Backend services overview

A backend service defines how Cloud Load Balancing distributes traffic. The backend service configuration contains a set of values, such as the protocol used to connect to backends, various distribution and session settings, health checks, and timeouts. These settings provide fine-grained control over how your load balancer behaves. To get you started, most of the settings have default values that allow for fast configuration. A backend service is either global or regional in scope.

Load balancers, Envoy proxies, and proxyless gRPC clients use the configuration information in the backend service resource to do the following:

  • Direct traffic to the correct backends , which are instance groups or network endpoint groups (NEGs).
  • Distribute traffic according to a balancing mode , which is a setting for each backend.
  • Determine which health check is monitoring the health of the backends.
  • Specify session affinity .
  • Determine whether other services are enabled, including the following services that are only available for certain load balancers :
    • Cloud CDN
    • Google Cloud Armor security policies
    • Identity-Aware Proxy
  • Designate regional backend services as a service in App Hub , which is in preview .

You set these values when you create a backend service or add a backend to the backend service.

Note: If you're using either the global external Application Load Balancer or the classic Application Load Balancer, and your backends serve static content, consider using backend buckets instead of backend services.

The following table summarizes which load balancers use backend services. The product that you are using also determines the maximum number of backend services, the scope of a backend service, the type of backends supported, and the backend service's load balancing scheme . The load balancing scheme is an identifier that Google uses to classify forwarding rules and backend services. Each load balancing product uses one load balancing scheme for its forwarding rules and backend services. Some schemes are shared among products.

Table: Backend services and supported backend types
Product
Maximum number of backend services
Scope of backend service
Supported backend types
Load balancing scheme
Global external Application Load Balancer
Multiple
Global
Each backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends *
  • All zonal NEGs: One or more GCE_VM_IP_PORT type zonal NEGs *
  • All hybrid connectivity NEGs: One or more NON_GCP_PRIVATE_IP_PORT type NEGs
  • A combination of zonal and hybrid NEGs: GCE_VM_IP_PORT and NON_GCP_PRIVATE_IP_PORT type NEGs
  • All serverless NEGs: One or more App Engine, Cloud Run, or Cloud Run functions services
  • One global internet NEG for an external backend
  • Private Service Connect NEGs:
    • Google APIs: a single Private Service Connect NEG
    • Managed services: one or more Private Service Connect NEGs
EXTERNAL_MANAGED
Classic Application Load Balancer
Multiple
Global
Each backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends
  • All zonal NEGs: One or more GCE_VM_IP_PORT type zonal NEGs
  • All hybrid connectivity NEGs: One or more NON_GCP_PRIVATE_IP_PORT type NEGs
  • A combination of zonal and hybrid NEGs: GCE_VM_IP_PORT and NON_GCP_PRIVATE_IP_PORT type NEGs
  • All serverless NEGs: One or more App Engine, Cloud Run, or Cloud Run functions services, or
  • One global internet NEG for an external backend
EXTERNAL #
Regional external Application Load Balancer
Multiple
Regional
Each backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends *
  • All zonal NEGs: One or more GCE_VM_IP_PORT type zonal NEGs *
  • All hybrid connectivity NEGs: One or more NON_GCP_PRIVATE_IP_PORT type NEGs
  • A combination of zonal and hybrid NEGs: GCE_VM_IP_PORT and NON_GCP_PRIVATE_IP_PORT type NEGs
  • A single serverless NEG (Cloud Run only)
  • A single Private Service Connect NEG
  • All regional internet NEGs for an external backend
EXTERNAL_MANAGED
Cross-region internal Application Load Balancer
Multiple
Global
Each backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends *
  • All zonal NEGs: One or more GCE_VM_IP_PORT type zonal NEGs *
  • All hybrid connectivity NEGs: One or more NON_GCP_PRIVATE_IP_PORT type NEGs
  • A combination of zonal and hybrid NEGs: GCE_VM_IP_PORT and NON_GCP_PRIVATE_IP_PORT type NEGs
  • A single serverless NEG (Cloud Run only)
  • Private Service Connect NEGs:
    • Google APIs: a single Private Service Connect NEG
    • Managed services: one or more Private Service Connect NEGs
INTERNAL_MANAGED
Regional internal Application Load Balancer
Multiple
Regional
Each backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends *
  • All zonal NEGs: One or more GCE_VM_IP_PORT type zonal NEGs *
  • All hybrid connectivity NEGs: One or more NON_GCP_PRIVATE_IP_PORT type NEGs
  • A combination of zonal and hybrid NEGs: GCE_VM_IP_PORT and NON_GCP_PRIVATE_IP_PORT type NEGs
  • A single serverless NEG (Cloud Run only)
  • A single Private Service Connect NEG
  • All regional internet NEGs for an external backend
INTERNAL_MANAGED
Global external proxy Network Load Balancer
1
Global
The backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends *
  • All zonal NEGs: One or more GCE_VM_IP_PORT type zonal NEGs *
  • All hybrid connectivity NEGs: One or more NON_GCP_PRIVATE_IP_PORT type NEGs
  • A combination of zonal and hybrid NEGs: GCE_VM_IP_PORT and NON_GCP_PRIVATE_IP_PORT type NEGs
  • Private Service Connect NEGs:
    • Google APIs: a single Private Service Connect NEG
    • Managed services: one or more Private Service Connect NEGs
EXTERNAL_MANAGED
Classic proxy Network Load Balancer
1
Global
The backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends
  • All zonal NEGs: One or more GCE_VM_IP_PORT type zonal NEGs
  • All hybrid connectivity NEGs: One or more NON_GCP_PRIVATE_IP_PORT type NEGs
  • A combination of zonal and hybrid NEGs: GCE_VM_IP_PORT and NON_GCP_PRIVATE_IP_PORT type NEGs
EXTERNAL
Regional external proxy Network Load Balancer
1
Regional
The backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends *
  • All zonal NEGs: One or more GCE_VM_IP_PORT type zonal NEGs *
  • All hybrid connectivity NEGs: One or more NON_GCP_PRIVATE_IP_PORT type NEGs
  • A combination of zonal and hybrid NEGs: GCE_VM_IP_PORT and NON_GCP_PRIVATE_IP_PORT type NEGs
  • All regional internet NEGs for an external backend
  • A single Private Service Connect NEG
EXTERNAL_MANAGED
Regional internal proxy Network Load Balancer
1
Regional
The backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends *
  • All zonal NEGs: One or more GCE_VM_IP_PORT type zonal NEGs *
  • All hybrid connectivity NEGs: One or more NON_GCP_PRIVATE_IP_PORT type NEGs
  • A combination of zonal and hybrid NEGs: GCE_VM_IP_PORT and NON_GCP_PRIVATE_IP_PORT type NEGs
  • All regional internet NEGs for an external backend
  • A single Private Service Connect NEG
INTERNAL_MANAGED
Cross-region internal proxy Network Load Balancer
Multiple
Global
The backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends *
  • All zonal NEGs: One or more GCE_VM_IP_PORT type zonal NEGs *
  • All hybrid connectivity NEGs: One or more NON_GCP_PRIVATE_IP_PORT type NEGs
  • A combination of zonal and hybrid NEGs: GCE_VM_IP_PORT and NON_GCP_PRIVATE_IP_PORT type NEGs
  • Private Service Connect NEGs:
    • Google APIs: a single Private Service Connect NEG
    • Managed services: one or more Private Service Connect NEGs
INTERNAL_MANAGED
External passthrough Network Load Balancer
1
Regional
The backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends
  • All zonal NEGs: One or more GCE_VM_IP type zonal NEGs
EXTERNAL
Internal passthrough Network Load Balancer
1
Regional, but configurable to be globally accessible
The backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends
  • All zonal NEGs: One or more GCE_VM_IP type zonal NEGs
  • One port mapping NEG (Preview)
INTERNAL
Cloud Service Mesh
Multiple
Global
Each backend service supports one of the following backend combinations:
  • All instance group backends: One or more managed, unmanaged, or a combination of managed and unmanaged instance group backends
  • All zonal NEGs: One or more GCE_VM_IP_PORT or NON_GCP_PRIVATE_IP_PORT type zonal NEGs
  • One internet NEG of type INTERNET_FQDN_PORT
  • One or more service bindings
INTERNAL_SELF_MANAGED
* Support IPv4 and IPv6 (dual-stack) instance groups and zonal NEG backends. Zonal NEGs support dual-stack on only GCE_VM_IP_PORT type endpoints.
For GKE deployments, mixed NEG backends are only supported with standalone NEGs .
Backend services used by classic Application Load Balancers and classic proxy Network Load Balancers are always global in scope, in either Standard or Premium Network Tier. However, in Standard Tier the following restrictions apply:
# It is possible to attach EXTERNAL_MANAGED backend services to EXTERNAL forwarding rules. However, EXTERNAL backend services cannot be attached to EXTERNAL_MANAGED forwarding rules. To take advantage of new features available only with the global external Application Load Balancer , we recommend that you migrate your existing EXTERNAL resources to EXTERNAL_MANAGED by using the migration process described at Migrate resources from classic to global external Application Load Balancer .

