A network endpoint group (NEG) specifies a group of backend endpoints for a load balancer. A serverless NEG is a backend that points to a Cloud Run, App Engine, Cloud Run functions, or API Gateway service.
A serverless NEG can represent one of the following:
- A Cloud Run service or a group of services.
- A Cloud Run functions function or a group of functions.
- An App Engine app (Standard or Flex), a specific service within an app, a specific version of an app, or a group of services.
- An API Gateway that provides access to your services through a REST API consistent across all services, regardless of service implementation. This capability is in Preview.
Supported load balancers
The following table lists the serverless products supported by each Application Load Balancer. Serverless NEGs are not supported by proxy Network Load Balancers and passthrough Network Load Balancers.
Serverless platform | Application Load Balancers | ||||
---|---|---|---|---|---|
Regional internal |
Cross-region internal |
Global external |
Classic | Regional external |
|
Cloud Run | |||||
App Engine | |||||
Cloud Run functions |
Use cases
When your load balancer is enabled for serverless apps, you can do the following:
- Configure your serverless app to serve from a dedicated IPv4 IP address that is not shared with other services.
- Map a single URL to multiple serverless functions or services that serve at the same domain. In this document, see URL masks.
- Share URL space with other Google Cloud compute platforms. By using multiple backend services, a single load balancer can send traffic to multiple backend types. The load balancer selects the correct backend service based on the host or path of the request URL.
- Reuse the same SSL certificates and private keys that you use for Compute Engine, Google Kubernetes Engine, and Cloud Storage. Reusing the same certificates eliminates the need to manage separate certificates for serverless apps.
Global external Application Load Balancer and classic Application Load Balancer
Setting up a global external Application Load Balancer or a classic Application Load Balancer enables your serverless apps to integrate with existing cloud services. You can do the following:
- Protect your service with Google Cloud Armor, an edge DDoS defense and WAF security product available to all services accessed through an external Application Load Balancer. There are some limitations associated with this capability, especially for Cloud Run and App Engine.
- Enable your service to optimize delivery using Cloud CDN. Cloud CDN caches content close to your users. Cloud CDN provides capabilities like cache invalidation and Cloud CDN signed URLs.
- Use Google's Edge infrastructure to terminate user's HTTP(S) connections closer to the user, thus decreasing latency.
To learn how to configure a load balancer with a serverless compute backend, see the following documentation:
- Set up a global external Application Load Balancer with Cloud Run, App Engine, or Cloud Run functions
- Set up a classic Application Load Balancer with Cloud Run, App Engine, or Cloud Run functions
Integrating an external Application Load Balancer with API Gateway enables your serverless backends to take advantage of all the features provided by Cloud Load Balancing. For more information, see External Application Load Balancer for API Gateway. To configure an external Application Load Balancer to route traffic to an API Gateway, see Getting started with an external Application Load Balancer for API Gateway. This capability is in Preview.
Regional external Application Load Balancer
Using a regional external Application Load Balancer lets you run workloads with regulatory or compliance requirements on Cloud Run backends. For example, if you require that your application's network configurations and traffic termination reside in a specific region, a regional external Application Load Balancer is often the preferred option to comply with the necessary jurisdictional controls.
To learn how to configure a regional external Application Load Balancer with a serverless compute backend, see Set up a regional external Application Load Balancer with Cloud Run.
Regional internal Application Load Balancer and cross-region internal Application Load Balancer
When an internal Application Load Balancer is configured with Cloud Run backends, you can do the following:
- Enable advanced traffic management features such as fault injection, header rewrites, redirects, traffic splitting, and more, for your Cloud Run services.
- Seamlessly migrate legacy services from Compute Engine, GKE, or on-premises, to Cloud Run and take advantage of weight-based traffic splitting to gradually shift traffic to Cloud Run without any downtime.
- Protect your Cloud Run services with VPC Service Controls.
- Establish a single, policy-enforcing internal ingress point for your services running in Cloud Run, Compute Engine, and GKE.
To learn how to configure an regional internal Application Load Balancer with a serverless compute backend, see Set up a regional internal Application Load Balancer with Cloud Run.
The rest of this page discusses how to use serverless NEGs with your Application Load Balancers. For more information about other types of NEGs, see Network endpoint groups overview.
