Configure per VM Tier_1 networking performance

Compute Engine lets you select a high-bandwidth per VM Tier_1 networking performanceconfiguration for certain Compute Engine virtual machine (VM) and bare metalinstances. Compute instances with Tier_1 networking configurations areespecially useful for large, distributed compute workloads with lots of heavyinternode communications, such as high performance computing (HPC), machinelearning (ML), and deep learning (DL).

Combining these high network throughput instances with high-performance LocalSSD storage is beneficial for I/O-intensive, flash-optimized databases.

Before you begin

Required roles

To get the permissions that you need to configure an instance to use per VM Tier_1 networking performance, ask your administrator to grant you the following IAM roles on your project:

For more information about granting roles, seeManage access to projects, folders, and organizations.

These predefined roles contain the permissions required to configure an instance to use per VM Tier_1 networking performance. To see the exact permissions that are required, expand theRequired permissions section:

Required permissions

The following permissions are required to configure an instance to use per VM Tier_1 networking performance:

  • To create instances:
    • compute.instances.create on the project
    • To use a custom image to create the VM:compute.images.useReadOnly on the image
    • To use a snapshot to create the VM:compute.snapshots.useReadOnly on the snapshot
    • To use an instance template to create the VM:compute.instanceTemplates.useReadOnly on the instance template
    • To assign alegacy network to the VM:compute.networks.use on the project
    • To specify a static IP address for the VM:compute.addresses.use on the project
    • To assign an external IP address to the VM when using a legacy network:compute.networks.useExternalIp on the project
    • To specify a subnet for the VM:compute.subnetworks.use on the project or on the chosen subnet
    • To assign an external IP address to the VM when using a VPC network:compute.subnetworks.useExternalIp on the project or on the chosen subnet
    • To set VM instance metadata for the VM:compute.instances.setMetadata on the project
    • To set tags for the VM:compute.instances.setTags on the VM
    • To set labels for the VM:compute.instances.setLabels on the VM
    • To set a service account for the VM to use:compute.instances.setServiceAccount on the VM
    • To create a new disk for the VM:compute.disks.create on the project
    • To attach an existing disk in read-only or read-write mode:compute.disks.use on the disk
    • To attach an existing disk in read-only mode:compute.disks.useReadOnly on the disk
  • To update an instance to include Tier_1 networking:
    • compute.instances.update
    • Permission to use the resources that you want to modify on the instance, forexamplecompute.networks.use
  • To create an instance template with Tier_1 networking:compute.instanceTemplates.create

You might also be able to get these permissions withcustom roles or otherpredefined roles.

Limitations

  • Compute Engine is the only product area supporting Tier_1 networking.
  • Tier_1 networking is supported with N2, N2D, C2, C2D, C3, C3D, C4, C4A,C4D, M3, and Z3 machine types that have the minimum required vCPUs.
  • For VMs, Tier_1 networking requires thegVNIC virtual network driverand agVNIC-compatible OS or custom image.
  • Third generation and laterVMs require gVNIC driver version 1.4.2 or later to deliver the highestnetwork bandwidth. Make sure the operatingsystem (OS) image that you use fully supports Tier_1 networking.Fully supported OS imagesinclude the updated gVNIC driver. You canupdate the gVNIC driveron images that don't have the latest version.
  • Purchasable stock keeping units (SKUs) for Tier_1 networking areexcluded fromcommitted use discounts.
  • Large C4, C4D, C3, C3D, and Z3 VMsmight encounter NUMA-related bottlenecks when bandwidth is pushed beyond100 Gbps. Depending on your application architecture, you might need tocontrol for thread and interrupt placement. On Linux, guest OSfeatures such asReceive Flow Steering (RFS)can help address this issue. Verify that your applications are NUMA-tuned tomaximize your performance.

