You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Run this command to boot your private location worker by mounting your configuration file to the container. Ensure that your `<MY_WORKER_CONFIG_FILE_NAME>.json` file is in `/etc/docker`, not the root home folder:
This command starts a Docker container and makes your private location ready to run tests. **Datadog recommends running the container in detached mode with proper restart policy.**
The Podman configuration is very similar to Docker, however, you must set `NET_RAW` as an additional capability to support ICMP tests.
269
274
270
275
1. Run `sysctl -w "net.ipv4.ping_group_range = 0 2147483647"` from the host where the container runs.
@@ -277,10 +282,9 @@ The Podman configuration is very similar to Docker, however, you must set `NET_R
277
282
If you have configured blocked reserved IP addresses, add the `NET_ADMIN` Linux capabilities to your private location container.
278
283
279
284
This command starts a Podman container and makes your private location ready to run tests. Datadog recommends running the container in detached mode with proper restart policy.
To deploy the private locations worker in a secure manner, set up and mount a Kubernetes Secret resource in the container under `/etc/datadog/synthetics-check-runner.json`.
286
290
@@ -331,17 +335,17 @@ To deploy the private locations worker in a secure manner, set up and mount a Ku
331
335
332
336
For OpenShift, run the private location with the `anyuid` SCC. This is required for your browser test to run.
You can set environment variables in your configuration parameters that point to secrets you have already configured. To create environment variables with secrets, see the [Kubernetes documentation][3].
341
345
342
346
Alternatively:
343
347
344
-
1. Add the [Datadog Synthetics Private Location][30] to your Helm repositories:
348
+
1. Add the [Datadog Synthetics Private Location][2] to your Helm repositories:
345
349
346
350
```shell
347
351
helm repo add datadog https://helm.datadoghq.com
@@ -356,12 +360,13 @@ Alternatively:
356
360
357
361
**Note:** If you have blocked reserved IPs, add the `NET_ADMIN` [Linux capabilities][26] to your private location container.
Create a new EC2 task definition that matches the following. Replace each parameter with the corresponding value found in your previously generated private location configuration file:
367
372
@@ -392,15 +397,16 @@ Create a new EC2 task definition that matches the following. Replace each parame
392
397
...
393
398
}
394
399
```
395
-
396
400
**Notes:**
397
401
398
402
- If you have blocked reserved IPs, configure a [linuxParameters][31] to grant `NET_ADMIN` capabilities to your private location containers.
399
403
- If you use the `DATADOG_API_KEY`, `DATADOG_ACCESS_KEY`, `DATADOG_SECRET_ACCESS_KEY`, `DATADOG_PUBLIC_KEY_PEM` and `DATADOG_PRIVATE_KEY` environment variables, you do not need to include them in the `"command": [ ]` section.
Create a new Fargate task definition that matches the following. Replace each parameter with the corresponding value found in your previously generated private location configuration file:
406
412
@@ -435,9 +441,9 @@ Create a new Fargate task definition that matches the following. Replace each pa
435
441
436
442
**Note:** Because the private location firewall option is not supported on AWS Fargate, the `enableDefaultBlockedIpRanges` parameter cannot be set to `true`.
437
443
438
-
{{% /collapse-content %}}
444
+
{{< /tab >}}
439
445
440
-
{{% collapse-content title="Fargate with AWS Secret Manager" level="h4" expanded=false %}}
446
+
{{% tab "Fargate with AWS Secret Manager" %}}
441
447
442
448
Create a secret in AWS secret manager to store all or part of the previously generated private location configuration. Keep in mind that the `publicKey` cannot be kept as it is in the configuration file. For example:
443
449
@@ -522,9 +528,11 @@ If you didn't save all the configuration in the secret manager, you can still pa
522
528
523
529
**Note:** Because the private location firewall option is not supported on AWS Fargate, the `enableDefaultBlockedIpRanges` parameter cannot be set to `true`.
{{% collapse-content title="Windows via GUI" level="h4" expanded=false %}}
588
+
{{% tab "Windows via GUI" %}}
581
589
582
590
1. Download the [`datadog-synthetics-worker-{{< synthetics-worker-version "synthetics-windows-pl" >}}.amd64.msi` file][101] and run this file from the machine you want to install the private location on.
583
591
1. Click **Next** on the welcome page, read the EULA, and accept the terms and conditions. Click **Next**.
@@ -617,9 +625,9 @@ Once the process is complete, click **Finish** on the installation completion pa
{{% collapse-content title="Windows via CLI" level="h4" expanded=false %}}
630
+
{{% tab "Windows via CLI" %}}
623
631
624
632
1. Download the [`datadog-synthetics-worker-{{< synthetics-worker-version "synthetics-windows-pl" >}}.amd64.msi` file][101] and run this file from the machine you want to install the private location on.
625
633
2. Run one of the following commands inside the directory where you downloaded the installer:
@@ -649,7 +657,8 @@ Additional parameters can be added:
0 commit comments