Private access options for services

Virtual machine (VM) instances in Virtual Private Cloud (VPC) networks can reach Google and third-party APIs and services without an external IP address. All Google Cloud APIs and services support private access.

The access methods are different for services in VPC networks compared to services in Google's production infrastructure. The former use peering or Private Service Connect; the latter use Private Google Access or Private Service Connect.

The following sections summarize the private access options in each category:

You can configure one or all of these options. They operate independently of each other.

Connect to Google APIs

The following table shows the options for connecting to services in Google's production networks:

Option Clients Connection Supported services
Private Service Connect endpoints for Google APIs
Google Cloud resources or on-premises systems, with or without external IP addresses. Connect to an endpoint in your VPC network, which forwards requests to Google APIs and services. Supports all Google Cloud APIs and most other Google APIs and services1.
Private Service Connect backends for Google APIs
Google Cloud resources or on-premises systems, with or without external IP addresses. Connect to a load balancer in your VPC network, which forwards requests to Google APIs and services. Supports selected locational and global Google APIs and services.
Private Google Access
Google Cloud resources without external IP addresses. Connect to the standard external IP addresses or Private Google Access domains and VIPs for Google APIs and services through the VPC network's default internet gateway. Supports most Google APIs and services1.
Private Google Access for on-premises hosts
On-premises hosts with or without external IP addresses. Connect to Google APIs and services from your on-premises network through a Cloud VPN tunnel or VLAN attachment by using one of the Private Google Access-specific domains and VIPs. The Google services that you can access depend on which Private Google Access-specific domain you use.
1 Use private services access or Private Service Connect to connect to Google services that are not supported by Private Service Connect for Google APIs or Private Google Access.

Connect to services in VPC networks

The following table shows the options for connecting to services in VPC networks:

Option Clients Connection Supported services Usage
Connecting to services
Private Service Connect endpoints for published services
Google Cloud VM instances with or without external IP addresses. Connect to services in another VPC network through an endpoint. Supports services that are published using Private Service Connect for service producers. Use this option to connect to supported services in another VPC network without assigning external IP addresses to your Google Cloud resources.
Private Service Connect backends for published services
Google Cloud VM instances with or without external IP addresses. Connect to services in another VPC network through a load balancer. Supports services that are published using Private Service Connect for service producers. Use this option to connect to supported services in another VPC network through a consumer-managed load balancer. You don't need to assign external IP addresses to your Google Cloud resources.
Service connection policies
Google Cloud VM instances with or without external IP addresses. Connect to services in another VPC network through an endpoint. Supports specific Google and third-party services. To find out whether a service supports service connection policies, contact the service provider. Use this option to deploy a managed service instance and configure connectivity through a service's administrative API or UI. The service instance is deployed in a producer VPC network that is connected to your VPC network through an endpoint. You don't need to assign external IP addresses to your Google Cloud resources.
Private services access
Google Cloud VM instances with or without external IP addresses. Connect to a Google or third-party managed VPC network through a VPC Network Peering connection. Supports Google services2 and third-party services that are made available using the Service Networking API. Use this option to connect to specific Google and third-party services without assigning external IP addresses to your Google Cloud and Google or third-party resources.
2 Use Private Service Connect for Google APIs or Private Google Access to connect to Google services that are not supported by private services access or Private Service Connect for published services.

Connect from serverless Google services to VPC networks

You can use a Serverless VPC Access connector to let Cloud Run, App Engine standard, and Cloud Functions environments send packets to the internal IPv4 addresses of resources in a VPC network. Serverless VPC Access also supports sending packets to other networks connected to the selected VPC network.