This document provides an overview of the different options for private
connectivity to Google and third-party APIs and services. By default, a virtual
machine (VM) that doesn't have an external IP address can't reach anything
outside of its VPC network, including Google APIs and services.
Google Cloud provides several options to provide private connectivity to
services through a VM's internal IP address. All Google Cloud APIs and
services support at least one of the following private access options:
Private Service Connect
Private Google Access
Private services access
VPC Network Peering
You can configure one or more of these options—the options operate
independently of each other.
VPC-hosted services might offer private connectivity through
Private Service Connect, private services access,
VPC Network Peering, or a combination of those options.
The following table describes the private access options for connecting to
Google APIs and services that are hosted in Google's production infrastructure:
Use this option to connect to supported services in another
VPC network through a consumer-managed load balancer.
You don't need to assign external IP addresses to your
Google Cloud resources.
Google Cloud VM instances with or without external IP
addresses.
Connect to services in another VPC network through an
endpoint.
Supports specific Google and third-party services. To find out
whether a service supports service connection policies, contact the
service provider.
Use this option to deploy a managed service instance and
configure connectivity through a service's administrative API or UI.
The service instance is deployed in a producer VPC network
that is connected to your VPC network through an endpoint.
You don't need to assign external IP addresses to your
Google Cloud resources.
Use this option to connect to specific Google and third-party services
without assigning external IP addresses to your Google Cloud and
Google or third-party resources.
Connect from serverless Google services to VPC networks
You can useDirect VPC egressto let Cloud Run, App Engine
standard, and Cloud Run functions environments send packets to the internal IPv4
addresses of resources in a VPC network. If Direct VPC egress
isn't an option for you, you can configure aServerless VPC Accessconnector instead. Both options also support sending packets to other networks
connected to the selected VPC network.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-10-27 UTC."],[],[]]