Skip to content

Commit 23b9944

Browse files
RoRoJnerda-codes
andauthored
fix(docs): review (#5028)
* fix(docs): review * Update tutorials/bind-dns-server/index.mdx Co-authored-by: Néda <[email protected]> * fix(nextcloud): revert --------- Co-authored-by: Néda <[email protected]>
1 parent c843fdf commit 23b9944

File tree

8 files changed

+54
-128
lines changed

8 files changed

+54
-128
lines changed

pages/ipam/reference-content/ipv6.mdx

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ content:
77
paragraph: Learn about IPv6 at Scaleway - configuration, routing, security, and best practices for seamless integration and scalability. Transition smoothly with our step-by-step guide.
88
tags: ipv6 ipv4 support
99
dates:
10-
validation: 2024-11-18
10+
validation: 2025-05-27
1111
posted: 2024-11-18
1212
categories:
1313
- network
@@ -27,7 +27,7 @@ This is where **IPv6** comes in, the most recent version of the IP protocol. Eac
2727

2828
Written in human-readable form, an IPv6 address can be shown as eight groups of four hexadecimal digits, each group representing 16 bits and separated by a colon, e.g. `2001:0DB8:0000:0003:0000:01FF:0000:002E`. This can also be notated as `2001:DB8::3:0:1FF:0:2E`.
2929

30-
As well as providing a much bigger address space, IPv6 also includes a built-in network security layer (IPsec), as well as improved features for reliability and efficiency, like autoconfiguration, streamlined headers and improved Quality of Service (QoS). All leading to a more robust and secure protocol, that can potentially offer lower latency and faster data transfer.
30+
As well as providing a much bigger address space, IPv6 also includes a built-in network security layer (IPsec), as well as improved features for reliability and efficiency, like auto-configuration, streamlined headers and improved Quality of Service (QoS). All leading to a more robust and secure protocol, that can potentially offer lower latency and faster data transfer.
3131

3232
## IPv6-compatible products
3333

@@ -54,6 +54,7 @@ Go further with Instances and IPv6 in the following documentation:
5454
- [Using routed IPs](/instances/api-cli/using-routed-ips/)
5555
- Fix lost IPv6 connectivity when migrating to routed IP for old [Debian Buster images](/instances/troubleshooting/fix-lost-ip-connectivity-on-debian-buster/) or [RHEL images](/instances/troubleshooting/fix-unreachable-ipv6-rhel-based-instance/)
5656
- [Fix DNS resolution with a routed IPv6-only setup on Debian Bullseye](/instances/troubleshooting/fix-dns-routed-ipv6-only-debian-bullseye/)
57+
- [Setting a reverse IPv6 DNS record via the IPAM API](/ipam/api-cli/set-ip-reverse/)
5758

5859
### Elastic Metal and IPv6
5960

@@ -113,11 +114,15 @@ Go further with IPv6 and Load Balancers with the following documentation:
113114

114115
VPC and Private Networks are compatible with IPv6.
115116

116-
- Private Networks are dual-stack, meaning each Private Network necessarily has both an IPv4 and and an IPv6 CIDR blocks.
117+
- Private Networks are dual-stack, meaning each Private Network necessarily has both IPv4 and and IPv6 CIDR blocks.
117118
- For IPv6, this is a `/64` block, automatically created by Scaleway, guaranteed to be unique within the VPC and not overlapping with any of your other Private Networks.
118119
- All IPv6-compatible resources will automatically receive an IPv6 address when they join a Private Network, in addition to an IPv4 address.
119120
- This address can be auto-allocated from the pool, or specified by the user via a [reserved IP address](/ipam/how-to/reserve-ip/)
120-
- Scaleway VPC routing supports both IPv4 and IPv6 protocols. [Managed routes](/vpc/how-to/manage-routing/#how-to-generate-a-managed-route) to Private Networks are simultaneously generated for both IPV4 and IPV6, and both are added to the VPC's route table. Note that auto-generated managed routes to Public Gateways are only created in IPv4, since Public Gateways are not yet IPv6-compatible. [Custom routes](/vpc/how-to/manage-routing/#how-to-create-a-custom-route) are only created for the IP type specified during the creation process.
121+
- Scaleway VPC routing supports both IPv4 and IPv6 protocols. [Managed routes](/vpc/how-to/manage-routing/#how-to-generate-a-managed-route) to Private Networks are simultaneously generated for both IPv4 and IPv6, and both are added to the VPC's route table. Note that auto-generated managed routes to Public Gateways are only created in IPv4, since Public Gateways are not yet IPv6-compatible. [Custom routes](/vpc/how-to/manage-routing/#how-to-create-a-custom-route) are only created for the IP type specified during the creation process.
122+
123+
### InterLink and IPv6
124+
125+
InterLink supports both IPv4 and IPv6 traffic. Each InterLink entails two BGP sessions: one for IPv4 and one of IPv6, whereby routing information is dynamically exchanged between the external router and the Scaleway VPC vRouter. When creating a [routing policy](/interlink/concepts/#routing-policy) for your InterLink, you must separately specify the IPv4 and IPv6 routes to propagate.
121126