Bandwidth tiers

The egress bandwidth limit represents the maximum possible amount of data perunit of time (for example, gigabits per second, or Gbps) that Google Cloudallows a Compute Engine instance to emit from its network interfaces(NICs). The egress bandwidth includes data transferred to all Persistent Disk andGoogle Cloud Hyperdisk volumes attached to the instance.

Note the following about bandwidth limits:

  • The default bandwidth limit ranges from 10 Gbps to 200 Gbps,depending on themachine type and instancesize.
  • Tier_1 networking increases the maximum egress bandwidth limit forcompute instances. The maximum egress bandwidth limit ranges from 50 Gbpsto 200 Gbps, depending on the size and machine type of your instance.
  • The actual egress bandwidth is always less than or equal to the egressbandwidth limit.

To achieve the highest possible egress bandwidth,all of the followingmust be true:

  • The sending and receiving compute instances must be in the same zone.
  • The instances must have NICs in the same VPC network or inVPC networks connected by VPC Network Peering.
  • Packets sent between the instances must useinternal IP address destinations.
  • The VPC network that is used by the instances uses the highestmaximum transmission unit (MTU) setting. A higher MTUreduces the packet-header overhead and thus increases payload data throughput.

For a complete discussion about egress and ingress bandwidth limits, seeNetwork bandwidth.

General-purpose C4 VMs and bare metal instances

The following table describes the egress bandwidth limits for C4 VMs andbare metal instances. For C4 VMs with Local SSD, only machine types with288 vCPUs support Tier_1 networking.

vCPUsInternal IPTier_1
Internal IP
External IPTier_1
External IP
210 GbpsN/A7 GbpsN/A
423 GbpsN/A7 GbpsN/A
823 GbpsN/A7 GbpsN/A
1623 GbpsN/A7 GbpsN/A
2423 GbpsN/A7 GbpsN/A
3223 GbpsN/A7 GbpsN/A
4834 Gbps50 Gbps7 Gbps25 Gbps
9667 Gbps100 Gbps7 Gbps25 Gbps
144100 Gbps150 Gbps7 Gbps25 Gbps
192100 Gbps200 Gbps7 Gbps25 Gbps
288100 Gbps200 Gbps7 Gbps25 Gbps

General-purpose C4A VMs

The following table describes the egress bandwidth limits for C4A VMs.

vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
110 GbpsN/A7 GbpsN/A
210 GbpsN/A7 GbpsN/A
423 GbpsN/A7 GbpsN/A
823 GbpsN/A7 GbpsN/A
1623 GbpsN/A7 GbpsN/A
3223 Gbps50 Gbps7 Gbps25 Gbps
4834 Gbps50 Gbps7 Gbps25 Gbps
6445 Gbps75 Gbps7 Gbps25 Gbps
7250 Gbps100 Gbps7 Gbps25 Gbps

General-purpose C4D instances

The following table describes the egress bandwidth limits for C4D instances.

vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
210 GbpsN/A7 GbpsN/A
420 GbpsN/A7 GbpsN/A
820 GbpsN/A7 GbpsN/A
1620 GbpsN/A7 GbpsN/A
3223 GbpsN/A7 GbpsN/A
4834 Gbps50 Gbps7 Gbps25 Gbps
6445 Gbps75 Gbps7 Gbps25 Gbps
9667 Gbps100 Gbps7 Gbps25 Gbps
192100 Gbps150 Gbps7 Gbps25 Gbps
384100 Gbps200 Gbps7 Gbps25 Gbps

General-purpose C3 VMs and bare metal instances

The following table describes the egress bandwidth limits for C3 VMs and baremetal instances.

