(Opsional) Konfigurasikan pelaporan Anda untuk menggunakan Virtual Private Cloud (VPC)
Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Atau, jika ingin menggunakan Virtual Private Cloud (VPC) di
lingkungan tempat layanan produk Anda berjalan, Anda harus menyelesaikan
langkah-langkah berikut untuk mengintegrasikan pelaporan Google Cloud Marketplace dengan VPC.
Secara default, virtual machine (VM) Compute Engine di VPC Anda hanya dapat berkomunikasi secara internal. Anda harus mengonfigurasi salah satu VM untuk berkomunikasi secara eksternal, sehingga VM lainnya di VPC dapat menggunakannya untuk pelaporan.
Pastikan Anda memiliki peran Identity and Access Management (IAM)
Compute Network Admin untuk project Google Cloud .
Menyiapkan Akses Google Pribadi
Agar virtual machine (VM) Compute Engine produk Anda dapat berkomunikasi
secara eksternal untuk tujuan pelaporan, Anda harus menyiapkan
Akses Google Pribadi. Untuk informasi selengkapnya tentang cara mengonfigurasi Akses Google Pribadi, lihat Mengonfigurasi Akses Google Pribadi.
Untuk Targets, pilih Specified target tags, lalu untuk Target tag, tentukan google-apis-services.
Untuk Destination filter, pilih IPv4 ranges, dan untuk
Destination IPv4 ranges, tentukan 199.36.153.8/30.
Untuk Protocols and ports, pilih Allow all.
Di konsol Google Cloud , pilih VM yang ingin Anda gunakan untuk melaporkan
penggunaan produk. Di bagian Network tags, tambahkan google-apis-services, lalu
klik SAVE.
Di bagian Network interfaces, temukan antarmuka jaringan VPC Anda.
Di kolom Subnetwork, klik link subnet. Dari halaman Subnet details, klik Edit, lalu tetapkan Private Google Access ke On.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[],[],null,["# (Optional) Configure your reporting to use Virtual Private Cloud (VPC)\n\nOptionally, if you want to use [Virtual Private Cloud (VPC)](/vpc) in the\nenvironment in which your product's service runs, you must complete the\nfollowing steps to integrate Google Cloud Marketplace reporting with VPC.\nBy default, the Compute Engine virtual machines (VMs) in your\nVPC can only communicate internally. You must configure one of\nthe VMs to communicate externally, so that the rest of the VMs in your\nVPC can use it for reporting.\n\nBefore you begin\n----------------\n\n- Set up your preferred implementation of VPC in your service environment. For steps to set up VPC, visit [Create and modify Virtual Private Cloud (VPC) networks](/vpc/docs/create-modify-vpc-networks).\n- Ensure that you have the [Compute Network Admin](/iam/docs/understanding-roles#compute-engine-roles) Identity and Access Management (IAM) role for your Google Cloud project.\n\nSet up Private Google Access\n----------------------------\n\nTo enable your product's Compute Engine virtual machines (VMs) to communicate\nexternally for reporting purposes, you must set up\n[Private Google Access](/vpc/docs/private-google-access). For more information\nabout configuring Private Google Access, refer to\n[Configuring Private Google Access](/vpc/docs/configure-private-google-access).\n\n1. [Enable Private Google Access](/vpc/docs/configure-private-google-access#enabling-pga)\n for your service environment.\n\n2. [Configure DNS](/vpc/docs/configure-private-google-access#config-domain) to\n resolve requests to `private.googleapis.com`.\n\n3. [Create a custom route](/vpc/docs/using-routes#addingroute) for Google APIs:\n\n - For **Name** , specify `route-google-apis-services`.\n - For **Network**, select your VPC.\n - For **Destination IP range** , specify `199.36.153.8/30`.\n - For **Priority** , specify `0`.\n - For **Instance tags** , specify `google-apis-services`.\n - For **Next hop** , select **Default internet gateway**.\n4. [Create a VPC firewall rule](/vpc/docs/using-firewalls#creating_firewall_rules)\n to enable your product to communicate with Google APIs:\n\n - For the **Name** , specify `google-apis-services`.\n - For the **Description** , specify `Allow egress traffic to Google APIs and\n services`.\n - Enable [firewall rules logging](/vpc/docs/using-firewall-rules-logging).\n - For **Network**, select your VPC.\n - For **Direction of traffic** , select **Egress**.\n - For the **Action on match** , select **Allow**.\n - For **Targets** , select `Specified target tags`, and then for **Target\n tags** , specify `google-apis-services`.\n - For the **Destination filter** , select `IPv4 ranges`, and for the **Destination IPv4 ranges** , specify `199.36.153.8/30`.\n - For **Protocols and ports** , select `Allow all`.\n5. In Google Cloud console, select the VM you want to use to report your\n product's usage. Under **Network tags** , add `google-apis-services`, and\n click **SAVE**.\n\n6. Under **Network interfaces**, locate your VPC's network\n interface.\n\n7. In the **Subnetwork** column, click the subnet link. From the\n **Subnet details** page, click **Edit** , and set **Private Google Access**\n to **On**.\n\n8. Click **Save**."]]