Endpoint types
Serverless NEGs don't have any network endpoints such as ports or IP addresses. They can only point to an existing Cloud Run, App Engine, API Gateway, or Cloud Run functions service residing in the same region as the NEG.
When you create a serverless NEG, you specify the fully qualified domain name
(FQDN) of the Cloud Run, App Engine,
API Gateway,
or Cloud Run functions service. The endpoint is of type
SERVERLESS
. Other endpoint types are not supported in a serverless NEG.
A serverless NEG cannot have more than one endpoint. The endpoint points to either a serverless application or a URL mask. The load balancer serves as the frontend for the serverless compute application and proxies traffic to the specified endpoint. However, if the backend service contains multiple serverless NEGs in different regions, the load balancer sends traffic to the NEG in the closest region to minimize request latency.
Network tier
For global external Application Load Balancers, you can use a serverless NEG in a load balancer using either Standard or Premium Network Service Tiers. The Premium Tier is required only if you want to set up serverless NEGs in multiple regions.
Regional external Application Load Balancers are always Standard Tier.
Cross-region internal Application Load Balancers and regional internal Application Load Balancers are always Premium tier.
Load balancing components
A load balancer using a serverless NEG backend requires special configuration only for the backend service. The frontend configuration is the same as any other proxy-based Google Cloud load balancer. Additionally, internal Application Load Balancers require a proxy-only subnet to run Envoy proxies on your behalf.
The following diagrams show a sample serverless NEG deployment.
Global external
This diagram shows how a serverless NEG fits into a global external Application Load Balancer architecture.
Regional external
This diagram shows how a serverless NEG fits into a regional external Application Load Balancer architecture.
Regional internal
This diagram shows how a serverless NEG fits into the regional internal Application Load Balancer model.
Cross-region
This diagram shows how a serverless NEG fits into the cross-region internal Application Load Balancer model.
Frontend components
No special frontend configuration is required for load balancing with serverless NEG backends. Forwarding rules are used to route traffic by IP address, port, and protocol to a target proxy. The target proxy then terminates connections from clients.
URL maps are used by Application Load Balancers to set up URL-based routing of requests to the appropriate backend services.
For more details on each of these components, refer the architecture sections of the specific load balancer overviews:
Backend service
Backend services provide configuration information to the load balancer. Load balancers use the information in a backend service to direct incoming traffic to one or more attached backends. Serverless NEGs can be used as backends for certain load balancers.
The following restrictions apply depending on the type of load balancer:
- A global backend service used by global external Application Load Balancers can have several serverless NEGs attached to it, but only one serverless NEG per region.
- A regional backend service used by regional internal Application Load Balancers and regional external Application Load Balancers can only have one serverless NEG attached to it.
- A global backend service used by cross-region internal Application Load Balancers can only have Cloud Run services attached to it.
Each serverless NEG can point to either of the following:
- The FQDN for a single function or service
- A URL mask that points to multiple functions or services that serve at the same domain
A URL mask is a URL schema template that tells the serverless NEG backend how to map the user request to the correct service. URL masks are useful if you are using a custom domain for your serverless application and have multiple services serving at the same domain. Instead of creating a separate serverless NEG for each function or service, you can create the NEG with a generic URL mask for the custom domain. For more information and examples, see URL masks.
For additional restrictions when adding a serverless NEG as a backend, see Limitations.
Outlier detection for serverless NEGs
Outlier detection is an optional configuration that can be enabled on a global backend service that has serverless NEGs attached to it. The outlier detection analysis is only available for a cross-region internal Application Load Balancer, global external Application Load Balancer, and not for a classic Application Load Balancer. The outlier detection analysis identifies unhealthy serverless NEGs based on their HTTP response patterns, and reduces the error rate by routing most new requests from unhealthy services to healthy services. To learn how the outlier detection algorithm works and understand its limitations, see the following example.
Assume that there is a backend service with two serverless NEGs
attached to it—one in the REGION_A
region and another in the
REGION_B
region. If the serverless NEG that serves as a backend to a
global external Application Load Balancer in the REGION_A
region is not responsive, outlier
detection identifies the serverless NEG as unhealthy. Based on outlier detection
analysis, some of the new requests are then sent to the serverless NEG in the
REGION_B
region.
