You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/managed-databases-for-postgresql-and-mysql/how-to/connect-database-private-network.mdx
-6Lines changed: 0 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,12 +63,6 @@ Managed Databases for PostgreSQL and MySQL are currently not compatible with the
63
63
You can use Public Gateways in [SSH bastion](/public-gateways/how-to/use-ssh-bastion/) mode and perform port forwarding.
64
64
</Message>
65
65
66
-
<Messagetype="tip">
67
-
If you are using Scaleway Kubernetes Kapsule, you can use the [scaleway-k8s-vpc](https://github.com/Sh4d1/scaleway-k8s-vpc) GitHub project to connect a Database Instance to your pods using a Private Network.<br /><br />
68
-
Once your Kapsule node is connected to the Private Network you can directly reach the database by using the assigned service IP. There is no need to expose it through a Kubernetes resource like a service. The database is ready to use out of the box. <br /><br />
69
-
**The `scaleway-k8s-vpc` is not an officially supported by Scaleway.**
70
-
</Message>
71
-
72
66
## How to detach a Database Instance from a Private Network
73
67
74
68
1. Click **PostgreSQL and MySQL** under **Managed Databases** on the side menu. A list of your Database Instances displays.
Copy file name to clipboardExpand all lines: pages/managed-databases-for-postgresql-and-mysql/how-to/create-a-database.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ Compared to traditional database management, which requires customers to provide
50
50
- Choose your storage type and capacity. Two types of storage are available:
51
51
-**Block Storage Legacy** - With this type, your storage is decoupled from your compute resources. You can increase your storage space without changing your node type. You can define your storage capacity by entering the desired amount in the box. The volume can be increased up to 10 TB.
52
52
53
-
-**Block Storage**: This storage type works like the [Block Storage Legacy](/managed-databases-for-postgresql-and-mysql/concepts/#block-storage-legacy), while providing lower latency and high resiliency through 5k IOPS. You can increase your volume to up to 10 TB.
53
+
-**Block Storage**: This storage type works like Block Storage Legacy, while providing lower latency and high resiliency through 5k or 15k IOPS. You can increase your volume to up to 10 TB.
54
54
55
55
-**Local SSD Storage** - Your storage is fixed and tied to your compute resource.
Copy file name to clipboardExpand all lines: pages/managed-databases-for-redis/how-to/create-a-database-for-redis.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ Managed Database for Redis™<sup>*</sup> is a low-latency caching solution base
38
38
- Select a node type.
39
39
4. Configure your Network. You can select either:
40
40
41
-
-**Private Network**: allows your databases to communicate in an isolated and secure network without requiring a public IP address. If you select this option, you must either:
41
+
-**Attach to Private Network**: allows your databases to communicate in an isolated and secure network without requiring a public IP address. If you select this option, you must either:
42
42
- select an existing Private Network to attach from the drop-down or
43
43
- create and attach a new one
44
44
@@ -48,7 +48,7 @@ Managed Database for Redis™<sup>*</sup> is a low-latency caching solution base
48
48
- Managed Databases for Redis™ are currently not compatible with the [Static NAT](/public-gateways/concepts/#nat) feature of [Scaleway Public Gateways](/public-gateways/concepts/#public-gateway). You can use Public Gateways in [SSH bastion](/public-gateways/how-to/use-ssh-bastion/) mode and perform port forwarding.
49
49
</Message>
50
50
51
-
-**Public network**: resources in a public network are publicly visible by default. The default Access Control List (ACL) settings allow anybody to connect to resources in your network. You can restrict access by configuring ACLs.
51
+
-**Set up public connectivity**: resources in a public network are publicly visible by default. The default Access Control List (ACL) settings allow anybody to connect to resources in your network. You can restrict access by configuring ACLs.
52
52
5. Complete the remaining steps in the creation wizard:
53
53
- Create credentials: add a name and set a password for your user.
For multiple nodes, replace `{db-instance-id}` with the Database Instance UUID of each respective Instance, and `{privateNetworkId}` with the `ID` of your Private Network:
To connect to a MongoDB® via a Private Network, use the following command: `mongosh "mongodb+srv://{username}:{password}@{instance_id}.{private_network_id}.internal/?tls=true&tlsCAFile={tls_certificate}"`. Make sure you replace the variables indicated within the `{}` with their corresponding values.
