Skip to content

Commit ff60041

Browse files
committed
docs(srv): update serverless x VPC doc
1 parent 9bf2c0a commit ff60041

File tree

4 files changed

+36
-54
lines changed

4 files changed

+36
-54
lines changed

menu/navigation.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4509,6 +4509,10 @@
45094509
"label": "Serverless overview",
45104510
"slug": "serverless-overview"
45114511
},
4512+
{
4513+
"label": "Containers and Private Networks integration",
4514+
"slug": "containers-private-networks"
4515+
},
45124516
{
45134517
"label": "Containers limitations",
45144518
"slug": "containers-limitations"

pages/organizations-and-projects/additional-content/organization-quotas.mdx

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -333,6 +333,12 @@ After you order a server from the list of Elastic Metal servers compatible with
333333
The maximum RAM quota is obtained by multiplying the maximum scale factor of your container by the selected RAM quantity.
334334
For example, if you choose to create a container with 512 MB of memory and a maximum scale of 20, you will have 10 GB RAM.
335335

336+
#### Private Networks (VPC) quotas
337+
338+
| | [Payment method validated](/billing/how-to/add-payment-method/#how-to-add-a-credit-card) | Payment method and [identity validated](/account/how-to/verify-identity/) |
339+
|-----------------------------------|:----------------------------------------------------------------------------------------------------------: |:------------------------------------------------------------------------------------:|
340+
| Maximum attached Private Networks | 5 | 10 |
341+
336342
## Serverless Functions
337343

338344
<ComputeServerlessFunctions />
@@ -354,6 +360,12 @@ For example, if you choose to create a container with 512 MB of memory and a max
354360
The maximum RAM quota is obtained by multiplying the maximum scale factor of your container by the selected RAM quantity.
355361
For example, if you choose to create a container with 512 MB of memory and a max scale of 20, you will have 10 GB RAM.
356362

363+
#### Private Networks (VPC) quotas
364+
365+
| | [Payment method validated](/billing/how-to/add-payment-method/#how-to-add-a-credit-card) | Payment method and [identity validated](/account/how-to/verify-identity/) |
366+
|-----------------------------------|:----------------------------------------------------------------------------------------------------------: |:------------------------------------------------------------------------------------:|
367+
| Maximum attached Private Networks | 5 | 10 |
368+
357369
## Serverless Jobs
358370

359371
<ComputeServerlessJobs />

pages/serverless-containers/reference-content/containers-limitations.mdx

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -84,21 +84,7 @@ Do not have your containers listen on these ports, as they are used by our servi
8484

8585
## Private Networks and Virtual Private Cloud (VPC)
8686

87-
### Compatibility
88-
89-
Scaleway Serverless Containers support [Virtual Private Cloud (VPC)](/vpc/) and can be attached to a Private Network, which allows you to securely connect your resources in an isolated environment. Refer to the [dedicated documentation](/serverless-containers/how-to/use-private-networks/) for more information.
90-
91-
### Usage
92-
93-
- Containers in the same namespace can be attached to different Private Networks.
94-
95-
- Attaching Serverless Containers to Private Networks does not entail additional cost.
96-
97-
### Limitations
98-
99-
- VPC works with Namespaces that have **VPC support enabled**. VPC support can only be enabled at [namespace creation](/serverless-containers/how-to/create-manage-delete-containers-namespace/#creating-a-serverless-containers-namespace), and cannot be updated afterward.
100-
101-
- Only one Private Network can be attached to a container.
87+
Refer to the [dedicated documentation](/serverless-containers/reference-content/containers-private-networks/) on VPC and Serverless Containers integration for more information.
10288

10389
## Default values for CPU and memory limits
10490

pages/serverless-containers/reference-content/containers-private-networks.mdx

Lines changed: 19 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -6,49 +6,29 @@ dates:
66
- validation: 2025-07-29
77
---
88

