Skip to content

Commit 45de44f

Browse files
[DOCS-10975] add Windows steps for PL root certificates (#29485)
* add Windows steps for PL root certificates * remove stray </a> tag * add standalone process * fixing windows command * fixing some vale stuff * fixing period * Apply suggestions from code review Co-authored-by: Joe Peeples <[email protected]> * fixes from Joe's review --------- Co-authored-by: Joe Peeples <[email protected]>
1 parent 39598de commit 45de44f

File tree

2 files changed

+44
-1
lines changed

2 files changed

+44
-1
lines changed

content/en/synthetics/platform/private_locations/_index.md

Lines changed: 44 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -666,7 +666,50 @@ For more information about private locations parameters for admins, see [Configu
666666

667667
You can upload custom root certificates to your private locations to have your API and browser tests perform the SSL handshake using your own `.pem` files.
668668

669-
When spinning up your private location containers, mount the relevant certificate `.pem` files to `/etc/datadog/certs` in the same way you mount your private location configuration file. These certificates are considered trusted CA and are used at test runtime. **Note**: If you combine all your `.pem` files into one file, then the order in which the certificates are placed matters. It is required that the intermediate certificate precedes the root certificate to successfully establish a chain of trust.
669+
{{< tabs >}}
670+
{{% tab "Linux container" %}}
671+
672+
When spinning up your private location containers, mount the relevant certificate `.pem` files to `/etc/datadog/certs` in the same way you mount your private location configuration file. These certificates are considered trusted CA and are used at test runtime.
673+
674+
<div class="alert alert-info"><strong>Note</strong>: If you combine all your <code>.pem</code> files into one file, the sequence of the certificates within the file is important. It is required that the intermediate certificate precedes the root certificate to successfully establish a chain of trust.</div>
675+
676+
{{% /tab %}}
677+
678+
{{% tab "Windows service" %}}
679+
680+
To install root certificates for private locations on a Windows service, use the following steps:
681+
682+
1. Open the Registry Editor App.
683+
2. Navigate to the entry `Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\synthetics-private-location`.
684+
3. Create a Registry key named `Environment` with the `Multi-string` value type.
685+
686+
<div class="alert alert-info"><strong>Note</strong>: Your certificate needs to be in the same folder as the your Synthetic Monitoring Service:
687+
default: <code>C:\Program Files\Datadog-Synthetics\Synthetics</code>.</div>
688+
689+
4. Set the value `NODE_EXTRA_CA_CERTS=C:\Program Files\Datadog-Synthetics\Synthetics\CACert.pem`
690+
691+
{{< img src="synthetics/private_locations/windows_pl_set_service.png" alt="Your image description" style="width:100%;" >}}
692+
693+
5. Open the Services App and reload the Datadog Synthetic Monitoring Private Location service.
694+
695+
{{% /tab %}}
696+
697+
{{% tab "Windows standalone" %}}
698+
699+
To install root certificates for private locations on a standalone Windows process with `synthetics-private-location.exe`, use the following steps:
700+
701+
1. Open your Windows command prompt or PowerShell.
702+
703+
2. Set the environment variable and call the executable.
704+
705+
Example:
706+
707+
```text
708+
set NODE_EXTRA_CA_CERTS=C:\Program Files\Datadog-Synthetics\Synthetics\CACert.pem && .\synthetics-private-location.exe --config "C:\ProgramData\Datadog-Synthetics\Synthetics\worker-config.json"
709+
```
710+
711+
{{% /tab %}}
712+
{{< /tabs >}}
670713

671714
#### Set up liveness and readiness probes
672715

Loading

0 commit comments

Comments
 (0)