Skip to content

Commit f9850ad

Browse files
committed
fix(vpc): add info
1 parent cc89416 commit f9850ad

File tree

2 files changed

+12
-4
lines changed

2 files changed

+12
-4
lines changed

menu/navigation.json

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2923,17 +2923,21 @@
29232923
},
29242924
{
29252925
"items": [
2926-
{
2927-
"label": "Understanding VPC GA and migration",
2928-
"slug": "vpc-migration"
2929-
},
29302926
{
29312927
"label": "Understanding routing",
29322928
"slug": "understanding-routing"
29332929
},
2930+
{
2931+
"label": "Understanding DNS",
2932+
"slug": "dns"
2933+
},
29342934
{
29352935
"label": "Getting the most from Private Networks",
29362936
"slug": "getting-most-private-networks"
2937+
},
2938+
{
2939+
"label": "Understanding VPC GA and migration",
2940+
"slug": "vpc-migration"
29372941
}
29382942
],
29392943
"label": "Additional Content",

network/vpc/reference-content/getting-most-private-networks.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,10 @@ Further, when you attach a resource to a Private Network and specify a reserved
6969

7070
Using reserved IP addresses is ideal to ensure that certain IP addresses are never released into the general pool and kept for certain critical resources with fixed IP requirements, even when that resource is detached from the Private Network, or when migrating between resources. Reserved IP addresses may also be useful where your Private Network is extending or integrating with external networks, or to assign addresses to virtual machines hosted on Elastic Metal servers via Proxmox.
7171

72+
### DNS and hostnames
73+
74+
Scaleway Private Networks benefit from managed internal DNS. This allows the resolution of resources' **hostnames** on the Private Network, into their private IP addresses. See our documentation on [Understanding Scaleway DNS](/network/vpc/reference-content/dns/) for full details of how to effectively use hostname addressing and the capabilities of Private Networks' DNS resolver service.
75+
7276
## Removing public IPs from resources
7377

7478
We strongly recommend that you disable public connectivity on all of your Scaleway resources, unless it is absolutely required. It is preferable to attach resources to Private Networks wherever possible, and direct all traffic to the resource's private IP address on that network. This ensures optimal security, reduced cost and enhanced latency. Find out more in our documentation about [public connectivity best practices](/network/ipam/reference-content/public-connectivity-best-practices).

0 commit comments

Comments
 (0)