Backends

A backend is one or more endpoints that receive traffic from a Google Cloud load balancer, a Cloud Service Mesh-configured Envoy proxy, or a proxyless gRPC client. There are several types of backends:

You cannot delete a backend instance group or NEG that is associated with a backend service. Before you delete an instance group or NEG, you must first remove it as a backend from all backend services that reference it.

Instance groups

This section discusses how instance groups work with the backend service.

Backend VMs and external IP addresses

Backend VMs in backend services don't need external IP addresses:

  • For global external Application Load Balancers and external proxy Network Load Balancers:Clients communicate with a Google Front End (GFE) which hosts your load balancer's external IP address. GFEs communicate with backend VMs or endpoints by sending packets to an internal address created by joining an identifier for the backend's VPC network with the internal IPv4 address of the backend. Communication between GFEs and backend VMs or endpoints is facilitated through special routes .
    • For instance group backends, the internal IPv4 address is always the primary internal IPv4 address that corresponds to the nic0 interface of the VM.
    • For GCE_VM_IP_PORT endpoints in a zonal NEG, you can specify the endpoint's IP address as either the primary IPv4 address associated with any network interface of a VM or any IPv4 address from an alias IP address range associated with any network interface of a VM.
  • For regional external Application Load Balancers:Clients communicate with an Envoy proxy which hosts your load balancer's external IP address. Envoy proxies communicate with backend VMs or endpoints by sending packets to an internal address created by joining an identifier for the backend's VPC network with the internal IPv4 address of the backend.

    • For instance group backends, the internal IPv4 address is always the primary internal IPv4 address that corresponds to the nic0 interface of the VM, and nic0 must be in the same network as the load balancer.
    • For GCE_VM_IP_PORT endpoints in a zonal NEG, you can specify the endpoint's IP address as either the primary IPv4 address associated with any network interface of a VM or any IPv4 address from an alias IP address range associated with any network interface of a VM, as long as the network interface is in the same network as the load balancer.
  • For external passthrough Network Load Balancers:Clients communicate directly with backends by way of Google's Maglev pass-through load balancing infrastructure. Packets are routed and delivered to backends with the original source and destination IP addresses preserved. Backends respond to clients using direct server return . The methods used to select a backend and to track connections are configurable .

    • For instance group backends, packets are always delivered to the nic0 interface of the VM.
    • For GCE_VM_IP endpoints in a zonal NEG, packets are delivered to the VM's network interface that is in the subnetwork associated with the NEG.

Named ports

The backend service's named port attribute is only applicable to proxy-based load balancers (Application Load Balancers and Proxy Network Load Balancers) using instance group backends. The named port defines the destination port used for the TCP connection between the proxy (GFE or Envoy) and the backend instance.

Named ports are configured as follows:

  • On each instance group backend, you must configure one or more named ports using key-value pairs. The key represents a meaningful port name that you choose, and the value represents the port number you assign to the name. The mapping of names to numbers is done individually for each instance group backend.

  • On the backend service, you specify a single named port using just the port name ( --port-name ).

On a per-instance group backend basis, the backend service translates the port name to a port number. When an instance group's named port matches the backend service's --port-name , the backend service uses this port number for communication with the instance group's VMs.

For example, you might set the named port on an instance group with the name my-service-name and the port 8888 :

gcloud compute instance-groups unmanaged set-named-ports my-unmanaged-ig \
    --named-ports=my-service-name:8888

Then you refer to the named port in the backend service configuration with the --port-name on the backend service set to my-service-name :

gcloud compute backend-services update my-backend-service \
    --port-name=my-service-name

A backend service can use a different port number when communicating with VMs in different instance groups if each instance group specifies a different port number for the same port name.

The resolved port number used by the proxy load balancer's backend service doesn't need to match the port number used by the load balancer's forwarding rules. A proxy load balancer listens for TCP connections sent to the IP address and destination port of its forwarding rules. Because the proxy opens a second TCP connection to its backends, the second TCP connection's destination port can be different.

Named ports are only applicable to instance group backends. Zonal NEGs with GCE_VM_IP_PORT endpoints, hybrid NEGs with NON_GCP_PRIVATE_IP_PORT endpoints, and internet NEGs define ports using a different mechanism, namely, on the endpoints themselves. Serverless NEGs reference Google services and PSC NEGs reference service attachments using abstractions that don't involve specifying a destination port.

Internal passthrough Network Load Balancers and external passthrough Network Load Balancers don't use named ports. This is because they are pass-through load balancers that route connections directly to backends instead of creating new connections. Packets are delivered to the backends preserving the destination IP address and port of the load balancer's forwarding rule.

To learn how to create named ports, see the following instructions:

Restrictions and guidance for instance groups

Keep the following restrictions and guidance in mind when you create instance groups for your load balancers:

  • Don't put a VM in more than one load-balanced instance group. If a VM is a member of two or more unmanaged instance groups, or a member of one managed instance group and one or more unmanaged instance groups, Google Cloud limits you to only using one of those instance groups at a time as a backend for a particular backend service.

    If you need a VM to participate in multiple load balancers, you must use the same instance group as a backend on each of the backend services.

  • For proxy load balancers, when you want to balance traffic to different ports, specify the required named ports on one instance group and have each backend service subscribe to a unique named port.

  • You can use the same instance group as a backend for more than one backend service. In this situation, the backends must use compatible balancing modes. Compatible means that the balancing modes must be the same, or they must be a combination of CONNECTION and RATE .

    Incompatible balancing mode combinations are as follows:

    • CONNECTION with UTILIZATION
    • RATE with UTILIZATION

    Consider the following example:

    • You have two backend services: external-https-backend-service for an external Application Load Balancer and internal-tcp-backend-service for an internal passthrough Network Load Balancer.
    • You're using an instance group called instance-group-a in internal-tcp-backend-service .
    • In internal-tcp-backend-service , you must apply the CONNECTION balancing mode because internal passthrough Network Load Balancers only support the CONNECTION balancing mode.
    • You can also use instance-group-a in external-https-backend-service if you apply the RATE balancing mode in external-https-backend-service .
    • You cannot also use instance-group-a in external-https-backend-service with the UTILIZATION balancing mode.
  • To change the balancing mode for an instance group serving as a backend for multiple backend services:

    • Remove the instance group from all backend services except for one.
    • Change the balancing mode for the backend on the one remaining backend service.
    • Re-add the instance group as a backend to the remaining backend services, if they support the new balancing mode.
  • If your instance group is associated with several backend services, each backend service can reference the same named port or a different named port on the instance group.

  • We recommend not adding an autoscaled managed instance group to more than one backend service. Doing so might cause unpredictable and unnecessary scaling of instances in the group, especially if you use the HTTP Load Balancing Utilizationautoscaling metric.

