Communicating between your services

Region ID

The REGION_ID is an abbreviated code that Google assigns based on the region you select when you create your app. The code does not correspond to a country or province, even though some region IDs may appear similar to commonly used country and province codes. For apps created after February 2020, REGION_ID.r is included in App Engine URLs. For existing apps created before this date, the region ID is optional in the URL.

Learn more about region IDs.

You can use various methods to communicate between your App Engine services or with other services, including Google Cloud services and external applications.

The simplest approach for communicating with your App Engine service is to send targeted HTTP requests, where the URL includes the name or ID of a resource. For example, you can include the ID of a service or version that you want to target, in addition to the corresponding Google Cloud project ID:


https://VERSION-dot-SERVICE-dot-PROJECT_ID.REGION_ID.r.appspot.com

Note that the combined length of VERSION-dot-SERVICE-dot-PROJECT_ID, where VERSION is the name of your version, SERVICE is the name of your service, and PROJECT_ID is your project ID, cannot be longer than 63 characters and cannot start or end with a hyphen. If the combined length is longer than 63 characters, you might see Error DNS address could not be found.

Learn more about requests in App Engine:

Your App Engine services can also communicate using Pub/Sub, which provides reliable asynchronous many-to-many messaging between processes, including App Engine. These processes can be individual instances of your application, services, or even external applications.

To share data across databases and your App Engine app or some other external application, see Understanding Data and File Storage.

If you use the legacy bundled services, you can also pass requests between services and from services to external endpoints using the URL Fetch API.

Additionally, services in the standard environment that reside within the same Google Cloud project can also use one of the App Engine APIs for the following tasks:

  • Share a single memcache instance.
  • Collaborate by assigning work between services through Task Queues.

Private Communication

Communication between services in the same project

You can allow an App Engine standard service to communicate with another App Engine service in the same project without having to expose the destination service to the public internet.

To allow communication between services in the same project:

  1. Configure ingress controls by adjusting the destination service's ingress settings to allow "internal" traffic only.

    The "internal" setting allows requests from the project's VPC networks only. This includes App Engine resources from a client app on the same network when egress traffic is routed over a connector. All other traffic from the internet or other Google Cloud projects, including other App Engine services, is blocked.

  2. Route the traffic over a Serverless VPC Access connector:

    1. For each App Engine version sending private traffic to other app endpoints, attach the version to a Serverless VPC Access connector belonging to one of the Google Cloud project's own networks, not a Shared VPC network.

    2. Ensure Private Google Access is enabled for the subnet used by the Serverless VPC Access connector.

    3. Configure one of the following:

      • Client requests to use the private.googleapis.com IP range by adding a DNS entry for the destination hostname. Follow DNS configuration to add the DNS hostname, but be sure to configure the private zone to be for appspot.com rather than googleapis.com. Also ensure that traffic is directed to the destination app's appspot.com address, not a custom domain. Your app can only be reached on the private.googleapis.com IP range using this appspot.com domain.

      • The client app to send all-traffic via the Serverless VPC Access connector, instead of configuring requests to use the private.googleapis.com IP range.

Communication between services in different projects

You can have private access between Google Cloud projects when apps running in projects belong to a Shared VPC network that is configured to invoke an app running in the Shared VPC network's host project.

To use this pattern, follow the previous steps for communicating between services in the same project. In the standard environment, attach each client version to a Serverless VPC Access connector on the Shared VPC network.

Other methods of communication between projects using internal access are not possible in App Engine.

Reserved URL paths

It is not possible to use the following URL paths:

  • Paths ending with /eventlog
  • Paths starting with /_ah/
  • Some paths ending with z