Traffic distribution
A load balancer accepts client traffic on the frontend and sends it to one or more healthy backends based on configured rules and health evaluation.
Cloud Load Balancing is one of the most important services in Google Cloud because it controls how traffic reaches applications, how backend instances are selected, how health is validated, and how services stay reachable during traffic growth or backend failure.
In Google Cloud, load balancing is not one single product with one behavior. Google provides Application Load Balancers and Network Load Balancers, with external and internal choices depending on traffic type and architecture goals. That makes load balancer selection a major design decision rather than just a deployment checkbox.
Cloud Load Balancing is Google Cloud’s managed load balancing platform. Google’s overview explains that it provides Application Load Balancers and Network Load Balancers, and that different products are chosen based on traffic type, OSI layer, and whether access is external or internal. :contentReference[oaicite:1]{index=1}
A load balancer accepts client traffic on the frontend and sends it to one or more healthy backends based on configured rules and health evaluation.
In Google Cloud, Layer 7 traffic is handled by Application Load Balancers, while Layer 4 use cases are handled by Network Load Balancers. :contentReference[oaicite:2]{index=2}
Google positions Cloud Load Balancing as fully managed and scalable, so teams do not have to build and patch their own traffic distribution tier. :contentReference[oaicite:3]{index=3}
Google’s resource-model docs explain that a load balancer is made up of multiple components rather than one single API object. In practice, teams design a frontend, attach backend services or backends, define health checks, and for Layer 7 traffic often use URL maps and related routing components. :contentReference[oaicite:4]{index=4}
The frontend is the client-facing entry point, usually tied to an IP address, protocol, and port configuration.
Backends can include various Google Cloud platforms depending on the load balancer type and deployment mode. Google documents support for backends across platforms such as Compute Engine, GKE, Cloud Run, Cloud Storage, and even external backends in some cases. :contentReference[oaicite:5]{index=5}
Health checks help ensure that only healthy backends receive new traffic. Google highlights health checks as a core part of Cloud Load Balancing behavior. :contentReference[oaicite:6]{index=6}
URL maps direct requests by hostname and path to backend services or backend buckets, making them central to advanced Application Load Balancer routing. :contentReference[oaicite:7]{index=7}
Google’s “choose a load balancer” guidance starts with traffic type first, because that determines which load balancer family is appropriate. :contentReference[oaicite:8]{index=8}
Google supports both internet-facing and internal-only load balancing options depending on architecture requirements. :contentReference[oaicite:9]{index=9}
Google’s overview and product pages organize Cloud Load Balancing around two families: Application Load Balancers and Network Load Balancers, with internal and external variants depending on the use case. :contentReference[oaicite:10]{index=10}
These are Layer 7 load balancers for HTTP and HTTPS traffic. Google documents them as proxy-based and suitable for advanced request routing and backend diversity. :contentReference[oaicite:11]{index=11}
These are Layer 4 load balancers used when traffic should be handled at the transport layer, including use cases for TCP, UDP, TLS offload, and passthrough patterns. :contentReference[oaicite:12]{index=12}
External load balancers accept internet-originated traffic and are used for public-facing applications and services. :contentReference[oaicite:13]{index=13}
Internal load balancers accept traffic from inside Google Cloud environments and are used for private east-west application delivery. :contentReference[oaicite:14]{index=14}
Some Google Cloud load balancers are global, while others are regional. This is one of the reasons choosing the correct product matters early in the design. :contentReference[oaicite:15]{index=15}
Network load balancing in Google Cloud includes proxy and passthrough styles, which affects where decisions are made and how traffic is handled. :contentReference[oaicite:16]{index=16}
| Family | OSI focus | Best fit |
|---|---|---|
| Application Load Balancer | Layer 7 | HTTP(S), advanced request routing, path and host decisions, flexible backend support |
| Network Load Balancer | Layer 4 | TCP, UDP, protocol-focused traffic distribution, transport-layer decisions |
Google explicitly documents that a load balancer is not a single API resource. It is a system composed of multiple interacting components. That is one of the reasons load balancing can feel more complex than beginners expect. :contentReference[oaicite:17]{index=17}
The frontend is what clients connect to. It usually includes IP address, protocol, and port definitions.