    • While not recommended, this scenario might work if the autoscaling metric is either CPU Utilizationor a Cloud Monitoring Metricthat is unrelated to the load balancer's serving capacity. Using one of these autoscaling metrics might prevent erratic scaling.

Zonal network endpoint groups

Network endpoints represent services by their IP address or an IP address and port combination, rather than referring to a VM in an instance group. A network endpoint group (NEG) is a logical grouping of network endpoints.

Zonal network endpoint groups (NEGs) are zonal resources that represent collections of either IP addresses or IP address and port combinations for Google Cloud resources within a single subnet .

A backend service that uses zonal NEGs as its backends distributes traffic among applications or containers running within VMs.

There are two types of network endpoints available for zonal NEGs:

  • GCE_VM_IP endpoints (supported only with internal passthrough Network Load Balancers and backend service-based external passthrough Network Load Balancers).
  • GCE_VM_IP_PORT endpoints.

To see which products support zonal NEG backends, see Table: Backend services and supported backend types .

For details, see Zonal NEGs overview .

Internet network endpoint groups

Internet NEGs are resources that define external backends. An external backend is a backend that is hosted within on-premises infrastructure or on infrastructure provided by third parties.

An internet NEG is a combination of a hostname or an IP address, plus an optional port. There are two types of network endpoints available for internet NEGs: INTERNET_FQDN_PORT and INTERNET_IP_PORT .

Internet NEGs are available in two scopes: global and regional. To see which products support internet NEG backends in each scope, see Table: Backend services and supported backend types .

For details, see Internet network endpoint group overview .

Serverless network endpoint groups

A network endpoint group (NEG) specifies a group of backend endpoints for a load balancer. A serverless NEG is a backend that points to a Cloud Run , App Engine , Cloud Run functions , or API Gateway service.

A serverless NEG can represent one of the following:

  • A Cloud Run service or a group of services.
  • A Cloud Run functions function or a group of functions.
  • An App Engine app (Standard or Flex), a specific service within an app, a specific version of an app, or a group of services.
  • An API Gateway that provides access to your services through a REST API consistent across all services, regardless of service implementation. This capability is in Preview.

To set up a serverless NEG for serverless applications that share a URL pattern, you use a URL mask . A URL mask is a template of your URL schema (for example, example.com/<service> ). The serverless NEG will use this template to extract the <service> name from the incoming request's URL and route the request to the matching Cloud Run, Cloud Run functions, or App Engine service with the same name.

To see which load balancers support serverless NEG backends, see Table: Backend services and supported backend types .

For more information about serverless NEGs, see the Serverless network endpoint groups overview .

Service bindings

A service binding is a backend that establishes a connection between a backend service in Cloud Service Mesh and a service registered in Service Directory. A backend service can reference several service bindings. A backend service with a service binding cannot reference any other type of backend.

Mixed backends

The following usage considerations apply when you add different types of backends to a single backend service:

  • A single backend service cannot simultaneously use both instance groups and zonal NEGs.
  • You can use a combination of different types of instance groups on the same backend service. For example, a single backend service can reference a combination of both managed and unmanaged instance groups. For complete information about which backends are compatible with which backend services, see the table in the previous section.
  • With certain proxy load balancers, you can use a combination of zonal NEGs (with GCE_VM_IP_PORT endpoints) and hybrid connectivity NEGs (with NON_GCP_PRIVATE_IP_PORT endpoints) to configure hybrid load balancing . To see which load balancers have this capability, refer Table: Backend services and supported backend types .

Protocol to the backends

When you create a backend service, you must specify the protocol used to communicate with the backends. You can specify only one protocol per backend service — you cannot specify a secondary protocol to use as a fallback.

Which protocols are valid depends on the type of load balancer or whether you are using Cloud Service Mesh.

Product Backend service protocol options
Table: Protocol to the backends
Application Load Balancer HTTP, HTTPS, HTTP/2
Proxy Network Load Balancer

TCP or SSL

The regional proxy Network Load Balancers support only TCP.

Passthrough Network Load Balancer TCP, UDP, or UNSPECIFIED
Cloud Service Mesh HTTP, HTTPS, HTTP/2, gRPC, TCP

Changing a backend service's protocol makes the backends inaccessible through load balancers for a few minutes.

IP address selection policy

This field is applicable to proxy load balancers. You must use the IP address selection policy to specify the traffic type that is sent from the backend service to your backends.

When you select the IP address selection policy, ensure that your backends support the selected traffic type. For more information, see Table: Backend services and supported backend types .

IP address selection policy is used when you want to convert your load balancer backend service to support a different traffic type. For more information, see Convert from single-stack to dual-stack .

You can specify the following values for the IP address selection policy:

IP address selection policy Description
Only IPv4 Only send IPv4 traffic to the backends of the backend service, regardless of traffic from the client to the GFE. Only IPv4 health checks are used to check the health of the backends.
Prefer IPv6

Prioritize the backend's IPv6 connection over the IPv4 connection (provided there is a healthy backend with IPv6 addresses).

The health checks periodically monitor the backends' IPv6 and IPv4 connections. The GFE first attempts the IPv6 connection; if the IPv6 connection is broken or slow, the GFE uses happy eyeballs to fall back and connect to IPv4.

Even if one of the IPv6 or IPv4 connections is unhealthy, the backend is still treated as healthy, and both connections can be tried by the GFE, with happy eyeballs ultimately selecting which one to use.

Only IPv6

Only send IPv6 traffic to the backends of the backend service, regardless of traffic from the client to the proxy. Only IPv6 health checks are used to check the health of the backends.

There is no validation to check if the backend traffic type matches the IP address selection policy. For example, if you have IPv4-only backends and select Only IPv6 as the IP address selection policy, the configuration results in unhealthy backends because traffic fails to reach those backends and the HTTP 503 response code is returned to the clients.

Encryption between the load balancer and backends

For information about encryption between the load balancer and backends, see Encryption to the backends .

Traffic distribution

The values of the following fields in the backend services resource determine some aspects of the backend's behavior:

  • A balancing mode defines how the load balancer measures backend readiness for new requests or connections.
  • A target capacity defines a target maximum number of connections, a target maximum rate, or target maximum CPU utilization.
  • A capacity scaler adjusts overall available capacity without modifying the target capacity.

Balancing mode

The balancing mode determines whether the backends of a load balancer or Cloud Service Mesh can handle additional traffic or are fully loaded.

Google Cloud has three balancing modes:

  • CONNECTION : Determines how the load is spread based on the total number of connections that the backend can handle.
  • RATE : The target maximum number of requests (queries) per second (RPS, QPS). The target maximum RPS/QPS can be exceeded if all backends are at or above capacity.
  • UTILIZATION : Determines how the load is spread based on the utilization of instances in an instance group.

Balancing modes available for each load balancer

You set the balancing mode when you add a backend to the backend service. The balancing modes available to a load balancer depend on the type of load balancer and the type of backends.

The passthrough Network Load Balancersrequire the CONNECTION balancing mode but don't support setting any target capacity .

The Application Load Balancerssupport either RATE or UTILIZATION balancing modes for instance group backends, RATE balancing mode for zonal NEGs with GCE_VM_IP_PORT endpoints, and RATE balancing mode for hybrid NEGs ( NON_GCP_PRIVATE_IP_PORT endpoints). For any other type of supported backend, balancing mode must be omitted.

  • For classic Application Load Balancers, a region is selected based on the location of the client and whether the region has available capacity, based on the load balancing mode's target capacity. Then, within a region, the balancing mode's target capacity is used to compute proportions for how many requests should go to each backend in the region. Requests or connections are then distributed in a round robin fashion among instances or endpoints within the backend.

  • For global external Application Load Balancers, a region is selected based on the location of the client and whether the region has available capacity, based on the load balancing mode's target capacity. Within a region, the balancing mode's target capacity is used to compute proportions for how many requests should go to each backend (instance group or NEG) in the region. You can use the service load balancing policy ( serviceLbPolicy ) and the preferred backend setting to influence the selection of any specific backends within a region. Furthermore, within each instance group or NEG, the load balancing policy ( LocalityLbPolicy ) determines how traffic is distributed to instances or endpoints within the group.

