Access a Looker (Google Cloud core) instance using private services access: Traffic originating from different regions

This documentation page describes how to set up a custom domain and set up access to a Looker (Google Cloud core) instance that meets the following criteria:

To access this kind of instance, perform the following steps:

  1. Set up the custom domain.
  2. Create VMs and a private zone.
  3. Configure the reverse proxy servers.
  4. Create and configure the load balancer.
  5. Create firewall rules.
  6. Update the DNS A record.
  7. Update the OAuth credentials.

Set up a custom domain

After your Looker (Google Cloud core) instance has been created, you can set up a custom domain.

Before you begin

Before you can customize the domain of your Looker (Google Cloud core) instance, identify where your domain's DNS records are stored, so that you can update them.

Required roles

To get the permissions that you need to create a custom domain for a Looker (Google Cloud core) instance, ask your administrator to grant you the Looker Admin (roles/looker.admin) IAM role on the project the instance resides in. For more information about granting roles, see Manage access to projects, folders, and organizations.

You might also be able to get the required permissions through custom roles or other predefined roles.

Create a custom domain

In the Google Cloud console, follow these steps to customize the domain of your Looker (Google Cloud core) instance:

  1. On the Instances page, click the name of the instance for which you would like to set up a custom domain.
  2. Click the CUSTOM DOMAIN tab.
  3. Click ADD A CUSTOM DOMAIN.

    This opens the Add a new custom domain panel.

  4. Using only letters, numbers, and dashes, enter the hostname of up to 64 characters for the web domain that you would like to use — for example: looker.examplepetstore.com.

  5. Click DONE on the Add a new custom domain panel to return to the CUSTOM DOMAIN tab.

Once set up, your custom domain is displayed in the Domain column on the Custom Domain tab of the instance details page of the Google Cloud console.

After your custom domain has been created, you can view information about it, or delete it.

Access the custom domain

When traffic to a private IP only Looker (Google Cloud core) instance originates from a different region than the instance, you can use one or more private IP reverse proxy servers and a load balancer to provide secure access to the instance.

Before you begin

To get the permissions that you need to set up access to a private IP custom domain, ask your administrator to grant you the following IAM roles on the project the instance resides in:

For more information about granting roles, see Manage access to projects, folders, and organizations.

You might also be able to get the required permissions through custom roles or other predefined roles.

Networking overview

The following sections show how to create a redundant NGINX or Apache proxy server setup, with a load balancer, to route traffic from any region or from on premises to the custom domain. The following diagram represents this topology:

A Google Cloud network showing secure access to a Looker (Google Cloud core) instance using Cloud Router, an internal load balancer, and Private Services Access.

Create VMs and a private zone

  1. Create two private IP only VM instances with a RHEL operating system. The VMs will act as your proxy servers. They should be located within the same region as the Looker (Google Cloud core) instance, but in different zones from each other.
  2. Create a Cloud DNS private zone for managing your Cloud DNS records. The private zone should be visible to the VPC in which the Looker (Google Cloud core) instance is located. The Cloud DNS private zone will be used by the VPC and the on-premises hosts for DNS resolution to reach the Looker (Google Cloud core) UI. Since you will be using a load balancer, the A record in the Cloud DNS private zone will map to the load balancer IP address.

Configure the reverse proxy servers

You can use any web server that can be configured as a reverse proxy server. Select one of the following options to see examples of how to set up reverse proxy servers using NGINX or Apache:

NGINX

The following example uses NGINX release 1.22.1 and Red Hat Enterprise Linux release 8.9 (Ootpa). To check what versions of NGNIX and Red Hat your VMs are using, run the following commands for each VM.

  1. First, connect to the VM.

  2. Install NGINX using the following command:

    sudo yum install nginx -y
    
  3. To find the NGINX version the VM is running, run the following command:

    sudo nginx -v
    

    This should return something similar to the following:

    nginx version: nginx/1.22.1

  4. To check which NGINX release the VM is running, run the following:

    sudo rpm -qi nginx | grep Release
    

    This should return something similar to the following:

    Release : 1.module+el8.8.0+20355+6d9c8a63.1

  5. To check what version of Red Hat your VMs are using, run the following command:

    sudo cat /etc/redhat-release
    

To set up each proxy server, use the following instructions for each of the two VMs that you created.