122127
### Serverless Functions and Containers and IPv6
123128

pages/load-balancer/how-to/add-certificate.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
meta:
33
title: How to add a certificate to your Load Balancer
4-
description: This page explains how to add a certificate to your Load Balancer
4+
description: Learn how to add an SSL/TLS certificate to your Scaleway Load Balancer to enable secure HTTPS traffic for your services
55
content:
66
h1: How to add a certificate to your Load Balancer
7-
paragraph: This page explains how to add a certificate to your Load Balancer
7+
paragraph: Learn how to add an SSL/TLS certificate to your Scaleway Load Balancer to enable secure HTTPS traffic for your services
88
dates:
9-
validation: 2024-11-18
9+
validation: 2025-05-27
1010
posted: 2022-10-20
1111
---
1212

tutorials/bind-dns-server/index.mdx

Lines changed: 23 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,44 +1,55 @@
11
---
22
meta:
33
title: Implementing a DNS server using BIND
4-
description: In this tutorial you will learn How to implement a DNS server using BIND.
4+
description: Learn how to install and configure a BIND DNS server on a Scaleway Instance to manage domain name resolution.
55
content:
66
h1: Implementing a DNS server using BIND
7-
paragraph: In this tutorial you will learn How to implement a DNS server using BIND.
7+
paragraph: Learn how to install and configure a BIND DNS server on a Scaleway Instance to manage domain name resolution.
88
tags: dns bind
99
categories:
1010
- domains-and-dns
1111
dates:
12-
validation: 2024-11-18
12+
validation: 2025-05-27
1313
posted: 2018-12-05
1414
---
1515

1616
DNS (Domain Name System) is a service that translates the IP address of computers connected to the internet into human-readable domain names, and vice versa. In an environment with a limited amount of Linux machines, it is possible to use the `/etc/hosts` file for associating an IP address to a DNS name. But when you have a large infrastructure with lots of systems/resources, `/etc/hosts` may quickly become cumbersome.
1717

18-
[BIND](https://www.isc.org/bind/) or Berkeley Internet Name Domain is open-source software that implements DNS protocols for the internet. In this tutorial, we need a DNS server machine & a client machine for testing.
18+
[BIND](https://www.isc.org/bind/) or Berkeley Internet Name Domain is open-source software that implements DNS protocols for the internet. In this tutorial, we need primary and secondary DNS server machines, in accordance with best practice to ensure redundancy. We also need a third machine (e.g. your local machine) for testing.
1919

2020
<Macro id="requirements" />
2121

2222
- A Scaleway account logged into the [console](https://console.scaleway.com)
2323
- [Owner](/iam/concepts/#owner) status or [IAM permissions](/iam/concepts/#permission) allowing you to perform actions in the intended Organization
24+
- Two [Instances](/instances/how-to/create-an-instance/) running Ubuntu, to act as the primary and secondary DNS server machines
25+
- A local machine, or a third Instance, to test from
2426
- An [SSH key](/organizations-and-projects/how-to/create-ssh-key/)
2527
- `sudo` privileges or access to the root user
2628

