Skip to content

Commit 4e81c05

Browse files
RoRoJjcirinosclwy
andauthored
feat(vpc): reorganize troubleshooting and add connectivity testing page (#5042)
* fix(vpc): troubleshooting * fix(vpc): troubleshooting fix * Apply suggestions from code review Co-authored-by: Jessica <113192637+jcirinosclwy@users.noreply.github.com> * Update pages/vpc/troubleshooting/connectivity-tests.mdx * fix(vpc): review comments * fix(vpc): fix conflicts in index --------- Co-authored-by: Jessica <113192637+jcirinosclwy@users.noreply.github.com>
1 parent 9690bca commit 4e81c05

File tree

9 files changed

+188
-50
lines changed

9 files changed

+188
-50
lines changed

pages/instances/troubleshooting/cant-connect-to-instance-with-pn-gateway.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,4 @@ The action to take depends on whether DHCP is [activated](/vpc/reference-content
2222

2323
If it is not, disconnect the Instance from the Private Network, as there may be other factors impacting your Instance, like one of your Instances running a DHCP server.
2424

25-
If it is, this is expected behavior as all the traffic towards your Instance now goes through the Public Gateway. To access your Instance using SSH, first create a static NAT association between a port of your Public Gateway (eg 2222) and the private IP assigned to your Instance, on the SSH port (22 by default). Then, SSH to the Public Gateway's IP on port 2222.
25+
If it is, this is expected behavior as all the traffic towards your Instance now goes through the Public Gateway. The recommended solution to connect to your Instance is to use [SSH bastion](/public-gateways/how-to/use-ssh-bastion/#how-to-connect-to-a-resource-behind-your-ssh-bastion).

pages/vpc/reference-content/dns.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ If you experience problems with DNS, try the following steps:
8080

8181
3. **Check Private Network name**. Issues can arise with Private Networks who share a name with a TLD. See our [dedicated document](/vpc/troubleshooting/pn-name/) for more help.
8282

83-
4. **Check whether you are using Network Manager**: DNS does not work out of the box for Linux distributions using Network Managed, such as **RockyLinux**. Find out how to resolve this problem [on our troubleshooting page](/vpc/troubleshooting/private-dns-dhcp-not-working/#distributions-running-network-manager)
83+
4. **Check whether you are using Network Manager**: DNS does not work out of the box for Linux distributions using Network Managed, such as **RockyLinux**. Find out how to resolve this problem [on our troubleshooting page](/vpc/troubleshooting/pn-name/#distributions-running-network-manager)
8484

8585
If you are still having problems reaching a resource attached to a Private Network via its hostname, [open a support ticket](https://console.scaleway.com/support).
8686

pages/vpc/troubleshooting/autoconfig-not-working.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
meta:
3-
title: My Instance is attached to a Private Network but auto-configuration is not working
3+
title: My legacy Instance is attached to a Private Network but auto-configuration is not working
44
description: Troubleshoot VPC autoconfiguration issues with this guide. Find solutions to common problems and ensure smooth network setup on Scaleway.
55
content:
6-
h1: My Instance is attached to a Private Network but auto-configuration is not working
6+
h1: My legacy Instance is attached to a Private Network but auto-configuration is not working
77
paragraph: Troubleshoot VPC autoconfiguration issues with this guide. Find solutions to common problems and ensure smooth network setup on Scaleway.
88
tags: resource instance private-network auto-configuration auto configuration dhcp default-route
99
dates:
@@ -21,7 +21,7 @@ They leverage helper scripts provided by the `scaleway-ecosystem` package. These
2121
- When Instances are attached to Private Networks plugged into Public Gateways, make the default route received by DHCP the primary route for all traffic on the Instance
2222
- Keep the route to the Scaleway Metadata API more specific (see below).
2323

24-
If your Instance does not get auto-configured, it may be that you are using an old version of the `scaleway-ecosystem` package. `scaleway-ecosystem` version 0.0.4 or later is required. Use the following command to update it:
24+
If your Instance does not get auto-configured, it may be that you are using an old Instance that has an old version of the `scaleway-ecosystem` package. `scaleway-ecosystem` version 0.0.4 or later is required. Use the following command to update it:
2525

