Stay organized with collections Save and categorize content based on your preferences.
This guide demonstrates how to create a Google Cloud HTTPS load balancer that:
Before you start, make sure that you are familiar with External Application Load Balancer concepts.
For a simplified example, see Setting up an external Application Load Balancer with a Compute Engine backend. For advanced routing, such as HTTP rewrites and redirects, see Traffic management for external Application Load Balancers.
OverviewThis guide provides instructions for creating a load balancer that directs traffic based on the path in the request URL and balances traffic across multiple regions. You create eight total Compute Engine instances in US (in zone us-central1-b) and EU (in zone eu-west1-b) regions. You then create a load balancer that routes traffic to these instances.
After you complete the instructions, your load balancer is configured as follows:
/video
is routed to one backend service.In this how-to document, you create the configuration that is illustrated in the following diagram:
Multi-regional HTTPS Load Balancing (click to enlarge)The sequence of events in the diagram is:
https://www.example.com/video/concert
URL, sending a content request to the external IP address defined in the forwarding rule. The request can use IPv4 or IPv6; there are forwarding rules for both protocols./video
, like https://www.example.com/video/concert
, is sent to video-backend-service
. Any other URL path is sent to the default service, web-backend-service
.video
instances serve video content, while the www
instances serve all other content.In this example, the load balancer accepts HTTPS requests from clients and proxies these requests as HTTP to the backends. You can also configure a load balancer to accept HTTP requests, as well as to use HTTPS when proxying requests to backends.
Before you beginThese instructions require a project. If you do not already have a project, set one up now. These instructions guide you through creating a custom mode Virtual Private Cloud (VPC) network. You must also set up custom firewall rules to allow traffic to reach the instances.
If you prefer to work from the command line, install the gcloud
command-line tool. See gcloud Overview for conceptual and installation information about the tool.
gcloud init
to initialize your gcloud directory. Permissions
To complete the steps in this guide, you must have permission to create Compute Engine instances in a project. You must have either a project owner or editor role, or you must have the following Compute Engine IAM roles:
For more information, see the following guides:
Setup Optional: Creating a new projectWe recommend that users with the resourcemanager.projects.create
permission create a new project before following the rest of this how-to. This simplifies cleanup at the end of the guide.
In this example, use the following VPC network, regions, and subnets:
Network: The network is a custom mode VPC network named lb-network
.
Subnets in two different regions:
us-subnet
uses 10.1.10.0/24
for its primary IP range and is located in the us-central1
region.eu-subnet
uses 10.1.11.0/24
for its primary IP range and is located in the europe-west1
region.To create the example network and subnet, follow these steps:
ConsoleIn the Google Cloud console, go to the VPC networks page.
Click Create VPC network.
Enter a Name of lb-network
.
In the Subnets section, create the first subnet:
us-subnet
us-central1
10.1.10.0/24
Still in the Subnets section, click Add subnet and create the second subnet:
eu-subnet
europe-west1
10.1.11.0/24
Click Create.
Create the custom VPC network:
gcloud compute networks create lb-network --subnet-mode=custom
Create the us-subnet
:
gcloud compute networks subnets create us-subnet \ --network=lb-network \ --range=10.1.10.0/24 \ --region=us-central1
Create the eu-subnet
:
gcloud compute networks subnets create eu-subnet \ --network=lb-network \ --range=10.1.11.0/24 \ --region=europe-west1
The default deny ingress rule blocks incoming traffic to the backend instances, including traffic from the load balancer and Google Cloud health checking systems. You must create new firewall rules to override the default rule and allow traffic to reach your instances.
In this example, you create the following firewall rules:
fw-allow-ssh
: An ingress rule, applicable to the instances being load balanced, that allows incoming SSH connectivity on TCP port 22 from any address. You can choose a more restrictive source IP range for this rule; for example, you can specify just the IP ranges of the system from which you will initiating SSH sessions. This example uses the target tag allow-ssh
to identify the backend VMs to which it should apply.
fw-allow-health-check-and-proxy
: An ingress rule, applicable to the instances being load balanced, that allows traffic from the load balancer and Google Cloud health checking systems (130.211.0.0/22
and 35.191.0.0/16
). This example uses the target tag allow-health-check
to identify the backend VMs to which it should apply.