2729
## Installing BIND
2830

29-
1. Install the latest version of BIND 9.20 and related tools:
31+
1. Connect to the Instance that will act as the primary DNS server using [SSH](/instances/how-to/connect-to-instance/):
32+
```
33+
ssh root@<your_instance_ip>
34+
```
35+
36+
2. Update the `apt` package manager and upgrade the software already installed on the Instance to the latest version, available in Ubuntu's repositories:
37+
```
38+
apt update && apt upgrade -y
39+
40+
3. Install the latest version of BIND 9.18 and related tools:
3041
```
3142
apt-get install bind9 bind9utils bind9-doc dnsutils
3243
```
33-
2. Verify the installed version:
44+
4. Verify the installed version:
3445
```
3546
named -v
3647
```
3748
The expected output should be:
3849
```
39-
BIN 9.20.x
50+
BIND 9.18.x
4051
```
41-
52+
5. Repeat the above steps on the secondary DNS server Instance.
4253
4354
## Configuring the primary DNS server
4455
@@ -138,6 +149,8 @@ DNS (Domain Name System) is a service that translates the IP address of computer
138149
139150
### Testing the Configuration
140151
152+
Carry out the following steps on a third machine, e.g. your local machine or another Instance.
153+
141154
1. Check the primary DNS server:
142155
```bash
143156
dig @192.0.2.1 www.example.com
@@ -169,6 +182,6 @@ DNS (Domain Name System) is a service that translates the IP address of computer
169182

170183
## Conclusion
171184

172-
You have successfully configured a DNS server using BIND 9.20. You can now resolve domain names within your infrastructure or serve DNS queries to external clients.
185+
You have successfully configured a redundant DNS server using BIND 9.18. You can now resolve domain names within your infrastructure or serve DNS queries to external clients.
173186

174-
For more advanced configurations and features, refer to the [official BIND 9.20 documentation](https://kb.isc.org/docs/isc-bind-9).
187+
For more advanced configurations and features, refer to the [official BIND documentation](https://kb.isc.org/docs/isc-bind-9).

tutorials/configure-nodemcu-iot-hub/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ content:
88
categories:
99
- iot-hub
1010
dates:
11-
validation: 2024-11-18
11+
validation: 2025-05-27
1212
tags: iot iot-hub NodeMCU Arduino-IDE
1313
hero: assets/scaleway_nodemcu.webp
1414
---
Binary file not shown.
Binary file not shown.
Binary file not shown.
Lines changed: 18 additions & 110 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
22
meta:
33
title: Setting up a load-balanced WordPress
4-
description: This page shows you how to set up a load-balanced WordPress for increased availability
4+
description: Set up a Scaleway Load Balancer for WordPress to improve performance, ensure high availability, and handle traffic efficiently.
55
content:
66
h1: Setting up a load-balanced WordPress
7-
paragraph: This page shows you how to set up a load-balanced WordPress for increased availability
7+
paragraph: Set up a Scaleway Load Balancer for WordPress to improve performance, ensure high availability, and handle traffic efficiently.
88
categories:
99
- load-balancer
1010
- instances
1111
tags: WordPress Load-Balancer
1212
dates:
13-
validation: 2024-11-18
13+
validation: 2025-05-27
1414
posted: 2019-04-08
1515
---
1616

@@ -45,111 +45,19 @@ Load Balancer supports private IPs of Scaleway Instances for backend servers, al
4545

4646
## Configuring a Load Balancer
4747

48-
1. Click **Load Balancer** in the menu on the left, to enter the Load Balancer section, then click **+ Create a Load Balancer**:
49-
<Lightbox src="scaleway-lb-console.webp" alt="" />
50-
2. Enter the **Name** of the Load Balancer, optionally you can enter a description and tags to simplify the management of them. Choose the **Region** for the Load Balancer (it should be the same region as the geographical region of your Instances), and a new IP address is allocated automatically.1. Click **Load Balancer** in the menu on the left, to enter the Load Balancer section, then click **+ Create a Load Balancer**:
51-
<Lightbox src="scaleway-lb-console.webp" alt="" />
52-
3. Enter the **Name** of the Load Balancer, optionally you can enter a description and tags to simplify the management of them. Choose the **region** for the Load Balancer (it should be the same region as the geographical region of your Instances), and a new IP address is allocated automatically.
53-
4. Configure a backend rule, this rule defines the backend infrastructure that will be load-balanced.
48+
1. Follow the instructions for [creating a Load Balancer](/load-balancer/how-to/create-load-balancer/#how-to-create-a-load-balancer), with the following settings:
49+
- The same Availability Zone as your Instances
50+
- A frontend listening on port 80
51+
- A backend using HTTP protocol, listening on port 80
52+
<Message type="tip">
53+
It is also possible to use [SSL to encrypt backend connections](/tutorials/nginx-reverse-proxy/), in this case, set the port to 443.|
54+
</Message>
55+
- TLS encryption activated on the backend
56+
- Proxy protocol deactivated on the backend
57+
- The two WordPress Instances (`10.45.2.3` and `10.45.2.3`) as backend server IPs
58+
- HTTP health check
5459

