Google Cloud accounts for bandwidth per virtual machine (VM) instance, not per network interface (NIC) or IP address. A VM's machine type defines its maximum possible egress rate; however, you can only achieve that maximum possible egress rate in specific situations.
This page outlines expectations, which are useful when planning your deployments. It categorizes bandwidth using two dimensions:
- The traffic direction: As used on this page, traffic direction is always
from the perspective of a Google Cloud VM:
- Packets sent from a Google Cloud VM compose its egress (outbound) traffic.
- Packets sent to a Google Cloud VM compose its ingress (inbound) traffic.
The type of destination IP address: Google Cloud categorizes IP addresses as either internal or external:
- An IP address within a VPC network is called an internal IP address. For example, each VM's NIC has a primary internal IP address located in a VPC network. Internal IP addresses can be any valid private or privately re-used public IP address range.
- An IP address that's accessible from the internet is an external IP address. External IP addresses can be located in Google Cloud, such as the external IP address assigned to a VM's NIC. External IP addresses are always public IP addresses, including public IP addresses on the internet outside of Google Cloud.
See IP addresses in the VPC documentation for precise definitions. For example, if you privately re-use a public IP address in your VPC network, that is an internal IP address, and the corresponding external IP address is no longer reachable.
All of the information on this page is applicable to Compute Engine VMs, as well as products that depend on Compute Engine VMs. For example, a Google Kubernetes Engine node is a Compute Engine VM.
Neither additional network interfaces
(NICs) nor additional IP addresses per
NIC increase ingress or egress bandwidth for a VM. For example, an
n1-standard-8 VM with two NICs is limited to 16 Gbps total egress
bandwidth, not 16 Gbps egress bandwidth per NIC.
Bandwidth summary table
The following table summarizes bandwidth expectations:
|Packet's destination address|
|Traffic direction||Internal IP address destination||External IP address destination|
from a Google Cloud VM
||Maximum possible egress from a single VM cannot exceed the following:
to a Google Cloud VM
||Google Cloud protects each VM by limiting ingress traffic
delivered to an external IP address associated with the VM. The limit is
the first of the following rates encountered:
Google Cloud limits outbound (egress) bandwidth on a per-VM and a per-project basis. Outbound bandwidth includes traffic sent from all of the VM's NICs and data transferred to all persistent disks connected to the VM.
The maximum possible egress bandwidth depends on the machine type of the VM.
Tables on the machine types page document these
numbers. For example, an
n2-standard-8 VM has eight vCPUs, so its maximum
possible egress bandwidth is 16 Gbps.
Maximum possible egress bandwidth is not a guarantee. In addition to the machine type, egress bandwidth is impacted by factors such as the following inexhaustive list:
- packet size
- protocol overhead
- the number of flows
- Ethernet driver settings of the VM's guest OS, such as checksum offload and TCP segmentation offload (TSO)
- network congestion
- the destination of the packet—Google Cloud handles egress traffic from a VM differently depending on whether the outbound packet's destination address is an internal IP address or an external IP address.
- In a situation where persistent disks compete with other network egress traffic, 60% of the maximum network bandwidth is given to persistent disk writes, leaving 40% for other network egress traffic. See other factors that affect performance in the Persistent Disk documentation for more details.
Egress to internal IP address destinations
From the perspective of a sending VM, Google Cloud restricts the maximum possible egress to internal IP address destinations according to the sending VM's machine type. Internal IP addresses are those in a VPC network, a different VPC network connected using VPC Network Peering, or a network connected to your VPC network using Cloud VPN or Cloud Interconnect.
The following list ranks VM-to-VM traffic, using internal IP address sources and destinations, from highest possible bandwidth to lowest:
- Between VMs in the same zone
- Between VMs in different zones of the same region
- Between VMs in different zones in different regions
When sending traffic from a VM to an internal IP address located in a different VPC network connected using Cloud VPN tunnels, egress bandwidth is limited to the maximum data rate of a Cloud VPN tunnel. To fully utilize the bandwidth of multiple tunnels and ECMP routing, you must use multiple TCP connections (unique 5-tuples).
Egress to external IP address destinations
From the perspective of a sending VM, Google Cloud limits outbound traffic sent to an external IP address destination to whichever of the following rates is first reached. An external IP address is publicly routable: either an external IP address of a Google Cloud resource or an address on the internet.
- 7 Gbps, in total, for all packet flows and connections
- 3 Gbps per flow
You can associate an external IP address with a Google Cloud VM in one of the following capacities:
- You can assign an external IP address to the network interface of a VM.
- An external forwarding rule used for protocol forwarding requires an external IP address.
- The IP address of a network TCP/UDP load balancer's forwarding rule requires an external IP address.
- External IP addresses are associated with a Cloud NAT gateway.
As an example, even though an
n2-standard-16 instance has an egress bandwidth
limit of 32 Gbps, total egress bandwidth to the internet is limited to
Per-project aggregate egress limits
Google Cloud also enforces two project-level limits on the aggregate amount of network egress bandwidth sent from VMs in your project:
- Maximum internet egress bandwidth per-project: Applies to all traffic sent to external IP addresses outside of Google Cloud
- Maximum egress bandwidth from a given region to all other regions: Applies to traffic sent to both internal IP address destinations and external IP address destinations.
These limits are calculated using internal telemetry and are unlikely to restrict outbound bandwidth for most projects. For questions about how to achieve your required internet egress bandwidth or required egress bandwidth from one region to other regions, contact your sales team.
Google Cloud handles inbound traffic to a VM differently depending on whether the packet's destination is an internal IP address or an external IP address.
Ingress to internal IP address destinations
Google Cloud does not implement any purposeful restriction on traffic inbound to an associated internal IP address. A VM can receive as much internal traffic as its machine type, operating system, and other network conditions and resources permit. An associated internal IP address is one of the following:
- The primary internal IP address of a VM's network interface
- An alias IP address from an alias IP range assigned to a VM's network interface
- The IP address of an internal forwarding rule used for internal protocol forwarding
- The IP address of an internal TCP/UDP load balancer's forwarding rule
Ingress to external IP address destinations
Google Cloud limits inbound traffic sent to a VM's associated external IP address to whichever of the following rates that is reached first:
- 1,800,000 packets per second
- 20 Gbps
For the purposes of this limit, an associated external IP address is one of the following:
- An external IP address assigned to a VM's network interface
- The IP address of an external forwarding rule used for external protocol forwarding
- The IP address of a network TCP/UDP load balancer's forwarding rule
- Established inbound responses processed by Cloud NAT
For the last two definitions of an associated external IP address: if an external IP address is shared among multiple VMs, Google Cloud limits inbound traffic individually for each backend VM.