HTTPS traffic enters via Cloud Load Balancer to private app services. Pub/Sub and Storage trigger GPU GKE workers in an ...
HTTPS traffic enters via Cloud Load Balancer to private app services. Pub/Sub and Storage trigger GPU GKE workers in an isolated AI subnet, with private SQL and controlled egress via Cloud NAT.
High-Level Overview Public Access: The only public entry point is via HTTPS through a Cloud Load Balancer, which routes traffic securely to backend services within a private VPC. Private Networking: All compute and data services live inside a VPC (Virtual Private Cloud) divided into two subnets: App Subnet (10.0.1.0/24) — web and backend workloads AI Subnet (10.0.2.0/24) — machine learning and GPU workloads 🧩 Components Breakdown 🌐 App Subnet Backend API: Runs on Cloud Run or GKE, accessible only via private IPs within the VPC. React Frontend: Hosted via Cloud Storage + CDN for performance and scalability. Cloud SQL (MySQL): Private IP access only for secure database communication. Cloud Storage (Input Bucket): Used to store input data for AI workloads. Pub/Sub (Input Topic): Used for event-driven communication between app and AI subsystems. 🤖 AI Subnet GKE GPU Workers: GPU-enabled nodes for heavy AI processing (e.g., inference or training tasks). Gemini API: AI service that consumes data from Pub/Sub and may egress via Cloud NAT for controlled outbound access. Cloud Storage (Output Bucket): Secure output location for processed AI data. Pub/Sub (Response Topic): Used for asynchronous communication back to the app or downstream consumers. 🌩️ Network Security Private Access Only: No direct internet exposure for compute or data components. Cloud NAT Gateway: Provides managed outbound internet access (for updates, external APIs, etc.) only to approved components such as the Gemini API. HTTPS Only Ingress: Ensures encrypted external communication. ✅ Key Benefits Strong isolation between web and AI workloads. Private communication within the VPC (no public IPs). Scalability via GKE and Pub/Sub decoupling. Compliance-ready design with least-privilege access and managed services.
Sign in to join the discussion
Sign in to commentBe the first to comment
Share your thoughts on this architecture
about 2 months ago
I appreciate the thoroughness of your architecture design, particularly in terms of security and network isolation. However, one significant tradeoff I see is the reliance on Cloud NAT for outbound internet access, specifically for your GKE GPU workers and the Gemini API.
Santhosh S
@sardyshan
Open an interactive version — fork it, generate AI variants, or share it with your team.
Make this template your own
Takes 30 seconds • No credit card required
Estimated monthly cost
$208.30/month
10 cloud services in this architecture
Ready to build this?
Clone this architecture into your workspace and deploy it to your cloud account.
Takes 30 seconds • No credit card required
Create a global e-commerce platform with multi-cloud redundancy. Use AWS in us-east-1 for the primary application with…
Build an ML training and deployment platform on GCP with Vertex AI, Cloud Storage, BigQuery, Cloud Functions, and…
Design a microservices architecture on GCP with GKE cluster, Cloud Load Balancing, Cloud SQL, Pub/Sub for messaging,…
1. VM Instances (Compute Engine) You created three individual VMs: www1, www2, www3 Each has Apache web server…