paws.compute (version 0.1.0)

ec2_create_transit_gateway_vpc_attachment: Attaches the specified VPC to the specified transit gateway

Description

Attaches the specified VPC to the specified transit gateway.

Usage

ec2_create_transit_gateway_vpc_attachment(TransitGatewayId, VpcId,
  SubnetIds, Options, TagSpecifications, DryRun)

Arguments

TransitGatewayId

[required] The ID of the transit gateway.

VpcId

[required] The ID of the VPC.

SubnetIds

[required] The IDs of one or more subnets. You can specify only one subnet per Availability Zone. You must specify at least one subnet, but we recommend that you specify two subnets for better availability. The transit gateway uses one IP address from each specified subnet.

Options

The VPC attachment options.

TagSpecifications

The tags to apply to the VPC attachment.

DryRun

Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.

Request syntax

svc$create_transit_gateway_vpc_attachment(
  TransitGatewayId = "string",
  VpcId = "string",
  SubnetIds = list(
    "string"
  ),
  Options = list(
    DnsSupport = "enable"|"disable",
    Ipv6Support = "enable"|"disable"
  ),
  TagSpecifications = list(
    list(
      ResourceType = "client-vpn-endpoint"|"customer-gateway"|"dedicated-host"|"dhcp-options"|"elastic-ip"|"fleet"|"fpga-image"|"host-reservation"|"image"|"instance"|"internet-gateway"|"launch-template"|"natgateway"|"network-acl"|"network-interface"|"reserved-instances"|"route-table"|"security-group"|"snapshot"|"spot-instances-request"|"subnet"|"transit-gateway"|"transit-gateway-attachment"|"transit-gateway-route-table"|"volume"|"vpc"|"vpc-peering-connection"|"vpn-connection"|"vpn-gateway",
      Tags = list(
        list(
          Key = "string",
          Value = "string"
        )
      )
    )
  ),
  DryRun = TRUE|FALSE
)

Details

If you attach a VPC with a CIDR range that overlaps the CIDR range of a VPC that is already attached, the new VPC CIDR range is not propagated to the default propagation route table.

To send VPC traffic to an attached transit gateway, add a route to the VPC route table using CreateRoute.