  1. Connect to the VM.
  2. Edit the /etc/nginx/nginx.conf file to contain the following configuration:

    events {
      worker_connections 1024;
    }
    
    http {
      log_format  main  '$remote_addr - $remote_user [$time_local] "$request" '
                        '$status $body_bytes_sent "$http_referer" '
                        '"$http_user_agent" "$http_x_forwarded_for"';
    
      log_format debug  '$http_x_forwarded_for - $remote_user [$time_local] '
                        '"$request_method $scheme://$host$request_uri $server_protocol" '
                        '$status $body_bytes_sent "$http_referer" '
                        '"$http_user_agent" $request_time';
    
      access_log  /var/log/nginx/access.log  debug;
    
      sendfile            on;
      tcp_nopush          on;
      keepalive_timeout   65;
        types_hash_max_size 4096;
    
        include             /etc/nginx/mime.types;
        default_type        application/octet-stream;
    
    server {
      listen 443 ssl;
      # listen [::]:443 ssl;
      include snippets/self-signed.conf;
      # include snippets/ssl-params.conf;
      server_name CUSTOM_DOMAIN;
      location / {
        proxy_pass https://INGRESS_PRIVATE_IP/$request_uri;
        proxy_set_header Host $server_name;
        proxy_http_version 1.1;
      }
    }
    server {
      listen 80;
      # listen [::]:80;
      server_name CUSTOM_DOMAIN;
      return 302 https://$server_name$request_uri;
      }
    }
    

    Replace the following:

    • CUSTOM_DOMAIN: The custom domain of your Looker (Google Cloud core) instance
    • INGRESS_PRIVATE_IP: The ingress private IP for your Looker (Google Cloud core) instance

    Additionally, consider the following:

    • This is an IPv4-only configuration. If you require the proxy to also listen on its private IPv6 address, uncomment the listen [::]:443 ssl line in the file.
    • The access log level is set to debug; make sure to adjust it to the level used in your specific environment.
    • If you implement the ssl-params.conf file, which is referenced later in these steps, uncomment include snippets/ssl-params.conf.
  3. Create a valid TLS certificate that references the Looker (Google Cloud core) custom domain URL. This certificate will be the one that the proxy presents to clients that are trying to access Looker (Google Cloud core). The Certificate Authority (CA) used to sign the certificate must be trusted by your clients; you can also use an internal private CA to sign this TLS certificate. (Alternatively, you can also use a self-managed SSL certificate.)

    In this example, assume the certificate has already been created using the Let's Encrypt free service, without setting up automatic renewal through Certbot. Once the certificate has been created, save the relevant files in the certs and private directories on each proxy VM:
    /etc/pki/tls/certs/custom-domain.custom-domain.com.fullchain.pem;
    /etc/pki/tls/private/custom-domain.custom-domain.com.key.pem;
    

    Replace custom-domain.custom-domain.com with your custom domain.

    If the certs and private directories don't exist in your installation, you can either create them or use other folders.

  4. To make sure that NGINX picks up the certificate files, create the directory /etc/nginx/snippets:

    sudo mkdir /etc/nginx/snippets
    
  5. Create the configuration file, /etc/nginx/snippets/self-signed.conf:

    sudo touch /etc/nginx/snippets/self-signed.conf
    

    Edit the configuration file to add the paths to the certificate files that you saved:

    ssl_certificate /etc/pki/tls/certs/custom-domain.custom-domain.com.fullchain.pem;
    ssl_certificate_key /etc/pki/tls/private/custom-domain.custom-domain.com.key.pem;
    

    Replace custom-domain.custom-domain.com with your custom domain.