Note: If you are using a C3 bare metal instance, you can maximize networkbandwidth performance by disabling sleep states. For more information, see thetroubleshooting documentation.
vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
423 GbpsN/A7 GbpsN/A
823 GbpsN/A7 GbpsN/A
2223 GbpsN/A7 GbpsN/A
4432 Gbps50 Gbps7 Gbps25 Gbps
8862 Gbps100 Gbps7 Gbps25 Gbps
176100 Gbps200 Gbps7 Gbps25 Gbps
192100 Gbps200 Gbps7 Gbps25 Gbps

General-purpose C3D VMs

vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
420 GbpsN/A7 GbpsN/A
820 GbpsN/A7 GbpsN/A
1620 GbpsN/A7 GbpsN/A
3020 Gbps50 Gbps7 Gbps25 Gbps
6040 Gbps75 Gbps7 Gbps25 Gbps
9060 Gbps100 Gbps7 Gbps25 Gbps
180100 Gbps150 Gbps7 Gbps25 Gbps
360100 Gbps200 Gbps7 Gbps25 Gbps

Compute-optimized H4D instances

The following table describes the egress bandwidth limits for H4D instances.

vCPUsInternal IPExternal IP
192200 Gbps1 Gbps

Compute-optimized H3 VMs

The following table describes the egress bandwidth limits for H3 VMs.

vCPUsInternal IPExternal IP
88200 Gbps1 Gbps

Compute-optimized C2 VMs

The following table describes the egress bandwidth limits for C2 VMs.

vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
410 GbpsNot applicable (N/A)7 GbpsN/A
816 GbpsN/A7 GbpsN/A
1632 GbpsN/A7 GbpsN/A
3032 Gbps50 Gbps7 Gbps7 Gbps
6032 Gbps100 Gbps7 Gbps7 Gbps

Compute-optimized C2D VMs

The following table describes the egress bandwidth limits for C2D VMs.

vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
210 GbpsNot applicable (N/A)7 GbpsN/A
410 GbpsN/A7 GbpsN/A
816 GbpsN/A7 GbpsN/A
1632 GbpsN/A7 GbpsN/A
3232 Gbps50 Gbps7 Gbps25 Gbps
5632 Gbps50 Gbps7 Gbps25 Gbps
11232 Gbps100 Gbps7 Gbps25 Gbps

Memory-optimized M4 VMs

The following table describes the egress bandwidth limits for M4 VMs.

vCPUsInternal IPExternal IP
1616 Gbps7 Gbps
3232 Gbps7 Gbps
5632 Gbps7 Gbps
6432 Gbps7 Gbps
11250 Gbps7 Gbps
224100 Gbps7 Gbps

Memory-optimized M3 VMs

The following table describes the egress bandwidth limits for M3 VMs.

vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
3232 GbpsN/A7 GbpsN/A
6432 Gbps50 Gbps7 Gbps25 Gbps
12832 Gbps100 Gbps7 Gbps25 Gbps

General-purpose N2 VMs

The following table describes the egress bandwidth limits for N2 VMs.

vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
210 GbpsNot applicable (N/A)7 GbpsN/A
410 GbpsN/A7 GbpsN/A
816 GbpsN/A7 GbpsN/A
1632 GbpsN/A7 GbpsN/A
3232 Gbps50 Gbps7 Gbps25 Gbps
4832 Gbps50 Gbps7 Gbps25 Gbps
6432 Gbps75 Gbps7 Gbps25 Gbps
8032 Gbps100 Gbps7 Gbps25 Gbps
9632 Gbps100 Gbps7 Gbps25 Gbps
12832 Gbps100 Gbps7 Gbps25 Gbps

General-purpose N2 (custom size shapes) VMs

The following table describes the egress bandwidth limits for custom-sized N2VMs.

vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
2, 4, or 610 GbpsNot applicable (N/A)7 GbpsN/A
8, 10, 12, or 1416 GbpsN/A7 GbpsN/A
16, 18, 20, 22, 24, 26, 28, or 3032 GbpsN/A7 GbpsN/A
32, 36, 40, 44, 48, 52, 56, or 6032 Gbps50 Gbps7 Gbps25 Gbps
64, 68, 72, or 7632 Gbps75 Gbps7 Gbps25 Gbps
80 or more32 Gbps100 Gbps7 Gbps25 Gbps

