Skip to content

Commit e7eb45c

Browse files
fix(rdb): vpc routing
1 parent 117bb5d commit e7eb45c

File tree

2 files changed

+10
-6
lines changed

2 files changed

+10
-6
lines changed

pages/managed-databases-for-postgresql-and-mysql/how-to/connect-database-private-network.mdx

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,11 @@ This improves performance by reducing the latency between your application and y
2222

2323
You can create new Database Instances to attach to your Private Network, or attach existing ones.
2424

25+
<Message type="note">
26+
Managed Databases for PostgreSQL and MySQL is compatible with the [VPC routing](https://www.scaleway.com/en/docs/vpc/concepts/#routing) feature, which allows you to connect one or more Database Instances in Private Network to resources in other Private Networks of the same VPC. Refer to the [How to manage routing](/vpc/how-to/manage-routing/) documentation page for more information.
27+
</Message>
28+
29+
2530
<Macro id="requirements" />
2631

2732
- A Scaleway account logged into the [console](https://console.scaleway.com)
@@ -31,9 +36,9 @@ You can create new Database Instances to attach to your Private Network, or atta
3136

3237
## How to attach a Database Instance to a Private Network
3338

34-
<Message type="note">
35-
You can only attach your Database Instance to one Private Network at a time.
36-
</Message>
39+
<Message type="note">
40+
You can only attach your Database Instance to one Private Network at a time.
41+
</Message>
3742

3843
1. Click **PostgreSQL and MySQL** under **Databases** on the side menu. A list of your Database Instances displays.
3944
2. Select the geographical region of the Instance you want to manage from the drop-down.

pages/vpc/reference-content/understanding-routing.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ You can create your own custom routes to send traffic for defined IP ranges towa
2525

2626
Routing is activated by default whenever you create a new VPC, and can be activated on pre-existing VPCs by [following these steps](/vpc/how-to/manage-routing/#how-to-activate-routing). More routing features are planned for the future, such as ACLs and firewalling.
2727

28-
The diagram below shows an example of how routing works across two Private Networks on a VPC. The route table is held on the VPC's virtual router ([VRouter](/vpc/concepts/#vrouter)), and synched to each resource as it joins a Private Network.
28+
The diagram below shows an example of how routing works across two Private Networks on a VPC. The route table is held on the VPC's virtual router ([VRouter](/vpc/concepts/#vrouter)), and synched to each resource as it joins a Private Network.
2929
- An Elastic Metal server on Private Network A can send a packet to the public internet via a Public Gateway also attached to Private Network A.
3030
- An Instance also on Private Network A can send a packet to an Instance on Private Network B, via the vRouter.
3131
- The same Instance on Private Network A can send a packet to an IP destination at the other end of the VPN hosted on Instance XYZ on Private Network B, thanks to a custom route.
@@ -39,7 +39,7 @@ The diagram below shows an example of how routing works across two Private Netwo
3939
Every VPC has an associated **route table**, used to manage and control the routing of traffic within the VPC. The routes within a route table tell the VPC where to send traffic trying to get to a specific destination IP address. One line in the route table corresponds to one route. A route consists of:
4040

4141
- A **destination** IP or IP range. This specifies that the route applies to traffic with a matching destination IP.
42-
- A **next hop**. This specifies where the VPC should forward traffic that is trying to reach the destination IP.
42+
- A **next hop**. This specifies where the VPC should forward traffic that is trying to reach the destination IP.
4343
- For local subnet routes, the next hop will be the relevant Private Network. Traffic destined for an IP within the CIDR block of the Private Network's subnet will find the attached resource there.
4444
- For custom routes, the next hop is a defined resource on a defined Private Network.
4545
- If the destination IP is not known on the VPC (represented by the `0.0.0.0/0` address), its next hop will be a Public Gateway so that it can reach the public internet (as long as a Public Gateway set to advertise the default route has been attached to the Private Network).
@@ -79,5 +79,4 @@ For example, you may use one Private Network for frontend resources and another
7979

8080
## Limitations
8181

82-
- Managed Databases are not currently compatible with routing. The VPC cannot automatically route between Managed Databases on different Private Networks, or (for example) between a Managed Database on one Private Network and an Instance on a different Private Network.
8382
- VPC routing does not currently support virtual IPs.

0 commit comments

Comments
 (0)