Skip to content

Commit 0f9e7ef

Browse files
fix(rdb): remove mentions of db in vpc
1 parent e7eb45c commit 0f9e7ef

File tree

5 files changed

+15
-23
lines changed

5 files changed

+15
-23
lines changed

pages/vpc/faq.mdx

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,6 @@ Yes, [VPC routing](/vpc/concepts#routing) allows you to automize the routing of
4040

4141
This is not currently possible. You may consider using a VPN tunnel to achieve this, for example [IPsec](https://en.wikipedia.org/wiki/IPsec) or [WireGuard](https://en.wikipedia.org/wiki/WireGuard). Scaleway also offers an [OpenVPN InstantApp](/tutorials/openvpn-instant-app/), making it easy to install a VPN directly on an Instance.
4242

43-
### Why can I not route traffic to my Managed Database on another Private Network?
44-
45-
Managed Databases do not currently support VPC routing - see our [dedicated documentation](/vpc/reference-content/understanding-routing/#limitations)
46-
4743
### Can I control traffic flow between my VPC's Private Networks?
4844

4945
Yes, use the [Network ACL feature](/vpc/reference-content/understanding-nacls/) to filter packets flowing between the different Private Networks of your VPC. By default, all traffic is allowed to pass, until you start to add rules to the VPC's NACL.

pages/vpc/how-to/manage-routing.mdx

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Routing is used to manage and control the flow of traffic within a VPC. It tells
1818
Read more about the VPC routing feature, including detailed explanations, usage considerations, limitations and best practices in our [dedicated reference content](/vpc/reference-content/understanding-routing/).
1919

2020
<Macro id="requirements" />
21-
21+
2222
- A Scaleway account logged into the [console](https://console.scaleway.com)
2323

2424
## How to activate routing
@@ -44,7 +44,7 @@ To activate routing on a pre-existing VPC, follow these steps:
4444
Two types of auto-generated routes exist:
4545

4646
- **Local subnet route**: Generated when you create a Private Network in a VPC. Allows traffic to be routed between different Private Networks in the VPC.
47-
- **Default route to internet**: Generated when you attach a Public Gateway to a Private Network in the VPC, and set it to advertise a [default route](/public-gateways/concepts/#default-route). Allows traffic to be routed to addresses outside the VPC (i.e. the public internet) via the gateway.
47+
- **Default route to internet**: Generated when you attach a Public Gateway to a Private Network in the VPC, and set it to advertise a [default route](/public-gateways/concepts/#default-route). Allows traffic to be routed to addresses outside the VPC (i.e. the public internet) via the gateway.
4848

4949
<Message type="note">
5050
Public Gateways remain scoped to the Private Network(s) to which they are attached. They do not advertise the default route on other Private Networks in the VPC. For example, an Instance attached to Private Network A will not be able to access the internet via a Public Gateway in Private Network B.
@@ -64,17 +64,17 @@ Your VPC's **route table** can be found in its **Routing** tab. The route table
6464

6565
Routes are automatically generated and added to the route table when you:
6666

67-
- Create a Private Network in the VPC (this generates a **local subnet route**, which allows the VPC to automatically route traffic between Private Networks), or
67+
- Create a Private Network in the VPC (this generates a **local subnet route**, which allows the VPC to automatically route traffic between Private Networks), or
6868
- Attach a Public Gateway to a Private Network and set it to advertise a default route. This generates a **default route to the internet**.
6969
- Create a custom route
70-
70+
7171
When your route table starts to populate, it will look something like this:
7272

7373
<Lightbox src="scaleway-route-table.webp" alt="" />
7474

7575
For help with understanding the route table and how to read it, [refer to our documentation about route tables](/vpc/reference-content/understanding-routing/#route-table).
7676

77-
### How to view VPC routes in IPV6
77+
### How to view VPC routes in IPV6
7878

7979
Scaleway VPC routing supports both IPv4 and IPv6 protocols. Managed routes to Private Networks are simultaneously generated for both IPV4 and IPV6, and both are added to the route table. Use the toggle above the route table to switch from the default view of **IPV4** routes to a view of **IPV6** routes.
8080

@@ -110,7 +110,7 @@ Follow the steps below to define a custom route:
110110

111111
8. Enter a **next hop** for the route. The VPC will route traffic for the destination IP to the resource designated as next hop.
112112
- Select the Private Network which the next hop resource is attached to.
113-
- Select a resource type: **Instance**, **Public Gateway** or **Elastic Metal**. Routing is not yet compatible with Managed Databases, nor with other types of Scaleway resources which are not integrated with VPC.
113+
- Select a resource type: **Instance**, **Public Gateway** or **Elastic Metal**.
114114
- Select the **name** of the specific resource you want to route traffic to. The resource must be attached to a Private Network in this VPC.
115115

116116
<Message type="note">
@@ -123,15 +123,15 @@ Follow the steps below to define a custom route:
123123

124124
### How to fix a broken custom route
125125

126-
If you delete a resource used as a next hop in a custom route, or detach it from the Private Network, the custom route will cease to function. A **Not found!** warning will display in the **Next hop** column for this route in the route table.
126+
If you delete a resource used as a next hop in a custom route, or detach it from the Private Network, the custom route will cease to function. A **Not found!** warning will display in the **Next hop** column for this route in the route table.
127127

128128
<Lightbox src="scaleway-route-not-found.webp" alt="A VPC route table displays in the Scaleway console, with a red 'Not found!' text in the next hop column of a custom route" />
129129

