You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: network/vpc/how-to/create-private-network.mdx
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,6 +48,10 @@ While DHCP is built into all new Private Networks, it may not be automatically a
48
48
49
49
6. Click **Create Private Network** to finish. Your Private Network is created.
50
50
51
+
<Messagetype="tip">
52
+
See our [Basic VPC use case](/network/vpc/reference-content/use-case-basic/) documentation for full details of how to create a simple infrastructure that leverages the advantages of Private Networks, including accompanying Terraform templates.
53
+
</Message>
54
+
51
55
## How to configure CIDR
52
56
53
57
Private Networks have built-in **D**ynamic **H**ost **C**onfiguration **P**rotocol (DHCP). DHCP manages the allocation of private IP addresses to resources attached to the network. For this purpose, a **C**lassless **I**nter-**D**omain **R**outing (CIDR) block is defined for each Private Network, from which IP addresses will be assigned. In fact, both an IPv4 and an IPv6 CIDR block are defined.
Copy file name to clipboardExpand all lines: network/vpc/index.mdx
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,9 +6,11 @@ meta:
6
6
7
7
<Alert
8
8
sentiment="info"
9
-
title="Getting the most from your Private Networks"
9
+
title="VPC Basic Use Case"
10
10
>
11
-
Learn how to optimize your Scaleway VPCs, Private Networks and resource connectivity with [our new guide](/network/vpc/reference-content/getting-most-private-networks/) detailing tips and best practices.
11
+
Read our [Basic VPC use case](/network/vpc/reference-content/use-case-basic/) documentation for full details of how to create a simple infrastructure that leverages the advantages of Private Networks, including accompanying Terraform templates.
Copy file name to clipboardExpand all lines: network/vpc/reference-content/getting-most-private-networks.mdx
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,6 +49,10 @@ For example, you may use one Private Network for frontend resources and another
49
49
50
50
When [creating a Private Network](/network/vpc/how-to/create-private-network/), you can let Scaleway automatically generate a CIDR block for it that is guaranteed to be unique in this VPC. All resources attached to the Private Network get a private IP address from this block. However, you also have the option to define your own CIDR block for the network. Ensure you choose a prefix and network size that is appropriate for your needs, does not overlap with that of any other Private Network in the VPC, and contains enough IP addresses for all resources that will be attached to the Private Network.
51
51
52
+
<Messagetype="tip">
53
+
See our [Basic VPC use case](/network/vpc/reference-content/use-case-basic/) documentation for full details of how to create a simple infrastructure that leverages the advantages of Private Networks, including accompanying Terraform templates.
54
+
</Message>
55
+
52
56
## Attaching resources to Private Networks
53
57
54
58
When you attach a resource (e.g. an Instance, an Elastic Metal server) to a Private Network, you can either:
Copy file name to clipboardExpand all lines: network/vpc/reference-content/use-case-basic.mdx
+39-3Lines changed: 39 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,6 +33,8 @@ This is a basic infrastructure to leverage VPC isolation:
33
33
- Administrators can access the Instances via the [Public Gateway](/network/public-gateways/concepts/#public-gateway).
34
34
- External services are accessed by the Instances via the Public Gateway.
35
35
36
+
Full [Terraform templates](#terraform) are available for this infrastructure.
37
+
36
38
## Detail
37
39
38
40
User requests go via a domain name, whose DNS record points to the public flexible IP of a Scaleway Load Balancer. This Load Balancer is attached to a **Private Network** in a **VPC**. It distributes user traffic to multiple **Instances** which are also attached to the Private Network, and do not have their own public/flexible IP addresses. These Instances are accessible only from within the VPC. The Instances can store data to and retrieve data from **Block Storage** and a **Managed Database** attached to the same Private Network and not exposed to the internet.
@@ -89,8 +91,42 @@ Follow the steps below to create this infrastructure using the [Scaleway console
89
91
90
92
## Terraform
91
93
92
-
A Terraform template for this architecture is provided in full on our [Terraform Scaleway Provider pages](TODO-LINK). Terraform allows you to create Infrastructure as Code (IaC) to build, configure and manage your infrastructure with configuration files, rather than with the Scaleway console. The following snippet shows an extract of the configuration file:
94
+
Terraform templates for this architecture are provided in full on our [Scaleway Terraform Examples repo](https://github.com/scaleway/terraform-examples/tree/main/demo-vpc-app/). Terraform allows you to create Infrastructure as Code (IaC) to build, configure and manage your infrastructure with configuration files, rather than with the Scaleway console.
95
+
96
+
The templates include an example "Task Tracker" application to show how the infrastructure is used. The application is containerized using Docker, deployed on an Instance in the Private Network and leverages PostgreSQL for data storage. Full instructions are provided for creating the infrastructure with Terraform and deploying the test application.
97
+
98
+
The following snippet shows an extract of the configuration file:
0 commit comments