Based on the type of server error that is encountered, you can use one of the following outlier detection methods to enable outlier detection:
- Consecutive 5xx errors. A
5xx
series HTTP status code qualifies as an error. - Consecutive gateway errors. Only
502
,503
, and504
HTTP status codes qualify as an error.
Note that even after enabling outlier detection, you'll likely see some requests being sent to the unhealthy service and thus returning 5XX errors to the clients. This is because results of the outlier detection algorithm (ejection of endpoints from the load balancing pool and returning them back to the pool) are executed independently by each proxy instance of the load balancer. In most cases, more than one proxy instance handles the traffic received by a backend service. Thus, it is possible that an unhealthy endpoint is detected and ejected by only some of the proxies, and while this happens, other proxies may continue to send requests to the same unhealthy endpoint.
To reduce error rates further, you can configure more aggressive outlier detection
parameters. We recommend configuring higher values for the ejection thresholds
(outlierDetection.baseEjectionTime
). For example, our tests show that
setting outlierDetection.baseEjectionTime
to 180 seconds with a sustained
QPS of higher than 100 results in less than 5% observed error rates. To learn
more about the outlier detection API, see
outlierDetection
in the global backend service API
documentation.
The following outlierDetection
fields are not supported when the backend
service has a serverless NEG attached to it:
outlierDetection.enforcingSuccessRate
outlierDetection.successRateMinimumHosts
outlierDetection.successRateRequestVolume
outlierDetection.successRateStdevFactor
To learn how to configure outlier detection, see Set up a global external Application Load Balancer with a serverless backend: Enable outlier detection.
URL masks
A serverless NEG backend can point to either a single Cloud Run (or App Engine or Cloud Run functions if applicable) service, or a URL mask that points to multiple services. A URL mask is a template of your URL schema. The serverless NEG uses this template to map the request to the appropriate service.
URL masks are an optional feature that make it easier to configure serverless NEGs when your serverless application is comprised of multiple Cloud Run, Cloud Run functions, or App Engine services. Serverless NEGs used with internal Application Load Balancers can only use a URL mask that points to Cloud Run services.
URL masks are useful if your serverless app is mapped to a custom domain rather
than the default address that Google Cloud provides.
With a custom domain such as example.com
, you could have multiple
services deployed to different subdomains or paths on the same domain. In such
cases, instead of creating a separate serverless NEG backend for each
service, you can create a single serverless NEG with a generic URL mask for the
custom domain (for example, example.com/<service>
). The NEG extracts the
service name from the request's URL.
The following illustration shows an external Application Load Balancer with a single backend service and serverless NEG, that uses a URL mask to map user requests to different services.
URL masks work best when your application's services use a predictable URL
schema. The advantage of using a URL mask instead of a URL map is that you don't
need to create separate serverless NEGs for the login
and search
services.
You also don't need to modify your load balancer configuration each time you add
a new service to your application.
Limitations
- A serverless NEG cannot have any network endpoints such as IP address or port.
- Serverless NEGs can point only to serverless applications residing in the same region where the NEG is created.
- For a load balancer that is using a Serverless NEG backend, the serverless NEG must be created in the same project as the backing Cloud Run, App Engine, API Gateway, or Cloud Run functions services pointed to by the NEG. You might see requests failing if you connect a service that is not in the same project as the serverless NEG.
- A load balancer configured with a serverless NEG cannot detect whether the underlying serverless app or service is working as expected. This means that even if your service is returning errors, the load balancer continues to direct traffic to it. Make sure to thoroughly test new versions of your services before routing user traffic to them.
Limitations with backend services
The following limitations apply to backend services that have a serverless NEG backend:
- A global backend service used by global external Application Load Balancers can have only one serverless NEG per region. To combine multiple serverless NEGs in a single backend service, all the NEGs must represent functionally equivalent deployments in different regions. For example, the NEGs can point to the same Cloud Run, App Engine, or Cloud Run functions service deployed in different regions.
- A global backend service used by cross-region internal Application Load Balancers can have only one Cloud Run service attached to it.
- A regional backend service can only have one serverless NEG attached to it.
- Cross-project service referencing in a Shared VPC deployment is supported with configurations that contain a serverless NEG. To use this feature, you create the load balancer's frontend components (IP address, forwarding rule, target proxy, and URL map) in a project different from load balancer's backend components (backend service and serverless NEGs). Note that the backend service, associated serverless NEGs, and the backing serverless service (Cloud Run, App Engine, API Gateway, or Cloud Run functions), must always be created in the same project.