  • For cross-region internal Application Load Balancers, regional external Application Load Balancers, and regional internal Application Load Balancers, the balancing mode's target capacity is used to compute proportions for how many requests should go to each backend (instance group or NEG) in the region. Within each instance group or NEG, the load balancing policy ( LocalityLbPolicy ) determines how traffic is distributed to instances or endpoints within the group. Only the cross-region internal Application Load Balancer support the use of the service load balancing policy ( serviceLbPolicy ) and the preferred backend settings to influence the selection of any specific backends within a region.

Proxy Network Load Balancerssupport either CONNECTION or UTILIZATION balancing modes for VM instance group backends, CONNECTION balancing mode for zonal NEGs with GCE_VM_IP_PORT endpoints, and CONNECTION balancing mode for hybrid NEGs ( NON_GCP_PRIVATE_IP_PORT endpoints). For any other type of supported backend, balancing mode must be omitted.

  • For global external proxy Network Load Balancers, a region is selected based on the location of the client and whether the region has available capacity, based on the load balancing mode's target capacity. Within a region, the balancing mode's target capacity is used to compute proportions for how many requests should go to each backend (instance group or NEG) in the region. You can use the service load balancing policy ( serviceLbPolicy ) and the preferred backend setting to influence the selection of any specific backends within a region. Furthermore, within each instance group or NEG, the load balancing policy ( LocalityLbPolicy ) determines how traffic is distributed to instances or endpoints within the group.

  • For cross-region internal proxy Network Load Balancers, the configured region is selected first. Within a region, the balancing mode's target capacity is used to compute proportions for how many requests should go to each backend (instance group or NEG) in the region. You can use the service load balancing policy ( serviceLbPolicy ) and the preferred backend setting to influence the selection of any specific backends within a region. Furthermore, within each instance group or NEG, the load balancing policy ( LocalityLbPolicy ) determines how traffic is distributed to instances or endpoints within the group.

  • For classic proxy Network Load Balancers, a region is selected based on the location of the client and whether the region has available capacity based on the load balancing mode's target capacity. Then, within a region, the load balancing mode's target capacity is used to compute proportions for how many requests or connections should go to each backend (instance group or NEG) in the region. After the load balancer has selected a backend, requests or connections are then distributed in a round robin fashion among VM instances or network endpoints within each individual backend.

  • For regional external proxy Network Load Balancers and regional internal proxy Network Load Balancers, the load balancing mode's target capacity is used to compute proportions for how many requests should go to each backend (instance group or NEG). Within each instance group or NEG, the load balancing policy ( localityLbPolicy ) determines how traffic is distributed to instances or endpoints within the group.

The following table summarizes the load balancing modes available for each load balancer and backend combination.

Table: Balancing modes available for each load balancer
Load balancer
Backends
Balancing modes available
Application Load Balancer
Instance groups
RATE or UTILIZATION
Zonal NEGs ( GCE_VM_IP_PORT endpoints)
RATE
Hybrid NEGs ( NON_GCP_PRIVATE_IP_PORT endpoints)
RATE

Proxy Network Load Balancer

  • Global external proxy Network Load Balancer
  • Classic proxy Network Load Balancer
  • Regional external proxy Network Load Balancer
  • Regional internal proxy Network Load Balancer
  • Cross-region internal proxy Network Load Balancer
Instance groups
CONNECTION or UTILIZATION
Zonal NEGs ( GCE_VM_IP_PORT endpoints)
CONNECTION

Hybrid NEGs ( NON_GCP_PRIVATE_IP_PORT endpoints)

CONNECTION
Passthrough Network Load Balancer
Instance groups
CONNECTION
Zonal NEGs ( GCE_VM_IP endpoints)
CONNECTION

If the average utilization of all VMs that are associated with a backend service is less than 10%, Google Cloud might prefer specific zones. This can happen when you use regional managed instance groups, zonal managed instance groups in different zones, and zonal unmanaged instance groups. This zonal imbalance automatically resolves as more traffic is sent to the load balancer.

For more information, see gcloud compute backend-services add-backend .

Target capacity

Each balancing mode has a corresponding target capacity , which defines one of the following target maximums:

  • Number of connections
  • Rate
  • CPU utilization

For every balancing mode, the target capacity is not a circuit breaker. A load balancer can exceed the maximum under certain conditions, for example, if all backend VMs or endpoints have reached the maximum.

Connection balancing mode

For CONNECTION balancing mode, the target capacity defines a target maximum number of open connections. Except for internal passthrough Network Load Balancers and external passthrough Network Load Balancers, you must use one of the following settings to specify a target maximum number of connections:

  • max-connections-per-instance (per VM): Target average number of connections for a single VM.
  • max-connections-per-endpoint (per endpoint in a zonal NEG): Target average number of connections for a single endpoint.
  • max-connections (per zonal NEGs and for zonal instance groups): Target average number of connections for the whole NEG or instance group. For regional managed instance groups, use max-connections-per-instance instead.

The following table shows how the target capacity parameter defines the following:

  • The target capacity for the whole backend
  • The expected target capacity for each instance or endpoint
Table: Target capacity for backends using the CONNECTION balancing mode
Backend type Target capacity
If you specify Whole backend capacity Expected per instance or per endpoint capacity
Instance group
N instances,
H healthy
max-connections-per-instance=X X × N (X × N)/H
Zonal NEG
N endpoints,
H healthy
max-connections-per-endpoint=X X × N (X × N)/H
Instance groups
(except regional managed instance groups)

H healthy instances
max-connections=Y Y Y/H

As illustrated, the max-connections-per-instance and max-connections-per-endpoint settings are proxies for calculating a target maximum number of connections for the whole VM instance group or whole zonal NEG:

  • In a VM instance group with N instances, setting max-connections-per-instance=X has the same meaning as setting max-connections=X × N .
  • In a zonal NEG with N endpoints, setting max-connections-per-endpoint=X has the same meaning as setting max-connections=X × N .

Rate balancing mode

For the RATE balancing mode, you must define the target capacity using one of the following parameters:

  • max-rate-per-instance (per VM): Provide a target average HTTP request rate for a single VM.
  • max-rate-per-endpoint (per endpoint in a zonal NEG): Provide a target average HTTP request rate for a single endpoint.
  • max-rate (per zonal NEGs and for zonal instance groups): Provide a target average HTTP request rate for the whole NEG or instance group. For regional managed instance groups, use max-rate-per-instance instead.

The following table shows how the target capacity parameter defines the following:

  • The target capacity for the whole backend
  • The expected target capacity for each instance or endpoint
Table: Target capacity for backends using the RATE balancing mode
Backend type Target capacity
If you specify Whole backend capacity Expected per instance or per endpoint capacity
Instance group
N instances,
H healthy
max-rate-per-instance=X X × N (X × N)/H
zonal NEG
N endpoints,
H healthy
max-rate-per-endpoint=X X × N (X × N)/H
Instance groups
(except regional managed instance groups)

H healthy instances
max-rate=Y Y Y/H

As illustrated, the max-rate-per-instance and max-rate-per-endpoint settings are proxies for calculating a target maximum rate of HTTP requests for the whole instance group or whole zonal NEG:

  • In an instance group with N instances, setting max-rate-per-instance=X has the same meaning as setting max-rate=X × N .
  • In a zonal NEG with N endpoints, setting max-rate-per-endpoint=X has the same meaning as setting max-rate=X × N .

Utilization balancing mode

The UTILIZATION balancing mode has no mandatory target capacity. You have a number of options that depend on the type of backend, as summarized in the table in the following section.

The max-utilization target capacity can only be specified per instance group and cannot be applied to a particular VM in the group.

