You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/vpc/how-to/attach-resources-to-pn.mdx
+5-2Lines changed: 5 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -32,6 +32,7 @@ The following resource types can be attached to a Private Network:
32
32
- Load Balancers
33
33
- Public Gateways
34
34
- Managed Databases for PostgreSQL and MySQL
35
+
- Serverless Functions and Containers
35
36
36
37
<Messagetype="note">
37
38
Kubernetes Kapsule clusters and Managed Databases for Redis™ are also compatible with Private Networks, but they can only be attached to a Private Network at the time of creating the resource. It is not possible to attach a cluster or Redis™ database to a Private Network after its creation, or change the attached Private Network.
@@ -85,7 +86,7 @@ The following resource types can be attached to a Private Network:
85
86
- Select whether to **auto-allocate an available IP** from the pool of addresses for the Private Network or **specify an IP** that you have already [reserved via IPAM](/ipam/how-to/reserve-ip/).
86
87
87
88
<Messagetype="note">
88
-
Only Instances, Load Balancers, Public Gateways, and Elastic Metal servers are compatible with reserved IPs. Support for Managed Databases and Apple silicon will be coming soon. In the meantime, you must auto-allocate IPs for these products.
89
+
Only Instances, Load Balancers, Public Gateways, and Elastic Metal servers are compatible with reserved IPs. Support for Managed Databases, Apple silicon and Serverless will be coming soon. In the meantime, you must auto-allocate IPs for these products.
89
90
</Message>
90
91
</TabsTab>
91
92
@@ -116,8 +117,10 @@ You can also attach a managed resource to a Private Network from the resource's
116
117
-[Managed Database for PostgreSQL and MySQL](/managed-databases-for-postgresql-and-mysql/how-to/connect-database-private-network/)
Note that for Kubernetes Kapsules and Managed Databases for Redis™, you can only attach the resource to a Private Network at the time of creating the resource itself.
123
+
Note that for Kubernetes Kapsules and Managed Databases for Redis™, you can only attach the resource to a Private Network at the time of creating the resource itself. Serverless Functions and Containers can only be attached to Private Networks if they have been created in a namespace that supports VPC.
121
124
</Message>
122
125
123
126
For Elastic Metal servers and Apple silicon Mac minis, manual configuration of the network interface is required. This is not required for Instances or other types of managed resource. See the relevant documentation for [Elastic Metal](/elastic-metal/how-to/use-private-networks/#how-to-configure-the-network-interface-on-your-elastic-metal-server-for-private-networks) or [Apple silicon](/apple-silicon/how-to/use-private-networks/) for full instructions.
Copy file name to clipboardExpand all lines: pages/vpc/quickstart.mdx
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -131,7 +131,7 @@ You can create multiple Private Networks within each VPC. Resources attached to
131
131
- Select whether to **auto-allocate an available IP** from the pool of addresses for the Private Network or **specify an IP** that you have already [reserved via IPAM](/ipam/how-to/reserve-ip/).
132
132
133
133
<Messagetype="note">
134
-
Only Instances, Load Balancers, Public Gateways, and Elastic Metal servers are compatible with reserved IPs. Support for Managed Databases and Apple silicon will be coming soon. In the meantime, you must auto-allocate IPs for these products.
134
+
Only Instances, Load Balancers, Public Gateways, and Elastic Metal servers are compatible with reserved IPs. Support for Managed Databases, Apple silicon and Serverless will be coming soon. In the meantime, you must auto-allocate IPs for these products.
| Compatible with private IPv6 | No | No | No | No |
127
-
| Compatible with reserved IPs | No | No | Yes | Yes |
128
-
| Additional information | Must have at least one of <br/> private and/or public endpoint | Must have at least one of <br/> private and/or public endpoint | -- | Private LBs must have a PN |
| Compatible with private IPv6 | No | No | No | No | No
127
+
| Compatible with reserved IPs | No | No | Yes | Yes | No
128
+
| Additional information | Must have at least one of <br/> private and/or public endpoint | Must have at least one of <br/> private and/or public endpoint | -- | Private LBs must have a PN | Egress traffic only, from VPC-supported namespaces. |
Copy file name to clipboardExpand all lines: pages/vpc/troubleshooting/vpc-limitations.mdx
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -22,5 +22,6 @@ This page sets out some current limitations of Scaleway's VPC.
22
22
- Managed Databases for PostgreSQL and MySQL
23
23
- Managed Databases for Redis™ (only during the process of creating the database)
24
24
- Kubernetes Kapsule (only during the process of creating the Kapsule cluster)
25
+
- Serverless Functions and Containers (egress traffic only, with VPC-supporting namespaces)
25
26
- Private Networks are not supported on some legacy Instance offers which have reached EOL, e.g. `VC1`, `START1` and `X64-*GB`. Note that all Instance offers in the [current product catalogue](https://www.scaleway.com/en/pricing/?tags=compute) are supported.
26
27
- Managed Databases are not currently compatible with VPC routing. The VPC cannot automatically route between Managed Databases on different Private Networks, or (for example) between a Managed Database on one Private Network and an Instance on a different Private Network.
0 commit comments