Skip to content

Commit e73dc79

Browse files
ldecarvalho-docjcirinosclwyiManuRoRoJ
authored
fix(rdb): vpc routing (#5073)
* fix(rdb): vpc routing * fix(rdb): remove mentions of db in vpc * fix(rdb): routing Co-authored-by: Jessica <[email protected]> * Update connect-database-private-network.mdx update frontmatter * Update understanding-nacls.mdx update frontmatter * Update understanding-routing.mdx update frontmatter * fix(vpcrdb): correct routing info --------- Co-authored-by: Jessica <[email protected]> Co-authored-by: numa <[email protected]> Co-authored-by: Rowena <[email protected]>
1 parent 58635c1 commit e73dc79

File tree

7 files changed

+43
-39
lines changed

7 files changed

+43
-39
lines changed

pages/managed-databases-for-postgresql-and-mysql/how-to/connect-database-private-network.mdx

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,18 +18,21 @@ This improves performance by reducing the latency between your application and y
1818

1919
You can create new Database Instances to attach to your Private Network, or attach existing ones.
2020

21-
<Requirements />
21+
<Message type="note">
22+
Managed PostgreSQL and MySQL Database Instances created after July 28th 2025 are compatible with the [VPC routing](/vpc/concepts/#routing) feature, which allows you to connect one or more Database Instances in a Private Network to resources in other Private Networks of the same VPC. Maintenance scheduled for later in August 2025 will make all pre-existing Managed PostgreSQL and MySQL Database Instances compatible as well. Refer to the [How to manage routing](/vpc/how-to/manage-routing/) documentation page for more information about VPC routing.
23+
</Message>
2224

25+
<Requirements />
2326
- A Scaleway account logged into the [console](https://console.scaleway.com)
2427
- [Owner](/iam/concepts/#owner) status or [IAM permissions](/iam/concepts/#permission) allowing you to perform actions in the intended Organization
2528
- A valid [API key](/iam/how-to/create-api-keys/)
2629
- A [PostgreSQL or MySQL Database Instance](/managed-databases-for-postgresql-and-mysql/quickstart/)
2730

2831
## How to attach a Database Instance to a Private Network
2932

30-
<Message type="note">
31-
You can only attach your Database Instance to one Private Network at a time.
32-
</Message>
33+
<Message type="note">
34+
You can only attach your Database Instance to one Private Network at a time.
35+
</Message>
3336

3437
1. Click **PostgreSQL and MySQL** under **Databases** on the side menu. A list of your Database Instances displays.
3538
2. Select the geographical region of the Instance you want to manage from the drop-down.
@@ -72,4 +75,4 @@ This action takes a few moments to complete. During this time, your Database Ins
7275
- remains available,
7376
- goes into **Configuring** mode, and
7477
- network configuration actions become unavailable
75-
</Message>
78+
</Message>

pages/vpc/faq.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,10 +34,6 @@ Yes, [VPC routing](/vpc/concepts#routing) allows you to automize the routing of
3434

3535
This is not currently possible. You may consider using a VPN tunnel to achieve this, for example [IPsec](https://en.wikipedia.org/wiki/IPsec) or [WireGuard](https://en.wikipedia.org/wiki/WireGuard). Scaleway also offers an [OpenVPN InstantApp](/tutorials/openvpn-instant-app/), making it easy to install a VPN directly on an Instance.
3636

37-
### Why can I not route traffic to my Managed Database on another Private Network?
38-
39-
Managed Databases do not currently support VPC routing - see our [dedicated documentation](/vpc/reference-content/understanding-routing/#limitations)
40-
4137
### Can I control traffic flow between my VPC's Private Networks?
4238

4339
Yes, use the [Network ACL feature](/vpc/reference-content/understanding-nacls/) to filter packets flowing between the different Private Networks of your VPC. By default, all traffic is allowed to pass, until you start to add rules to the VPC's NACL.
@@ -46,6 +42,10 @@ Yes, use the [Network ACL feature](/vpc/reference-content/understanding-nacls/)
4642
NACLs are currently in Public Beta, and configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console.
4743
</Message>
4844

