A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from http://cloud.google.com/api-gateway/docs/gateway-serverless-neg below:

Getting started with load balancing for API Gateway | API Gateway Documentation

Skip to main content

Stay organized with collections Save and categorize content based on your preferences.

Getting started with load balancing for API Gateway

Preview

This product or feature is subject to the "Pre-GA Offerings Terms" in the General Service Terms section of the Service Specific Terms. Pre-GA products and features are available "as is" and might have limited support. For more information, see the launch stage descriptions.

This tutorial shows you how to create a Global external Application Load Balancer to route requests to API Gateway. The configuration process follows the same steps used to configure global external Application Load Balancer integration with other serverless products such as Cloud Run, Cloud Run functions, and App Engine.

While a load balancer is not required for API Gateway to function, it does allow your gateway to take advantage of the benefits of a load balancer. For example, using a global external Application Load Balancer with API Gateway lets you:

Before you begin
  1. If you have not already done so, download and install the Google Cloud CLI.

    Download the gcloud CLI

  2. Update gcloudcomponents:

    gcloud components update
  3. Follow the API Gateway Quickstart to deploy a Cloud Run service and create a gateway that points to that service.

  4. Configure permissions.

  5. Add an SSL certificate resource.

Deploy a Cloud Run service and API Gateway instance

In this tutorial, you will deploy a "hello-world" service to Cloud Run, create a gateway that routes to the Cloud Run service, and configure a global external Application Load Balancer to route requests to a custom domain.

Although this tutorial uses Cloud Run as the backend service for API Gateway, these steps also apply to any backend services API Gateway supports.

Upon successful completion of the API Gateway quickstart, you should have a deployed gateway URL that points to the Cloud Run service.

Configure permissions

In this tutorial, you will create a serverless network endpoint group (NEG) and create a global external Application Load Balancer in a Cloud project. This requires either a project owner or editor role, or the following Compute Engine IAM roles:

Create an SSL certificate resource

To create a global external Application Load Balancer, an SSL certificate resource must be added to the load balancer's frontend. Create an SSL certificate resource using either a Google-managed SSL certificate or a self-managed SSL certificate.

Warning: Don't use a self-signed certificate for production purposes.

This tutorial assumes that you have already created an SSL certificate resource.

If you want to test this process without creating an SSL certificate resource (or a domain as required by Google-managed certificates), you can still use the instructions on this page to set up an HTTP load balancer instead.

Create the global external Application Load Balancer
  1. Create a serverless NEG for API Gateway.

    A network endpoint group (NEG) specifies a group of backend endpoints for a load balancer. A serverless NEG is a backend that points to a service like API Gateway, as shown in the following figure:

    To create a serverless NEG for your gateway, run the following command, where:

    gcloud beta compute network-endpoint-groups create SERVERLESS_NEG_NAME \
      --region=REGION_ID \
      --network-endpoint-type=serverless \
      --serverless-deployment-platform=apigateway.googleapis.com \
      --serverless-deployment-resource=GATEWAY_ID

    For example:

    gcloud beta compute network-endpoint-groups create api-gateway-serverless-neg \
      --region=us-central1 \
      --network-endpoint-type=serverless \
      --serverless-deployment-platform=apigateway.googleapis.com \
      --serverless-deployment-resource=my-gateway
  2. Create a backend service to define how the global external Application Load Balancer distributes traffic.

    The backend service configuration contains a set of values, such as the protocol used to connect to backends, various distribution and session settings, health checks, and timeouts, as shown in the following figure:

    To create a backend service, run the following command:

    gcloud compute backend-services create BACKEND_SERVICE_NAME --global

    where BACKEND_SERVICE_NAME is the name of your new backend service.

    For example:

    gcloud compute backend-services create api-gateway-backend-service --global

    To add your serverless NEG as a backend to the backend service, run the following command, where:

    gcloud compute backend-services add-backend BACKEND_SERVICE_NAME \
      --global \
      --network-endpoint-group=SERVERLESS_NEG_NAME \
      --network-endpoint-group-region=REGION_ID

    For example:

    gcloud compute backend-services add-backend api-gateway-backend-service \
      --global \
      --network-endpoint-group=api-gateway-serverless-neg \
      --network-endpoint-group-region=us-central1
  3. Create a URL map to route incoming requests to the backend service, as shown in the figure below:

    To create the URL map, run the following command, where:

    gcloud compute url-maps create URL_MAP_NAME \
      --default-service BACKEND_SERVICE_NAME

    For example:

    gcloud compute url-maps create api-gateway-url-map \
      --default-service api-gateway-backend-service

    This example URL map only targets one backend service representing a single gateway, so host rules or path matchers are not required. If you have more than one backend service, you can use host rules to direct requests to different services based on the hostname. Use path matchers to direct requests to different services based on the request path.

    For example:

    gcloud compute url-maps add-path-matcher api-gateway-url-map \
      --path-matcher-name=my-pm2  \
      --default-service=my-host-default-backend \
      --path-rules="/video=video-service,/video/*=video-service" \
      --new-hosts my-hosts.com
    gcloud compute url-maps add-host-rule api-gateway-url-map \
      --hosts=my-app-domain \
      --path-matcher-name=my-app-path-matcher

    To learn more about host rules and path matchers, see the URL Map documentation.

  4. Create an SSL certificate for your target proxy, as shown in the figure below:

    To create a global external Application Load Balancer, an SSL certificate resource is required for the HTTP(S) target proxy. You can create an SSL certificate resource using either a Google-managed SSL certificate or a self-managed SSL certificate. Using Google-managed certificates is recommended. If you are testing this process without an SSL certificate resource and want to set up an HTTP load balancer, you can skip this step.

    To create a Google-managed certificate, you must have a domain. If you don't have a domain, you can use a self-signed SSL certificate for testing.