In the Google Cloud console, go to the Firewall policies page.
Click Create firewall rule to create the first firewall rule:
fw-allow-ssh
.lb-network
.allow-ssh
.0.0.0.0/0
.22
for the port number.Click Create firewall rule to create the second firewall rule:
fw-allow-health-check-and-proxy
.lb-network
.allow-health-check
.130.211.0.0/22
and 35.191.0.0/16
.80,443
for the port numbers.Create the fw-allow-ssh
firewall rule to allow SSH connectivity to VMs with the network tag allow-ssh
. When you omit source-ranges
, Google Cloud interprets the rule to mean any source.
gcloud compute firewall-rules create fw-allow-ssh \ --network=lb-network \ --action=allow \ --direction=ingress \ --target-tags=allow-ssh \ --rules=tcp:22
Create the fw-allow-health-check-and-proxy
rule to allow the load balancer and Google Cloud health checks to communicate with backend instances on TCP port 80
and 443
:
gcloud compute firewall-rules create fw-allow-health-check-and-proxy \ --network=lb-network \ --action=allow \ --direction=ingress \ --target-tags=allow-health-check \ --source-ranges=130.211.0.0/22,35.191.0.0/16 \ --rules=tcp:80,tcp:443
To set up a load balancer with a Compute Engine backend, your VMs need to be in instance groups. This guide describes how to create a managed instance group with Linux VMs that have Apache running.
The managed instance group provides VMs running the backend servers of an external HTTPS load balancer. For demonstration purposes, backends serve their own hostnames.
In this example, you create eight virtual machine instances (VMs): four to serve video content and four to serve all other content. You use a startup script to install Apache web server software with a unique home page for each instance. Note that you can use any web server on your VMs; Apache is installed in this example as a convenience.
ConsoleCreate an instance template.
In the Google Cloud console, go to the Instance templates page.
video-us-template
.apt-get
.allow-health-check
and allow-ssh
.lb-network
us-subnet
Click Management. Enter the following script into the Startup script field.
#! /bin/bash apt-get update apt-get install apache2 -y a2ensite default-ssl a2enmod ssl vm_hostname="$(curl -H "Metadata-Flavor:Google" \ http://metadata.google.internal/computeMetadata/v1/instance/name)" mkdir -p /var/www/html/video echo "Page served from: $vm_hostname" | \ tee /var/www/html/index.html /var/www/html/video/index.html systemctl restart apache2
Click Create.
Create a managed instance group. In the Google Cloud console, go to the Instance groups page.
ig-video-us
.us-central1
.video-us-template
.Off:do not autoscale
.2
.Create an instance template.
gcloud compute instance-templates create video-us-template \ --region=us-central1 \ --network=lb-network \ --subnet=us-subnet \ --tags=allow-health-check,allow-ssh \ --image-family=debian-12 \ --image-project=debian-cloud \ --metadata=startup-script='#! /bin/bash apt-get update apt-get install apache2 -y a2ensite default-ssl a2enmod ssl vm_hostname="$(curl -H "Metadata-Flavor:Google" \ http://metadata.google.internal/computeMetadata/v1/instance/name)" mkdir -p /var/www/html/video echo "Page served from: $vm_hostname" | \ tee /var/www/html/index.html /var/www/html/video/index.html systemctl restart apache2'
Create a managed instance group based on the template.
gcloud compute instance-groups managed create ig-video-us \ --template=video-us-template --size=2 --zone=us-central1-b
Repeat this procedure four times for the four instance groups. Make sure to change the instance group name, template name, region, and zone for each instance group, as follows:
ig-video-us
, video-us-template
, us-central1-b
(as shown in the example)ig-video-eu
, video-eu-template
, europe-west1-b
ig-www-us
, www-us-template
, us-central1-b
ig-www-eu
, www-europe-template
, europe-west1-b
For each instance group, define an HTTP service and map a port name to the relevant port. Once configured, the load balancing service forwards traffic to the named port.
ConsoleIn the Google Cloud console, go to the Instance groups page.
Click the name of your instance group (for example ig-video-us
) and click Edit Group.
Click Specify port name mapping.
Click Add item.
For the port name, enter http
. For the port number, enter 80
.
Click Save.
