- Setup - Deploy your GCP Runner with Terraform
- Access Requirements - Configure IAM permissions and network access
- Private GAR Images - Configure access to private Google Artifact Registry
- Runner Costs - Understand GCP Runner pricing and cost optimization
- Troubleshooting - Comprehensive troubleshooting and monitoring guide

GCP Runner Overview
Prerequisites
Before deploying your GCP Runner, ensure you have:- GCP Project with billing enabled and sufficient quotas for your expected workload
- VPC and Networking - A custom VPC with properly configured subnets:
- Runner subnet: Private subnet for development environment VMs (with Private Google Access enabled)
- Proxy subnet (internal LB only): REGIONAL_MANAGED_PROXY subnet for internal load balancer
- Domain Name that you control with DNS modification capabilities
- SSL/TLS Certificate provisioned based on your load balancer choice:
- External LB: Certificate stored in Google Certificate Manager
- Internal LB: Certificate stored in Google Secret Manager with both certificate and private key
- Required APIs enabled in your GCP project (automatically enabled by Terraform)
Load Balancer Configurations
The GCP Runner supports two load balancer configurations, each designed for different network architectures and security requirements.External Load Balancer (Default)
The external load balancer configuration provides internet-accessible development environments through Google Cloud’s global load balancer. This configuration is simpler to set up and doesn’t require additional networking configuration. Use Cases:- Development teams accessing environments from various locations
- Simplified setup with internet connectivity
- No additional network infrastructure required
- SSL certificate managed by Google Certificate Manager
- Public internet access to development environments
- Standard VPC subnet for development environments

GCP Runner External NLB
Internal Load Balancer (Recommended for Enterprise)
The internal load balancer configuration keeps all traffic within your VPC and corporate network, providing the highest level of security and control. This configuration is ideal for enterprise environments with existing network infrastructure and security policies. Use Cases:- Enterprise environments with strict security requirements
- Corporate networks with VPN or interconnect access
- Zero internet exposure for development environments
- SSL certificate stored in Google Secret Manager (both certificate and private key)
- Dedicated proxy-only subnet with purpose REGIONAL_MANAGED_PROXY
- Corporate network connectivity to your GCP VPC (VPN, Interconnect, etc.)

GCP Runner Internal NLB
Certificate Requirements
SSL certificates are required for both load balancer configurations but have different storage and format requirements:External Load Balancer Certificate
- Storage: Google Certificate Manager
- Format: Managed certificate or uploaded certificate
- SANs required: Root domain (
yourdomain.com
) and wildcard (*.yourdomain.com
)
Internal Load Balancer Certificate
- Storage: Google Secret Manager
- Format: JSON object with both certificate and private key
- SANs required: Root domain (
yourdomain.com
) and wildcard (*.yourdomain.com
) - Secret format:
Next Steps
- Setup - Deploy your GCP Runner with Terraform
- Access Requirements - Configure IAM permissions and network access