55-
The following parameters should be configured in the backend rule:
56-
57-
|Parameter|Description|
58-
|----------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------|
59-
|**Backend Name**|A name for the backend rule (e.g. `wordpress-backend-rule`)|
60-
|**Protocol**|The protocol to use. Set this value to `HTTP`, to have access to HTTP-specific features of the Load Balancer|
61-
|**Port**|The port on which the backend application listens, with a standard configuration is **port 80** for a web application. It is also possible to use [SSL to encrypt backend connections](/tutorials/nginx-reverse-proxy/), in this case, set the port to 443.|
62-
|**Proxy**|This enables or disables PROXY protocol version 2 (must be supported by backend servers). It is not required for this tutorial, keep it off.|
63-
|**TLS encryption**|Enable Transport Layer Security (TLS) to encrypt connections between the Load Balancer and the backend server(s).|
64-
|**Health Check Type**|The health check type to use. To check the health of a web application, set this to `HTTP`.|
65-
|**Server IPs**|Add the two WordPress Instances (`10.45.2.3` and `10.45.2.3`) to the list of backend servers|
66-
67-
The final backend rule should look similar to the following example:
68-
69-
<Lightbox src="scaleway-lb-backend-rule.webp" alt="" />
70-
5. Click **Create a Load Balancer** to deploy the Load Balancer.
71-
72-
## Checking if the Load Balancer works
73-
74-
It is possible to check the status of the Load Balancer with an API call.
75-
It will provide you with information about the status of the Load Balancer and if the health check was successful.
76-
77-
<Message type="important">
78-
Retrieve your Organization ID and generate [API key](/iam/how-to/create-api-keys/) from your [management console](https://console.scaleway.com/project/credentials) before you continue.
79-
</Message>
80-
81-
1. Set the required variables to make the API call easier:
82-
```bash
83-
LB_ID="<LOAD_BALANCER_ID>"
84-
TOKEN="<API_SECRET_KEY>"
85-
REGION="<REGION>" # (can be either fr-par or nl-ams, depending on the load balancers region)
86-
```
87-
2. When the Load Balancer is configured and running, type the following command to request its status. Make sure that [jsonpp](https://jmhodges.github.io/jsonpp/) is installed on the machine running the above command to get an easily readable JSON output:
88-
```bash
89-
curl -X GET "https://api.scaleway.com/lb/v1/regions/$REGION/lbs/$LB_ID/stats" -H "X-Auth-Token: $SECRET_KEY" | json_pp
90-
```
91-
3. The API will provide a [JSON formatted](https://en.wikipedia.org/wiki/JSON) response like the following example:
92-
```json
93-
{
94-
"backend_servers_stats": [
95-
{
96-
"ip": "10.45.2.3",
97-
"backend_id": "cd64b4e0-2c23-484a-80b9-602bf934245e",
98-
"instance_id": "4d2294bf-4e6d-499c-922a-ca08f58ed66d",
99-
"server_state_changed_at": "2019-04-10T13:01:27Z",
100-
"server_state": "stopped",
101-
"last_health_check_status": "failed"
102-
},
103-
{
104-
"server_state": "stopped",
105-
"server_state_changed_at": "2019-04-10T13:01:27Z",
106-
"instance_id": "4d2294bf-4e6d-499c-922a-ca08f58ed66d",
107-
"ip": "10.45.2.4",
108-
"backend_id": "cd64b4e0-2c23-484a-80b9-602bf934245e",
109-
"last_health_check_status": "unknown"
110-
},
111-
{
112-
"instance_id": "bd4b6e5f-2cfb-40da-afd8-933e7afbbd61",
113-
"server_state_changed_at": "2019-04-10T13:01:27Z",
114-
"server_state": "running",
115-
"backend_id": "cd64b4e0-2c23-484a-80b9-602bf934245e",
116-
"ip": "10.45.2.3",
117-
"last_health_check_status": "passed"
118-
},
119-
{
120-
"ip": "10.45.2.4",
121-
"backend_id": "cd64b4e0-2c23-484a-80b9-602bf934245e",
122-
"instance_id": "bd4b6e5f-2cfb-40da-afd8-933e7afbbd61",
123-
"server_state_changed_at": "2019-04-10T13:01:27Z",
124-
"server_state": "running",
125-
"last_health_check_status": "passed"
126-
}
127-
]
128-
}
129-
```
130-
131-
As two Instances are configured in the backend, the JSON list contains four entries. This is due to the high availability feature of the Load Balancer. Should the master Instance experience a failure, it switches automatically to the backup one.
132-
133-
In the status of the `running` instance, the health check status (`last_health_check_status`) has `passed`. This means that the backend Instance replied well to the request sent to it in the health check. Requests to WordPress are load-balanced between the two Instances.
134-
4. Connect to the first WordPress Instance (`10.45.2.3`) and stop the web server application running on it:
135-
```bash
136-
systemctl stop nginx.service
137-
```
138-
5. Re-run the command from Step 3.
139-
6. In the JSON list, the `last_health_check_status` changed to `failed`, as the web server no longer replies to requests:
140-
```json
141-
{
142-
"last_health_check_status": "failed",
143-
"server_state": "stopped",
144-
"instance_id": "bd4b6e5f-2cfb-40da-afd8-933e7afbbd61",
145-
"ip": "10.45.2.3",
146-
"server_state_changed_at": "2019-04-10T13:32:18Z",
147-
"backend_id": "cd64b4e0-2c23-484a-80b9-602bf934245e"
148-
}
149-
```
150-
151-
When you navigate to the load-balanced IP (`http://51.51.51.51`) in your browser, your WordPress displays. The Load Balancer has automatically detected that the Nginx server on the first Instance (`10.45.2.3`) is not running anymore and redirects all traffic to the second Instance (`10.45.2.3`).
152-
7. Restart the web server application and re-run the command mentioned in step 3. The `last_health_check_status` will change again into `passed` and requests are load balanced again between the two Instances.
60+
2. Check the status of your Load Balancer's backend servers in the Scaleway console, by navigating to the Load Balancer's dashboard, then **Backends** > **Backend name** > **Server list**, where you can see the status of each server depending on its health check result.
15361