  6. To confirm that the configuration file contains the reference to the files that were mentioned in the previous step, run the following command:

    sudo more /etc/nginx/snippets/self-signed.conf
    

    It should return the file paths that you added.

  7. Optionally, create the ssl-params.conf NGINX file, which can be used to store parameters that can be reused in future NGINX configurations.

    For reference, the contents of the file should look similar to the following:

    ssl_protocols TLSv1.3;
    ssl_prefer_server_ciphers on;
    ssl_dhparam /etc/nginx/dhparam.pem;
    ssl_ciphers EECDH+AESGCM:EDH+AESGCM;
    ssl_ecdh_curve secp384r1;
    ssl_session_timeout  10m;
    ssl_session_cache shared:SSL:10m;
    ssl_session_tickets off;
    ssl_stapling on;
    ssl_stapling_verify on;
    resolver 127.0.0.53 valid=300s;
    resolver_timeout 5s;
    # Disable strict transport security for now. You can uncomment the following
    # line if you understand the implications.
    #add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload";
    add_header X-Frame-Options DENY;
    add_header X-Content-Type-Options nosniff;
    add_header X-XSS-Protection "1; mode=block";
    
  8. To configure SELinux to allow NGINX to forward traffic to the Looker (Google Cloud core) ingress IP, set the httpd_can_network_connect SELinux boolean parameter to 1:

    sudo setsebool -P httpd_can_network_connect 1
    
  9. You can now restart the NGINX process using the following command:

    sudo systemctl restart nginx
    
  10. Verify that NGINX has correctly restarted using the following command:

    sudo systemctl status nginx
    

    It should return an output that is similar to the following:

    nginx.service - The nginx HTTP and reverse proxy server
      Loaded: loaded (/usr/lib/systemd/system/nginx.service; disabled; vendor preset: disabled)
      Active: active (running) since Tue 2024-05-14 11:58:00 UTC; 9min ago
      Process: 144044 ExecStart=/usr/sbin/nginx (code=exited, status=0/SUCCESS)
      Process: 144042 ExecStartPre=/usr/sbin/nginx -t (code=exited, status=0/SUCCESS)
      Process: 144039 ExecStartPre=/usr/bin/rm -f /run/nginx.pid (code=exited, status=0/SUCCESS)
    Main PID: 144045 (nginx)
        Tasks: 2 (limit: 11040)
      Memory: 2.6M
      CGroup: /system.slice/nginx.service
              ├─144045 nginx: master process /usr/sbin/nginx
              └─144046 nginx: worker process
    May 14 11:58:00 proxy-three-eu-w4 systemd[1]: nginx.service: Succeeded.
    May 14 11:58:00 proxy-three-eu-w4 systemd[1]: Stopped The nginx HTTP and reverse proxy server.
    May 14 11:58:00 proxy-three-eu-w4 systemd[1]: Starting The nginx HTTP and reverse proxy server...
    May 14 11:58:00 proxy-three-eu-w4 nginx[144042]: nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
    May 14 11:58:00 proxy-three-eu-w4 nginx[144042]: nginx: configuration file /etc/nginx/nginx.conf test is successful
    May 14 11:58:00 proxy-three-eu-w4 systemd[1]: Started The nginx HTTP and reverse proxy server.
    

Apache

Complete these steps for each VM.

  1. First, connect to the VM.

  2. Install Apache:

    sudo yum install httpd -y
    
  3. The following example uses Red Hat Enterprise Linux release 7.9. To check what versions of Red Hat your VMs are using, run the following command:

    cat /etc/redhat-release
    

    This should return the following:

    Red Hat Enterprise Linux Server release 7.9 (Maipo)

  4. The following example uses Apache release 2.4.6. To check what versions of Apache your VMs are using, run the following commands for each VM:

    sudo httpd -version
    

    This should return the following:

    Server version: Apache/2.4.6 (Red Hat Enterprise Linux)
    Server built:   date
    
  5. For more information about the Apache server, run the following command:

    sudo rpm -qi httpd
    

    This should return an output similar to the following:

