8000 add port info · DataDog/documentation@93dc471 · GitHub
[go: up one dir, main page]

Skip to content

Commit 93dc471

Browse files
committed
add port info
1 parent 6d8b417 commit 93dc471

File tree

1 file changed

+10
-3
lines changed

1 file changed

+10
-3
lines changed

content/en/security/application_security/threats/setup/threat_detection/gcp-service-extensions.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,16 @@ and [create a Service Extension as a traffic extension][5].
5050

5151
To integrate a Service Extension with ASM using the Google Cloud Console, complete the following steps:
5252

53-
1. **Create a VM Compute instance** using the Datadog Service Extensions Docker image. The image is available on the [Datadog Go tracer GitHub Registry][1].
53+
1. **Create a VM Compute instance** using the Datadog ASM Service Extensions Docker image. The image is available on the [Datadog Go tracer GitHub Registry][1].
5454

55-
See the [Configuration](#configuration) section below for available environment variables when setting up your VM instance.
55+
See the [Configuration](#configuration) section below for available environment variables when setting up your VM instance.
56+
57+
<div class="alert alert-info">
58+
<strong>Note:</strong> Be sure to update accordingly your Firewall rules to allow the Load Balancer to communicate with the Callout VM instance. The same also applies to the Datadog Agent.
59+
</div>
5660

5761
2. **Add the VM to an unmanaged instance group**
62+
5863
Specify `http:80` and `grpc:443` (or your configured values) for the port mappings of the instance group.
5964

6065
3. **Create a backend service and add your instance group**
@@ -73,6 +78,8 @@ To integrate a Service Extension with ASM using the Google Cloud Console, comple
7378
2. Select your load balancer type
7479
3. Select `Traffic extensions` as the type
7580
4. Select your forwarding rules
81+
82+
7683
<br>
7784

7885
5. **Create an Extension Chain**
@@ -107,7 +114,7 @@ You can use Terraform to automate the deployment of the ASM GCP Service Extensio
107114
You can import the following module to your project. It's installing a the service extension on a **Global External Load Balancer**:
108115

109116
```bash
110-
mkdir gcp-asm-service-extension
117+
mkdir gcp-asm-service-extension && cd gcp-asm-service-extension
111118
touch main.tf variables.tf
112119
```
113120

0 commit comments

Comments
 (0)
0