Configurar el acceso a la VPC
Organízate con las colecciones
Guarda y clasifica el contenido según tus preferencias.
Usar Terraform para configurar un servicio de Cloud Run de forma que use un conector de acceso a VPC
Código de ejemplo
A menos que se indique lo contrario, el contenido de esta página está sujeto a la licencia Reconocimiento 4.0 de Creative Commons y las muestras de código están sujetas a la licencia Apache 2.0. Para obtener más información, consulta las políticas del sitio web de Google Developers. Java es una marca registrada de Oracle o sus afiliados.
[[["Es fácil de entender","easyToUnderstand","thumb-up"],["Me ofreció una solución al problema","solvedMyProblem","thumb-up"],["Otro","otherUp","thumb-up"]],[["Es difícil de entender","hardToUnderstand","thumb-down"],["La información o el código de muestra no son correctos","incorrectInformationOrSampleCode","thumb-down"],["Me faltan las muestras o la información que necesito","missingTheInformationSamplesINeed","thumb-down"],["Problema de traducción","translationIssue","thumb-down"],["Otro","otherDown","thumb-down"]],[],[],[],null,["# Configure VPC access\n\nUse Terraform to configure a Cloud Run service to use VPC access connector\n\nCode sample\n-----------\n\n### Terraform\n\n\nTo learn how to apply or remove a Terraform configuration, see\n[Basic Terraform commands](/docs/terraform/basic-commands).\n\n\nFor more information, see the\n[Terraform provider reference documentation](https://registry.terraform.io/providers/hashicorp/google/latest/docs).\n\n resource \"google_project_service\" \"vpcaccess_api\" {\n service = \"vpcaccess.googleapis.com\"\n disable_on_destroy = false\n }\n\n # VPC\n resource \"google_compute_network\" \"default\" {\n name = \"cloudrun-network\"\n auto_create_subnetworks = false\n }\n\n # VPC access connector\n resource \"google_vpc_access_connector\" \"connector\" {\n name = \"vpcconn\"\n region = \"us-west1\"\n ip_cidr_range = \"10.8.0.0/28\"\n network = google_compute_network.default.name\n depends_on = [google_project_service.vpcaccess_api]\n min_instances = 2\n max_instances = 3\n }\n\n # Cloud Router\n resource \"google_compute_router\" \"router\" {\n name = \"router\"\n region = \"us-west1\"\n network = google_compute_network.default.id\n }\n\n # NAT configuration\n resource \"google_compute_router_nat\" \"router_nat\" {\n name = \"nat\"\n region = \"us-west1\"\n router = google_compute_router.router.name\n source_subnetwork_ip_ranges_to_nat = \"ALL_SUBNETWORKS_ALL_IP_RANGES\"\n nat_ip_allocate_option = \"AUTO_ONLY\"\n }\n\n # Cloud Run service\n resource \"google_cloud_run_v2_service\" \"gcr_service\" {\n name = \"mygcrservice\"\n location = \"us-west1\"\n\n deletion_protection = false # set to \"true\" in production\n\n template {\n containers {\n image = \"us-docker.pkg.dev/cloudrun/container/hello\"\n resources {\n limits = {\n cpu = \"1000m\"\n memory = \"512Mi\"\n }\n }\n # the service uses this SA to call other Google Cloud APIs\n # service_account_name = myservice_runtime_sa\n }\n\n scaling {\n # Limit scale up to prevent any cost blow outs!\n max_instance_count = 5\n }\n\n vpc_access {\n # Use the VPC Connector\n connector = google_vpc_access_connector.connector.id\n # all egress from the service should go through the VPC Connector\n egress = \"ALL_TRAFFIC\"\n }\n }\n }\n\nWhat's next\n-----------\n\n\nTo search and filter code samples for other Google Cloud products, see the\n[Google Cloud sample browser](/docs/samples?product=cloudrun)."]]