    Name        : httpd
    Version     : 2.4.6
    Release     : 99.el7_9.1
    Architecture: x86_64
    Install Date: Tue May  7 15:48:59 2024
    Group       : System Environment/Daemons
    Size        : 3899819
    License     : ASL 2.0
    Signature   : RSA/SHA256, Fri Apr 28 17:09:45 2023, Key ID 199e2f91fd431d51
    Source RPM  : httpd-2.4.6-99.el7_9.1.src.rpm
    Build Date  : Fri Apr 28 16:56:11 2023
    Build Host  : x86-vm-40.build.eng.bos.redhat.com
    Relocations : (not relocatable)
    Packager    : Red Hat, Inc. 
    Vendor      : Red Hat, Inc.
    URL         : http://httpd.apache.org/
    Summary     : Apache HTTP Server
    Description :
    The Apache HTTP Server is a powerful, efficient, and extensible
    web server.
    
  6. Create the configuration file /etc/httpd/conf.d/ssl.conf on the proxy VM, and add the following configuration to the file:

    ServerName custom domain of Looker (Google Cloud core)
    #   SSL Engine Switch:
    #   Enable/Disable SSL for this virtual host.
    SSLEngine on
    #   SSL Protocol support:
    # List the enable protocol levels with which clients will be able to
    # connect.  Disable SSLv2 access by default:
    SSLProtocol all -SSLv2 -SSLv3
    #   SSL Cipher Suite:
    #   List the ciphers that the client is permitted to negotiate.
    #   See the mod_ssl documentation for a complete list.
    SSLCipherSuite HIGH:3DES:!aNULL:!MD5:!SEED:!IDEA
    #   Server Certificate:
    # Point SSLCertificateFile at a PEM encoded certificate.  If
    # the certificate is encrypted, then you will be prompted for a
    # pass phrase.  Note that a kill -HUP will prompt again.  A new
    # certificate can be generated using the genkey(1) command.
    # SSLCertificateFile /etc/pki/tls/certs/localhost.crt
    SSLCertificateFile "/etc/pki/tls/certs/custom domain of Looker (Google Cloud core).crt"
    #   Server Private Key:
    #   If the key is not combined with the certificate, use this
    #   directive to point at the key file.  Keep in mind that if
    #   you've both a RSA and a DSA private key you can configure
    #   both in parallel (to also allow the use of DSA ciphers, etc.)
    # SSLCertificateKeyFile /etc/pki/tls/private/localhost.key
    SSLCertificateKeyFile "/etc/pki/tls/private/custom domain of Looker (Google Cloud core).key"
    SSLProxyEngine On
    SSLProxyCheckPeerCN off
    SSLProxyCheckPeerName off
    ProxyPreserveHost On
    RewriteEngine On
    AllowEncodedSlashes NoDecode
    ProxyPass / https://private IP of Looker (Google Cloud core)>:443/
    RewriteCond %{REQUEST_URI} ^/render/
    RewriteRule ^(.*)$ https://private IP of Looker (Google Cloud core)>:443/$1 [P]
    RewriteRule ^(.*)$ https://private IP of Looker (Google Cloud core)>:443/$1 [P,NE]
    ProxyPassReverse / https://private IP of Looker (Google Cloud core):443/
    
    

    Replace the following:

    • custom domain of Looker (Google Cloud core): The custom domain of your Looker (Google Cloud core) instance.
    • private IP of Looker (Google Cloud core): The private IP of your Looker (Google Cloud core) instance.
  7. Confirm that the TLS certificate files are available in the directories referenced in the /etc/httpd/conf.d/ssl.conf file:

    SSLCertificateFile "/etc/pki/tls/certs/custom domain of Looker (Google Cloud core).crt"
    SSLCertificateKeyFile "/etc/pki/tls/private/custom domain of Looker (Google Cloud core).key"
    