General-purpose N2D VMs

The following table describes the egress bandwidth limits for N2D VMs.

vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
210 GbpsNot applicable (N/A)7 GbpsN/A
410 GbpsN/A7 GbpsN/A
816 GbpsN/A7 GbpsN/A
1632 GbpsN/A7 GbpsN/A
3232 GbpsN/A7 GbpsN/A
4832 Gbps50 Gbps7 Gbps25 Gbps
6432 Gbps50 Gbps7 Gbps25 Gbps
8032 Gbps50 Gbps7 Gbps25 Gbps
9632 Gbps100 Gbps7 Gbps25 Gbps
12832 Gbps100 Gbps7 Gbps25 Gbps
22432 Gbps100 Gbps7 Gbps25 Gbps

General-purpose N2D (custom size shapes) VMs

The following table describes the egress bandwidth limits forcustom-sized N2D VMs.

vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
2 or 410 GbpsNot applicable (N/A)7 GbpsN/A
816 GbpsN/A7 GbpsN/A
16 or 3232 GbpsN/A7 GbpsN/A
48, 64, or 8032 Gbps50 Gbps7 Gbps25 Gbps
9632 Gbps100 Gbps7 Gbps25 Gbps

Memory-optimized X4 instance

The following table describes the egress bandwidth limits for X4 bare metalinstances.

Note: If using a X4 bare metal instance, to maximize network bandwidthperformance, see theTroubleshooting documentationfor information about disabling sleep states.
vCPUsInternal IPExternal IP
960100 Gbps7 Gbps
1440100 Gbps7 Gbps
1920100 Gbps7 Gbps

Storage-optimized Z3 VMs

The following table describes the egress bandwidth limits for Z3 VMs.

Note: If you are using a Z3 bare metal instance, you can maximize networkbandwidth performance by disabling sleep states. For more information, see thetroubleshooting documentation.
vCPUsInternal IPTier_1 Internal IPExternal IPTier_1 External IP
8, 14, 16, or 2223 GbpsN/A7 GbpsN/A
3232 GbpsN/A7 GbpsN/A
4432 Gbps50 Gbps7 Gbps25 Gbps
8862 Gbps100 Gbps7 Gbps25 Gbps
176100 Gbps200 Gbps7 Gbps25 Gbps
192100 Gbps200 Gbps7 Gbps25 Gbps

Configure an instance with Tier_1 networking

You can enable Tier_1 networking when creating a compute instance if theinstance doesn't use the VirtioNet interface. You can also edit an instanceto add or remove Tier_1 networking, provided the instance was created withthe gVNIC or IDPF network interface .

Optionally, you can alsoenable faster network packet processing with DPDKto run performance-intensive applications on an instance that usesTier_1 networking.

Create instances and containers that use Tier_1 networking

Use the Google Cloud console, the Google Cloud CLI or REST to addTier_1 networking to a new compute instance orcontainer.

Console

  1. In the Google Cloud console, go to theVM instances page.

    Go to VM instances

  2. Select your project.

  3. ClickCreate instance.

  4. Specify aName for your compute instance. For more information, seeResource naming convention.

  5. Select aregion and zone that supportsthe machine type you plan to use.

  6. Select aMachine configuration for your instance. To create aninstance with Tier_1 networking, you must select a supported machine series and type.

    • Click theGeneral purpose tab before selecting N2, N2D, C4, C4A, C4D,C3, or C3D from theSeries drop-down menu.
    • Click theCompute optimized tab before selecting C2 or C2D fromtheSeries menu.
    • Click theMemory optimized tab before selecting M3from theSeries menu.
    • Click theStorage optimized tab before selecting Z3 fromtheSeries menu.

    If you get an error that the machine type is not available in theselected region, change the region to one that supports your chosenmachine type.

  7. In theMachine type menu, choose a machine type that alignswith thebandwidth tier size requirements.

  8. To select a compatible operating system, in theBoot disksection, clickChange, and then select a supported operating systemor use theCustom Images tab to select acustom image.