15462
## Configuring WordPress
15563

@@ -183,11 +91,11 @@ Update the configuration of each Instance now, so they will use the database on
18391
When connecting to the Instance from a web browser, the content is taken from the database on the MariaDB server.
18492
3. Log into the WordPress Admin interface and click **Settings** to configure WordPress.
18593
- Enter the IP of one of your WordPress Instances (`10.45.2.3`) in the field **WordPress Address (URL)**
186-
- Enter the **Load Balanced IP** (`51.51.51.51`) or your domain name in the field **Site Address (URL)**
94+
- Enter the **Load Balancer's public (flexible) IP address** (`51.51.51.51`) or your domain name in the field **Site Address (URL)**
18795
18896
Save the form.
18997
4. Redo this step on the second instance.
190-
5. Type the **Load Balanced IP** or your domain name in your browser, and WordPress will appear on the load balanced IP:
98+
5. Type the **Load Balancer's public (flexible) IP address** or your domain name in your browser, and WordPress will appear :
19199
<Lightbox src="scaleway-lb-wp-lbip.webp" alt="" />
192100
193-
The Load Balancer is now automatically distributing the load between your Instances. To increase the computing power of the Load Balancer, simply snapshot an Instance and spin up a new one.
101+
The Load Balancer is now automatically distributing the load between your Instances. To increase the computing power of the Load Balancer, simply [snapshot](/instances/concepts/#snapshot) an Instance and spin up a new one.

0 commit comments

Comments
 (0)