  8. Check if mod_ssl is installed:

    sudo yum list installed | grep mod_ssl
    

    If mod_ssl is not installed, install it with the following command:

    sudo yum install mod_ssl
    

    Once mod_ssl is installed, you must enable it by adding the following line to the Apache configuration file, /etc/httpd/conf/httpd.conf:

    LoadModule ssl_module modules/mod_ssl.so
    
  9. In the Apache configuration file, /etc/httpd/conf/httpd.conf, replace Listen 80 with Listen 443.

  10. Execute the following command to allow the Apache proxy VM to forward traffic to Looker (Google Cloud core):

    /usr/sbin/setsebool -P httpd_can_network_connect 1
    
  11. Finally, restart Apache to apply the changes:

    sudo systemctl restart httpd
    
  12. Verify that the rewrite module is loaded and ready on Apache using this command:

    sudo httpd -M | grep rewrite
    

    It should return an output that is similar to the following:

    rewrite_module (shared)
  13. Finally start or restart the Apache process, in order to make sure all the configuration changes are picked up:

    sudo systemctl restart httpd
    
  14. Verify that the Apache process has correctly restarted using the following command:

    sudo systemctl status httpd
    

    It should return an output that is similar to the following:

    httpd.service - The Apache HTTP Server
    Loaded: loaded (/usr/lib/systemd/system/httpd.service; disabled; vendor preset: disabled)
    Active: active (running) since Tue 2024-05-14 15:41:57 UTC; 1s ago
      Docs: man:httpd(8)
            man:apachectl(8)
    Main PID: 1400 (httpd)
    Status: "Processing requests..."
    CGroup: /system.slice/httpd.service
            ├─1400 /usr/sbin/httpd -DFOREGROUND
            ├─1401 /usr/sbin/httpd -DFOREGROUND
            ├─1402 /usr/sbin/httpd -DFOREGROUND
            ├─1403 /usr/sbin/httpd -DFOREGROUND
            ├─1404 /usr/sbin/httpd -DFOREGROUND
            └─1405 /usr/sbin/httpd -DFOREGROUND
    May 14 15:41:57 proxy-ingress-apache systemd[1]: Starting The Apache HTTP Server...
    May 14 15:41:57 proxy-ingress-apache systemd[1]: Started The Apache HTTP Server.
    

Create and configure the load balancer

This examples uses zonal network endpoint groups (NEGs) with GCE_VM_IP endpoints as backends of the internal passthrough Network Load Balancer. If you prefer to use instance group based backends, follow the documentation available on the Set up an internal passthrough Network Load Balancer with VM instance group backends documentation page.

  1. Create one separate zonal NEG for each compute zone where you plan to deploy proxy servers. For example, if you want to deploy proxy servers in each of the three compute zones of the region where Looker (Google Cloud core) is deployed, then create three zonal NEGs. See the Quotas and limits documentation page to check how many endpoints are supported per zonal NEG.

    To create a zonal NEG, use the following gcloud command:

    gcloud compute network-endpoint-groups create NEG_NAME --network-endpoint-type=gce-vm-ip \
    --zone=PROXY_INSTANCE_ZONE --network=PROXY_INSTANCE_VPC \
    --subnet=PROXY_INSTANCE_SUBNET
    

    Replace the following:

    • NEG_NAME: The name of the NEG you are creating.
    • PROXY_INSTANCE_ZONE: The zone that the proxy server is located in.
    • PROXY_INSTANCE_VPC: The VPC that contains the proxy server.
    • PROXY_INSTANCE_SUBNET: The subnet in which the proxy server is located.

    Repeat this step for any additional zone where you will deploy a proxy server VM.

  2. Add each proxy server to the NEG in the same zone:

    gcloud compute network-endpoint-groups update NEG_NAME --zone=PROXY_INSTANCE_ZONE \
    --add-endpoint='instance=PROXY_INSTANCE_NAME'
    

    Replace the following:

    • PROXY_INSTANCE_ZONE: The zone that the proxy server is located in.
    • NEG_NAME: The name of the NEG in the same zone as the proxy server.
    • PROXY_INSTANCE_NAME: The name of the proxy server.