Repeat this step for each instance group.
gcloudgcloud compute instance-groups unmanaged set-named-ports ig-video-us \ --named-ports http:80 \ --zone us-central1-b
gcloud compute instance-groups unmanaged set-named-ports ig-www-us \ --named-ports http:80 \ --zone us-central1-b
gcloud compute instance-groups unmanaged set-named-ports ig-video-eu \ --named-ports http:80 \ --zone europe-west1-b
gcloud compute instance-groups unmanaged set-named-ports ig-www-eu \ --named-ports http:80 \ --zone europe-west1-bReserving external IP addresses
Now that your instances are up and running, set up the services needed for load balancing. In this section, you create two global static external IP addresses that your customers use to reach your load balancer.
ConsoleIn the Google Cloud console, go to the External IP addresses page.
Click Reserve static address to reserve an IPv4 address.
Assign a Name of lb-ipv4-1
.
Set the Network tier to Premium.
Set IP version to IPv4.
Set the Type to Global.
Click Reserve.
Click Reserve static address again to reserve an IPv6 address.
Assign a Name of lb-ipv6-1
.
Set the Network Tier to Premium.
Set IP version to IPv6.
Ensure that the Type is set to Global.
In this example, the load balancer uses Premium Tier networking. A load balancer using Standard Tier networking would instead use regional IP addresses. IPv6 addresses are not available with Standard Tier.
Click Reserve.
Reserve an IPv4 address:
gcloud compute addresses create lb-ipv4-1 \ --ip-version=IPV4 \ --network-tier=PREMIUM \ --global
Reserve an IPv6 address:
gcloud compute addresses create lb-ipv6-1 \ --ip-version=IPV6 \ --network-tier=PREMIUM \ --global
Load balancer functionality involves several connected resources. In this section, you set up and connect the resources. They are as follows:
Two global forwarding rules, one each for IPv4 and IPv6, which hold the global external IP address resources. Global forwarding rules forward the incoming request to the target proxy.
In the Google Cloud console, go to the Load balancing page.
web-map
.www
instances
The load balancer requires two backend services and a health check to service both of them. In this example, the load balancer terminates HTTPS requests from the client and uses HTTP to communicate with the backends. To do this, you specify HTTP for the backend protocols and health checks.
web-backend-service
.http
.ig-www-us
.80
.ig-www-eu
.Configure the health check for the www
instances.
http-basic-check-www
HTTP
80
video
instances
video-backend-service
and assign the ig-video-us
and ig-video-eu
instance groups to it.http-basic-check-video
. Health check names must be unique.The host and path rules configure the load balancer's URL map resource.
web-backend-service
in the right-hand column and is already populated with the default rule Any unmatched (default)
for Hosts and Paths.video-backend-service
in the right-hand column. If it does not exist, click Add host and path rule, and then select video-backend-service
from the drop-down menu in the right column. Populate the other columns as follows:
*
./video
, and then press the Tab key./video/*
, and then press the Tab key.The frontend configuration section configures several resources for the load balancer, including the forwarding rules and SSL certificates. In addition, it allows you to select the protocol used between the client and the load balancer.
In this example, you are using HTTPS between the client and the load balancer, so you need one or more SSL certificate resources to configure the proxy. See SSL Certificates for information on how to create SSL certificate resources. We recommend using a Google-managed certificate.
Warning: Do not use a self-signed certificate for production purposes.https-content-rule
.HTTPS
.IPv4
.lb-ipv4-1
, which you created earlier.443
, to allow HTTPS traffic.www-ssl-cert
.-----BEGIN CERTIFICATE-----
and end with -----END CERTIFICATE-----
.-----BEGIN CERTIFICATE-----
and terminating with -----END CERTIFICATE-----
. Google Cloud does not validate the certificate chain for you — validation is your responsibility.-----BEGIN RSA PRIVATE KEY-----
and end with -----END RSA PRIVATE KEY-----
. ECDSA private keys must start with -----BEGIN EC PRIVATE KEY-----
and end with -----END EC PRIVATE KEY-----
.gcloud
and the API, this option is called NONE
.https-content-ipv6-rule
.HTTPS
if you want to use HTTPS between the client and the load balancer. Select HTTP
if you want HTTP between the client and the load balancer.IPv6
.lb-ipv6-1
, which you created earlier.443
is required.www-ssl-cert
.gcloud
and the API, this option is called NONE
.Create a health check. Use the gcloud
command for HTTP if you are using HTTP between the load balancer and the backends.
gcloud compute health-checks create http http-basic-check \ --port 80
Create a backend service for each content provider.