- The backend service timeout
setting does not apply
to backend services with serverless NEG backends. Attempting to modify the
backend service's
resource.timeoutSec
property results in the following error:Timeout sec is not supported for a backend service with Serverless network endpoint groups
.
For backend services with serverless NEG backends, the default timeout is 60 minutes. This timeout is not configurable. If your application needs long-running connections, configure your clients to retry requests on failure. - All serverless NEGs combined in a backend service must also use the same type of backend. This means Cloud Run serverless NEGs can only be combined with other Cloud Run serverless NEGs, and App Engine serverless NEGs can only be combined with App Engine serverless NEGs.
- You cannot mix serverless NEGs with other types of NEGs in the same backend service. For example, you cannot route to a GKE cluster and a Cloud Run service from the same backend service.
- When setting up backend services that route to serverless NEGs,
certain fields are restricted:
- You cannot specify a balancing mode. That is, the
RATE
,UTILIZATION
, andCONNECTION
values have no effect on the load balancer's traffic distribution. - Health checks are not supported for serverless backends. Therefore, backend services that contain serverless NEG backends cannot be configured with health checks. However, you can optionally enable outlier detection to identify unhealthy serverless services and route new requests to a healthy serverless service.
- You cannot specify a balancing mode. That is, the
- You cannot use the
gcloud compute backend-services edit
command to modify a backend service with a serverless NEG backend. As a workaround, use thegcloud compute backend-services update
command instead.
Additional limitations apply depending on the type of load balancer and the serverless backend.
Limitations with regional internal Application Load Balancers and regional external Application Load Balancers
- Serverless NEGs used with regional internal Application Load Balancers, or regional external Application Load Balancers can only point to Cloud Run services.
- For projects that are using serverless NEGs, the queries per second (QPS) limit is 5000 QPS per project for traffic sent to any serverless NEGs configured with regional external Application Load Balancers or regional internal Application Load Balancers. This limit is aggregated across all regional external Application Load Balancers and regional internal Application Load Balancers in the project. This is not a per load balancer limit.
Limitations with cross-region internal Application Load Balancers
- Serverless NEGs used with cross-region internal Application Load Balancers can only point to Cloud Run services.
Limitations with global external Application Load Balancers
This sections lists the limitations you'll encounter when configuring serverless NEGs with global external Application Load Balancers.
Limitations with App Engine
- Global external Application Load Balancers with both App Engine flexible environment backends and App Engine standard environment backends don't support cross-project service referencing.
Limitations with Cloud Run
- An external Application Load Balancer with serverless NEGs does not support Knative serving.
- External Application Load Balancers don't support authenticating end-user requests to Cloud Run services. However, you can use IAP to authenticate users within your organization. If you want to enable IAP, you should remember that IAP and Cloud CDN are incompatible with each other. They cannot be enabled on the same backend service.
Limitations with App Engine
- Multi-region load balancing is not supported with App Engine. This is because App Engine requires 1 region per project.
- Only one IAP policy is allowed on the request path. For example, if you have already set an IAP policy in the backend service, you shouldn't set another IAP policy on the App Engine app.
- We recommend that you use ingress controls so that your app only receives requests sent from the load balancer (and the VPC if you use it). Otherwise, users can use your app's App Engine URL to bypass the load balancer, Google Cloud Armor security policies, SSL certificates, and private keys that are passed through the load balancer.
Limitations with API Gateway
For more information, see Limitations on serverless NEGs and API Gateway.
Limitations with traffic management features
- Advanced traffic management features like load balancing locality policy, session affinity, and outlier detection aren't supported with serverless NEG backends.
- Specifying a session affinity on a backend service with a serverless NEG backend won't work. As a workaround for Cloud Run, use its specific session affinity feature.
Pricing
To see pricing information for load balancers with serverless NEGs, see All networking pricing: Cloud Load Balancing.
What's next
- Set up a global external Application Load Balancer with Cloud Run, App Engine, or Cloud Run functions
- Set up a classic Application Load Balancer with Cloud Run, App Engine, or Cloud Run functions
- Set up a regional external Application Load Balancer with a Cloud Run backend
- Set up a regional internal Application Load Balancer with a Cloud Run backend
- Set up a cross-region internal Application Load Balancer with Cloud Run