    Repeat this step until each of the proxy server VM is added to a NEG as an endpoint.

  3. Create a regional health check that will be used by the internal load balancer. Use the compute health-checks create command:

    gcloud compute health-checks create PROTOCOL NAME \
        --region=REGION \
        --description=DESCRIPTION \
        --check-interval=CHECK_INTERVAL \
        --timeout=TIMEOUT \
        --healthy-threshold=HEALTHY_THRESHOLD \
        --unhealthy-threshold=UNHEALTHY_THRESHOLD \
        PORT_SPECIFICATION \
        ADDITIONAL_FLAGS
    

    Replace the following:

    • PROTOCOL: The protocol used for the health check. Valid options are grpc, http, https, http2, ssl, and tcp.
    • NAME: The name of the health check. Within a given project, each global health check must have a unique name, and regional health checks must have unique names within a given region.
    • REGION: All load balancers except for regional external Application Load Balancers and regional internal Application Load Balancers use global health checks (--global). Regional internal Application Load Balancers use regional health checks whose region must match the region of the backend service.
    • DESCRIPTION: An optional description.
    • CHECK_INTERVAL: The amount of time from the start of one health check probe system's connection to the start of the next one. Units are seconds. If omitted, Google Cloud uses a value of 5s (5 seconds).
    • TIMEOUT: The amount of time that Google Cloud waits for a response to a probe. The value of TIMEOUT must be less than or equal to the CHECK_INTERVAL. Units are seconds. If omitted, Google Cloud uses a value of 5s (5 seconds).
    • HEALTHY_THRESHOLD and UNHEALTHY_THRESHOLD: Specify the number of sequential probes that must succeed or fail for the VM instance to be considered healthy or unhealthy. If either is omitted, Google Cloud uses a default threshold of 2.
    • PORT_SPECIFICATION: Defines the port specification using one of the Port specification flags.
    • ADDITIONAL_FLAGS: Other flags for specifying ports and options specific to the PROTOCOL. See Additional flags for HTTP, HTTPS, and HTTP/2 health checks, Additional flags for SSL and TCP health checks, or Additional flag for gRPC health checks.
  4. Create the backend service:

    gcloud compute backend-services create BS_NAME --load-balancing-scheme=INTERNAL \
    --protocol=tcp --region=PROXY_INSTANCES_REGION --health-checks=HC_NAME \
    --health-checks-region=HC_REGION --session-affinity=CLIENT_IP \
    --connection-persistence-on-unhealthy-backends=NEVER_PERSIST
    

    Replace the following:

    • BS_NAME: The name of the load balancer you are creating.
    • PROXY_INSTANCES_REGION: The region in which the proxy servers are located.
    • HC_NAME: The name of the regional health check you created.
    • HC_REGION: The region in which the health check is located.

    Additionally:

    • The --session-affinity=CLIENT_IP flag directs a particular client's request to the same backend proxy instance VM, based on a hash created on both the client IP's address and the destination address.
    • The --connection-persistence-on-unhealthy-backends=NEVER_PERSIST flag means that connections won't persist on non-healthy proxy instance VMs.
  5. Add each of the NEGs to the backend service:

    gcloud compute backend-services add-backend BS_NAME --region=BS_REGION \
    --network-endpoint-group=NEG_NAME --network-endpoint-group-zone=NEG_ZONE
    

    Replace the following:

    • BS_NAME: The name of the backend service you created.
    • BS_REGION: The region in which the backend service is located; this should be the same as the region in which the proxy servers are located.
    • NEG_NAME: The name of the NEG you are adding.
    • NEG_ZONE: The zone in which the NEG is located.

    Repeat this step for the additional NEG you created.

