties so how do you do that so it's really a like a three step process so you would start with you start with the resource access manager
where you would go in and create a new resource share that centrally is manage the owner of the transit gateway would go in and create the resource share and
the participants of who would actually access that and that could be either accounts in your organization or accounts outside of your organization now it's important to remember that
those participants accept the invitation so think of it as the transit gateway owner enable sharing the next step is
for the participant in this case the VPC owner to be able to request an attachment to the transit gateway and when they request that attachment because they were part of one of the
they were one of the principal's as part of the resource share they're now able to describe the transit gateway they're able to attach to a transit gateway as
well as they're able to make those attachment requests and the third step is the transit gateway owner now has the ability to accept or reject that
attachment request and so in this case you can actually set it up as auto accept or you can manually accept those requests and so why would I do that why
would I actually do that so think of it as the the network teams want to be able to control the transit gateway but they want to allow the application teams to
be able to use network services and those teams when they use those network services you want to be able to attach and describe but you don't want to
change your network configuration and so what would that look like so if we go to the console for the resource access manager all we have to do is put in a
name for the the resource share we would basically select transit gateway as the resource that we want to share and then under the principles we would actually select or provide the accounts that we
want to share and those again could be within your organization or they could be outside of your organization and that's it so we talked about how transit
gateway is a fully managed service and it works with all other AWS services as well and we talked about how it connects with V PCs and VPNs but with launch of the transit gateway
we actually support cloud formation templates which allows you to easily automate their build process as well as being able to monitor the transit
gateway we integrate with Amazon's Cloud watch and you have metrics on packets in packets out drop packets you also can enable flow logs on your en is for all
the V pcs are attached to a transit gateway as far as pricing so there's two dimensions to pricing for the transit gateway your build hourly for every
attachment to the transit gateway as well as for data processing yet one for every gig - that's processed by the transit gateway or to the transit
gateway from each of the attachments region availability wise we are currently launched in six regions and we have more coming by the end of the year
so we talked about how transit gateway is a highly scaleable service we wanted to make sure that whether your journey started with two V pcs or a thousands of
V pcs that transit gateway could support that for you and so the transit gateway we've were supporting up to 5,000 V PC
attachments against the transit gateway as well as you're able to install up to 10,000 routes on a transit gateway and
then as Steve mentioned the the power of the routing domains and being able to create the use of flexible network topologies we're supporting up to 20
route tables so what's on our roadmap now this is kind of dangerous when you actually actually put some stuff on the roadmap right so you can't hold me to it
so we know that Direct Connect is important for our customers and so right now at launch we're supporting AWS VPN if you're a direct connect customer if you're a pulpit public directly to that
customer you can actually connect to turns a gateway using AWS VPN for a private Direct Connect we're going to be providing that support in q1 2019
this next one actually gets me excited and so when we were designing transit gateway one of the things we wanted to do was to be able to create a global network and so it's not just about having a transit gateway within a region
but what if you can connect transit gateways across regions so you have a transit gateway in your US East region and you want to be able to always be pcs in your u.s. region you want to be able
to send traffic to another read transit gateway and say Asia Pacific you can do that when this comes out and so think about how you might be able to use that
so take an example where you have a branch office that's in Virginia that basically uses a VPN connection and connects into the u.s. East region sends
traffic over to the asia-pacific region and then through a VPN connection sends traffic down to an office of Mumbai you just created a global network all within
AWS and then additionally we want to continue to provide advanced routing capabilities for our customers and we were really excited about what you can do with routing domains and if you think about that in the ability of with
routing domains that that Steve went through what else can we do for our customers and what we're looking to do is add the ability to do policy-based routing so think about policy papers
routing as being able to make routing decisions on the properties of a packet outside of just the destination IP that's gonna be powerful when you'll be
able to do that so to bring it all back home and back together is we talked about how in this journey and when we build transit gate we wanted to make it simpler to and easier for customers to
connect thousands of V pcs together you know so no matter your journey from to 2000's we want transit gateway to be that that simplifying ability we talked about how you want to share
your edge connectivity you don't want to have to make a network change every time you add a new VP C and transit gateway allows you to do that the visibility and control with transit gateway now you
have a central place where you can make all those routing policy changes and where Steve was talking about middleboxes think about that you now have the ability to put other services and share
those network services weathers network services are things like Active Directory those network services could be a firewall those network services could be other AWS services like private
link or NAT gateway or an NL B all those things work through a transit gateway now and you have one place to do that in feature interoperability we talked about
how trans gateway works with other AWS services cloud Watch metrics cloud formation flow logs and then for those customers who use VPN the on-demand
bandwidth and be able to ecmp traffic across multiple tunnels there's many different use cases where you can use that whether it's at a branch office or a backup for VP or for a Direct Connect
and then with routing we're excited to see what customers are going to do with the routing constructs that we have with routing domains and be able to use
different types of next-hop abilities that are there thank you so there are a couple of other sessions happening this week that I just wanted to draw your attention to where there's going to be
some mentions of transit gateway and first of all we have Dave Brown our VP for EC to EC to networking he's doing a leadership session tomorrow afternoon definitely I recommend you go along to
that to hear about some of the cool things we've done with networking at AWS over the past year and some of our future plans there's a session that Nick is doing on Thursday where he's going to be diving into those reference architectures some of the the ones I had
on that list and explaining how you can build those and then finally if VPN is your thing and you want more detail around VPN and our plans there what we've built out and how that interacts with transit gateway
Tommy's doing a session on Friday that I'd also highly recommend so I hope you're all as excited as we are about transit gateway we think it gives you a lot of new capabilities we're looking forward to seeing what you do with
so thank you very much for coming to the session and we'd really appreciate your feedback in the mobile app [Applause]
Loading video analysis...