2626
- On Ubuntu (Focal and Jammy) or Debian (Stretch and Buster):
2727

Lines changed: 125 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,125 @@
1+
---
2+
meta:
3+
title: Connectivity tests for unreachable Instances in a Private Network
4+
description: When your Scaleway Instance is unreachable via its attached Private Network, this page sets out a detailed testing process to help you diagnose and resolve the issue.
5+
content:
6+
h1: Connectivity tests for unreachable Instances in a Private Network
7+
paragraph: When your Scaleway Instance is unreachable via its attached Private Network, this page sets out a detailed testing process to help you diagnose and resolve the issue.
8+
tags: resource private-network connectivity ping test
9+
dates:
10+
validation: 2025-05-30
11+
posted: 2025-05-30
12+
categories:
13+
- network
14+
---
15+
16+
When an Instance becomes unreachable over a Private Network, it can be challenging to diagnose and resolve the issue.
17+
18+
To help streamline the troubleshooting process, the Scaleway Network team has developed a step-by-step technique that can help identify and potentially fix connectivity problems.
19+
20+
This technique involves a series of tests and checks to determine the root cause of the issue, including DNS resolution, ARP table verification, and Link-Local Address (LLA) calculation.
21+
22+
By following these steps, you can quickly determine if the issue is related to DNS, network configuration, or resource-specific problems, and take corrective action to restore connectivity.
23+
24+
It is particularly useful to carry out these steps before opening a support ticket, and supplying the results of the tests. This enables a swifter and more efficient resolution of your problem.
25+
26+
## Step-by-step connectivity testing process
27+
28+
### Step 1: Ping the non-communicating Instance from another Instance in the Private Network
29+
30+
1. [Connect to another Instance](/instances/how-to/connect-to-instance/) in the same Private Network as the non-communicating Instance.
31+
32+
2. Try to reach the non-communicating Instance with a ping via `ping instance-name` (where `instance-name` is the name you gave your Instance upon creation.)
33+
34+
3. Carry out the same test for both IPv4 and IPv6, ie `ping -4 instance-name` and `ping -6 instance-name`.
35+
36+
- If these tests fail, there may be a DNS issue meaning the Instance's hostname cannot be resolved, see step 4 directly below.
37+
- Otherwise, if the tests succeed, continue to the section [Check ARP](#step-2-check-arp)
38+
39+
4. Consider checking DNS records via the Scaleway Domains and DNS CLI as documented [here](/vpc/reference-content/dns/#troubleshooting), to see if the private DNS zone is correctly configured and the Instance's DNS records are up-to-date.
40+
41+
<Message type="important">
42+
Note that we do not recommend editing these records yourself, rather open a support ticket with the information you have gathered.
43+
</Message>
44+
45+
### Step 2: Check ARP
46+
47+
A server's **A**ddress **R**esolution **P**rotocol (ARP) table maps IP addresses to MAC addresses on a local network. Use this data to find the probe state for the target Instance's MAC address.
48+
49+
1. From another Instance in the same Private Network as the non-communicating Instance, view ARP information via an `ip neigh` command.
50+
51+
You should see an output of many lines in the following format:
52+
53+
```
54+
172.16.8.2 dev ens5 lladdr 02:00:00:1c:0d:9b REACHABLE
55+
```
56+
57+
2. Find the line beginning with the non-communicating Instance's private IP address, and containing also its MAC address. You can check both via the Scaleway console in the Private Network's **Attached resources** tab. You can use the following command to identify the line, replacing `<MAC_ADDRESS>` with the Instance's MAC address:
58+
59+
```
60+
ip neigh | grep --ignore-case <MAC_ADDRESS>
61+
```
62+
63+
The line ends with the state of the probe for that Instance's MAC address.
64+
65+
`FAILED` shows that the system tried to resolve the MAC address but did not get a response.
66+
67+
Continue to the next stage of testing.
68+
69+
### Step 3: Try reaching the Instance using its LLA
70+
71+
If the Instance could not be reached via the resolution of its MAC address, next you should try to reach it via its IPv6 **L**ink **L**ocal **A**ddress (LLA) in the Private Network.
72+
73+
The LLA is calculated from the Instance's MAC address.
74+
75+
1. Use an online tool or guide to carry out the standardized process of calculating the Instance's LLA from its MAC address. Remember that you can view its MAC address from the Scaleway console, in the Private Network's **Attached Resources** tab.
76+
77+
<Message type="tip">
78+
You can use the following code snippet to calculate the LLA:
79+
80+
```
81+
bash-5.2$ mac_to_ipv6_ll() {
82+
IFS=':'; set $1; unset IFS
83+
echo "fe80::$(printf %02x $((0x$1 ^ 2)))$2:${3}ff:fe$4:$5$6"
84+
}
85+
```
86+
<br/>
87+
Example usage and output for a MAC address of `02:00:00:23:e4:01`:
88+
89+
```
90+
bash-5.2$ mac_to_ipv6_ll 02:00:00:23:e4:01
91+
fe80::0000:00ff:fe23:e401
92+
```
93+
</Message>
94+
95+
2. Ping the LLA. Ensure that you specify which interface to ping over (the Private Network) by adding the `%interface` zone index to the end of the ping command. For example, for a LLA of `fe80::0:0ff:fe1c:d9b` and a Private Network interface name of `ens5`, use the following command:
96+
97+
```
98+
ping -6 fe80::0:0ff:fe1c:d9b%ens5
99+
```
100+
101+
<Message type="tip">
102+
The interface name depends on the Instance type and OS. You can use the following command to get a compact summary of all network interfaces on your Instance:
103+
104+
```
105+
ip -brief -color addr show
106+
```
107+
</Message>
108+
109+
A successful ping will show results similar to the following:
110+
111+
```
112+
PING fe80::0:0ff:fe1c:d9b%ens5 (fe80::ff:fe1c:d9b%ens5) 56 data bytes
113+
64 bytes from fe80::ff:fe1c:d9b%ens5: icmp_seq=1 ttl=64 time=1.27 ms
114+
64 bytes from fe80::ff:fe1c:d9b%ens5: icmp_seq=2 ttl=64 time=0.652 ms
115+
64 bytes from fe80::ff:fe1c:d9b%ens5: icmp_seq=3 ttl=64 time=0.632 ms
116+
--- fe80::0:0ff:fe1c:d9b%ens5 ping statistics ---
117+
3 packets transmitted, 3 received, 0% packet loss, time 2042ms
118+
rtt min/avg/max/mdev = 0.632/0.850/1.266/0.294 ms
119+
```
120+
121+
This response suggests the Instance is attached to the Private Network, but has lost its IPAM-provided IPv4 and IPv6 addresses. There could be a configuration issue on the Instance, such as DHCP client issue, a problem with `iptables` rules, or another parameter you may have manually altered.
122+
123+
You can connect to your Instance via SSH using the LLA, to take control and attempt to fix the issue.
124+
125+
If you do not believe you have modified any parameters affecting the Instance's DHCP or IP configuration over the Private Network, open a support ticket providing the full output from all of the above tests.