Set the --protocol
field to HTTP
because we are using HTTP to go to the instances. Use the http-basic-check
health check we created earlier as the health check.
load-balancing-scheme=EXTERNAL_MANAGED
. This setting offers advanced traffic management capability.load-balancing-scheme=EXTERNAL
.gcloud compute backend-services create video-backend-service \ --load-balancing-scheme=LOAD_BALANCING_SCHEME \ --global-health-checks \ --protocol=HTTP \ --port-name=http \ --health-checks=http-basic-check \ --global
gcloud compute backend-services create web-backend-service \ --load-balancing-scheme=LOAD_BALANCING_SCHEME \ --global-health-checks \ --protocol=HTTP \ --port-name=http \ --health-checks=http-basic-check \ --global
Add your instance groups as backends to the backend services. A backend defines the capacity (maximum backend utilization or maximum queries per second) of the instance groups it contains. In this example, set balancing-mode
to the value UTILIZATION
, max-utilization
to 0.8
, and capacity-scaler
to 1
. Set capacity-scaler
to 0
if you wish to drain a backend service.
Add the ig-video-us
instance group:
gcloud compute backend-services add-backend video-backend-service \ --balancing-mode=UTILIZATION \ --max-utilization=0.8 \ --capacity-scaler=1 \ --instance-group=ig-video-us \ --instance-group-zone=us-central1-b \ --global
Add the ig-video-eu
instance group:
gcloud compute backend-services add-backend video-backend-service \ --balancing-mode=UTILIZATION \ --max-utilization=0.8 \ --capacity-scaler=1 \ --instance-group=ig-video-eu \ --instance-group-zone=europe-west1-b \ --global
Add the ig-www-us
instance group:
gcloud compute backend-services add-backend web-backend-service \ --balancing-mode=UTILIZATION \ --max-utilization=0.8 \ --capacity-scaler=1 \ --instance-group=ig-www-us \ --instance-group-zone=us-central1-b \ --global
Add the ig-www-eu
instance group:
gcloud compute backend-services add-backend web-backend-service \ --balancing-mode=UTILIZATION \ --max-utilization=0.8 \ --capacity-scaler=1 \ --instance-group=ig-www-eu \ --instance-group-zone=europe-west1-b \ --global
Create a URL map to route the incoming requests to the appropriate backend services. In this case, the request path mappings defined via the --path-rules
flag split traffic according to the URL path in each request to your site. Traffic that does not match an entry in the --path-rules
list is sent to the entry in the --default-service flag
.
Create a URL map:
gcloud compute url-maps create web-map \ --default-service web-backend-service
Add a path matcher to your URL map and define your request path mappings:
gcloud compute url-maps add-path-matcher web-map \ --default-service web-backend-service \ --path-matcher-name pathmap \ --path-rules="/video=video-backend-service,/video/*=video-backend-service"
Create an SSL certificate resource to use in the HTTPS proxy. To create a Google-managed certificate, you must have a domain. If you do not have a domain, you can use a self-signed SSL certificate for testing. For more information, see Types of SSL certificates.
If you are using multiple SSL certificates, you must create an SSL certificate resource for each certificate.
Warning: Do not use a self-signed certificate for production purposes.To create a self-managed SSL certificate resource:
gcloud compute ssl-certificates create www-ssl-cert \ --certificate [CRT_FILE_PATH] \ --private-key [KEY_FILE_PATH]
To create a Google-managed SSL certificate resource:
gcloud compute ssl-certificates create www-ssl-cert \ --domains [DOMAIN]
Create a target HTTPS proxy to route requests to your URL map. The proxy is the portion of the load balancer that holds the SSL certificate for HTTPS Load Balancing, so you also load your certificate in this step.
gcloud compute target-https-proxies create https-lb-proxy \ --url-map web-map --ssl-certificates www-ssl-cert
Create two global forwarding rules to route incoming requests to the proxy, one for each of the IP addresses you created.
