Skip to content

Commit ccbea70

Browse files
committed
fix(vpcrdb): correct routing info
1 parent dd355f7 commit ccbea70

File tree

6 files changed

+12
-2
lines changed

6 files changed

+12
-2
lines changed

pages/managed-databases-for-postgresql-and-mysql/how-to/connect-database-private-network.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This improves performance by reducing the latency between your application and y
1919
You can create new Database Instances to attach to your Private Network, or attach existing ones.
2020

2121
<Message type="note">
22-
Managed Databases for PostgreSQL and MySQL is compatible with the [VPC routing](/vpc/concepts/#routing) feature, which allows you to connect one or more Database Instances in Private Network to resources in other Private Networks of the same VPC. Refer to the [How to manage routing](/vpc/how-to/manage-routing/) documentation page for more information.
22+
Managed PostgreSQL and MySQL Database Instances created after July 28th 2025 are compatible with the [VPC routing](/vpc/concepts/#routing) feature, which allows you to connect one or more Database Instances in a Private Network to resources in other Private Networks of the same VPC. Maintenance scheduled for later in August 2025 will make all pre-existing Managed PostgreSQL and MySQL Database Instances compatible as well. Refer to the [How to manage routing](/vpc/how-to/manage-routing/) documentation page for more information about VPC routing.
2323
</Message>
2424

2525
<Requirements />

pages/vpc/faq.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,10 @@ Yes, use the [Network ACL feature](/vpc/reference-content/understanding-nacls/)
4242
NACLs are currently in Public Beta, and configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console.
4343
</Message>
4444

45+
### Why can I not route traffic to my Managed Database on another Private Network?
46+
47+
Only Managed PostgreSQL and MySQL Database Instances created after July 28th 2025 are compatible with [VPC routing](/vpc/concepts/#routing). Maintenance scheduled for later in August 2025 will make all pre-existing Managed PostgreSQL and MySQL Database Instances compatible as well.
48+
4549
### How are NACLs different from security groups?
4650

4751
[Security groups](/instances/how-to/use-security-groups/) filter **public** traffic on your Instances, whereas NACLs filter traffic to/from Private Networks only.

pages/vpc/how-to/manage-routing.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ Follow the steps below to define a custom route:
193193

194194
8. Enter a **next hop** for the route. The VPC will route traffic for the destination IP to the resource designated as next hop.
195195
- Select the Private Network which the next hop resource is attached to.
196-
- Select a resource type: **Instance**, **Public Gateway** or **Elastic Metal**.
196+
- Select a resource type, e.g. **Instance**, **Public Gateway** or **Elastic Metal**.
197197
- Select the **name** of the specific resource you want to route traffic to. The resource must be attached to a Private Network in this VPC.
198198

199199
<Message type="note">

pages/vpc/reference-content/understanding-routing.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -156,4 +156,5 @@ Alternatively, and aligned with best practice, when the default NACL rule **Deni
156156

157157
## Limitations
158158

159+
- Only Managed PostgreSQL and MySQL Database Instances created after July 28th 2025 are compatible with VPC routing. Maintenance scheduled for later in August 2025 will make all pre-existing Managed PostgreSQL and MySQL Database Instances compatible as well.
159160
- VPC routing does not currently support virtual IPs.

pages/vpc/troubleshooting/vpc-limitations.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,5 @@ This page sets out some current limitations of Scaleway's VPC.
2222
- Kubernetes Kapsule (only during the process of creating the Kapsule cluster)
2323
- Serverless Functions and Containers (egress traffic only, with VPC-supporting namespaces)
2424
- Private Networks are not supported on some legacy Instance offers which have reached EOL, e.g. `VC1`, `START1` and `X64-*GB`. Note that all Instance offers in the [current product catalogue](https://www.scaleway.com/en/pricing/?tags=compute) are supported.
25+
- Only Managed PostgreSQL and MySQL Database Instances created after July 28th 2025 are compatible with [VPC routing](/vpc/concepts/#routing). Maintenance scheduled for later in August 2025 will make all pre-existing Managed PostgreSQL and MySQL Database Instances compatible as well.
2526

pages/vpc/troubleshooting/vpc-pn-routing-connectivity-issues.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,10 @@ This is standard behavior:
1818
- Once you have activated routing on a VPC, you cannot deactivate it
1919
- You do not have the option to create a new VPC where routing is deactivated
2020

21+
## My Managed Database cannot communicate with other resources in my VPC
22+
23+
Only Managed PostgreSQL and MySQL Database Instances created after July 28th 2025 are compatible with [VPC routing](/vpc/concepts/#routing). Maintenance scheduled for later in August 2025 will make all pre-existing Managed PostgreSQL and MySQL Database Instances compatible as well.
24+
2125
## I cannot route between VPCs/Private Networks in different regions, or different Scaleway Projects.
2226

2327
Currently, routing is only supported between Private Networks in a single VPC. We do not support:

0 commit comments

Comments
 (0)