  9. Optional. In theFirewall section, choose your firewall rules.

  10. Expand theAdvanced options section.

  11. Expand theNetworking section, and then do the following:

    1. In theNetwork interface card menu, selectgVNIC.

      Note: The option- in theNetwork interface card menuindicates that the NIC type can be either gVNIC or VirtioNet (VirtIO)depending on themachine type.For some machine types, only gVNIC is available for the networkinterface card. If both gVNIC and VirtIO are available for a VMinstance, then choose gVNIC instead of using the default NIC type,which is VirtIO.
    2. In theNetwork bandwidth section, select theEnable per VM Tier_1 networking performance checkbox.

    3. If the machine type supports multiple NICs or your instance uses IPv6addresses, then configure yourNetwork interfaces.

  12. ClickCreate.

gcloud

Use thegcloud compute instances create commandto create an instance with agVNIC virtual network driver.Use the--network-performance-configs flag and the--network-interface flag to configure a network performance settingfor an instance. If you don't specify these flags the instance is createdwith the default network performance configuration.

To create an instance running container images, use thegcloud compute instances create-with-container command.

gcloud compute instances createINSTANCE_NAME  \    --image=OS_IMAGE  \    --machine-type=MACHINE_TYPE  \    --network-performance-configs=total-egress-bandwidth-tier=TIER_1  \    --network-interface=nic-type=GVNIC

Replace the following:

For example:

gcloud compute instances create instance-1 \    --network-performance-configs=total-egress-bandwidth-tier=TIER_1 \    --network-interface=nic-type=GVNIC \    --image-family=rocky-linux-8-optimized-gcp \    --image-project=rocky-linux-cloud \    --machine-type=n2-standard-32

REST

Call the Compute Engine APIinstances.insert methodto create a compute instance with a high-bandwidth network configuration.In the request body, do the following:

  • Set thenetworkPerformanceConfig parameters tototalEgressBandwidthTier andTIER_1.
  • Set thenetworkInterface parameters tonicType andGVNIC.
POST https://compute.googleapis.com/compute/v1/projects/PROJECT_ID/zones/ZONE/instances{  "name":INSTANCE_NAME,    "description": string,    ...    "networkPerformanceConfig": {        "totalEgressBandwidthTier": TIER_1  },    "networkInterfaces": [      {        "nicType": "GVNIC"    },    ...    ]  }

Replace the following:

  • PROJECT_ID: your project ID
  • ZONE: the zonewhere you want to create the instance
  • INSTANCE_NAME: the name of the instance

Update a compute instance to include Tier_1 networking

Refer to theUpdating instance propertiesdocumentation to verify that you are meeting all the requirements tosuccessfully update your compute instance. Use the Google Cloud console, theGoogle Cloud CLI or REST to update an instance.

You can modify an existing instance to change the network configuration toinclude or exclude per VM Tier_1 networking performance. Your instance must already have agVNIC interface associated with it; you can't edit your instance to add anetwork interface. To update the network configuration, you must stop andrestart the instance.

Console

  1. In the Google Cloud console, go to theVM instances page.

    Go to VM instances

  2. Select your project.

  3. Click the name of the instance that you want to modify.

  4. ClickStopto stop the instance. If there is noStop option, clickMore actions >Stop.

  5. ClickEdit.

  6. If your instance was originally configured with a gVNIC card, select theEnable per VM Tier_1 networking performance checkbox to add per VM Tier_1 networking performance,or deselect the checkbox to remove this feature from your instance.

