Private Service Connect compatibility
Services
You can access the following services by using Private Service Connect.
Google published services
Third-party published services
Self-managed published services
- Create an endpoint to access the published service
- Create a backend to access the published service
LoadBalancer
service and publish the service through a ServiceAttachment
- Create an endpoint to access the published service
- Create a backend to access the published service
Choose one of the following:
-
run.app
URL: you don't need additional configuration -
cloudfunctions.net
URL (for Cloud Run functions only): you don't need additional configuration - Published service: Route requests to your service through a load balancer with a Serverless NEG and publish the service
Choose the consumer option that corresponds with the service producer configuration:
-
cloudfunctions.net
andrun.app
URLs: Create an endpoint to access those URLs -
Published service:
- Create an endpoint to access the published service
- Create a backend to access the published service
cloudfunctions.net
URL: you don't need additional
configurationGlobal Google APIs
Endpoints can target a bundle of global Google APIs or a single regional Google API. Backends can target a single global Google API or a single regional Google API.
Bundles of global Google APIs
You can use Private Service Connect endpoints to send traffic to a bundle of Google APIs.
When you create an endpoint to access
Google APIs and services, you choose which bundle of APIs you need
access to— All APIs( all-apis
) or VPC-SC( vpc-sc
):
-
The
all-apis
bundle provides access to most Google APIs and services, including all*.googleapis.com
service endpoints. -
The
vpc-sc
bundle provides access to APIs and services that support VPC Service Controls.
The API bundles support only HTTP-based protocols over TCP (HTTP, HTTPS, and HTTP/2). All other protocols, including MQTT and ICMP are not supported.
all-apis
Enables API access to most Google APIs and services regardless of whether they are supported by VPC Service Controls. Includes API access to Google Maps, Google Ads, Google Cloud, and most other Google APIs, including the lists below. Does not support Google Workspace web applications such as Gmail and Google Docs. Does not support any interactive websites.
Domain names that match:
-
accounts.google.com
(only supports paths needed for OAuth authentication of service accounts; user account authentication is interactive and not supported) -
*.aiplatform-notebook.cloud.google.com
-
*.aiplatform-notebook.googleusercontent.com
-
appengine.google.com
-
*.appspot.com
-
*.backupdr.cloud.google.com
-
backupdr.cloud.google.com
-
*.backupdr.googleusercontent.com
-
backupdr.googleusercontent.com
-
*.cloudfunctions.net
-
*.cloudproxy.app
-
*.composer.cloud.google.com
-
*.composer.googleusercontent.com
-
*.datafusion.cloud.google.com
-
*.datafusion.googleusercontent.com
-
*.dataproc.cloud.google.com
-
dataproc.cloud.google.com
-
*.dataproc.googleusercontent.com
-
dataproc.googleusercontent.com
-
dl.google.com
-
gcr.io
or*.gcr.io
-
*.googleapis.com
-
*.gke.goog
-
*.gstatic.com
-
*.kernels.googleusercontent.com
-
*.ltsapis.goog
-
*.notebooks.cloud.google.com
-
*.notebooks.googleusercontent.com
-
packages.cloud.google.com
-
pkg.dev
or*.pkg.dev
-
pki.goog
or*.pki.goog
-
*.run.app
-
source.developers.google.com
-
storage.cloud.google.com
Choose all-apis
under these circumstances:
- You don't use VPC Service Controls.
- You do use VPC Service Controls, but you also need to access Google APIs and services that are not supported by VPC Service Controls. 1
vpc-sc
Enables API access to Google APIs and services that are supported by VPC Service Controls .
Blocks access to Google APIs and services that do not support VPC Service Controls . Does not support Google Workspace APIs or Google Workspace web applications such as Gmail and Google Docs.
Choose vpc-sc
when you only
need access to Google APIs and services that are
supported by
VPC Service Controls. The vpc-sc
bundle does not permit
access to Google APIs and services that do not support VPC Service Controls. 1
vpc-sc
, as it provides additional risk mitigation for data
exfiltration. Using vpc-sc
denies access to
Google APIs and services that are not supported by VPC Service Controls. See Setting up private
connectivity
in the VPC Service Controls documentation for more details.Single global Google API
You can use Private Service Connect backends to send requests to a single supported global Google API. The following APIs are supported:
- Bigtable
:
bigtable.googleapis.com
andbigtableadmin.googleapis.com
- Cloud Logging
:
logging.googleapis.com
- Spanner
:
spanner.googleapis.com
- Cloud Storage
:
storage.googleapis.com
- Pub/Sub
:
pubsub.googleapis.com
Regional Google APIs
You can use endpoints or backends to access regional Google APIs. For a list of supported regional Google APIs, see Regional service endpoints .
Types
The following tables summarize compatibility information for different Private Service Connect configurations.
In the following tables, a checkmark indicates that a feature is supported, and a no symbol indicates that a feature isn't supported.
Endpoints and published services
This section summarizes the configuration options that are available for consumers and producers when using endpoints to access published services.
Consumer configuration
This table summarizes the supported configuration options and capabilities of endpoints that access published services based on target producer type.
- IPv4 services
- IPv4 services
- IPv6 services
- IPv4 services
- IPv4 services
- IPv6 services
- IPv4 services
- IPv4 services
- IPv6 services
- IPv4 services
- IPv4 services
- IPv4 services
- IPv4 services
Endpoints that access a published service have the following limitations:
-
You can't create an endpoint in the same VPC network as the published service that you are accessing.
-
Packet Mirroring can't mirror packets for Private Service Connect published services traffic.
-
Not all static routes with load balancer next hops are supported with Private Service Connect. For more information, see Static routes with load balancer next hops .
-
Connectivity Tests can't test connectivity between an IPv6 endpoint and a published service.
Producer configuration
This table summarizes the supported configuration options and capabilities of published services that are accessed by endpoints .
- GCE_VM_IP_PORT zonal NEGs
- Hybrid NEGs
- Serverless NEGs
- Private Service Connect NEGs
- Instance groups
- IPv4
- GCE_VM_IP_PORT zonal NEGs
- Hybrid NEGs
- Serverless NEGs
- Private Service Connect NEGs
- Instance groups
- IPv4
- GCE_VM_IP_PORT zonal NEGs
- Hybrid NEGs
- Private Service Connect NEGs
- Instance groups
- IPv4
Published services have the following limitations:
- Load balancers that are configured with multiple protocols
—protocol set to
L3_DEFAULT
—are not supported. - Packet Mirroring can't mirror packets for Private Service Connect published services traffic.
- You must use the Google Cloud CLI or the API to create a service attachment that points to a forwarding rule that is used for internal protocol forwarding .
For issues and workarounds, see Known issues .
Different load balancers support different port configurations; some load balancers support a single port, some support a range of ports, and some support all ports. For more information, see Port specifications .
Backends and published services
A Private Service Connect backend for published services requires two load balancers—a consumer load balancer and a producer load balancer. This section summarizes the configuration options that are available for consumers and producers when using backends to access published services.
Consumer configuration
This table describes the consumer load balancers that are supported by Private Service Connect backends for published services, including which backend service protocols can be used with each consumer load balancer. The consumer load balancers can access published services that are hosted on supported producer load balancers .
Global external Application Load Balancer (supports multiple regions)
Note: Classic Application Load Balancer is not supported.
- HTTP
- HTTPS
- HTTP2
Global external proxy Network Load Balancer
To associate this load balancer with a Private Service Connect NEG, use the Google Cloud CLI or send an API request.
Note: Classic proxy Network Load Balancer is not supported.
- TCP/SSL
Producer configuration
This table describes the configuration for producer load balancers that are supported by Private Service Connect backends for published services.
- GCE_VM_IP_PORT zonal NEGs
- Hybrid NEGs
- Serverless NEGs
- Private Service Connect NEGs
- Instance groups
- TCP
- HTTP
- HTTPS
- HTTP/2
- gRPC
- GCE_VM_IP zonal NEGs
- Instance groups
- TCP
- GCE_VM_IP_PORT zonal NEGs
- Hybrid NEGs
- Serverless NEGs
- Private Service Connect NEGs
- Instance groups
- HTTP
- HTTPS
- HTTP/2
- GCE_VM_IP_PORT zonal NEGs
- Hybrid NEGs
- Private Service Connect NEGs
- Instance groups
- TCP
Published services have the following limitations:
- Load balancers that are configured with multiple protocols
—protocol set to
L3_DEFAULT
—are not supported. - Packet Mirroring can't mirror packets for Private Service Connect published services traffic.
- You must use the Google Cloud CLI or the API to create a service attachment that points to a forwarding rule that is used for internal protocol forwarding .
For issues and workarounds, see Known issues .
For an example backend configuration that uses a global external Application Load Balancer, see Access published services through backends .
To publish a service, see Publish services .
Endpoints and global Google APIs
This table summarizes the features that are supported by endpoints used to access Google APIs .
To create this configuration, see Access Google APIs through endpoints .
Backends and global Google APIs
This table describes which load balancers can use a Private Service Connect backend to a global Google API.
-
Global external Application Load Balancer
Note: Classic Application Load Balancer is not supported.
-
Cross-region internal Application Load Balancer
- Bigtable
:
bigtable.googleapis.com
andbigtableadmin.googleapis.com
- Cloud Logging
:
logging.googleapis.com
- Spanner
:
spanner.googleapis.com
- Cloud Storage
:
storage.googleapis.com
- Pub/Sub
:
pubsub.googleapis.com
Endpoints and regional Google APIs
This table summarizes the features that are supported by endpoints used to access regional Google APIs .
Backends and regional Google APIs
This table describes which load balancers can use a Private Service Connect backend to access regional Google APIs.
For an example backend configuration that uses an internal Application Load Balancer, see Access regional Google APIs through backends .
-
Internal Application Load Balancer
Protocols: HTTPS
-
Regional external Application Load Balancer
Protocols: HTTPS
What's next
- Learn about accessing published services through endpoints .
- Learn about accessing global Google APIs through endpoints .
- Learn about accessing regional Google APIs through endpoints .
- Learn about backends .
- Learn about publishing services .