The UTILIZATION balancing mode has no mandatory target capacity. When you use the Google Cloud console to add a backend instance group to a backend service, the Google Cloud console sets the value of max-utilization to 0.8 (80%) if the UTILIZATION balancing mode is selected. In addition to max-utilization , the UTILIZATION balancing mode supports more complex target capacities, as summarized in the table in the following section.

Changing the balancing mode of a load balancer

For some load balancers or load balancer configurations, you cannot change the balancing mode because the backend service has only one possible balancing mode. For others, depending on the backend used, you can change the balancing mode because more than one mode is available to those backend services.

To see which balancing modes are supported for each load balancer, refer the Table: Balancing modes available for each load balancer

Balancing modes and target capacity settings

For products that support a target capacity specification, the target capacity is not a circuit breaker. When the configured target capacity maximum is reached in a given zone, new requests or connections are distributed to other zones that aren't processing requests or connections at target capacity. If all zones have reached target capacity, new requests or connections are distributed by overfilling.

Application Load Balancers and Cloud Service Mesh

This table lists the available balancing mode and target capacity combinations for Application Load Balancers and Cloud Service Mesh.

Table: Balancing mode and target capacity combinations for Application Load Balancers and Cloud Service Mesh
Backend type
Balancing mode
Target capacity specification
Instance groups
  • zonal unmanaged
  • zonal managed
  • regional managed
RATE
You must specify one of the following:
  • max-rate
     (supported only by zonal instance groups)
  • max-rate-per-instance
     (supported by all instance groups)
UTILIZATION
You can optionally specify one of the following:
  • (1) max-utilization
  • (2) max-rate
     (supported only by zonal instance groups)
  • (3) max-rate-per-instance
     (supported by all instance groups)
  • (1) and (2) together
  • (1) and (3) together

Zonal NEGs

  • GCP_VM_IP_PORT

Hybrid NEGS

  • NON_GCP_PRIVATE_IP_PORT
RATE
You must specify one of the following:
  • max-rate per zonal NEG
  • max-rate-per-endpoint

Proxy Network Load Balancers

This table lists the available balancing mode and target capacity combinations for Proxy Network Load Balancers.

Table: Balancing mode and target capacity combinations for Proxy Network Load Balancers
Backend type
Balancing mode
Target capacity specification
Instance groups
  • zonal unmanaged
  • zonal managed
  • regional managed
CONNECTION
You must specify one of the following:
  • max-connections
     (supported only by zonal instance groups)
  • max-rate-per-instance
     (supported by all instance groups)
UTILIZATION
You can optionally specify one of the following:
  • (1) max-utilization
  • (2) max-connections
     (supported only by zonal instance groups)
  • (3) max-connections-per-instance
     (supported by all instance groups)
  • (1) and (2) together
  • (1) and (3) together

Zonal NEGs

  • GCP_VM_IP_PORT

Hybrid NEGS

  • NON_GCP_PRIVATE_IP_PORT
CONNECTION
You must specify one of the following:
  • max-connections per zonal NEG
  • max-connections-per-endpoint

Passthrough Network Load Balancers

This table lists the available balancing mode and target capacity combinations for Passthrough Network Load Balancers.

Table: Balancing mode and target capacity combinations for Passthrough Network Load Balancers
Backend type
Balancing mode
Target capacity specification
Instance groups
  • zonal unmanaged
  • zonal managed
  • regional managed
CONNECTION
You cannot specify a target maximum number of connections.
Zonal NEGs
  • GCP_VM_IP
CONNECTION
You cannot specify a target maximum number of connections.

Capacity scaler

Use capacity scaler to scale the target capacity (max utilization, max rate, or max connections) without changing the target capacity.

For the Google Cloud reference documentation, see the following:

You can adjust the capacity scaler to scale the effective target capacity without explicitly changing one of the --max-* parameters.

You can set the capacity scaler to either of these values:

  • The default value is 1 , which means the group serves up to 100% of its configured capacity (depending on balancingMode ).
  • A value of 0 means the group is completely drained, offering 0% of its available capacity. You cannot configure a setting of 0 when there is only one backend attached to the backend service.
  • A value from 0.1 (10%) to 1.0 (100%).

The following examples demonstrate how the capacity scaler works in conjunction with the target capacity setting:

  • If the balancing mode is RATE , the max-rate is set to 80 RPS, and the capacity scaler is 1.0 , the available capacity is also 80 RPS.

  • If the balancing mode is RATE , the max-rate is set to 80 RPS, and the capacity scaler is 0.5 , the available capacity is 40 RPS ( 0.5 times 80 ).

  • If the balancing mode is RATE , the max-rate is set to 80 RPS, and the capacity scaler is 0.0 , the available capacity is zero ( 0 ).

Service load balancing policy

A service load balancing policy ( serviceLbPolicy ) is a resource associated with the load balancer's backend service . It lets you customize the parameters that influence how traffic is distributed within the backends associated with a backend service:

  • Customize the load balancing algorithm used to determine how traffic is distributed among regions or zones.
  • Enable auto-capacity draining so that the load balancer can quickly drain traffic from unhealthy backends.

Additionally, you can designate specific backends as preferred backends . These backends must be used to capacity (that is, the target capacity specified by the backend's balancing mode) before requests are sent to the remaining backends.

To learn more, see Advanced load balancing optimizations with a service load balancing policy .

Load balancing locality policy

For a backend service, traffic distribution is based on a balancing mode and a load balancing locality policy . The balancing mode determines the fraction of traffic that should be sent to each backend (instance group or NEG). The load balancing locality policy then ( LocalityLbPolicy ) determines how traffic is distributed across instances or endpoints within each zone. For regional managed instance groups, the locality policy applies to each constituent zone.

The load balancing locality policy is configured per-backend service. The following settings are available:

  • ROUND_ROBIN (default): This is the default load balancing locality policy setting in which the load balancer selects a healthy backend in round robin order.

  • LEAST_REQUEST : An O(1) algorithm in which the load balancer selects two random healthy hosts and picks the host which has fewer active requests.

  • RING_HASH : This algorithm implements consistent hashing to backends. The algorithm has the property that the addition or removal of a host from a set of N hosts only affects 1/N of the requests.

  • RANDOM : The load balancer selects a random healthy host.

  • ORIGINAL_DESTINATION : The load balancer selects a backend based on the client connection metadata. Connections are opened to the original destination IP address specified in the incoming client request, before the request was redirected to the load balancer.

    ORIGINAL_DESTINATION is not supported for global and regional external Application Load Balancers.

  • MAGLEV : Implements consistent hashing to backends and can be used as a replacement for the RING_HASH policy. Maglev is not as stable as RING_HASH but has faster table lookup build times and host selection times. For more information about Maglev, see the Maglev whitepaper .

  • WEIGHTED_MAGLEV : Implements per-instance weighted load balancing by using weights reported by health checks. If this policy is used, the backend service must configure a non legacy HTTP-based health check, and health check replies are expected to contain the non-standard HTTP response header field, X-Load-Balancing-Endpoint-Weight , to specify the per-instance weights. Load balancing decisions are made based on the per-instance weights reported in the last processed health check replies, as long as every instance reports a valid weight or reports UNAVAILABLE_WEIGHT . Otherwise, load balancing will remain equal-weight.

    WEIGHTED_MAGLEV is supported only for External passthrough Network Load Balancers. For an example, see Set up weighted load balancing for external passthrough Network Load Balancers .

Configuring a load balancing locality policy is supported only on backend services used with the following load balancers:

  • Global external Application Load Balancer
  • Regional external Application Load Balancer
  • Cross-region internal Application Load Balancer
  • Regional internal Application Load Balancer
  • External passthrough Network Load Balancer

Note that the effective default value of the load balancing locality policy ( localityLbPolicy ) changes according to your session affinity settings. If session affinity is not configured—that is, if session affinity remains at the default value of NONE —then the default value for localityLbPolicy is ROUND_ROBIN . If session affinity is set to a value other than NONE , then the default value for localityLbPolicy is MAGLEV .

To configure a load balancing locality policy, you can use the Google Cloud console, gcloud ( --locality-lb-policy ) or the API ( localityLbPolicy ).