load-balancing-scheme=EXTERNAL_MANAGED
. This setting offers advanced traffic management capability.load-balancing-scheme=EXTERNAL
.gcloud compute forwarding-rules create https-content-rule \ --load-balancing-scheme=LOAD_BALANCING_SCHEME \ --network-tier=PREMIUM \ --address=lb-ipv4-1 \ --global \ --target-https-proxy=https-lb-proxy \ --ports=443
gcloud compute forwarding-rules create https-content-ipv6-rule \ --load-balancing-scheme=LOAD_BALANCING_SCHEME \ --network-tier=PREMIUM \ --address=lb-ipv6-1 \ --global \ --target-https-proxy=https-lb-proxy \ --ports=443
After creating the global forwarding rule, it can take several minutes for your configuration to propagate worldwide.
Connect your domain to your load balancerAfter the load balancer is created, note the IP address that is associated with the load balancer—for example, 30.90.80.100
. To point your domain to your load balancer, create an A
record by using your domain registration service. If you added multiple domains to your SSL certificate, you must add an A
record for each one, all pointing to the load balancer's IP address. For example, to create A
records for www.example.com
and example.com
, use the following:
NAME TYPE DATA www A 30.90.80.100 @ A 30.90.80.100
If you use Cloud DNS as your DNS provider, see Add, modify, and delete records.
Sending traffic to your instancesNow that you have configured your load balancing service, you can start sending traffic to the forwarding rule and watch the traffic go to different instances.
Console and Web BrowserIn the Google Cloud console, go to the Load balancing page.
Click web-map
to expand the load balancer you just created.
In the Backend section, confirm that the instances are healthy. The Healthy column should be populated indicating that both instances in each of the four instance groups are healthy. If you see otherwise, first try reloading the page. It can take a few moments for the Google Cloud console to indicate that the instances are healthy. If the backends do not appear healthy after a few minutes, review the firewall configuration and the set of network tags assigned to your backend instances.
Record the IPv4 and IPv6 addresses of your load balancer:
In the Google Cloud console, go to the External IP addresses page.
Under Name, find the addresses named lb-ipv4-1
and lb-ipv6-1
, and then record the associated values from the External Addresses column.
If you are using a Google-managed certificate:
Create the following DNS records:
Confirm that your certificate resource's status is ACTIVE. For more information, see Google-managed SSL certificate resource status.
Test your load balancer using a web browser by going to one of the following:
https://IP_ADDRESS
, where IP_ADDRESS is the load balancer's IPv4 address. If your browser displays a certificate warning, you must explicitly instruct your browser to trust the certificate. The warning occurs because certificates are typically configured with domains, not IP addresses.
https://FQDN
, where FQDN is the fully qualified domain name (FQDN) for which you configured DNS to point to the load balancer's IP address. If you used a self-managed, self-signed SSL certificate or a self-managed SSL certificate signed by a custom certificate authority (CA), your browser displays a certificate warning unless you have explicitly configured it to trust the certificate or its CA. For more details about self-managed certificates, see Creating a private key and certificate.
Your browser should render a page with content showing the name of the instance that served the page, along with its zone (for example, Page on ig-www-us-02 in us-central1-b
).
In your browser, go to one of the following:
https://IP_ADDRESS/video
, where IP_ADDRESS is the load balancer's IPv4 address.
https://FQDN/video
, where FQDN is the FQDN for which you configured DNS to point to the load balancer's IP address.
Your browser should render a page with content showing the name of the video instance that served the page, along with its zone (for example, Page on ig-video-us-02 in us-central1-b
).
-k
with curl to suppress its warnings about self-signed certificates. Web applications normally use certificates signed by a certificate authority in order to demonstrate their authenticity to clients. You can use your own CA-signed certificate with a load balancer, or you can configure your load balancer to issue a Google-managed certificate for a domain that you control.
