You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: faq/public-gateways.mdx
+1-1
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Moreover, the Public Gateway supports [static NAT](/public-gateways/how-to/confi
29
29
30
30
On 12 July 2023, DHCP functionality moved from Public Gateways to Private Networks. See our [dedicated migration documentation](/vpc/reference-content/vpc-migration/) for full details.
31
31
32
-
Pre-existing static leases created via the Public Gateway were fully migrated and still work for your attached resources on a Private Network. Manual static lease configuration is still available via the API and other devtools, but is no longer available via the Scaleway console. We recommend that you use [Scaleway IPAM](/ipam/) to reserve private IP addresses on specific Private Networks, which you can then use when attaching resources.
32
+
Pre-existing static leases created via the Public Gateway were fully migrated and still work for your attached resources on a Private Network. Manual static lease configuration is still available via the API and other developer tools, but is no longer available via the Scaleway console. We recommend that you use [Scaleway IPAM](/ipam/) to reserve private IP addresses on specific Private Networks, which you can then use when attaching resources.
Copy file name to clipboardexpand all lines: pages/kubernetes/reference-content/kubernetes-load-balancer.mdx
+2-2
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ Here is a quick overview of how to create a Load Balancer for your cluster:
45
45
- Modify your Load Balancer's configuration as necessary via the yaml manifest and [Load Balancer annotations](https://github.com/scaleway/scaleway-cloud-controller-manager/blob/master/docs/loadbalancer-annotations.md) , putting any new annotations into effect via kubectl, so the CCM can carry out the modifications as necessary.
46
46
47
47
<Messagetype="important">
48
-
Load Balancers for Kubernetes clusters should **always** be provisioned via the cluster's Cloud Controller Manager. It is **not** correct procedure to provision the Load Balancer by creating a Scaleway Load Balancer in the console or via the API, and then attempting to use it as your cluster's external Load Balancer. Similarly, you cannot use the Scaleway console or devtools to edit your cluster's Load Balancer after creation, this must be done via the CCM, as detailed in this documentation.
48
+
Load Balancers for Kubernetes clusters should **always** be provisioned via the cluster's Cloud Controller Manager. It is **not** correct procedure to provision the Load Balancer by creating a Scaleway Load Balancer in the console or via the API, and then attempting to use it as your cluster's external Load Balancer. Similarly, you cannot use the Scaleway console or developer tools to edit your cluster's Load Balancer after creation, this must be done via the CCM, as detailed in this documentation.
49
49
</Message>
50
50
51
51
## Creating a Load Balancer for your cluster: Step by step
@@ -128,7 +128,7 @@ Your Load Balancer will be created with a default configuration unless you defin
128
128
With annotations, you can configure parameters such as the balancing method, health check settings, and more.
129
129
130
130
<Message type="important">
131
-
You should **never** try to modify the configuration of your cluster's Load Balancer via the Scaleway console, the API, or any other devtools. Any modifications made this way will be overwritten by the cluster's CCM. You should **always** use annotations as described below to configure your cluster's Load Balancer.
131
+
You should **never** try to modify the configuration of your cluster's Load Balancer via the Scaleway console, the API, or any other developer tools. Any modifications made this way will be overwritten by the cluster's CCM. You should **always** use annotations as described below to configure your cluster's Load Balancer.
132
132
</Message>
133
133
134
134
Add annotations to the `metadata` section of your LoadBalancer Service's yaml manifest as shown below. In this example we include two annotations, but you can include as many as you need.
Copy file name to clipboardexpand all lines: pages/kubernetes/reference-content/using-load-balancer-annotations.mdx
+1-1
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ See the full list of available Load Balancer annotations [here](https://github.c
26
26
-[Configuring health checks](/load-balancer/reference-content/configuring-health-checks/)
27
27
28
28
<Messagetype="important">
29
-
You should **always** use annotations as described below to configure your cluster's Load Balancer. Any modifications made to the configuration of your Kubernetes cluster's Load Balancer via the Scaleway console, the API, or any other devtools, will be **overwritten by the cluster's CCM**.
29
+
You should **always** use annotations as described below to configure your cluster's Load Balancer. Any modifications made to the configuration of your Kubernetes cluster's Load Balancer via the Scaleway console, the API, or any other developer tools, will be **overwritten by the cluster's CCM**.
30
30
</Message>
31
31
32
32
The following documentation shows you how to use annotations to fine tune your Load Balancer's configuration.
Copy file name to clipboardexpand all lines: pages/load-balancer/reference-content/public-private-accessibility.mdx
+2-2
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ A Load Balancer is defined as public when you choose the "public" accessibility
30
30
- It must have a public IPv4 address, which can either be a new address created along with the Load Balancer, or an existing available flexible IP address held in your account.
31
31
- It can optionally have an additional public IPv6 address.
32
32
- The Load Balancer is accessible over the public internet via its public IP address(es), but can optionally also be attached to up to eight different Private Networks.
33
-
- It can be configured or deleted using the Scaleway API, console, CLI, Terraform/OpenTofu or other devtools.
33
+
- It can be configured or deleted using the Scaleway API, console, CLI, Terraform/OpenTofu or other developer tools.
34
34
- It provides its metrics to [Scaleway Cockpit](/cockpit/concepts/#cockpit), allows the use of Let's Encrypt certificates, and (if the appropriate Load Balancer type is selected), supports multi-cloud IP addresses for its backend servers.
35
35
36
36
<Lightboxsrc="scaleway-public-lb.webp"alt="" />
@@ -42,7 +42,7 @@ A Load Balancer is defined as private when you choose the "private" accessibilit
42
42
- It has no public IP address for sending requests or initiating TCP connections.
