You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[DOCS-10975] add Windows steps for PL root certificates (#29485)
* add Windows steps for PL root certificates
* remove stray </a> tag
* add standalone process
* fixing windows command
* fixing some vale stuff
* fixing period
* Apply suggestions from code review
Co-authored-by: Joe Peeples <[email protected]>
* fixes from Joe's review
---------
Co-authored-by: Joe Peeples <[email protected]>
Copy file name to clipboardExpand all lines: content/en/synthetics/platform/private_locations/_index.md
+44-1Lines changed: 44 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -666,7 +666,50 @@ For more information about private locations parameters for admins, see [Configu
666
666
667
667
You can upload custom root certificates to your private locations to have your API and browser tests perform the SSL handshake using your own `.pem` files.
668
668
669
-
When spinning up your private location containers, mount the relevant certificate `.pem` files to `/etc/datadog/certs` in the same way you mount your private location configuration file. These certificates are considered trusted CA and are used at test runtime. **Note**: If you combine all your `.pem` files into one file, then the order in which the certificates are placed matters. It is required that the intermediate certificate precedes the root certificate to successfully establish a chain of trust.
669
+
{{< tabs >}}
670
+
{{% tab "Linux container" %}}
671
+
672
+
When spinning up your private location containers, mount the relevant certificate `.pem` files to `/etc/datadog/certs` in the same way you mount your private location configuration file. These certificates are considered trusted CA and are used at test runtime.
673
+
674
+
<div class="alert alert-info"><strong>Note</strong>: If you combine all your <code>.pem</code> files into one file, the sequence of the certificates within the file is important. It is required that the intermediate certificate precedes the root certificate to successfully establish a chain of trust.</div>
675
+
676
+
{{% /tab %}}
677
+
678
+
{{% tab "Windows service" %}}
679
+
680
+
To install root certificates for private locations on a Windows service, use the following steps:
681
+
682
+
1. Open the Registry Editor App.
683
+
2. Navigate to the entry `Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\synthetics-private-location`.
684
+
3. Create a Registry key named `Environment` with the `Multi-string` value type.
685
+
686
+
<div class="alert alert-info"><strong>Note</strong>: Your certificate needs to be in the same folder as the your Synthetic Monitoring Service:
0 commit comments