71
+
</Message>
81
72
82
-
### Python
73
+
### With Pymongo
83
74
84
75
The following code shows you how to use the `pymongo` library to connect using TLS.
To connect to a MongoDB® via a Private Network, use the following connection string: `connection_string = f"mongodb+srv://{username}:{password}@{instance_id}.{private_network_id}.internal/?tls=true&tlsCAFile={tls_certificate}"`. Make sure you replace the variables indicated within the `{}` with their corresponding values.
111
+
</Message>
118
112
119
-
### Node.js
113
+
### With Node.js
120
114
121
115
The following code shows you how to use the `mongodb` module to connect using TLS.
[Private Networks](/vpc/concepts/#private-networks) allows you to enhance the security of your system's architecture by isolating it from the internet.
18
+
19
+
Using Private Networks improves performance by reducing the latency between your application and your database nodes. It also increases the security of your databases, as Instances in your Private Network can directly communicate with your Database Instance, without passing through the public internet.
20
+
21
+
You can [create new Database Instances](/managed-mongodb-databases/how-to/create-a-database-instance) to attach to your Private Network, or attach existing ones.
22
+
23
+
<Macroid="requirements" />
24
+
25
+
- A Scaleway account logged into the [console](https://console.scaleway.com)
26
+
-[Owner](/iam/concepts/#owner) status or [IAM permissions](/iam/concepts/#permission) allowing you to perform actions in the intended Organization
27
+
- A valid [API key](/iam/how-to/create-api-keys/)
28
+
- A [Managed MongoDB® Database Instance](/managed-mongodb-databases/how-to/create-a-database-instance)
29
+
30
+
## How to attach a Database Instance to a Private Network
31
+
32
+
<Messagetype="note">
33
+
You can only attach your Database Instance to one Private Network at a time.
34
+
</Message>
35
+
36
+
1. Click **MongoDB®** under **Managed Databases** on the side menu. A list of your Database Instances displays.
37
+
2. Click the database name or <Iconname="more" />, then click **More info** to access the Database Instance information page.
38
+
3. Scroll to the **Network** section.
39
+
4. Click **Attach Private Network** next to **Private endpoint**. A pop-up appears.
40
+
5. Choose one or both of the options below:
41
+
- Select and attach an existing Private Network and select the network from the drop-down list.
42
+
<Messagetype="important">
43
+
The Database Instance must be attached to a Private Network in the same region.
44
+
</Message>
45
+
- Create and attach a new Private Network and enter the name of the network in the form.
46
+
<Messagetype="important">
47
+
If you select this option, a Private Network with default settings will be created in the same region as your Database Instance. Do not use a TLD (e.g. `dev` or `cloud`) as a name, to avoid conflicts.
48
+
</Message>
49
+
6. Click **Attach to Private Network** to conclude.
50
+
51
+
<Messagetype="note">
52
+
Managed MongoDB® is currently not compatible with the [Static NAT](/public-gateways/concepts/#nat) feature of [Scaleway Public Gateways](/public-gateways/concepts/#public-gateway). You can use Public Gateways in [SSH bastion](/public-gateways/how-to/use-ssh-bastion/) mode and perform port forwarding.
53
+
</Message>
54
+
55
+
<Messagetype="tip">
56
+
Once you have attached your Database Instance to a Private Network, you can [connect to the Database Instance](/managed-mongodb-databases/how-to/connect-database-instance) using the private endpoint connection string.
57
+
</Message>
58
+
59
+
## How to detach a Database Instance from a Private Network
60
+
61
+
1. Click **MongoDB®** under **Managed Databases** on the side menu. A list of your Database Instances displays.
62
+
2. Click the database name or <Iconname="more" />, then click **More info** to access the Database Instance information page.
63
+
3. Scroll to the **Network** section.
64
+
4. Click **Detach Private Network**. A pop-up appears.
65
+
5. Click **Detach resource** to confirm.
66
+
67
+
<Messagetype="note">
68
+
This action takes a few moments to complete. During this time, your Database Instance:
69
+
- remains available,
70
+
- goes into **Configuring** mode, and
71
+
- network configuration actions become unavailable
0 commit comments