Configurar un perímetro de servicio con Controles de Servicio de VPC
Organízate con las colecciones
Guarda y clasifica el contenido según tus preferencias.
Controles de Servicio de VPC es una Google Cloud función que te permite configurar un perímetro de servicio y crear un límite de transferencia de datos. Puedes usar Controles de Servicio de VPC con Workflows para proteger tus servicios.
Las solicitudes HTTP de una ejecución de Workflows se admiten de la siguiente manera:
Se permiten las solicitudes autenticadas
a los endpoints Google Cloud que cumplen los requisitos de Controles de Servicio de VPC.
Se permiten las solicitudes a los endpoints de Cloud Run Functions y de servicios de Cloud Run.
Se bloquean las solicitudes a endpoints de terceros.
Se bloquean las solicitudes a endpoints que no cumplen los requisitos de Controles de Servicio de VPC. Google Cloud
[[["Es fácil de entender","easyToUnderstand","thumb-up"],["Me ofreció una solución al problema","solvedMyProblem","thumb-up"],["Otro","otherUp","thumb-up"]],[["Es difícil de entender","hardToUnderstand","thumb-down"],["La información o el código de muestra no son correctos","incorrectInformationOrSampleCode","thumb-down"],["Me faltan las muestras o la información que necesito","missingTheInformationSamplesINeed","thumb-down"],["Problema de traducción","translationIssue","thumb-down"],["Otro","otherDown","thumb-down"]],["Última actualización: 2025-08-20 (UTC)."],[],[],null,["# Set up a service perimeter using VPC Service Controls\n\nVPC Service Controls is a Google Cloud feature that allows you to set\nup a service perimeter and create a data transfer boundary. You can use\nVPC Service Controls with Workflows to help protect your\nservices.\n\nHTTP requests from a Workflows execution are supported as\nfollows:\n\n- [Authenticated requests](/workflows/docs/authenticate-from-workflow#authenticate-apis) to VPC Service Controls-compliant Google Cloud endpoints are allowed.\n- Requests to Cloud Run functions and Cloud Run service endpoints are allowed.\n- Requests to third-party endpoints are blocked.\n- Requests to non-VPC Service Controls-compliant Google Cloud endpoints are blocked.\n\nWhat's next\n-----------\n\n- To learn more about VPC Service Controls, see the\n [overview](/vpc-service-controls/docs/overview) and\n [supported products and limitations](/vpc-service-controls/docs/supported-products).\n\n- For the recommended process to configure and enforce\n VPC Service Controls protection in your Google Cloud organization, see\n [Best practices for enabling VPC Service Controls](/vpc-service-controls/docs/enable).\n\n- For best practices for designing service perimeters, see\n [Design and architect service perimeters](/vpc-service-controls/docs/architect-perimeters).\n\n- To set up a service perimeter, see\n [Create a service perimeter](/vpc-service-controls/docs/create-service-perimeters).\n\n- To invoke a private endpoint, see\n [Invoke a private endpoint using Service Directory's service registry](/workflows/docs/invoke-private-endpoint-vpc)."]]