Backend services define the group of backends that can receive traffic and are closely tied to health checks and load balancing behavior.
For Application Load Balancers, URL maps direct traffic by hostname and path to the right backend service or backend bucket. :contentReference[oaicite:18]{index=18}
Health checks determine whether traffic should continue to be sent to a backend. Unhealthy backends should stop receiving new connections. :contentReference[oaicite:19]{index=19}
A premium load balancing page should explain how the service appears in real environments, not just list product names.
A public HTTPS application uses an external Application Load Balancer in front of multiple backends and routes traffic by hostname and path.
Internal application delivery can use an internal load balancer so private services are reachable inside Google Cloud without public exposure.
A Network Load Balancer is used when the application does not need Layer 7 routing logic and traffic should be distributed at Layer 4.
Google documents support for some external backends through internet NEGs, which enables broader hybrid traffic delivery patterns. :contentReference[oaicite:20]{index=20}
Kubernetes workloads often rely on Google Cloud load balancers behind services or ingress-style configurations. Google documents LoadBalancer Services in GKE as part of this model. :contentReference[oaicite:21]{index=21}
Google also provides architecture guidance for load-balanced managed VM patterns, showing how VM clusters can be exposed behind a load balancer. :contentReference[oaicite:22]{index=22}
Google’s own selection guide starts by asking what traffic type must be handled. That is the best first principle for choosing the right load balancer. :contentReference[oaicite:23]{index=23}
You need HTTP(S) handling, Layer 7 logic, hostname and path routing, advanced request behavior, or broad backend support. :contentReference[oaicite:24]{index=24}
You need transport-layer handling for traffic such as TCP or UDP, or you want a Layer 4 pattern instead of request-aware Layer 7 logic. :contentReference[oaicite:25]{index=25}
External is for internet-reachable services. Internal is for private application delivery inside Google Cloud environments. :contentReference[oaicite:26]{index=26}
Good load balancer design is not just about getting traffic through. It is about getting the right traffic to the right place, with resilience and maintainability built in.
Decide whether the workload is truly Layer 7 or Layer 4 before doing anything else.
Health checks should reflect actual backend readiness so traffic is not sent to targets that appear alive but are not truly able to serve requests.
Separate public entry patterns from private backend logic and document how traffic should flow.
For Application Load Balancers, URL maps are central to good request routing and should not be treated as an afterthought. :contentReference[oaicite:27]{index=27}
Google supports multiple backend styles depending on load balancer mode, so choose what fits your workload platform instead of forcing one pattern everywhere. :contentReference[oaicite:28]{index=28}
Load balancing often works best when considered together with Cloud DNS, Cloud CDN, and Cloud Armor rather than as a standalone network feature.
Load balancers are powerful, but many issues come from design assumptions rather than from the service itself.
Choosing a Network Load Balancer for a Layer 7 routing need or an Application Load Balancer for a purely transport-layer problem can create avoidable complexity.
A health check that does not reflect real application readiness can make an unhealthy backend look available.
Teams sometimes expose a service publicly when the workload was meant to stay private, or choose an internal product when public reachability is required.
Application routing issues are often caused by URL map configuration rather than by backend failure. :contentReference[oaicite:29]{index=29}
Google’s resource model is multi-component, so ignoring that usually leads to debugging confusion. :contentReference[oaicite:30]{index=30}
DNS, firewall policy, backend readiness, and platform-specific backend design all influence whether the load balancer behaves as expected.
The fastest way to troubleshoot load balancing is to break the path into components instead of treating it as one black box.
Load balancing becomes easier to design when you connect it with the services around it.
DNS determines how clients reach the frontend in the first place.
CDN often works directly with public application delivery patterns.
Load balancers and edge protection are often planned together.
Traffic delivery still depends on the surrounding security model.
Internal load balancing patterns make more sense when the VPC design is clear.
Return to the main Google Cloud networking learning hub and keep building your content cluster.