43
43
- It only listens to requests or connections sent to its interface(s) on the [Private Network(s)](/vpc/concepts/#private-networks) it is attached to. It is not accessible over the public internet.
44
44
- Like a public Load Balancer, it can be attached to up to eight different Private Networks.
45
-
- It can be configured or deleted using the Scaleway API, console, CLI, Terraform/OpenTofu, or other devtools.
45
+
- It can be configured or deleted using the Scaleway API, console, CLI, Terraform/OpenTofu, or other developer tools.
46
46
- It provides its metrics to [Scaleway Cockpit](/cockpit/concepts/#cockpit), even though there is no traffic.
47
47
- It does not allow the use of a Let's Encrypt [certificate](/load-balancer/concepts/#certificate) - only imported certificates are supported.
48
48
- It does not support multi-cloud IP addresses for its backend servers, since it is not directly connected to the internet. Routes to them are thus, not guaranteed.
Copy file name to clipboardexpand all lines: pages/public-gateways/concepts.mdx
+2-2
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ Scaleway Public Gateways are either in **Legacy mode** or **IPAM mode**. The mod
55
55
56
56
**Legacy** Public Gateways use a [workaround](/vpc/reference-content/vpc-migration/#public-gateways-and-vpc) to ensure IPAM compatibility. Your gateway is a legacy gateway if:
57
57
- You created it via the Scaleway console prior to 17 October 2023
58
-
- You created it via the Scaleway API or devtools prior to 17 October 2023, and you did not use the `ipam_config` object when creating the [GatewayNetwork](https://www.scaleway.com/en/developers/api/public-gateway/#path-gateway-networks-attach-a-public-gateway-to-a-private-network) (attachment to a Private Network).
58
+
- You created it via the Scaleway API or developer tools prior to 17 October 2023, and you did not use the `ipam_config` object when creating the [GatewayNetwork](https://www.scaleway.com/en/developers/api/public-gateway/#path-gateway-networks-attach-a-public-gateway-to-a-private-network) (attachment to a Private Network).
59
59
60
60
The auto-calculated `is_legacy`[Gateway parameter](https://www.scaleway.com/en/developers/api/public-gateway/#path-gateways-create-a-public-gateway) will have a value of `true`.
61
61
@@ -65,7 +65,7 @@ Private Networks attached to legacy Public Gateways must stay in the gateway's a
65
65
66
66
**IPAM** Public Gateways are fully and natively integrated with the Scaleway IPAM without any workaround. Your gateway is in IPAM mode if:
67
67
- You created it via the Scaleway console on or after 17 October 2023
68
-
- You created it via the Scaleway API or devtools using the `ipam_config` object, and the auto-calculated `is_legacy`[Gateway parameter](https://www.scaleway.com/en/developers/api/public-gateway/#path-gateways-create-a-public-gateway) has a value of `false`.
68
+
- You created it via the Scaleway API or developer tools using the `ipam_config` object, and the auto-calculated `is_legacy`[Gateway parameter](https://www.scaleway.com/en/developers/api/public-gateway/#path-gateways-create-a-public-gateway) has a value of `false`.
69
69
70
70
You cannot "migrate" a legacy Public Gateway to become an IPAM-mode gateway. While legacy Public Gateways continue to function thanks to our [workaround](/vpc/reference-content/vpc-migration/#public-gateways-and-vpc), you cannot modify them to become natively integrated IPAM networks. If you wish to have an IPAM-mode Public Gateway, for example to benefit from IP management via Scaleway's [IPAM](https://www.scaleway.com/en/developers/api/vpc/) API as more features become available, or to use Kapsule with full isolation, you must create a new gateway.
Copy file name to clipboardexpand all lines: pages/vpc/reference-content/vpc-migration.mdx
+2-2
Original file line number
Diff line number
Diff line change
@@ -89,7 +89,7 @@ If you fall into one of the cases where DHCP is not automatically activated for
89
89
90
90
See the dedicated documentation on [activating DHCP](/vpc/how-to/activate-dhcp/)
91
91
92
-
Any static DHCP reservations (static leases) configured via a Public Gateway have been transparently migrated. Going forward, [DHCP reservations via the Public Gateway API](https://www.scaleway.com/en/developers/api/public-gateway/) and other devtools are deprecated but still available via the API, to avoid breaking changes. They are no longer available via the console. We strongly recommend that you use our IPAM product to [reserve](/ipam/how-to/reserve-ip/) and manage your IP addresses.
92
+
Any static DHCP reservations (static leases) configured via a Public Gateway have been transparently migrated. Going forward, [DHCP reservations via the Public Gateway API](https://www.scaleway.com/en/developers/api/public-gateway/) and other developer tools are deprecated but still available via the API, to avoid breaking changes. They are no longer available via the console. We strongly recommend that you use our IPAM product to [reserve](/ipam/how-to/reserve-ip/) and manage your IP addresses.
93
93
94
94
## Aspect 3: DNS on Private Networks
95
95
@@ -127,7 +127,7 @@ When creating a Kubernetes Kapsule cluster with [full isolation](/kubernetes/ref
127
127
128
128
## Impacts on the rest of the Scaleway ecosystem
129
129
130
-
The general availability of VPC brings the following changes to our devtools and console:
130
+
The general availability of VPC brings the following changes to our developer tools and console:
131
131
132
132
**Scaleway console**
133
133
- The existing **Private Networks** section, available from the main menu (sidebar) of the [console](https://console.scaleway.com/), will soon cease to be accessible. Instead, you should select **VPC** in the sidebar, and then click on the relevant VPC, to access and manage your Private Networks.
0 commit comments