    To create a Google-managed SSL certificate resource:

    gcloud compute ssl-certificates create SSL_CERTIFICATE_NAME \
      --domains DOMAIN

    To create a self-managed SSL certificate resource:

    gcloud compute ssl-certificates create SSL_CERTIFICATE_NAME \
      --certificate CRT_FILE_PATH \
      --private-key KEY_FILE_PATH
  5. Create a target HTTP(S) proxy to route requests to your URL map, as shown in the figure below:

    To create the target proxy, use the following command, where:

    gcloud compute target-https-proxies create TARGET_HTTPS_PROXY_NAME \
      --ssl-certificates=SSL_CERT_NAME \
      --url-map=URL_MAP_NAME

    For example:

    gcloud compute target-https-proxies create api-gateway-https-proxy \
      --ssl-certificates=hello-cert \
      --url-map=api-gateway-url-map

    As noted earlier, you can create an HTTP load balancer without creating an SSL certificate resource. To do so, use the following command:

    gcloud compute target-http-proxies create TARGET_HTTP_PROXY_NAME \
          --url-map=URL_MAP_NAME

    For example:

    gcloud compute target-http-proxies create api-gateway-http-proxy \
      --url-map=api-gateway-url-map

    Subsequent commands for HTTP proxies should be modified to accommodate the --target-http-proxy flag and you TARGET_HTTP_PROXY_NAME for their HTTP(S) counterparts.

  6. Create a forwarding rule to route incoming requests to the proxy, as shown in the following figure:

    Use the following command to create the forwarding rule, where:

    gcloud compute forwarding-rules create HTTPS_FORWARDING_RULE_NAME \
      --target-https-proxy=TARGET_HTTPS_PROXY_NAME \
      --global \
      --ports=443

    For example:

    gcloud compute forwarding-rules create my-fw \
      --target-https-proxy=api-gateway-https-proxy \
      --global \
      --ports=443
Update DNS records with load balancer IP address

If you have a custom domain, this step is required to set up the DNS settings for your domain to point to the new IP address of your service. It is also required if you created a global external Application Load Balancer with a Google-managed certificate (which requires a domain). Allocating and using a static IP address is recommended when used with DNS. The specific instructions for this step depend on your DNS provider.

  1. To send traffic to the load balancer, the DNS record of your domain (in this tutorial, my-app-domain) must point to the IP address(es) of the load balancer.

    To find the IP address of your global forwarding rule, use this command:

    gcloud compute forwarding-rules list
  2. Update your domain's DNS A or AAAA record to point to the load balancer's IP address so that traffic sent to the existing custom domain URL is routed through the load balancer instead. It may take as little as several seconds or as long as several hours for DNS to propagate this change to the DNS server.

  3. Test to confirm that that your gateway is receiving traffic using curl or by visiting the URL in your browser. For example: https://my-app-domain

    Upon testing, you should see the response generated by the Cloud Run service. For example, this may be a "Hello World" HTML page or another expected response generated by the backend service directly. This means your request is going through the load balancer, and the backend service is instructing the load balancer to send it to your gateway.

Test your load balancer configuration

Now that you have configured your load balancer, you can start sending traffic to the forwarding rule's IP address.

To find the IP address of your global forwarding rule, use the following command:

gcloud compute forwarding-rules list

Use the curl command to test the response for various URLs for your services. For example:

curl https://HOST_URL/hello/
curl https://HOST_URL

You can use the API Gateway Cloud console to verify that requests are reaching the correct services.

Congratulations! You have successfully configured global external Application Load Balancer for API GatewayPREVIEW.

Clean up

To avoid incurring charges to your Google Cloud account for the resources used in this quickstart, you can delete the Cloud Load Balancing resources you created. If these resources were created within their own project, you can delete the entire project. Otherwise, you can delete the resources individually.

Delete the project Caution: Deleting a project has the following effects:

Run the following command, replacing PROJECT_ID with your project ID:

gcloud projects delete PROJECT_ID
Delete individual resources

Delete each component in the load balancer:

  1. Delete the forwarding rules:

    gcloud compute forwarding-rules delete HTTPS_FORWARDING_RULE_NAME --global
  2. Delete the global external IP addresses:

    gcloud compute addresses delete IP_ADDRESSES --global
  3. Delete the target proxy:

    gcloud compute target-https-proxies delete TARGET_HTTP_PROXY_NAME
  4. Delete the URL map:

    gcloud compute url-maps delete URL_MAP_NAME
  5. Delete the backend services:

    gcloud compute backend-services delete BACKEND_SERVICE_NAME --global
  6. (Optional) Delete the SSL certificate:

    gcloud compute ssl-certificates delete SSL_CERTIFICATE_NAME

Delete the serverless NEG:

gcloud compute network-endpoint-groups delete SERVERLESS_NEG_NAME --region=REGION

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-08-07 UTC.

[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["This guide explains how to configure a Global external Application Load Balancer to route requests to API Gateway, offering benefits like custom domains, Google Cloud Armor integration, load balancing across multiple locations, and advanced traffic management."],["The process involves setting up a serverless network endpoint group (NEG), a backend service, a URL map, and a target HTTP(S) proxy, as well as configuring either a Google-managed or self-managed SSL certificate for secure communication."],["Before getting started, ensure you have the Google Cloud CLI installed, updated, and you've completed the API Gateway Quickstart, configured permissions, and have an SSL certificate resource, or are ready to use HTTP in place of HTTPS."],["To properly direct traffic, you must update your domain's DNS settings to point to the IP address of the load balancer, which can be obtained from the forwarding rules."],["The guide also includes instructions on testing the load balancer configuration and cleaning up resources to prevent unnecessary charges, with options to delete individual resources or the entire project."]]],[]]


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4