  7. Save your changes.

  8. Restart your instance.

gcloud

  1. Export your instance's information to a YAML file using thegcloud compute instances export command.

    gcloud compute instances exportINSTANCE_NAME \   --zone=ZONE --destination=PATH_TO_FILE

    Replace the following:

    • INSTANCE_NAME: the name of the instance
    • ZONE: the name of the zone where the instance is located
    • PATH_TO_FILE: the relative path to the YAML file

      For example:

         gcloud compute instances export instance-1 \       --zone=europe-west1-c --destination=test-file.yaml

  2. Use theCloud Shell Editor,or the editor of your choice to open the YAML file you created.

  3. In the file, locate the configuration section fornetworkPerformanceConfig. Change the setting fortotalEgressBandwidthTier as shown in the following example:

    networkPerformanceConfig: totalEgressBandwidthTier: TIER_1

    SettingtotalEgressBandwidthTier toTIER_1 addsTier_1 networking. Setting it toDEFAULT removes theconfiguration.

    Tip: To avoid getting an error such as"ERROR: (gcloud.compute.instances.update-from-file) Cannot parse YAML: [Expected type for field value, found True (type)]", add quotes (' ') around any label values ofyes orno in the exported instance configuration file. This indicates the values are strings, not Boolean values.
  4. Use thegcloud compute instance update-from-file commandto update the instance with the changes in the file.

     gcloud compute instances update-from-fileINSTANCE_NAME \     --zone=ZONE \     --source=PATH_TO_FILE \     --most-disruptive-allowed-action=RESTART

    Replace the following:

    • INSTANCE_NAME: the name of the instance
    • ZONE: the name of the zone where the instanceis located
    • PATH_TO_FILE: your YAML filename

    The--most-disruptive-allowed-action=RESTART flag setting automaticallyrestarts your instance with the updated configuration.

REST

Call theinstances.update methodto modify the network configuration.

PUT https://compute.googleapis.com/compute/v1/projects/PROJECT_ID/zones/ZONE/instances/RESOURCE_ID?most_disruptive_allowed_action=RESTART{  "networkPerformanceConfig":{      "totalEgressBandwidthTier": "TIER_1"  },...}

SettingtotalEgressBandwidthTier toTIER_1 addsTier_1 networking. Setting it toDEFAULT removes the configuration.

Replace the following:

  • PROJECT_ID: your project ID
  • ZONE: the zone where your instance resides
  • RESOURCE_ID: the name of your instance

Themost_disruptive_allowed_action=RESTART query parameterautomatically restarts your instance with the updated configuration.

Verify high-bandwidth configuration in a compute instance

Use the Google Cloud console, the Google Cloud CLI orREST to generate a description of an existing compute instance, or anexisting instance that runs container images, to verify the instances'sbandwidth tier.

Console

  1. In the Google Cloud console, go to theVM instances page.

    Go to VM instances

  2. Select your project and clickContinue.

  3. Click the instance name to see its configuration details and see ifthe instance uses per VM Tier_1 networking performance.

gcloud

Use thegcloud compute instances describe commandto check if your instance uses per VM Tier_1 networking performance.

For example:

gcloud compute instances describeINSTANCE_NAME  \    --format="text(name, networkPerformanceConfig)"

The output is similar to the following:

name: instance-1networkPerformanceConfig.totalEgressBandwidthTier:TIER_1

If the output shows the valueDEFAULT, then Tier_1 networkingisn't enabled.

REST

Call theinstances.get methodto view the network configuration.

GET https://compute.googleapis.com/v1/projects/PROJECT_ID/zones/ZONE/instances/RESOURCE_ID/

Replace the following:

  • PROJECT_ID: your project name
  • ZONE: the zone where your instance resides
  • RESOURCE_ID: the name of your instance

The output should contain the following lines:

{  "name":RESOURCE_ID,    "description": string,    ...    "networkPerformanceConfig": {        "totalEgressBandwidthTier": "TIER_1"    },    ...  }

If the output shows the valueDEFAULT, then Tier_1 networking is notenabled.

Create an instance template with Tier_1 networking

Use the Google Cloud console, the Google Cloud CLI orREST to create an instance template with per VM Tier_1 networking performance.Refer to theCreating an instance templatedocumentation to verify that you are meeting all the requirements to createyour instance template.

