RDMA network profiles
This page provides an overview of Remote Direct Memory Access (RDMA) network profiles in Google Cloud.
Overview
RDMA network profiles let you create Virtual Private Cloud (VPC) networks that provide low-latency, high-bandwidth RDMA communication between the memory or GPUs of Compute Engine instances that are created in the network.
RDMA network profiles are useful for running AI workloads. For more information about running AI workloads in Google Cloud, see AI Hypercomputer overview .
You can create the following types of VPC networks by using RDMA network profiles:
ZONE
-vpc-roce
MRDMA
Supported zones
RDMA network profiles are available in a limited set of zones. You can only create a Falcon VPC network or RoCE VPC network in a zone where the corresponding network profile is available.
To view the supported zones, see List network profiles .
Alternatively, you can view the supported zones for the machine type that you intend to create in the network. RDMA network profiles are available in the same zones as their supported machine types. For more information, see the following:
- For GPU machine types, see GPU locations .
- For other machine types, see Available regions and zones .
Specifications
VPC networks created with an RDMA network profile have the following specifications:
-
Zonal constraint. Resources using a VPC network with an RDMA network profile are limited to the same zone as the RDMA network profile associated with the VPC network during the network creation. This zonal limit has the following effects:
-
All instances that have network interfaces in the VPC network must be created in the zone that matches the zone of the RDMA network profile used by the VPC network.
-
All subnets created in the VPC network must be located in the region that contains the zone of the RDMA network profile used by the VPC network.
-
-
RDMA network interfaces only. A VPC network with an RDMA network profile supports attachments only from specific network interfaces:
- Falcon VPC networks only support
IRDMAnetwork interfaces (NICs). - RoCE VPC networks only support
MRDMANICs.
All non-RDMA NICs of an instance must be attached to a regular VPC network.
- Falcon VPC networks only support
-
8896 byte MTU. For best performance, we recommend a maximum transmission unit (MTU) of
8896bytes for VPC networks with an RDMA network profile. This allows the RDMA driver in the instance's guest operating system to use smaller MTUs if needed.If you create a VPC network with an RDMA network profile, then
8896bytes is the default MTU. -
Firewall differences. See the following information about firewall differences in VPC networks with an RDMA network profile:
-
VPC networks with an RDMA network profile use the following implied firewall rules, which are different from the implied firewall rules used by regular VPC networks:
- Implied allow egress
- Implied allow ingress
-
Cloud NGFW support depends on the type of VPC network:
- RoCE VPC networks only support regional network firewall policies that have an RoCE firewall policy type. The set of parameters for rules within a supported regional network firewall policy are limited. For more information, see Cloud NGFW for RoCE VPC networks .
- Falcon VPC networks don't support configuring Cloud NGFW rules or policies.
-
-
No Connectivity Tests support. Connectivity Tests doesn't support VPC networks with an RDMA network profile.
-
Other VPC features. VPC networks with an RDMA network profile support a limited set of other VPC features. For more information, see the following Supported and unsupported features section.
Supported and unsupported features
The following sections describe which VPC features are supported and unsupported for each type of VPC network that you can create by using an RDMA network profile:
Falcon VPC networks ( falcon
)
The following table lists the features that are supported by
Falcon VPC networks, which are created by using the falcon
network profile.
| Feature | Supported | Network profile property | Network profile property value | Details |
|---|---|---|---|---|
|
RDMA NICs
|
interfaceTypes
|
IRDMA
