-
Notifications
You must be signed in to change notification settings - Fork 0
Add Transit Gateway Deployment Guide #17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
drernie
wants to merge
6
commits into
main
Choose a base branch
from
custom-gateway
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from all commits
Commits
Show all changes
6 commits
Select commit
Hold shift + click to select a range
4ebfc6f
Add Transit Gateway deployment guide and customer analysis
drernie b5bae83
Simplify Transit Gateway guide to essential info only
drernie 001187d
Tighten Transit Gateway guide to direct, action-oriented framing
drernie bcab9da
Streamline Transit Gateway guide to essential workflow
drernie 2b8eacb
Improve Transit Gateway guide clarity and completeness
drernie a5e8b59
Anonymize Transit Gateway documentation
drernie File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,78 @@ | ||
| Hello Simon, | ||
|
|
||
| Thanks for your detailed response, | ||
|
|
||
| We do have most of the network config that you mentioned as part of 2.0 | ||
|
|
||
| My specific question would be if we can use our TGW instead of dedicated Quilt NAT Gateways? | ||
|
|
||
| Additionally, | ||
| Can Quilt function if we route 0.0.0.0/0 through Transit Gateway instead of NAT Gateway? | ||
|
|
||
| Current: Private Subnet → NAT Gateway → Internet | ||
| Desired: Private Subnet → TGW → Corporate Firewall → Internet | ||
|
|
||
| Do Lambda functions and ECS containers require direct internet access to external (non-AWS) services? | ||
| If they only call AWS services, we can use VPC Endpoints and avoid internet routing entirely. If they call external APIs/registries, we need TGW routing to work. | ||
|
|
||
| Do they call external APIs?, Pull from public Docker Hub? Download from PyPI/npm at runtime? | ||
|
|
||
| Which AWS services does Quilt need outbound access to? | ||
| Do we need to add more VPC Endpoints for all AWS services Quilt uses, so those calls bypass the firewall. Current endpoints: S3, DynamoDB, execute-api | ||
|
|
||
| Need to know if we need ECR? CloudWatch? STS? Others? | ||
| Thanks, and Regards, | ||
|
|
||
| Customer Contact | ||
|
|
||
|
|
||
| From: Simon Kohnstamm from Quilt Data, Inc. <support@quiltdata.com> | ||
| Date: Tuesday, January 27, 2026 at 9:00 AM | ||
| To: Customer Contact <contact@customer.com>, ernest <ernest@quilt.bio> | ||
| Cc: Network Team <network@customer.com>, Security Team <security@customer.com>, Infrastructure Team <infrastructure@customer.com> | ||
| Subject: [EXTERNAL] Re: Quilt application integration with Customer's Network Infrastructure | ||
|
|
||
| CAUTION: External Email. THINK BEFORE YOU CLICK. It could be a phishing email. | ||
| Do not click links or open attachments unless you recognize the sender and are expecting the attachment or link. | ||
| Hi Customer Contact, | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'm not sure how that's important but non-anonymized commits will be preserved even after PR is merged |
||
| Thanks for the detailed note. Yes, Quilt supports integration into an existing corporate network/VPC and is designed to be private-by-default. Our current "Network 2.0" architecture places most services in private subnets and supports internal-only access via private load balancers and VPC endpoints. (See README.md and t4/template/PRIVATE_ENDPOINTS.md.) | ||
| Can Quilt run inside an existing corporate network? | ||
|
|
||
| Yes. We support deploying into an existing VPC, using customer-provided subnets and security groups. For Network 2.0 (what you're on), you provide: | ||
| Private subnets for service containers | ||
| Intra subnets for DB/Search | ||
| Optional public subnets if you want an internet-facing ELB | ||
| A "UserSecurityGroup" that controls ingress to the load balancer | ||
| (and optionally, if you want the API Gateway to run inside of your VPC) a VPC Endpoint for execute-api | ||
| Network requirements / dependencies | ||
|
|
||
| Network 2.0 defaults: | ||
| Private subnets for ECS/Lambda | ||
| Intra subnets for DB/Elasticsearch | ||
| ELB defaults to internal | ||
| API Gateway and Lambdas run inside the VPC | ||
| Outbound access for private subnets is via NAT or VPC endpoints (for AWS services). If you want fully private egress, we typically use VPC endpoints for services like S3, ECR, CloudWatch, and STS. | ||
| Firewall rules / ports | ||
|
|
||
| From the deployment templates: | ||
| Inbound to ELB: TCP 443 and 80 (80 redirects to 443). | ||
| DB access: TCP 5432 is only allowed from the DB accessor security group (internal). | ||
| Everything else remains internal to the VPC and is controlled by security groups. | ||
| Best practices / documentation | ||
|
|
||
| Use Network 2.0 defaults (private-by-default) and internal ELB where possible. | ||
| Potential impacts on performance/functionality | ||
|
|
||
| No functional limitations are expected. The main impact is access path: if the ELB is internal, users will need VPN/Direct Connect/Transit Gateway connectivity. For outbound calls to AWS services, NAT or VPC endpoints are required. Performance is generally comparable; any added latency is typically due to the corporate network path rather than Quilt itself. | ||
| If helpful, we're happy to jump on a call and review your target topology (internal-only vs. internet-facing, VPC endpoint strategy, etc.) and map it to the required parameters. | ||
|
|
||
| Best regards, | ||
|
|
||
| Simon | ||
|
|
||
|
|
||
|
|
||
| Simon Kohnstamm | ||
| Service And Support | ||
| QUILT.BIO | ||
| See All Tickets | ||
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
shouldn't that belong to meta?
having customer emails in the public repo seems like especially bad idea