Cloud Service Mesh and traffic distribution

Cloud Service Mesh also uses backend service resources. Specifically, Cloud Service Mesh uses backend services whose load balancing scheme is INTERNAL_SELF_MANAGED . For an internal self-managed backend service, traffic distribution is based on the combination of a load balancing mode and a load balancing policy . The backend service directs traffic to a backend according to the backend's balancing mode. Then Cloud Service Mesh distributes traffic according to a load balancing policy.

Internal self-managed backend services support the following balancing modes:

  • UTILIZATION , if all the backends are instance groups
  • RATE , if all the backends are either instance groups or zonal NEGs

If you choose RATE balancing mode, you must specify a maximum rate, maximum rate per instance, or maximum rate per endpoint.

For more information about Cloud Service Mesh, see Cloud Service Mesh concepts .

Backend subsetting

Backend subsetting is an optional feature that improves performance and scalability by assigning a subset of backends to each of the proxy instances.

Backend subsetting is supported for the following:

  • Regional internal Application Load Balancer
  • Internal passthrough Network Load Balancer

Backend subsetting for regional internal Application Load Balancers

The cross-region internal Application Load Balancer doesn't support backend subsetting.

For regional internal Application Load Balancers, backend subsetting automatically assigns only a subset of the backends within the regional backend service to each proxy instance. By default, each proxy instance opens connections to all the backends within a backend service. When the number of proxy instances and the backends are both large, opening connections to all the backends can lead to performance issues.

By enabling subsetting, each proxy only opens connections to a subset of the backends, reducing the number of connections which are kept open to each backend. Reducing the number of simultaneously open connections to each backend can improve performance for both the backends and the proxies.

The following diagram shows a load balancer with two proxies. Without backend subsetting, traffic from both proxies is distributed to all the backends in the backend service 1. With backend subsetting enabled, traffic from each proxy is distributed to a subset of the backends. Traffic from proxy 1 is distributed to backends 1 and 2, and traffic from proxy 2 is distributed to backends 3 and 4.

Comparing internal Application Load Balancer without and with backend subsetting.
Comparing internal Application Load Balancer without and with backend subsetting (click to enlarge).

You can additionally refine the load balancing traffic to the backends by setting the localityLbPolicy policy. For more information, see Traffic policies .

To read about setting up backend subsetting for internal Application Load Balancers, see Configure backend subsetting .

Caveats related to backend subsetting for internal Application Load Balancer
  • Although backend subsetting is designed to ensure that all backend instances remain well utilized, it can introduce some bias in the amount of traffic that each backend receives. Setting the localityLbPolicy to LEAST_REQUEST is recommended for backend services that are sensitive to the balance of backend load.
  • Enabling and then disabling subsetting breaks existing connections.
  • Backend subsetting requires that the session affinity is NONE (a 5-tuple hash). Other session affinity options can only be used if backend subsetting is disabled. The default values of the --subsetting-policy and --session-affinity flags are both NONE , and only one of them at a time can be set to a different value.

Backend subsetting for internal passthrough Network Load Balancer

Backend subsetting for internal passthrough Network Load Balancers lets you scale your internal passthrough Network Load Balancer to support a larger number of backend VM instances per internal backend service.

For information about how subsetting affects this limit, see the "Backend services" section of Load balancing resource quotas and limits .

By default, subsetting is disabled, which limits the backend service to distributing to up to 250 backend instances or endpoints. If your backend service needs to support more than 250 backends, you can enable subsetting. When subsetting is enabled, a subset of backend instances is selected for each client connection.

The following diagram shows a scaled-down model of the difference between these two modes of operation.

Comparing an internal passthrough Network Load Balancer without and with subsetting.
Comparing an internal passthrough Network Load Balancer without and with subsetting (click to enlarge).

Without subsetting, the complete set of healthy backends is better utilized, and new client connections are distributed among all healthy backends according to traffic distribution . Subsetting imposes load balancing restrictions but allows the load balancer to support more than 250 backends.

For configuration instructions, see Subsetting .

Caveats related to backend subsetting for internal passthrough Network Load Balancer
  • When subsetting is enabled, not all backends will receive traffic from a given sender even when the number of backends is small.
  • For the maximum number of backend instances when subsetting is enabled, see the quotas page .
  • Only 5-tuple session affinity is supported with subsetting.
  • Packet Mirroring is not supported with subsetting.
  • Enabling and then disabling subsetting breaks existing connections.
  • If on-premises clients need for to access an internal passthrough Network Load Balancer, subsetting can substantially reduce the number of backends that receive connections from your on-premises clients. This is because the region of the Cloud VPN tunnel or Cloud Interconnect VLAN attachment determines the subset of the load balancer's backends. All Cloud VPN and Cloud Interconnect endpoints in a specific region use the same subset. Different subsets are used in different regions.

Backend subsetting pricing

There is no charge for using backend subsetting. For more information, see All networking pricing .

Session affinity

Session affinity lets you control how the load balancer selects backends for new connections in a predictable way as long as the number of healthy backends remains constant. This is useful for applications that need multiple requests from a given user to be directed to the same backend or endpoint. Such applications usually include stateful servers used by ads serving, games, or services with heavy internal caching.

Google Cloud load balancers provide session affinity on a best-effort basis. Factors such as changing backend health check states, adding or removing backends, changes in backend weights (including enabling or disabling weighted balancing), or changes to backend fullness, as measured by the balancing mode, can break session affinity.

Load balancing with session affinity works well when there is a reasonably large distribution of unique connections. Reasonably large means at least several times the number of backends. Testing a load balancer with a small number of connections won't result in an accurate representation of the distribution of client connections among backends.

By default, all Google Cloud load balancers select backends by using a five-tuple hash ( --session-affinity=NONE ), as follows:

  • Packet's source IP address
  • Packet's source port (if present in the packet's header)
  • Packet's destination IP address
  • Packet's destination port (if present in the packet's header)
  • Packet's protocol

For pass-through load balancers, new connections are distributed to healthy backend instances or endpoints (in the active pool, if a failover policy is configured). You can control the following:

For proxy-based load balancers, as long as the number of healthy backend instances or endpoints remains constant, and as long as the previously selected backend instance or endpoint is not at capacity, subsequent requests or connections go to the same backend VM or endpoint. The target capacity of the balancing mode determines when the backend is at capacity.

The following table shows the session affinity options supported for each product:

Table: Supported session affinity settings
Product
Session affinity options
  • None ( NONE )
  • Client IP ( CLIENT_IP )
  • Generated cookie ( GENERATED_COOKIE )
  • Header field ( HEADER_FIELD )
  • HTTP cookie ( HTTP_COOKIE )
  • Stateful cookie-based affinity ( STRONG_COOKIE_AFFINITY )

Also note:

  • The effective default value of the load balancing locality policy ( localityLbPolicy ) changes according to your session affinity settings. If session affinity is not configured—that is, if session affinity remains at the default value of NONE —then the default value for localityLbPolicy is ROUND_ROBIN . If session affinity is set to a value other than NONE , then the default value for localityLbPolicy is MAGLEV .
  • For the global external Application Load Balancer, don't configure session affinity if you're using weighted traffic splitting. If you do, the weighted traffic splitting configuration takes precedence.
  • None ( NONE )
  • Client IP ( CLIENT_IP )
  • Generated cookie ( GENERATED_COOKIE )
  • None ( NONE )
  • Client IP ( CLIENT_IP )
  • Generated cookie ( GENERATED_COOKIE )
  • Header field ( HEADER_FIELD )
  • HTTP cookie ( HTTP_COOKIE )
  • Stateful cookie-based affinity ( STRONG_COOKIE_AFFINITY )

Also note:

  • The effective default value of the load balancing locality policy ( localityLbPolicy ) changes according to your session affinity settings. If session affinity is not configured—that is, if session affinity remains at the default value of NONE —then the default value for localityLbPolicy is ROUND_ROBIN . If session affinity is set to a value other than NONE , then the default value for localityLbPolicy is MAGLEV .
  • For the internal Application Load Balancer, don't configure session affinity if you're using weighted traffic splitting. If you do, the weighted traffic splitting configuration takes precedence.
  • None ( NONE )
  • CLIENT IP, no destination ( CLIENT_IP_NO_DESTINATION )
  • Client IP, Destination IP ( CLIENT_IP )
  • Client IP, Destination IP, Protocol ( CLIENT_IP_PROTO )
  • Client IP, Client Port, Destination IP, Destination Port, Protocol ( CLIENT_IP_PORT_PROTO )

For specific information about the internal passthrough Network Load Balancer and session affinity, see the Internal passthrough Network Load Balancer overview .