pages/vpc/troubleshooting/index.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -64,11 +64,11 @@ categories:
6464
## VPC troubleshooting pages
6565

6666
<LinksList>
67-
- <LinkList to="/vpc/troubleshooting/resource-attached-no-ip/" label="My resource has no IP address on a Private Network" />
68-
- <LinkList to="/vpc/troubleshooting/cant-delete-vpc-pn/" label="I can't delete my VPC or Private Network" />
69-
- <LinkList to="/vpc/troubleshooting/autoconfig-not-working/" label="My Instance is attached to a Private Network but auto-configuration is not working" />
70-
- <LinkList to="/vpc/troubleshooting/private-dns-dhcp-not-working/" label="Private DNS and/or DHCP are not working" />
71-
- <LinkList to="/vpc/troubleshooting/pn-name/" label="I am experiencing SSL or DNS errors and conflicts with my Private Network" />
67+
- <LinkList to="/vpc/troubleshooting/resource-attached-no-ip/" label="My resource has no IP address on a Private Network (DHCP problems)" />
68+
- <LinkList to="/vpc/troubleshooting/pn-name/" label="I am experiencing DNS or SSL errors and conflicts with my Private Network" />
7269
- <LinkList to="/vpc/troubleshooting/vpc-pn-routing-connectivity-issues/" label="I am experiencing connectivity or routing issues with my VPC or Private Network" />
70+
- <LinkList to="/vpc/troubleshooting/cant-delete-vpc-pn/" label="I can't delete my VPC or Private Network" />
71+
- <LinkList to="/vpc/troubleshooting/connectivity-tests/" label="Connectivity tests for unreachable Instances in a Private Network" />
72+
- <LinkList to="/vpc/troubleshooting/autoconfig-not-working/" label="My legacy Instance is attached to a Private Network but auto-configuration is not working" />
7373
- <LinkList to="/vpc/troubleshooting/vpc-limitations/" label="VPC limitations" />
7474
</LinksList>