|
Falcon VPC networks support only Other NIC types, such as |
|
|
Multi-NIC in the same network
|
allowMultiNicInSameNetwork
|
MULTI_NIC_IN_SAME_NETWORK_ALLOWED
|
Falcon VPC networks support multi-NIC instances , allowing two or more RDMA NICs of the same instance to be in the same VPC network. Each NIC must attach to a unique subnet in the VPC network. |
|
|
IPv4-only subnets
|
subnetworkStackTypes
|
SUBNET_STACK_TYPE_IPV4_ONLY
|
Falcon VPC networks support IPv4-only subnets, including the same Valid IPv4 ranges as regular VPC networks. Falcon VPC networks don't support dual-stack or IPv6-only subnets. For more information, see Types of subnets . |
|
PRIVATE
subnet purpose |
subnetworkPurposes
|
SUBNET_PURPOSE_PRIVATE
|
Falcon VPC networks support regular subnets, which have a Falcon VPC networks don't support Private Service Connect subnets, proxy-only subnets, or Private NAT subnets. For more information, see Purposes of subnets . |
|
GCE_ENDPOINT
address purpose |
addressPurposes
|
GCE_ENDPOINT
|
Falcon VPC networks support IP addresses with a Falcon VPC networks don't support special purpose IP addresses,
such as the |
|
|
Dynamic Network Interfaces
|
allowSubInterfaces
|
SUBINTERFACES_BLOCKED
|
Falcon VPC networks don't support Dynamic NICs . | |
|
Attachments from
nic0
|
allowDefaultNicAttachment
|
DEFAULT_NIC_ATTACHMENT_BLOCKED
|
Falcon VPC networks don't support attaching the nic0
network interface of an instance to the network. Each RDMA NIC attached
to the VPC network must not be nic0
. |
|
|
External IP addresses for instances
|
allowExternalIpAccess
|
EXTERNAL_IP_ACCESS_BLOCKED
|
Falcon VPC networks don't support assigning external IP addresses to RDMA NICs. Consequently, RDMA NICs don't have internet access. | |
|
Alias IP ranges
|
allowAliasIpRanges
|
ALIAS_IP_RANGE_BLOCKED
|
Falcon VPC networks don't support assigning alias IP ranges to RDMA NICs. | |
|
IP forwarding
|
allowIpForwarding
|
IP_FORWARDING_BLOCKED
|
Falcon VPC networks don't support IP forwarding . | |
|
Instance network migration
|
allowNetworkMigration
|
NETWORK_MIGRATION_BLOCKED
|
Falcon VPC networks don't support migrating instance NICs between networks . | |
|
Auto mode
|
allowAutoModeSubnet
|
AUTO_MODE_SUBNET_BLOCKED
|
Falcon VPC networks can't be auto mode networks. For more information, see subnet creation mode . | |
|
VPC Network Peering
|
allowVpcPeering
|
VPC_PEERING_BLOCKED
|
Falcon VPC networks don't support connecting to other VPC networks using VPC Network Peering . Consequently, Falcon VPC networks don't support connecting to services using private services access . | |
|
Static routes
|
allowStaticRoutes
|
STATIC_ROUTES_BLOCKED
|
Falcon VPC networks don't support static routes . | |
|
Packet Mirroring
|
allowPacketMirroring
|
PACKET_MIRRORING_BLOCKED
|
Falcon VPC networks don't support Packet Mirroring . | |
|
Cloud NAT
|
allowCloudNat
|
CLOUD_NAT_BLOCKED
|
Falcon VPC networks don't support Cloud NAT . | |
|
Cloud Router
|
allowCloudRouter
|
CLOUD_ROUTER_BLOCKED
|
Falcon VPC networks don't support Cloud Routers and dynamic routes. | |
|
Cloud Interconnect
|
allowInterconnect
|
INTERCONNECT_BLOCKED
|
Falcon VPC networks don't support Cloud Interconnect VLAN attachments. | |
|
Cloud VPN
|
allowVpn
|
VPN_BLOCKED
|
Falcon VPC networks don't support Cloud VPN tunnels. | |
|
Network Connectivity Center
|
allowNcc
|
NCC_BLOCKED
|
Falcon VPC networks don't support NCC . You can't add a Falcon VPC network as a VPC spoke to a NCC hub. | |
|
Cloud Load Balancing
|
allowLoadBalancing
|
LOAD_BALANCING_BLOCKED
|
Falcon VPC networks don't support Cloud Load Balancing . Consequently, Falcon VPC networks don't support load balancer features, including Google Cloud Armor . | |
|
Private Google Access
|
allowPrivateGoogleAccess
|
PRIVATE_GOOGLE_ACCESS_BLOCKED
|
Falcon VPC networks don't support Private Google Access . | |
|
Private Service Connect
|
allowPsc
|
PSC_BLOCKED
|
Falcon VPC networks don't support Private Service Connect . |
RoCE VPC networks ( roce
)
The following table lists the features that are supported
by RoCE VPC networks, which are created by using the roce
network profile.