45+
### Why can I not route traffic to my Managed Database on another Private Network?
46+
47+
Only Managed PostgreSQL and MySQL Database Instances created after July 28th 2025 are compatible with [VPC routing](/vpc/concepts/#routing). Maintenance scheduled for later in August 2025 will make all pre-existing Managed PostgreSQL and MySQL Database Instances compatible as well.
48+
4949
### How are NACLs different from security groups?
5050

5151
[Security groups](/instances/how-to/use-security-groups/) filter **public** traffic on your Instances, whereas NACLs filter traffic to/from Private Networks only.

pages/vpc/how-to/manage-routing.mdx

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Routing is used to manage and control the flow of traffic within a VPC. It tells
1818
Read more about the VPC routing feature, including detailed explanations, usage considerations, limitations and best practices in our [dedicated reference content](/vpc/reference-content/understanding-routing/).
1919

2020
<Requirements />
21-
21+
2222
- A Scaleway account logged into the [console](https://console.scaleway.com)
2323

2424
## How to activate routing
@@ -44,7 +44,7 @@ To activate routing on a pre-existing VPC, follow these steps:
4444
If you created your VPC before July 1st 2025, you must manually update its routing behavior in order to get the following capabilities:
4545

4646
- Advertisement of custom routes across the entire VPC as standard.
47-
- Option to enable each Private Network in the VPC to receive default route advertisements not only from their locally attached Public Gateways, but from other Public Gateways (or default custom routes) attached to different Private Networks throughout the whole VPC.
47+
- Option to enable each Private Network in the VPC to receive default route advertisements not only from their locally attached Public Gateways, but from other Public Gateways (or default custom routes) attached to different Private Networks throughout the whole VPC.
4848

4949
For more information on these new routing behaviors, see our [detailed documentation](/vpc/reference-content/understanding-routing/#updating-routing-behavior).
5050

@@ -78,10 +78,10 @@ Your VPC's **route table** can be found in its **Routing** tab. The route table
7878

7979
Routes are automatically generated and added to the route table when you:
8080

81-
- Create a Private Network in the VPC (this generates a **local subnet route**, which allows the VPC to automatically route traffic between Private Networks), or
81+
- Create a Private Network in the VPC (this generates a **local subnet route**, which allows the VPC to automatically route traffic between Private Networks), or
8282
- Attach a Public Gateway to a Private Network and set it to advertise a default route. This generates a **default route to the internet**.
8383
- Create a custom route
84-
84+
8585
When your route table starts to populate, it will look something like this:
8686

8787
<Lightbox image={image} alt="" />
@@ -93,12 +93,12 @@ Your VPC's **route table** can be found in its **Routing** tab. The route table
9393
Two types of auto-generated routes exist for VPCs:
9494

9595
- **Local subnet route**: Generated when you create a Private Network in a VPC. Allows traffic to be routed between different Private Networks in the VPC.
96-
- **Default route to internet**: Generated when you attach a Public Gateway to a Private Network in the VPC, and set it to advertise a [default route](/public-gateways/concepts/#default-route). Allows traffic to be routed to addresses outside the VPC (i.e. the public internet) via the gateway.
96+
- **Default route to internet**: Generated when you attach a Public Gateway to a Private Network in the VPC, and set it to advertise a [default route](/public-gateways/concepts/#default-route). Allows traffic to be routed to addresses outside the VPC (i.e. the public internet) via the gateway.
9797

9898
<Message type="note">
99-
By default, Public Gateways remain scoped to the Private Network(s) to which they are attached. They do not, as standard, advertise the default route on other Private Networks in the VPC.
99+
By default, Public Gateways remain scoped to the Private Network(s) to which they are attached. They do not, as standard, advertise the default route on other Private Networks in the VPC.
100100