Record the IPv4 and IPv6 addresses of your load balancer:
gcloud compute addresses describe lb-ipv4-1 \ --format="get(address)" \ --global
gcloud compute addresses describe lb-ipv6-1 \ --format="get(address)" \ --global
If you are using a Google-managed certificate:
Create the following DNS records:
Confirm that your certificate resource's status is ACTIVE. For more information, see Google-managed SSL certificate resource status.
gcloud compute ssl-certificates list
Use the curl
command to test the response from these URLs. Replace IP_ADDRESS with the load balancer's IPv4 address:
curl -k https://IP_ADDRESS
curl -k https://IP_ADDRESS/video/
Use the curl
command to test the response from these URLs. Replace IP_ADDRESS with the load balancer's IPv6 address. For IPv6, you must put brackets ([]
) around the address and disable globbing with the -g
flag (for example, curl -g -6 "https://[2001:DB8::]/"
).
curl -k -g -6 https://[IP_ADDRESS]
curl -k -g -6 https://[IP_ADDRESS]/video/
To simulate a user in a different geography, you can connect to one of your virtual machine instances in a different region, and then run a curl
command from that instance to see the request go to an instance in the region closest to it.
If you connect to ig-www-us-01
, running a curl
command shows that the request goes to an instance in us-central1
. You see output such as the following: Page on ig-www-us-02 in us-central1-b
.
If you connect to ig-www-eu-01
, running a curl
command shows that the request goes to an instance in europe-west1
. You see output such as the following: Page on ig-www-eu-02 in europe-west1-b
.
You can perform tests from a client system located anywhere in the world. If backends in one region become unhealthy or reach capacity, the HTTPS load balancer automatically sends traffic to the next-closest region.
Additional configuration optionsThis section expands on the configuration example to provide alternative and additional configuration options. All of the tasks are optional. You can perform them in any order.
Enabling session affinityThese procedures demonstrate how to configure a different type of session affinity for each backend service:
web-backend-service
video-backend-service
When client IP affinity is enabled, the load balancer directs a particular client's requests to the same backend VM based on a hash created from the client's IP address.
When generated cookie affinity is enabled, the load balancer issues a cookie on the first request. For each subsequent request with the same cookie, the load balancer directs the request to the same backend VM or endpoint. For external Application Load Balancers, the cookie is named GCLB
.
To enable client IP session affinity for web-backend-service
:
In the Google Cloud console, go to the Load balancing page.
Click Backends.
Click web-backend-service (the name of one of the backend services you created for this example) and click Edit.
On the Backend service details page, click Advanced configuration.
Under Session affinity, select Client IP from the menu.
Click Save.
To enable generated cookie session affinity for video-backend-service
:
In the Google Cloud console, go to the Load balancing page.
Click Backends.
Click video-backend-service (the name of one of the backend services you created for this example) and click Edit.
On the Backend service details page, click Advanced configuration.
Under Session affinity, select Generated cookie from the menu.
Click Update.
Use the following gcloud
command to update the web-backend-service
backend service, specifying client IP session affinity:
gcloud compute backend-services update web-backend-service \ --session-affinity=CLIENT_IP \ --global
Use the following gcloud
command to update the video-backend-service
backend service, specifying generated cookie session affinity:
gcloud compute backend-services update video-backend-service \ --session-affinity=GENERATED_COOKIE \ --globalAPI
To set client IP session affinity, make a PATCH
request to the backendServices/patch
method.
PATCH https://www.googleapis.com/compute/v1/projects/[PROJECT_ID]/global/backendServices/web-backend-service
{
"sessionAffinity": "CLIENT_IP"
}
To set generated cookie session affinity, make a PATCH
request to the backendServices/patch
method.
PATCH https://www.googleapis.com/compute/v1/projects/[PROJECT_ID]/global/backendServices/video-backend-service
{
"sessionAffinity": "GENERATED_COOKIE"
}
Removing external IP addresses from backend VMs
External Application Load Balancers communicate with backends using their internal IP addresses and special load balancer routes. The backend instances do not need external IP addresses to communicate with the load balancer. You can increase security by removing the external IP addresses from your backend instances.
To remove external IP addresses from backend instances, follow these directions.
If you need to connect using SSH to a backend instance that does not have an external IP address, refer to Connecting to an instance that doesn't have an external IP address.
Cleaning upAfter you have finished this tutorial you can delete the resources you've made, so that you won't continue to be billed for them in the future. If these resources were created within their own project, you can delete the entire project. Otherwise, you can delete the resources individually.
Deleting the project Caution: Deleting a project has the following effects:YOUR_PROJECT_ID.REGION_ID.r.appspot.com
URL, delete selected resources inside the project instead of deleting the project.In the Google Cloud console, go to the Projects page.
