Dual-stack subnets let your Cloud Run resources send IPv4 and IPv6 traffic to a VPC network with Direct VPC egress. You can change an existing IPv4 only (single-stack) subnet to a dual-stack subnet.
Subnet types
VPC networks support the following Compute Engine subnet types:
IPv4 only (single-stack) subnets, with only IPv4 subnet ranges
IPv4 and IPv6 (dual-stack) subnets, with both IPv4 and IPv6 subnet ranges
Dual-stack limitations
Before you change the stack type on an existing Cloud Run resource, consider the following limitations:
Dual-stack support is only available with subnets in a custom-mode VPC network. To have the internal access type available for dual-stack subnets, the VPC network internal IPv6 range must be enabled. Set up or convert the VPC network to custom mode.
Compared to IPv4-only subnets, dual-stack subnets might experience elevated cold-start latencies, limiting how quickly your application can scale up.
NAT64 is not supported.
Before you begin
Be sure that the Cloud Run service agent
has the Compute Public IP Admin role (roles/compute.publicIpAdmin)
to use the subnet with external IPv6.
Add a dual-stack subnet on a resource
Dual-stack subnets have both IPv4 and IPv6 address ranges.
To add a dual-stack subnet on a Cloud Run resource, do the following:
Console
In the Google Cloud console:
Enable the Compute Engine API:
Go to the VPC networks page:
Click Create VPC network if you are creating a new custom-mode network. If you are using an existing VPC network, click the name of the VPC network to show its VPC network details page.
If you are creating a new network or converting an existing one, enter the name and be sure that the Subnet creation mode is set to Custom, then select Configure a ULA internal IPv6 range for this VPC Network.
From the Subnets tab, click Add subnet. In the panel that appears:
- Provide a Name.
- Select a Region.
- For IP stack type, select IPv4 and IPv6 (dual-stack).
- Enter an IPv4 range. This is the primary IPv4 range for the subnet.
Select the IPv6 access type.
If the Internal option is not available and you need it, check that an internal IPv6 range is assigned on the network.
Click Add.
Deploy a Cloud Run service, execute a job, or deploy a worker pool on the dual-stack subnet that you created. As you enter the needed resource details, select the new IPv6 address range by following these steps:
- Click Container(s), Volumes, Networking, Security and select the Networking tab.
- Click Connect to a VPC for outbound traffic and then Send traffic directly to a VPC.
- Select the Network that you created in the previous step.
- Click the Subnet field to select the newly created IPv6 address range.
The resource is automatically provisioned with the subnet's stack type.
gcloud
To create a custom-mode network that supports dual-stack subnets, run the
gcloud compute networks createcommand.To configure internal IPv6 ranges on any subnets in this network, use the
--enable-ula-internal-ipv6flag. This option assigns a/48ULA prefix from within thefd20::/20range used by Google Cloud for internal IPv6 subnet ranges.gcloud compute networks create NETWORK \ --subnet-mode=custom \ --enable-ula-internal-ipv6
Replace
NETWORKwith the name of the VPC network that will contain the new subnet.To convert to or update a custom-mode network so that it supports dual-stack subnets, run the following command:
gcloud compute networks update NETWORK \ --subnet-mode=custom \ --enable-ula-internal-ipv6
Replace
NETWORKwith the name of the VPC network that will contain the new subnet.To create a dual-stack subnet with an IPv6 range, run the
subnets createcommand using the dual-stack settings:gcloud compute networks subnets create SUBNET \ --network=NETWORK \ --range=PRIMARY_IPv4_RANGE \ --stack-type=IPV4_IPV6 \ --ipv6-access-type=IPV6_ACCESS_TYPE \ --region=REGION
Replace the following:
SUBNET: a name for the new subnet.NETWORK: the name of the VPC network that will contain the new subnet.PRIMARY_IPv4_RANGE: the primary IPv4 range for the new subnet, in CIDR notation. For more information, see IPv4 subnet ranges.IPV6_ACCESS_TYPE: the IPv6 access type for the new subnet, eitherinternalorexternal.REGION: the Google Cloud region that the new subnet will be created in.
Deploy a Cloud Run service, execute a job, or deploy a worker pool on the dual-stack subnet that you created. The resource is automatically provisioned with the subnet's stack type.
YAML
If you are creating a new service, skip this step. If you are updating an existing service, download its YAML configuration:
gcloud run services describe SERVICE --format export > service.yaml
Update the following attributes:
apiVersion: serving.knative.dev/v1 kind: Service metadata: name: SERVICE_NAME labels: cloud.googleapis.com/location: REGION spec: template: metadata: annotations: run.googleapis.com/network-interfaces: '[{"network":"NETWORK","subnetwork":"SUBNET","tags":"NETWORK_TAG_NAMES"}]' run.googleapis.com/vpc-access-egress: EGRESS_SETTING spec: containers: - image: IMAGE
Replace:
- SERVICE_NAME with the name of your Cloud Run service. Service names must be 49 characters or less and must be unique per region and project.
- REGION with the region for your Cloud Run service, which must match the region of your subnet.
- NETWORK with the name of your VPC network.
- SUBNET with the name of your subnet. You can deploy or execute multiple services, jobs, or worker pools on the same subnet.
- Optional: NETWORK_TAG_NAMES with the names of the
network tags
you want to associate with a service. For services, network tags are
specified at the revision-level. Each service revision can have
different network tags, such as
network-tag-2. - EGRESS_SETTING with an
egress setting value:
all-traffic: Sends all outbound traffic through the VPC network.private-ranges-only: Sends only traffic to internal addresses through the VPC network.
- IMAGE with the URL of your service container image.
You can also specify more configuration, such as environment variables or memory limits.
Create or update the service using the following command:
gcloud run services replace service.yaml
Terraform
To learn how to apply or remove a Terraform configuration, see Basic Terraform commands.
Add the following to your
main.tffile:
Optionally, make your service public if you want to allow unauthenticated access to the service.
Change a subnet from single-stack to dual-stack
To add an IPv6 subnet range to an existing IPv4-only subnet in a custom-mode VPC network, see Change a subnet's stack type to dual-stack. Then, deploy the Cloud Run service, execute the job, or deploy the worker pool on the dual-stack subnet.
Change a subnet from dual-stack to single-stack
To change a resource's dual-stack subnet to a single-stack subnet, see Change a dual-stack subnet to IPv4 only. Then, deploy the Cloud Run service, execute the job, or deploy the worker pool on the dual-stack subnet.
Verify the network and subnet
To check that your resource is on the VPC network, run the following command:
gcloud run services describe SERVICE_NAME --region=REGION
Replace REGION with the Google Cloud region that the
new subnet was created in.
The following example output shows your network and subnet:
VPC Access:
Network: example-network
Subnet: example-subnet
Egress: private-ranges-only