| Feature | Supported | Network profile property | Network profile property value | Details |
|---|---|---|---|---|
|
RDMA NICs
|
interfaceTypes
|
MRDMA
|
RoCE VPC networks support only Other NIC types, such as |
|
|
Multi-NIC in the same network
|
allowMultiNicInSameNetwork
|
MULTI_NIC_IN_SAME_NETWORK_ALLOWED
|
RoCE VPC networks support multi-NIC instances , allowing two or more RDMA NICs of the same instance to be in the same VPC network. Each NIC must attach to a unique subnet in the VPC network. See also RoCE VPC network multi-NIC considerations . |
|
|
IPv4-only subnets
|
subnetworkStackTypes
|
SUBNET_STACK_TYPE_IPV4_ONLY
|
RoCE VPC networks support IPv4-only subnets, including the same Valid IPv4 ranges as regular VPC networks. RoCE VPC networks don't support dual-stack or IPv6-only subnets. For more information, see Types of subnets . |
|
PRIVATE
subnet purpose |
subnetworkPurposes
|
SUBNET_PURPOSE_PRIVATE
|
RoCE VPC networks support regular subnets, which have a RoCE VPC networks don't support Private Service Connect subnets, proxy-only subnets, or Private NAT subnets. For more information, see Purposes of subnets . |
|
GCE_ENDPOINT
address purpose |
addressPurposes
|
GCE_ENDPOINT
|
RoCE VPC networks support IP addresses with a RoCE VPC networks don't support special purpose IP addresses,
such as the |
|
|
Attachments from
nic0
|
allowDefaultNicAttachment
|
DEFAULT_NIC_ATTACHMENT_BLOCKED
|
RoCE VPC networks don't support attaching the nic0
network interfaces of an instance to the network. Each RDMA NIC attached
to the VPC network must not be nic0
. |
|
|
External IP addresses for instances
|
allowExternalIpAccess
|
EXTERNAL_IP_ACCESS_BLOCKED
|
RoCE VPC networks don't support assigning external IP addresses to RDMA NICs. Consequently, RDMA NICs don't have internet access. | |
|
Dynamic Network Interfaces
|
allowSubInterfaces
|
SUBINTERFACES_BLOCKED
|
RoCE VPC networks don't support Dynamic NICs . | |
|
Alias IP ranges
|
allowAliasIpRanges
|
ALIAS_IP_RANGE_BLOCKED
|
RoCE VPC networks don't support assigning alias IP ranges to RDMA NICs. | |
|
IP forwarding
|
allowIpForwarding
|
IP_FORWARDING_BLOCKED
|
RoCE VPC networks don't support IP forwarding . | |
|
Instance network migration
|
allowNetworkMigration
|
NETWORK_MIGRATION_BLOCKED
|
RoCE VPC networks don't support migrating instance NICs between networks . | |
|
Auto mode
|
allowAutoModeSubnet
|
AUTO_MODE_SUBNET_BLOCKED
|
RoCE VPC networks can't be auto mode networks. For more information, see subnet creation mode . | |
|
VPC Network Peering
|
allowVpcPeering
|
VPC_PEERING_BLOCKED
|
RoCE VPC networks don't support connecting to other VPC networks using VPC Network Peering . Consequently, RoCE VPC networks don't support connecting to services using private services access . | |
|
Static routes
|
allowStaticRoutes
|
STATIC_ROUTES_BLOCKED
|
RoCE VPC networks don't support static routes . | |
|
Packet Mirroring
|
allowPacketMirroring
|
PACKET_MIRRORING_BLOCKED
|
RoCE VPC networks don't support Packet Mirroring . | |
|
Cloud NAT
|
allowCloudNat
|
CLOUD_NAT_BLOCKED
|
RoCE VPC networks don't support Cloud NAT . | |
|
Cloud Router
|
allowCloudRouter
|
CLOUD_ROUTER_BLOCKED
|
RoCE VPC networks don't support Cloud Routers and dynamic routes. | |
|
Cloud Interconnect
|
allowInterconnect
|
INTERCONNECT_BLOCKED
|
RoCE VPC networks don't support Cloud Interconnect VLAN attachments. | |
|
Cloud VPN
|
allowVpn
|
VPN_BLOCKED
|
RoCE VPC networks don't support Cloud VPN tunnels. | |
|
Network Connectivity Center
|
allowNcc
|
NCC_BLOCKED
|
RoCE VPC networks don't support NCC . You can't add a RoCE VPC network as a VPC spoke to a NCC hub. | |
|
Cloud Load Balancing
|
allowLoadBalancing
|
LOAD_BALANCING_BLOCKED
|
RoCE VPC networks don't support Cloud Load Balancing . Consequently, RoCE VPC networks don't support load balancer features, including Google Cloud Armor . | |
|
Private Google Access
|
allowPrivateGoogleAccess
|
PRIVATE_GOOGLE_ACCESS_BLOCKED
|
RoCE VPC networks don't support Private Google Access . | |
|
Private Service Connect
|
allowPsc
|
PSC_BLOCKED
|
RoCE VPC networks don't support Private Service Connect . |
Multi-NIC considerations for RoCE VPC networks
To support workloads that benefit from cross-rail GPU-to-GPU communication, RoCE
VPC networks support instances that have multiple MRDMA
NICs in the
network. Each MRDMA
NIC must be in a unique subnet. Placing two or more MRDMA
NICs in the same RoCE VPC network might affect network
performance, including increased latency. MRDMA
NICs use NCCL
. NCCL attempts to align all network
transfers, even for cross-rail communication. For example, it uses PXN to copy
data through NVlink to a rail-aligned GPU before transferring it over the
network.