  • None ( NONE )
  • Client IP, Destination IP ( CLIENT_IP )
  • Client IP, Destination IP, Protocol ( CLIENT_IP_PROTO )
  • Client IP, Client Port, Destination IP, Destination Port, Protocol ( CLIENT_IP_PORT_PROTO )

For specific information about the external passthrough Network Load Balancer and session affinity, see the External TCP/UDP External passthrough Network Load Balancer overview .

  • Global external proxy Network Load Balancer
  • Classic proxy Network Load Balancer
  • Regional external proxy Network Load Balancer
  • Regional internal proxy Network Load Balancer
  • Cross-region internal proxy Network Load Balancer
  • None ( NONE )
  • Client IP ( CLIENT_IP )
  • None ( NONE )
  • Client IP ( CLIENT_IP )
  • Generated cookie ( GENERATED_COOKIE ) (HTTP protocols only)
  • Header field ( HEADER_FIELD ) (HTTP protocols only)
  • HTTP cookie ( HTTP_COOKIE ) (HTTP protocols only)

* This table documents session affinities supported by backend service-based external passthrough Network Load Balancers . Target pool-based external passthrough Network Load Balancers don't use backend services. Instead, you set session affinity for external passthrough Network Load Balancers through the sessionAffinity parameter in Target Pools .

Keep the following in mind when configuring session affinity:

  • Don't rely on session affinity for authentication or security purposes. Session affinity, except for stateful cookie-based session affinity , is designed to break whenever the number of serving and healthy backends changes. For more details, see Losing session affinity .

  • The default values of the --session-affinity and --subsetting-policy flags are both NONE , and only one of them at a time can be set to a different value.

Types of session affinity

The following sections discuss the different types of session affinity:

Client IP, no destination affinity

Client IP, no destination session affinity ( CLIENT_IP_NO_DESTINATION ) is a one-tuple hash based on just the source IP address of each received packet. This session affinity is only available for internal passthrough Network Load Balancers.

This option can be useful in situations where you need the same backend VM to process all packets from a client, based solely on the source IP address of the packet, without respect to the packet destination IP address. These situations usually arise when an internal passthrough Network Load Balancer is a next hop for a static route. For details, see Session affinity and next hop internal passthrough Network Load Balancers .

Client IP affinity

Client IP session affinity ( CLIENT_IP ) is a two-tuple hash created from the source and destination IP addresses of the packet. Client IP session affinity is available for all Google Cloud load balancers that use backend services. External passthrough Network Load Balancers call this session affinity option Client IP, Destination IP .

When you use client IP affinity, keep the following in mind:

  • The packet destination IP address is only the same as the load balancer forwarding rule's IP address if the packet is sent directly to the load balancer.

  • Packets that are routed to a next hop internal passthrough Network Load Balancer by a static route have destination IP addresses that don't match the load balancer forwarding rule's IP address. For important details, see Session affinity and next hop internal passthrough Network Load Balancers .

  • The packet source IP address might not match an IP address associated with the original client if the packet is processed by an intermediate NAT or proxy system before being delivered to a Google Cloud load balancer. In situations where many clients share the same effective source IP address, some backend VMs might receive more connections or requests than others.

When you use generated cookie-based affinity, the load balancer includes an HTTP cookie in the Set-Cookie header in response to the initial HTTP request.

The name of the generated cookie varies depending on the type of the load balancer. The following products support generated cookies:

Product Cookie name
Global external Application Load Balancers GCLB
Classic Application Load Balancers GCLB
Regional external Application Load Balancers GCILB
Cross-region internal Application Load Balancers GCILB
Regional internal Application Load Balancers GCILB
Cloud Service Mesh GCILB

The generated cookie's path attribute is always a forward slash ( / ), so it applies to all backend services on the same URL map, provided that the other backend services also use generated cookie affinity.

You can configure the cookie's time to live (TTL) value between 0 and 1,209,600 seconds (inclusive) by using the affinityCookieTtlSec backend service parameter. If affinityCookieTtlSec isn't specified, the default TTL value is 0 .

When the client includes the generated session affinity cookie in the Cookie request header of HTTP requests, the load balancer directs those requests to the same backend instance or endpoint, as long as the session affinity cookie remains valid. This is done by mapping the cookie value to an index that references a specific backend instance or an endpoint, and by making sure that the generated cookie session affinity requirements are met.

To use generated cookie affinity, configure the following balancing mode and localityLbPolicy settings:

  • For backend instance groups, use the RATE balancing mode.
  • For the localityLbPolicy of the backend service, use either RING_HASH or MAGLEV . If you don't explicitly set the localityLbPolicy , the load balancer uses MAGLEV as an implied default.

For more information, see losing session affinity .

Header field affinity

With header field affinity, requests are routed to the backends based on the value of the HTTP header in the consistentHash.httpHeaderName field of the backend service. To distribute requests across all available backends, each client needs to use a different HTTP header value.

The following load balancers use header field affinity:

  • Cloud Service Mesh
  • Cross-region internal Application Load Balancer
  • Global external Application Load Balancer
  • Regional external Application Load Balancer
  • Regional internal Application Load Balancer

Header field affinity is supported when the following conditions are true:

  • The load balancing locality policy is RING_HASH or MAGLEV.
  • The backend service's consistentHash specifies the name of the HTTP header ( httpHeaderName ).

To learn which products support header field affinity, refer the Table: Supported session affinity settings .

When you use HTTP cookie-based affinity, the load balancer includes an HTTP cookie in the Set-Cookie header in response to the initial HTTP request. You specify the name, path, and time to live (TTL) for the cookie.

The following products support HTTP cookie-based affinity:

  • All Application Load Balancers
  • Cloud Service Mesh

You can configure the cookie's TTL values using seconds, fractions of a second (as nanoseconds), or both seconds plus fractions of a second (as nanoseconds) using the following backend service parameters and valid values:

  • consistentHash.httpCookie.ttl.seconds can be set to a value between 0 and 315576000000 (inclusive).
  • consistentHash.httpCookie.ttl.nanos can be set to a value between 0 and 999999999 (inclusive). Because the units are nanoseconds, 999999999 means .999999999 seconds.

If both consistentHash.httpCookie.ttl.seconds and consistentHash.httpCookie.ttl.nanos aren't specified, the value of the affinityCookieTtlSec backend service parameter is used instead. If affinityCookieTtlSec isn't specified, the default TTL value is 0 .

When the client includes the HTTP session affinity cookie in the Cookie request header of HTTP requests, the load balancer directs those requests to the same backend instance or endpoint, as long as the session affinity cookie remains valid. This is done by mapping the cookie value to an index that references a specific backend instance or an endpoint, and by making sure that the generated cookie session affinity requirements are met.

To use HTTP cookie affinity, configure the following balancing mode and localityLbPolicy settings:

  • For backend instance groups, use the RATE balancing mode.
  • For the localityLbPolicy of the backend service, use either RING_HASH or MAGLEV . If you don't explicitly set the localityLbPolicy , the load balancer uses MAGLEV as an implied default.

For more information, see losing session affinity .

Stateful cookie-based session affinity

When you use stateful cookie-based affinity, the load balancer includes an HTTP cookie in the Set-Cookie header in response to the initial HTTP request. You specify the name, path, and time to live (TTL) for the cookie.

