Build Transit Gateway route table entries with static routes and propagations.
Last verified: May 2026
Build Transit Gateway route table entries with static routes, associations, and propagations.
Required Fields
TransitGatewayRouteTableIdRoutes[0].DestinationCidrBlockRoutes[0].TransitGatewayAttachmentIdOutput will appear here...AWS Transit Gateway acts as a regional hub that connects VPCs, VPN connections, Direct Connect gateways, and peering attachments through a centralized routing model. Each attachment associates with one or more route tables, and traffic flow depends on route table entries — static routes, propagated routes, and blackhole routes. The Transit Gateway Route Builder helps you define route table configurations with proper CIDR destinations, attachment targets, and propagation settings so you can visualize and validate your hub-and-spoke or mesh network topology before deployment.
Your team is consolidating 30 VPCs onto a Transit Gateway with hub-and-spoke topology including a centralized inspection VPC running a firewall appliance fleet. The builder generates: separate route tables for prod, dev, and shared-services; static routes from prod and dev pointing 0.0.0.0/0 to the inspection VPC; selective propagation rules so the inspection VPC sees both prod and dev routes for return traffic. End-to-end TGW config defined in 30 minutes vs the 2-3 days of trial-and-error to figure out the right combination of associations, propagations, and static routes.
Multiple route tables on a single TGW are the killer feature. Most teams default to 'one route table for everything' and lose the segmentation benefit. Use separate route tables for prod, dev, shared-services to enforce that prod ↔ dev traffic isn't routable even if VPC peering is misconfigured.
Static routes ALWAYS win over propagated. If you're seeing unexpected traffic flows on a TGW connected to both DX and VPN, check for static routes that override BGP-propagated routes. The TGW console doesn't always make this priority obvious.
Blackhole routes are perfect for kill-switch scenarios. Need to immediately stop traffic to a CIDR (compromised on-prem subnet, decommissioned partner)? Add a blackhole route on the relevant route tables. Faster and more reliable than racing to update firewall rules across 20 VPCs.
The builder constructs Transit Gateway route table configurations: route table itself, attachment associations (which attachments use this table), propagation rules (which attachments push their routes), and static routes (CIDR + target attachment + blackhole/active flag). Output is generated as aws ec2 create-transit-gateway-route + associate-transit-gateway-route-table commands and Terraform aws_ec2_transit_gateway_route_table resources.
Was this tool helpful?
Disclaimer: This tool runs entirely in your browser. No data is sent to our servers. Always verify outputs before using them in production. AWS, Azure, and GCP are trademarks of their respective owners.