Menyiapkan perimeter layanan menggunakan Kontrol Layanan VPC
Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Kontrol Layanan VPC adalah Google Cloud fitur yang memungkinkan Anda menyiapkan
perimeter layanan dan membuat batas transfer data. Anda dapat menggunakan Kontrol Layanan VPC dengan Cloud Tasks untuk membantu melindungi layanan Anda.
Target yang didukung
Setelah Anda menyiapkan perimeter layanan, permintaan HTTP dari
eksekusi Cloud Tasks diizinkan untuk:
Permintaan yang diautentikasi ke target fungsi Cloud Run yang mematuhi Kontrol Layanan VPC di endpoint functions.net
Permintaan yang diautentikasi ke target Cloud Run yang mematuhi Kontrol Layanan VPC di endpoint run.app
Contoh target yang tidak didukung
Setelah Anda menyiapkan perimeter layanan, permintaan HTTP dari
eksekusi Cloud Tasks akan diblokir untuk permintaan yang tidak mematuhi kebijakan.
Misalnya, permintaan ke semua hal berikut akan diblokir:
Target fungsi Cloud Run yang tidak mematuhi Kontrol Layanan VPC di endpoint functions.net
Target Cloud Run yang tidak mematuhi Kontrol Layanan VPC di
endpoint run.app
Cloud Run Functions menargetkan endpoint non-functions.net
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[],[],null,["# Set up a service perimeter using VPC Service Controls\n\nVPC Service Controls is a Google Cloud feature that allows you to set\nup a service perimeter and create a data transfer boundary. You can use\nVPC Service Controls with Cloud Tasks to help protect your\nservices.\n\nSupported targets\n-----------------\n\nOnce you set up a service perimeter, HTTP requests from a\nCloud Tasks execution are allowed for:\n\n- Authenticated requests to VPC Service Controls-compliant Cloud Run functions targets at `functions.net` endpoints\n- Authenticated requests to VPC Service Controls-compliant Cloud Run targets at `run.app` endpoints\n\nExamples of unsupported targets\n-------------------------------\n\nOnce you set up a service perimeter, HTTP requests from a\nCloud Tasks execution are blocked for non-compliant requests.\nFor example, requests to all of the following are blocked:\n\n- Non-VPC Service Controls-compliant Cloud Run functions targets at `functions.net` endpoints\n- Non-VPC Service Controls-compliant Cloud Run targets at `run.app` endpoints\n- Cloud Run functions targets at non-`functions.net` endpoints\n- Cloud Run targets at non-`run.app` endpoints\n- Non-Cloud Run functions endpoints\n- Non-Cloud Run endpoints\n\nWhat's next\n-----------\n\n- To set up a service perimeter, see\n [Create a service perimeter](/vpc-service-controls/docs/create-service-perimeters).\n\n- To adjust the ingress settings of your Cloud Run function, see\n [Configuring network settings](/functions/docs/networking/network-settings).\n\n- To adjust the ingress settings of your Cloud Run service, see\n [Restricting ingress for Cloud Run](/run/docs/securing/ingress).\n\n- To learn more about VPC Service Controls, see the\n [overview](/vpc-service-controls/docs/overview) and\n [supported products and limitations](/vpc-service-controls/docs/supported-products)."]]