101-
However, each Private Network can opt in to receive default route advertisements from across the entire VPC, rather than only from locally attached gateways. This allows them to find a route to the internet even if there is no Public Gateway or default custom route on their own Private Network. See our [dedicated documentation](/vpc/reference-content/understanding-routing/#default-routes) for full details.
101+
However, each Private Network can opt in to receive default route advertisements from across the entire VPC, rather than only from locally attached gateways. This allows them to find a route to the internet even if there is no Public Gateway or default custom route on their own Private Network. See our [dedicated documentation](/vpc/reference-content/understanding-routing/#default-routes) for full details.
102102
</Message>
103103

104104
You cannot delete managed routes, as their lifecycle is fully managed by Scaleway. The route will be automatically deleted for you when you delete the Private Network or Public Gateway that it concerns.
@@ -136,10 +136,10 @@ Each Private Network must individually opt in to receive all these default route
136136

137137
3. Click the **Manage default routes** button.
138138

139-
A screen displays, showing a list of all the Private Networks in your VPC.
140-
139+
A screen displays, showing a list of all the Private Networks in your VPC.
140+
141141
The **Local default route** column shows whether or not a default route is already advertised locally in the Private Network via an attached Public Gateway or custom route.
142-
142+
143143
4. Click the checkbox next to each Private Network that you want to receive all default routes from throughout the VPC.
144144

145145
5. Click **Apply scope** when finished.
@@ -149,7 +149,7 @@ Each Private Network must individually opt in to receive all these default route
149149
</TabsTab>
150150
</Tabs>
151151

152-
### How to view VPC routes in IPv6
152+
### How to view VPC routes in IPv6
153153

154154
Scaleway VPC routing supports both IPv4 and IPv6 protocols. Managed routes to Private Networks are simultaneously generated for both IPV4 and IPV6, and both are added to the route table. Use the toggle above the route table to switch from the default view of **IPV4** routes to a view of **IPV6** routes.
155155

@@ -193,7 +193,7 @@ Follow the steps below to define a custom route:
193193

194194
8. Enter a **next hop** for the route. The VPC will route traffic for the destination IP to the resource designated as next hop.
195195
- Select the Private Network which the next hop resource is attached to.
196-
- Select a resource type: **Instance**, **Public Gateway** or **Elastic Metal**. Routing is not yet compatible with Managed Databases, nor with other types of Scaleway resources which are not integrated with VPC.
196+
- Select a resource type, e.g. **Instance**, **Public Gateway** or **Elastic Metal**.
197197
- Select the **name** of the specific resource you want to route traffic to. The resource must be attached to a Private Network in this VPC.
198198

199199
<Message type="note">
@@ -206,15 +206,15 @@ Follow the steps below to define a custom route:
206206

207207
### How to fix a broken custom route
208208

209-
If you delete a resource used as a next hop in a custom route, or detach it from the Private Network, the custom route will cease to function. A **Not found!** warning will display in the **Next hop** column for this route in the route table.
209+
If you delete a resource used as a next hop in a custom route, or detach it from the Private Network, the custom route will cease to function. A **Not found!** warning will display in the **Next hop** column for this route in the route table.
210210

211211
<Lightbox image={image3} alt="A VPC route table displays in the Scaleway console, with a red 'Not found!' text in the next hop column of a custom route" />
212212

213213
To resolve this, you must either:
214214

215215
- [Reattach the next hop resource to the Private Network](/vpc/how-to/attach-resources-to-pn/#how-to-attach-a-resource-to-a-private-network) **and** then [edit the route](#how-to-edit-a-custom-route) to reselect the next hop resource, or
216216
- [Edit the route](#how-to-edit-a-custom-route) to select a new next hop, or
217-
- [Delete the route](#how-to-delete-a-custom-route)
217+
- [Delete the route](#how-to-delete-a-custom-route)
218218

