My Instance is attached to a Private Network but autoconfiguration is not working
Default Instance images for Ubuntu, Debian and CentOS support autoconfiguration of interfaces plugged into a Private Network.
They leverage helper scripts provided by the scaleway-ecosystem package. These scripts:
- enable DHCP on the interfaces plugged into a Private Network
- when Instances are attached to Private Networks plugged into Public Gateways, make the default route received by DHCP the primary route for all traffic on the Instance
- keep the route to the Scaleway Metadata API more specific (see below).
If your Instance does not get autoconfigured, it may be that you are using an old version of the scaleway-ecosystem package. scaleway-ecosystem 0.0.4
or later is required. Use the following command to update it:
-
On Ubuntu (Focal and Jammy) or Debian (Stretch and Buster):
add-apt-repository ppa:scaleway/stable && apt update && apt install scaleway-ecosystemadd-apt-repository ppa:scaleway/stable && apt update && apt install scaleway-ecosystemapt list scaleway-ecosystem -
On Debian distributions (Bookwork, Bullseye and Buster):
cat << EOF > /etc/apt/sources.list.d/scaleway-ubuntu-debian-stable-jammy.listdeb http://ppa.launchpad.net/scaleway/debian-stable/ubuntu jammy main# deb-src http://ppa.launchpad.net/scaleway/debian-stable/ubuntu jammy mainEOFapt -y updateapt install scaleway-ecosystemapt list scaleway-ecosystem -
On CentOS 7:
yum -y install yum-plugin-copryum -y copr enable @scaleway/instancesyum -y install scaleway-ecosystem -
On Centos Stream 8 and later, RockyLinux, AlmaLinux or Fedora:
dnf -y copr enable @scaleway/ecosystemdnf -y install scaleway-ecosystem
Security group rules for Instances are applied to public Internet connections only. The security group rules do not apply to Private Network connections.