130130
To resolve this, you must either:
131131

132132
- [Reattach the next hop resource to the Private Network](/vpc/how-to/attach-resources-to-pn/#how-to-attach-a-resource-to-a-private-network) **and** then [edit the route](#how-to-edit-a-custom-route) to reselect the next hop resource, or
133133
- [Edit the route](#how-to-edit-a-custom-route) to select a new next hop, or
134-
- [Delete the route](#how-to-delete-a-custom-route)
134+
- [Delete the route](#how-to-delete-a-custom-route)
135135

136136
## How to edit a custom route
137137

pages/vpc/reference-content/understanding-nacls.mdx

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,18 +50,18 @@ When defining a NACL rule, you must enter the following settings:
5050
- **Protocol**: Either `TCP`, `UDP`, or `ICMP`. The rule will apply only to traffic matching this protocol. Alternatively, you can choose to apply it to traffic matching any protocol.
5151

5252
- **Source** and **destination**: The rule will apply to traffic originating from this source and being sent to this destination. For both, enter an IP range in [CIDR format](/vpc/concepts/#cidr-block), and a port or port range. Alternatively, you can opt for the rule to apply to all IPs and/or all ports.
53-
53+
5454
- **Action**: The NACL will either **Allow** (accept) or **Deny** (drop) traffic that matches the rule, to proceed to its destination.
5555

5656
## Rule priority and application
5757

58-
The Network Access Control List should be read from top to bottom. Rules closer to the top of the list are applied first. If traffic matches a rule for an **Allow** or **Deny** action, the action is applied immediately. That traffic is not then subject to any further filtering or any further actions by any rules that follow.
58+
The Network Access Control List should be read from top to bottom. Rules closer to the top of the list are applied first. If traffic matches a rule for an **Allow** or **Deny** action, the action is applied immediately. That traffic is not then subject to any further filtering or any further actions by any rules that follow.
5959

6060
## Statelessness
6161

6262
**NACL rules are stateless**. This means the state of connections is not tracked, and inbound and outbound traffic is filtered separately. Return traffic is not automatically allowed, just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
6363

64-
Therefore, if you create a rule to allow traffic in one direction, you may also need a separate rule to allow the response in the opposite direction.
64+
Therefore, if you create a rule to allow traffic in one direction, you may also need a separate rule to allow the response in the opposite direction.
6565

6666
## Default rule
6767

@@ -77,7 +77,7 @@ The table below shows an example of a NACL for IPv4 traffic:
7777

7878
<Lightbox src="scaleway-nacl-example.webp" alt="A table shows a number of NACL rules" />
7979

80-
- A number of TCP rules allow connections to the specific ports necessary for SSH, HTTP, and HTTPS traffic. These rules allow all IPv4 sources within the VPC to connect to these ports, for all IPv4 destinations.
80+
- A number of TCP rules allow connections to the specific ports necessary for SSH, HTTP, and HTTPS traffic. These rules allow all IPv4 sources within the VPC to connect to these ports, for all IPv4 destinations.
8181

8282
- An ICMP rule allows all ICMP traffic from/to all IPv4 addresses on all ports, effectively permitting all ping requests within the VPC to function.
8383

@@ -95,9 +95,9 @@ Network ACLs cannot be used to block or filter the traffic to or from the follow
9595
- Scaleway DHCP
9696
- Scaleway Instance metadata
9797
- Kubernetes Kapsule task metadata endpoints
98-
- License activation for Windows installation on Elastic Metal or Instances
98+
- License activation for Windows installation on Elastic Metal or Instances
9999

100-
NACLs have the same resource limitations as [VPC routing](/vpc/reference-content/understanding-routing/#limitations), they cannot currently be used to filter Managed Database traffic, though this functionality is planned for the future.
100+
NACLs have the same resource limitations as [VPC routing](/vpc/reference-content/understanding-routing/#limitations).
101101

102102
NACLs are currently available only via the Scaleway API and developer tools. They are not yet available in the Scaleway console.
103103

pages/vpc/troubleshooting/vpc-limitations.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ This page sets out some current limitations of Scaleway's VPC.
2727
- Managed Databases for Redis™ (only during the process of creating the database)
2828
- Kubernetes Kapsule (only during the process of creating the Kapsule cluster)
2929
- Private Networks are not supported on some legacy Instance offers which have reached EOL, e.g. `VC1`, `START1` and `X64-*GB`. Note that all Instance offers in the [current product catalogue](https://www.scaleway.com/en/pricing/?tags=compute) are supported.
30-
- Managed Databases are not currently compatible with VPC routing. The VPC cannot automatically route between Managed Databases on different Private Networks, or (for example) between a Managed Database on one Private Network and an Instance on a different Private Network.
30+

pages/vpc/troubleshooting/vpc-pn-routing-connectivity-issues.mdx

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,6 @@ You may have problems with connectivity between resources in a VPC or Private Ne
1717

1818
This page helps you solve potential errors that are related to VPC connectivity and routing.
1919

20-
## My Managed Database cannot communicate with other resources in my VPC
21-
22-
This is normal, as VPC routing is not yet supported by Managed Databases for PostgreSQL and MySQL, nor Managed Databases for Redis. Adding support for Managed Databases is planned for the future.
23-
2420
## I cannot deactivate routing on my VPC
2521

2622
This is standard behavior:

0 commit comments

Comments
 (0)