pages/vpc/troubleshooting/pn-name.mdx

Lines changed: 36 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,36 @@
11
---
22
meta:
3-
title: I am experiencing SSL or DNS errors and conflicts with my Private Network
4-
description: This page helps you troubleshoot problems that can occur when you have given your Private Network a name that is also a TLD, which can cause errors and conflicts with SSL, DNS and addressing.
3+
title: I am experiencing DNS or SSL errors and conflicts with my Private Network
4+
description: This page helps you troubleshoot problems that can occur when accessing your resource by its hostname over a Private Network
55
content:
6-
h1: I am experiencing SSL or DNS errors and conflicts with my Private Network
7-
paragraph: This page helps you troubleshoot problems that can occur when you have given your Private Network a name that is also a TLD, which can cause errors and conflicts with SSL, DNS and addressing.
6+
h1: I am experiencing DNS or SSL errors and conflicts with my Private Network
7+
paragraph: This page helps you troubleshoot problems that can occur when accessing your resource by its hostname over a Private Network
88
tags: private-network tld ssl ssl-validation-failed dns name addressing
99
dates:
10-
validation: 2025-02-13
10+
validation: 2025-05-30
1111
posted: 2024-01-31
1212
categories:
1313
- network
1414
---
1515

16-
## TLD naming problem with Private Networks
16+
Scaleway VPC and Private Networks integrate managed DNS, for the effective resolution of hostnames to IP addresses. You may be experiencing DNS and/or related SSL errors when attempting to access your resource over its [hostname](/vpc/reference-content/dns/#hostname-format) on a Private Network.
17+
18+
This document guides you through solutions to this type of problem.
19+
20+
## Basic steps to try first
21+
22+
- Make sure that [DHCP is activated](/vpc/how-to/activate-dhcp/) on your Private Network.
23+
- Ensure that you have tried [detaching/reattaching](/vpc/troubleshooting/resource-attached-no-ip/#no-ip-address-is-displayed-but-i-have-activated-dhcp) the affected resources from/to the Private Network, particularly if they are older resources or you have [changed their name](/vpc/how-to/attach-resources-to-pn/#how-to-access-a-resource-on-a-private-network-via-its-hostname-dns).
24+
- Ensure that you are correctly addressing resources attached to a Private Network, using the format `resource-name.private-network-name.internal`. The `.internal` is important to allow Scaleway DNS to distinguish public and private hostnames and correctly resolve requests. [Find out more about DNS](/vpc/reference-content/dns/).
25+
26+
## Check for TLD naming problem
1727

1828
If you have given your Private Network a name that is also a **T**op **L**evel **D**omain, you may experience SSL or addressing errors and conflicts when you try to access resources on the public internet with the same TLD as your Private Network, or when trying to reach resources on your Private Network from the public internet. Examples are:
1929

2030
- Errors when trying to reach `google.dev` from a Private Network named `dev`
2131
- Errors when trying to reach `scw.cloud.network` from a Private Network named `network`
2232

23-
## Solutions
33+
### Solution
2434

2535
Scaleway is working on a solution to allow users to name their Private Networks with a TLD name without experiencing any conflicts. In the meantime, until this solution is deployed, you should **not** give your Private Network a name that is also a TLD.
2636

@@ -38,4 +48,22 @@ You can change your Private Network name at any time in the [Scaleway console](h
3848
- After changing the name of Private Network, it can take up to five minutes for the new name to be propagated.
3949
- You should also renew DHCP leases in order to update the list of search domains for the Private Network: do this by running `netplan apply` on Ubuntu servers.
4050
- Note that resources in a Private Network are in any case always reachable by their IP address.
41-
</Message>
51+
</Message>
52+
53+
## Check whether resource has a dot in its hostname
54+
55+
Issues may arise with internal addressing if you give your resource a name that includes a dot (`.`).
56+
57+
### Solution
58+
59+
Try renaming your resource to a name that does not include a dot, then detach/reattach it to the Private Network in order to update DNS.
60+
61+
## Distributions running Network Manager
62+
63+
Private DNS should work out of the box for attached resources with Debian-based distributions, and for distributions using `systemd-resolved`, such as Ubuntu.
64+
65+
It does **not** work out of the box for Linux distributions using Network Manager, such as **RockyLinux**.
66+
67+
### Solution
68+
69+
If your resource is running RockyLinux, or another distribution using Network Manager, you should manually configure the system to use the nameserver `169.254.169.254`. You will then be able to resolve the name of your resources, as well as public domain names.

0 commit comments

Comments
 (0)