219219
## How to edit a custom route
220220

pages/vpc/reference-content/understanding-nacls.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -48,18 +48,18 @@ When defining a NACL rule, you must enter the following settings:
4848
- **Protocol**: Either `TCP`, `UDP`, or `ICMP`. The rule will apply only to traffic matching this protocol. Alternatively, you can choose to apply it to traffic matching any protocol.
4949

5050
- **Source** and **destination**: The rule will apply to traffic originating from this source and being sent to this destination. For both, enter an IP range in [CIDR format](/vpc/concepts/#cidr-block), and a port or port range. Alternatively, you can opt for the rule to apply to all IPs and/or all ports.
51-
51+
5252
- **Action**: The NACL will either **Allow** (accept) or **Deny** (drop) traffic that matches the rule.
5353

5454
## Rule priority and application
5555

56-
The Network Access Control List should be read from top to bottom. Rules closer to the top of the list are applied first. If traffic matches a rule for an **Allow** or **Deny** action, the action is applied immediately. That traffic is not then subject to any further filtering or any further actions by any rules that follow.
56+
The Network Access Control List should be read from top to bottom. Rules closer to the top of the list are applied first. If traffic matches a rule for an **Allow** or **Deny** action, the action is applied immediately. That traffic is not then subject to any further filtering or any further actions by any rules that follow.
5757

5858
## Statelessness
5959

6060
**NACL rules are stateless**. This means the state of connections is not tracked, and inbound and outbound traffic is filtered separately. Return traffic is not automatically allowed just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
6161

62-
Therefore, if you create a rule to allow traffic in one direction, you may also need a separate rule to allow the response in the opposite direction.
62+
Therefore, if you create a rule to allow traffic in one direction, you may also need a separate rule to allow the response in the opposite direction.
6363

6464
## Default rule
6565

@@ -75,7 +75,7 @@ The table below shows an example of a NACL for IPv4 traffic:
7575

7676
<Lightbox image={image3} alt="A table shows a number of NACL rules" />
7777

78-
- A number of TCP rules allow connections to the specific ports necessary for SSH, HTTP, and HTTPS traffic. These rules allow all IPv4 sources within the VPC to connect to these ports, for all IPv4 destinations.
78+
- A number of TCP rules allow connections to the specific ports necessary for SSH, HTTP, and HTTPS traffic. These rules allow all IPv4 sources within the VPC to connect to these ports, for all IPv4 destinations.
7979

8080
- An ICMP rule allows all ICMP traffic from/to all IPv4 addresses on all ports, effectively permitting all ping requests within the VPC to function.
8181

@@ -93,9 +93,9 @@ Network ACLs cannot be used to block or filter the traffic to or from the follow
9393
- Scaleway DHCP
9494
- Scaleway Instance metadata
9595
- Kubernetes Kapsule task metadata endpoints
96-
- License activation for Windows installation on Elastic Metal or Instances
96+
- License activation for Windows installation on Elastic Metal or Instances
9797

98-
NACLs have the same resource limitations as [VPC routing](/vpc/reference-content/understanding-routing/#limitations), they cannot currently be used to filter Managed Database traffic, though this functionality is planned for the future.
98+
NACLs have the same resource limitations as [VPC routing](/vpc/reference-content/understanding-routing/#limitations).
9999

100100
NACLs are currently available only via the Scaleway API and developer tools. They are not yet available in the Scaleway console.
101101

@@ -104,4 +104,4 @@ NACLs are currently available only via the Scaleway API and developer tools. The
104104
NACL quotas are as follows:
105105

106106
- A maximum of 255 rules for IPv4 (per VPC)
107-
- A maximum of 255 rules for IPv6 (per VPC)
107+
- A maximum of 255 rules for IPv6 (per VPC)

pages/vpc/reference-content/understanding-routing.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ You can create your own custom routes to send traffic for defined IP ranges towa
2323