  6. Reserve an internal IP address in the VPC inside the IP range of the subnet where the proxy instances are connected. This will be the Virtual IP address (VIP) of the internal load balancer. Reserving the address will make sure the IP won't be used by any other object. To reserve the internal IP address, use the compute addresses create command:

    gcloud compute addresses create ADDRESS_NAMES \
        --region REGION --subnet SUBNETWORK \
        --addresses IP_ADDRESS
    

    Replace the following:

    • ADDRESS_NAMES: The names of one or more [--purpose=SHARED_LOADBALANCER_VIP] addresses that you want to create. In case of multiple addresses, specify all the addresses as a list, separated by spaces—for example, example-address-1 example-address-2 example-address-3
    • REGION: The region for this request.
    • SUBNETWORK: The subnet for this internal IP address.
    • IP_ADDRESS: The IP address to reserve, which must be within the subnet's primary IP range. If unspecified, an IP address is automatically allocated from the subnet.
  7. Create the forwarding rule and associate it with the backend service and the VIP:

    gcloud compute forwarding-rules create FW_RULE_NAME --region=BS_REGION \
    --load-balancing-scheme=internal --network=PROXY_INSTANCES_VPC_NAME --subnet=RESERVED_IP_ADDRESS_SUBNET \
    --address=RESERVED_IP_ADDRESS --ip-protocol=tcp --ports=ALL --backend-service=BS_NAME \
    --backend-service-region=BS_REGION --allow-global-access
    

    Replace the following:

    • FW_RULE_NAME: The name of the forwarding rule you are creating.
    • BS_REGION: The region in which the backend service is located
    • PROXY_INSTANCES_VPC_NAME: The name of the VPC in which the proxy server VMs were created
    • RESERVED_IP_ADDRESS_SUBNET: The subnet in which the VIP is located
    • RESERVED_IP_ADDRESS: The VIP address for the load balancer
    • BS_NAME: The name of the backend service

    Additionally:

    • The --allow-global-access flag indicates that the VIP of the load balancer is reachable from any region (not just the BS_REGION). This allows clients in every region to reach the Looker (Google Cloud core) instance.

Create firewall rules

For health checks to work, create ingress firewall rules applicable to the proxy VM being load balanced to allow traffic from health check prober IP ranges.

Additionally, create an ingress firewall rule to allow traffic from on premises or multicloud environments to gain access the load balancer backend service.

Update the DNS A record

Change the A record of the Looker (Google Cloud core) custom domain to point to the VIP of the load balancer. The Cloud DNS private zone you created manages the custom domain and is used by the VPC where the proxy instances are located.

Update the OAuth credentials

  1. Access your OAuth client by navigating in the Google Cloud console to APIs & Services > Credentials and selecting the OAuth client ID for the OAuth client that is used by your Looker (Google Cloud core) instance.
  2. Click the Add URI button to update the Authorized JavaScript origins field in your OAuth client to include the same DNS name that your organization will use to access Looker (Google Cloud core). So if your custom domain is looker.examplepetstore.com, you enter looker.examplepetstore.com as the URI.

  3. Update or add the custom domain to the list of the Authorized redirect URIs for the OAuth credentials you used when creating the Looker (Google Cloud core) instance. Add /oauth2callback to the end of the URI. So if your custom domain is looker.examplepetstore.com, you enter looker.examplepetstore.com/oauth2callback.

Adding users

Once the preceding steps are completed, the custom domain URL is accessible to users.

Ensure that the user authentication method is completely set up for the Looker (Google Cloud core) instance before adding users to the instance.

Troubleshooting

  • If you are using Chrome to access the Looker (Google Cloud core) custom domain and you receive a Chrome error such as NET::ERR_CERT_COMMON_NAME_INVALID or an HSTS policy error, you can fix it with the following steps:

    1. Open chrome://net-internals/#hsts
    2. Input the custom domain to query the HSTS/PKP set. Any policies for the custom domain will appear under Found:.
    3. Under Delete domain security policies, enter the custom domain in the Domain field.
    4. Click Delete to delete the policies.
  • To troubleshoot certificate errors, see the Troubleshoot SSL certificates documentation page. For Google-managed certificates, be sure to explicitly authorize the Certificate Authority that you want to allow to issue your Google-managed certificate.

What's next