Which steps should the SysOps administrator take to resolve the issue?
Add a route to the route tables of the new subnets that send on-premises traffic to the virtual private gateway.
Create a ticket with AWS Support to request adding Availability Zones to the Site-to-Site VPN route configuration.
Establish a new Site-to-Site VPN connection between a virtual private gateway attached to the new Availability Zone and the on-premises data center.
Replace the Site-to-Site VPN connection with an AWS Direct Connect connection.
Explanations:
The new subnets in the new Availability Zone need to have routes to the virtual private gateway in the route table to communicate with the on-premises network.
Adding Availability Zones to the Site-to-Site VPN configuration is unnecessary, as the VPN connection does not depend on the Availability Zones. Routing is the issue.
A new Site-to-Site VPN connection is not required. The existing VPN connection is already functioning correctly, and the issue lies with routing in the VPC.
AWS Direct Connect is an alternative network connection but is unnecessary in this scenario. The issue is with VPC routing, not the type of connection.