9-
## Description
9+
## Compatibility
1010

11-
Attach a Serverless Function or Container to a Private Network.
11+
Scaleway Serverless Containers support [Virtual Private Cloud (VPC)](/vpc/) and can be attached to a Private Network, which allows you to securely connect your resources in an isolated environment. Refer to the [dedicated documentation](/serverless-containers/how-to/use-private-networks/) for more information.
1212

13-
### Availability
13+
## Features
1414

15-
- Binding is done per Function or Container, not per namespace: multiple functions/containers in the same namespace can be attached to different PNs
16-
- Works for both sandboxes (v1, v2)
17-
- Feature is free of charge
15+
- Containers in the same namespace can be attached to different Private Networks.
16+
- Both [sandbox](/serverless-containers/concepts/#sandbox) environments (`V1` and `V2`) are compatible with Private Networks.
17+
- Attaching Serverless Containers to Private Networks **does not entail additional cost**.
18+
- **Egress** (outbound private traffic from a container to resources within the same Private Network) will be routed through the private interface, but external traffic (from the Internet) will be through the public endpoint of the container.
19+
- All DNS resolution is done through the Private Network (using the VPC DNS server `169.254.169.254`), which allows to resolve `*.internal` records.
1820

19-
### Features
20-
Container to PN resources (egress)
21-
Currently, no ingress (PN resources to container)
22-
but container still available through public traffic
21+
## Quotas
2322

24-
- All internal traffic (to PN) will be routed through the private interface, but external traffic (Internet) will be through the public (already existing) interface
23+
Refer to the [dedicated documentation](/organizations-and-projects/additional-content/organization-quotas/) for more information on Private Networks quotas for Serverless Containers.
2524

26-
- All DNS resolution is done through PN (using DNS server `169.254.169.254` (=VPC dns server)). This allows to resolve `*.internal` records
27-
28-
29-
30-
31-
## Users limitations
32-
33-
### API
34-
35-
- A Function/Container can **only** be attached to a single PN
36-
- extra quota for VPC via Containers (Container Unique Private Networks) 5/10
37-
- UPDATE QUOTAS DOC
38-
39-
40-
41-
### Infrastructure
42-
43-
- **VPC routing** (custom routes) doesn't work yet
44-
45-
- Each Function/Container instance will have a unique IP in the PN, assigned by Scaleway. this implies:
46-
- it won't be possible for a user to **preemptively book an IP** in IPAM, and reference it in the attachment
47-
- this can result in a **large number of IPs** being used in the PN. It might be confusing for clients as a single resource (a given Function/Container) with multiple instances will have multiple IPs
48-
49-
- **Cold-starts will be slightly longer** due to the additional steps required to attach the node to the PN and book an IP.
50-
51-
Also, as of today, only ingress is implemented (phase 1: call a resource in the PN from a Function/Container).
52-
53-
Egress (phase 2: calling a Function/Container from a resource in the PN) will be done [later](../#phases).
25+
## Limitations
5426

27+
- VPC works with Namespaces that have **VPC support enabled**. VPC support can only be enabled at [namespace creation](/serverless-containers/how-to/create-manage-delete-containers-namespace/#creating-a-serverless-containers-namespace), and cannot be updated afterward.
28+
- Only one Private Network can be attached to a container.
29+
- **VPC routing** (custom routes and cross-PN automatic routing) is not supported yet.
30+
- **Ingress** (inbound private traffic from resources to a container within the same Private Network) is not supported yet.
31+
- Each [container instance](/serverless-containers/concepts/#instance) has a unique IP automatically assigned by Scaleway in the Private Network. This implies the following:
32+
- Users **cannot preemptively book an IP** with [IPAM](/ipam/), and reference it in the attachment.
33+
- A single Serverless Container can have a **large number of IPs** being used within the Private Network, depending on the number of concurrent instances.
34+
- **Cold-starts are slightly longer** due to the additional steps required to attach the node to the Private Network and book an IP.

0 commit comments

Comments
 (0)