2424
Routing is activated by default whenever you create a new VPC, and can be activated on pre-existing VPCs by [following these steps](/vpc/how-to/manage-routing/#how-to-activate-routing). Network ACLs, to finely control and filter VPC traffic, are available [via the API](/vpc/reference-content/understanding-nacls) (currently in Public Beta).
2525

26-
The diagram below shows an example of how routing works across two Private Networks on a VPC. The route table is held on the VPC's virtual router ([VRouter](/vpc/concepts/#vrouter)), and synched to each resource as it joins a Private Network.
26+
The diagram below shows an example of how routing works across two Private Networks on a VPC. The route table is held on the VPC's virtual router ([VRouter](/vpc/concepts/#vrouter)), and synched to each resource as it joins a Private Network.
2727
- An Elastic Metal server on Private Network A can send a packet to the public internet via a Public Gateway also attached to Private Network A.
2828
- An Instance also on Private Network A can send a packet to an Instance on Private Network B, via the vRouter.
2929
- The same Instance on Private Network A can send a packet to an IP destination at the other end of the VPN hosted on Instance XYZ on Private Network B, thanks to a custom route.
@@ -37,7 +37,7 @@ The diagram below shows an example of how routing works across two Private Netwo
3737
Every VPC has an associated **route table**, used to manage and control the routing of traffic within the VPC. The routes within a route table tell the VPC where to send traffic trying to get to a specific destination IP address. One line in the route table corresponds to one route. A route consists of:
3838

3939
- A **destination** IP or IP range. This specifies that the route applies to traffic with a matching destination IP.
40-
- A **next hop**. This specifies where the VPC should forward traffic that is trying to reach the destination IP.
40+
- A **next hop**. This specifies where the VPC should forward traffic that is trying to reach the destination IP.
4141
- For local subnet routes, the next hop will be the relevant Private Network. Traffic destined for an IP within the CIDR block of the Private Network's subnet will find the attached resource there.
4242
- For custom routes, the next hop is a defined resource on a defined Private Network.
4343
- If the destination IP is not known on the VPC (represented by the `0.0.0.0/0` address), its next hop will be a Public Gateway so that it can reach the public internet (as long as a Public Gateway set to advertise the default route has been attached to the Private Network).
@@ -156,5 +156,5 @@ Alternatively, and aligned with best practice, when the default NACL rule **Deni
156156

157157
## Limitations
158158

159-
- Managed Databases are not currently compatible with routing. The VPC cannot automatically route between Managed Databases on different Private Networks, or (for example) between a Managed Database on one Private Network and an Instance on a different Private Network.
160-
- VPC routing does not currently support virtual IPs.
159+
- Only Managed PostgreSQL and MySQL Database Instances created after July 28th 2025 are compatible with VPC routing. Maintenance scheduled for later in August 2025 will make all pre-existing Managed PostgreSQL and MySQL Database Instances compatible as well.
160+
- VPC routing does not currently support virtual IPs.

pages/vpc/troubleshooting/vpc-limitations.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,5 @@ This page sets out some current limitations of Scaleway's VPC.
2222
- Kubernetes Kapsule (only during the process of creating the Kapsule cluster)
2323
- Serverless Functions and Containers (egress traffic only, with VPC-supporting namespaces)
2424
- Private Networks are not supported on some legacy Instance offers which have reached EOL, e.g. `VC1`, `START1` and `X64-*GB`. Note that all Instance offers in the [current product catalogue](https://www.scaleway.com/en/pricing/?tags=compute) are supported.
25-
- Managed Databases are not currently compatible with VPC routing. The VPC cannot automatically route between Managed Databases on different Private Networks, or (for example) between a Managed Database on one Private Network and an Instance on a different Private Network.
25+
- Only Managed PostgreSQL and MySQL Database Instances created after July 28th 2025 are compatible with [VPC routing](/vpc/concepts/#routing). Maintenance scheduled for later in August 2025 will make all pre-existing Managed PostgreSQL and MySQL Database Instances compatible as well.
26+

0 commit comments

Comments
 (0)