Setting the path field is not supported for cross-region internal Application Load Balancers.

All Application Load Balancers, except for classic Application Load Balancers, support stateful cookie-based affinity.

You can configure the cookie's TTL values using seconds, fractions of a second (as nanoseconds), or both seconds plus fractions of a second (as nanoseconds) using the following backend service parameters and valid values:

  • strongSessionAffinityCookie.ttl.seconds can be set to a value between 0 and 315576000000 (inclusive).
  • strongSessionAffinityCookie.ttl.nanos can be set to a value between 0 and 999999999 (inclusive). Because the units are nanoseconds, 999999999 means .999999999 seconds.

The value of the cookie identifies a selected backend instance or endpoint by encoding the selected instance or endpoint in the value itself. For as long as the cookie is valid, if the client includes the session affinity cookie in the Cookie request header of subsequent HTTP requests, the load balancer directs those requests to selected backend instance or endpoint.

Unlike other session affinity methods:

  • Stateful cookie-based affinity has no specific requirements for the balancing mode or for the load balancing locality policy ( localityLbPolicy ).

  • Stateful cookie-based affinity is not affected when autoscaling adds a new instance to a managed instance group.

  • Stateful cookie-based affinity is not affected when autoscaling removes an instance from a managed instance group unless the selected instance is removed.

  • Stateful cookie-based affinity is not affected when autohealing removes an instance from a managed instance group unless the selected instance is removed.

For more information, see losing session affinity .

Meaning of zero TTL for cookie-based affinities

All cookie-based session affinities, such as generated cookie affinity, HTTP cookie affinity, and stateful cookie-based affinity, have a TTL attribute.

A TTL of zero seconds means the load balancer does not assign an Expires attribute to the cookie. In this case, the client treats the cookie as a session cookie. The definition of a session varies depending on the client:

  • Some clients, like web browsers, retain the cookie for the entire browsing session. This means that the cookie persists across multiple requests until the application is closed.

  • Other clients treat a session as a single HTTP request, discarding the cookie immediately after.

Losing session affinity

All session affinity options for Application Load Balancers and Proxy Network Load Balancers require the following:

  • The selected backend instance or endpoint must remain configured as a backend. Session affinity can break when one of the following events occurs:

    • You remove the selected instance from its instance group.

    • Managed instance group autoscaling or autohealing removes the selected instance from its managed instance group.

    • You remove the selected endpoint from its NEG.

    • You remove the instance group or NEG that contains the selected instance or endpoint from the backend service.

  • The selected backend instance or endpoint must remain healthy. Session affinity can break when the selected instance or endpoint fails health checks.

  • For Global external Application Load Balancers, Classic Application Load Balancers, Global external proxy Network Load Balancers, and Classic proxy Network Load Balancers, session affinity can break if a different first-layer Google Front End (GFE) is used for subsequent requests or connections after the change in routing path. A different first-layer GFE might be selected if the routing path from a client on the internet to Google changes between requests or connections.

Except for stateful cookie-based session affinity , all session affinity options for Application Load Balancers and Proxy Network Load Balancers have the following additional requirements:

  • The instance group or NEG that contains the selected instance or endpoint must not be full as defined by its target capacity . (For regional managed instance groups, the zonal component of the instance group that contains the selected instance must not be full.) Session affinity can break when the instance group or NEG is full and other instance groups or NEGs are not. Because fullness can change in unpredictable ways when using the UTILIZATION balancing mode, you should use the RATE or CONNECTION balancing mode to minimize situations when session affinity can break.

  • The total number of configured backend instances or endpoints must remain constant. When at least one of the following events occurs, the number of configured backend instances or endpoints changes, and session affinity can break:

    • Adding new instances or endpoints:

      • You add instances to an existing instance group on the backend service.
      • Managed instance group autoscaling adds instances to a managed instance group on the backend service.
      • You add endpoints to an existing NEG on the backend service.
      • You add non-empty instance groups or NEGs to the backend service.
    • Removing any instance or endpoint, not just the selected instance or endpoint :

      • You remove any instance from an instance group backend.
      • Managed instance group autoscaling or autohealing removes any instance from a managed instance group backend.
      • You remove any endpoint from a NEG backend.
      • You remove any existing, non-empty backend instance group or NEG from the backend service.
  • The total number of healthy backend instances or endpoints must remain constant. When at least one of the following events occurs, the number of healthy backend instances or endpoints changes, and session affinity can break:

    • Any instance or endpoint passes its health check, transitioning from unhealthy to healthy.
    • Any instance or endpoint fails its health check, transitioning from healthy to unhealthy or timeout.

Backend service timeout

Most Google Cloud load balancers have a backend service timeout . The default value is 30 seconds. The full range of timeout values allowed is 1 - 2,147,483,647 seconds.

  • For external Application Load Balancers and internal Application Load Balancersusing the HTTP, HTTPS, or HTTP/2 protocol, the backend service timeout is a request and response timeout for HTTP(S) traffic.

    For more details about the backend service timeout for each load balancer, see the following:

  • For external proxy Network Load Balancers,the timeout is an idle timeout. To allow more or less time before the connection is deleted, change the timeout value. This idle timeout is also used for WebSocket connections.

  • For internal passthrough Network Load Balancers and external passthrough Network Load Balancers,you can set the value of the backend service timeout using gcloud or the API, but the value is ignored. Backend service timeout has no meaning for these pass-through load balancers.

  • For Cloud Service Mesh, the backend service timeout field (specified using timeoutSec ) is not supported with proxyless gRPC services. For such services, configure the backend service timeout using the maxStreamDuration field. This is because gRPC does not support the semantics of timeoutSec that specifies the amount of time to wait for a backend to return a full response after the request is sent. gRPC's timeout specifies the amount of time to wait from the beginning of the stream until the response has been completely processed, including all retries.

Health checks

Each backend service whose backends are instance groups or zonal NEGs must have an associated health check . Backend services using a serverless NEG or a global internet NEG as a backend must not reference a health check.

When you create a load balancer using the Google Cloud console, you can create the health check, if it is required, when you create the load balancer, or you can reference an existing health check.

When you create a backend service using either instance group or zonal NEG backends using the Google Cloud CLI or the API, you must reference an existing health check. Refer to the load balancer guide in the Health Checks Overview for details about the type and scope of health check required.

For more information, read the following documents:

Additional features enabled on the backend service resource

The following optional features are supported by some backend services.

Cloud CDN

Cloud CDN uses Google's global edge network to serve content closer to users, which accelerates your websites and applications. Cloud CDN is enabled on backend services used by global external Application Load Balancers . The load balancer provides the frontend IP addresses and ports that receive requests, and the backends that respond to the requests.

For more details, see the Cloud CDN documentation .

Cloud CDN is incompatible with IAP. They can't be enabled on the same backend service.

Google Cloud Armor

If you use one of the following load balancers, you can add additional protection to your applications by enabling Google Cloud Armor on the backend service during load balancer creation:

If you use the Google Cloud console, you can do one of the following:

  • Select an existing Google Cloud Armor security policy .
  • Accept the configuration of a default Google Cloud Armor rate-limiting security policy with a customizable name, request count, interval, key, and rate limiting parameters. If you use Google Cloud Armor with an upstream proxy service, such as a CDN provider, Enforce_on_key should be set as an XFF IP address.
  • Choose to opt out of Google Cloud Armor protection by selecting None.

IAP

IAP lets you establish a central authorization layer for applications accessed by HTTPS, so you can use an application-level access control model instead of relying on network-level firewalls. IAP is supported by certain Application Load Balancers .

IAP is incompatible with Cloud CDN. They can't be enabled on the same backend service.

Advanced traffic management features

To learn about advanced traffic management features that are configured on the backend services and URL maps associated with load balancers, see the following:

API and gcloud reference

For more information about the properties of the backend service resource, see the following references:

What's next

For related documentation and information about how backend services are used in load balancing, review the following:

For related videos: