-
Overview
- An internet network endpoint group (NEG) can be used as the backend for a backend service
- This is appropriate when serving content from an origin that is hosted outside of Google Cloud, with the Google Cloud external HTTP(S) load balancer as the frontend
- This enables the use of Google Edge infrastructure for terminating user connections
- Using Cloud CDN for a custom origin delivers traffic to a public endpoint across Google's private backbone
- This improves reliability and can decrease latency between client and server
- The terms "custom origin," "external endpoint," and "internet endpoint" are interchangeable
- Internet NEG is used to refer to a resource that contains an internet endpoint
- Internet NEGs are global resources that are hosted within on-premises infrastructure or on infrastructure provided by third-party providers
- An internet NEG can be used as a backend in a backend service for an external HTTP(S) load balancer, and as the origin for Cloud CDN
-
Load balancing components and specifications
- An internet network endpoint group can be used in a load balancer using the Premium network service tier
- Because only one internet endpoint is allowed in each internet NEG, load balancing is not actually performed
- Load balancing modes, such as rate or utilization cannot be used
- The load balancer serves as the frontend only, and it proxies traffic to the specified internet endpoint
- The forwarding selection is based on a URL map
- For target HTTP(S) proxies, the backend service used is determined by checking the request host name and path in the URL map.
- HTTP(S) load balancers can have multiple backend services referenced from the URL map
- Each external HTTP(S) load balancer has its own global external forwarding rule to direct traffic to the appropriate target proxy object
- If the URL map sends the request to a backend service that contains an internet NEG, the backend service directs traffic to that internet NEG
-
Backend service
- An internet NEG is one type of backend supported by a backend service of an external HTTP(S) load balancer
- Google's global edge infrastructure can be used to terminate user requests in front of a custom origin
- When an internet NEG is added as a backend on a backend service, the backend service cannot also use zonal NEGs or instance groups as backends
- All backends on a backend service must be of the same type
- Only one internet NEG backend can be added to the same backend service
- Only one endpoint can be added to an internet NEG
- The backend service cannot reference a health check
- The backend service's load balancing scheme must be EXTERNAL and its protocol must be one of HTTP, HTTPS, or HTTP2
-
Health checks
- A backend service that uses an internet NEG as a backend does not support a health check
- Google Cloud does not provide health checking for any internet endpoint or custom origin
- If the internet endpoint becomes unreachable or if the configured hostname (FQDN) cannot be resolved, the external HTTP(S) load balancer returns an HTTP 502 (Bad Gateway) response to its clients
-
Limitations
- An internet endpoint with a FQDN defined must be resolvable by Google Public DNS
- An internet endpoint must be a publicly-routable IPv4 address or must resolve to an internet endpoint cannot be an RFC 1918 address
- It must be reachable over the internet
- The endpoint cannot be only reachable over Cloud VPN or Cloud Interconnect
- If the internet endpoint references a Google API or service, the service must be reachable via TCP port 80 or 443 using the HTTP, HTTPS or HTTP/2 protocol
- Only use internet NEGs on the Premium network service tier, which is the default tier
- Load balancing is currently not supported on internet endpoints – the requests are only proxied to the endpoint
- Google Edge infrastructure terminates the user connections and then directs the connections to the internet endpoint
- Internet NEGs can be used without Cloud CDN enabled
- With this configuration, multiple NEGs cannot be attached to the backend service
- The restriction of a single endpoint remains
- No health checking is performed for the internet NEG
-
Quota
- Users can configure as many NEGs with external network endpoints as permitted by your existing network endpoint group quota
-
Pricing
- Egress traffic to an internet NEG's endpoint (type INTERNET_FQDN_PORT or INTERNET_IP_PORT) is charged at internet egress rates for Premium Tier networking
- The source is based on the client location, and the destination is based on the location of the public endpoint