In the project list, select the project you want to delete and click deleteDelete.
In the dialog, type the PROJECT_ID
, and then click Shut down to delete the project.
Run the following command, replacing PROJECT_ID
with your project ID:
gcloud projects delete PROJECT_IDDeleting individual resources Console Deleting the load balancer
In the Google Cloud console, go to the Load balancing page.
Select the checkbox next to web-map
.
Click the Delete button at the top of the page.
Select the checkboxes next to all of the additional resources, including backend services, health checks, and SSL certificates.
Click Delete load balancer and the selected resources.
In the Google Cloud console, go to the Instance groups page.
Select the checkbox at the top next to Name, to select all instance groups.
Click deleteDelete.
In the confirmation window, click deleteDelete.
In the Google Cloud console, go to the External IP addresses page.
Select the checkboxes next to lb-ipv4-1
and lb-ipv6-1
.
Click Release static addresses.
In the confirmation window, click deleteDelete.
In the Google Cloud console, go to the Firewall policies page.
Select the checkboxes next to fw-allow-health-check-and-proxy
and fw-allow-ssh
.
Click deleteDelete.
In the confirmation window, click deleteDelete.
In the Google Cloud console, go to the VM instances page.
Select the checkbox at the top next to Name to select all instances.
Click deleteDelete.
In the confirmation window, click deleteDelete.
In the Google Cloud console, go to the VPC networks page.
Click lb-network
.
On the network details page, click Delete VPC network.
In the confirmation window, click deleteDelete.
y
after each command to confirm deletion. Deleting the load balancer
To delete the load balancer, you'll need to delete each of its components.
Delete the forwarding rules:
gcloud compute forwarding-rules delete https-content-rule \ --global
gcloud compute forwarding-rules delete https-content-ipv6-rule \ --global
Delete the global external IP addresses:
gcloud compute addresses delete lb-ipv4-1 \ --global
gcloud compute addresses delete lb-ipv6-1 \ --global
Delete the target proxy:
gcloud compute target-https-proxies delete https-lb-proxy
Delete the SSL certificate:
gcloud compute ssl-certificates delete www-ssl-cert
Delete the URL map:
gcloud compute url-maps delete web-map
Delete the backend services:
gcloud compute backend-services delete web-backend-service \ --global
gcloud compute backend-services delete video-backend-service \ --global
Delete the health checks:
gcloud compute health-checks delete http-basic-check
You have deleted all of the load balancer resources.
Deleting the instance groupsRepeat the following command to delete four unmanaged instance groups, using the following name and zone combinations. Replace INSTANCE_GROUP_NAME
and ZONE
accordingly:
ig-www-us
, zone: us-central1-b
ig-video-us
, zone: us-central1-b
ig-www-eu
, zone: europe-west1-b
ig-video-eu
, zone: europe-west1-b
gcloud compute instance-groups unmanaged delete INSTANCE_GROUP_NAME \ --zone=ZONEDeleting the VM instances
Repeat the following command to delete eight VMs, using the following name and zone combinations. Replace VM_NAME
and ZONE
accordingly:
ig-www-us-01
, zone: us-central1-b
ig-www-us-02
, zone: us-central1-b
ig-video-us-01
, zone: us-central1-b
ig-video-us-02
, zone: us-central1-b
ig-www-eu-01
, zone: europe-west1-b
ig-www-eu-02
, zone: europe-west1-b
ig-video-eu-01
, zone: europe-west1-b
ig-video-eu-02
, zone: europe-west1-b
gcloud compute instances delete VM_NAME \ --zone=ZONEDeleting the firewall rules
Delete both firewall rules:
gcloud compute firewall-rules delete fw-allow-health-check-and-proxy
gcloud compute firewall-rules delete fw-allow-sshDeleting the VPC network
Delete the us-subnet
:
gcloud compute networks subnets delete us-subnet \ --region=us-central1
Delete the eu-subnet
:
gcloud compute networks subnets delete eu-subnet \ --region=europe-west1
Delete the VPC network:
gcloud compute networks delete lb-network
You have deleted all of the resources that you set up in this project.
What's nextExcept as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-08-07 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[],[]]
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4