Console

  1. In the Google Cloud console, go to theInstance templates page.

    Go to Instance templates

  2. ClickCreate instance template.

  3. Enter values for the following fields, or accept the default values.

  4. Specify aName for your instance template. For more information, seeResource naming convention.

  5. Select aregion and zone that supportsTier_1 networking.

  6. Select aMachine configuration for your compute instance. To createan instance that uses Tier_1 networking, you must select a supportedmachine series and machine type.

    • Click theGeneral purpose tab before selecting N2, N2D, C4, C4A,C4D, C3, or C3D from theSeries drop-down menu.
    • Click theCompute optimized tab before selecting C2 or C2D fromtheSeries menu.
    • Click theStorage optimized tab before selecting Z3 fromtheSeries menu.
  7. In theMachine type menu, choose a machine type that aligns with thebandwidth tier size requirements.

  8. In theBoot disk section, clickChange, and then select agVNIC-compatible orcustom image.

  9. Optional. In theFirewall section, choose your firewall rules.

  10. Expand theAdvanced options section.

  11. Expand theNetworking section, and then do the following:

    1. In theNetwork interface card menu, selectgVNIC.

      Note: The option- in theNetwork interface card menuindicates that the NIC type can be either gVNIC or VirtioNet (VirtIO)depending on themachine family type.For some machine family types, only gVNIC is available for the networkinterface card. If both gVNIC and VirtIO are available for the machinetype, then choose gVNIC instead of using the default NIC type, whichis VirtIO.
    2. In theNetwork bandwidth section, select theEnable per VM Tier_1 networking performance checkbox.

    3. If the machine type supports multiple NICs or the instance uses IPv6addresses, then configure theNetwork interfaces accordingly.

  12. ClickCreate.

gcloud

Use thegcloud compute instance-templates create commandwith both the--network-performance-configs and the--network-interfaceflags.

gcloud compute instance-templates createINSTANCE_TEMPLATE_NAME \    --image=OS_IMAGE \    --machine-type=MACHINE_TYPE \    --network-performance-configs=total-egress-bandwidth-tier=TIER_1 \    --network-interface=nic-type=GVNIC

Replace the following:

  • INSTANCE_TEMPLATE_NAME: the name of your instance template
  • OS_IMAGE: an operating system image that supportsgVNIC
  • MACHINE_TYPE: a machine type that supports Tier_1 networking, as described inBandwidth tiers.

For example:

gcloud compute instance-templates create instance-template-1 \    --image-family=rocky-linux-8-optimized-gcp \    --image-project=rocky-linux-cloud \    --network-performance-configs=total-egress-bandwidth-tier=TIER_1 \    --machine-type=n2-standard-32 \    --network-interface=nic-type=GVNIC

REST

Call theinstanceTemplates.insert method.Within the request body, set thenetworkPerformanceConfig parametertototalEgressBandwidthTier andTIER_1. Set thenetworkInterfacesparameter tonicType andGVNIC.

POST https://compute.googleapis.com/compute/v1/projects/PROJECT_ID/global/instancesTemplates{  "name": "INSTANCE_TEMPLATE_NAME",  "properties": {    "machineType": "zones/ZONE/machineTypes/MACHINE_TYPE",    ...    "networkPerformanceConfig": {        "totalEgressBandwidthTier": "TIER_1"     },    "networkInterfaces": [      {        "nicType": "GVNIC"      },    ...    ]  }}

Replace the following:

  • PROJECT_ID: your project name
  • INSTANCE_TEMPLATE_NAME: a name for the instancetemplate
  • ZONE: the zone where your instance is located
  • MACHINE_TYPE: the machine type of the instance
  • RESOURCE_ID: the name of your instance

Benchmark a higher bandwidth configuration

You canrun a benchmark testto check your compute instances's performance with per VM Tier_1 networking performance. Besure toremove the benchmarking resourcesthat you create during testing when you are finished to avoid unexpectedresource charges.

What's next

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-12-15 UTC.