Serverless VPC Access for the PCA Exam

GCP Study Hub
Ben Makansi
February 23, 2026

Serverless VPC Access is one of those features that only makes sense once you understand what serverless platforms give up in exchange for their simplicity. On the Professional Cloud Architect exam, the question rarely tests the configuration itself. It tests whether you recognize that a serverless service cannot reach a private VPC resource without a deliberate bridge between them.

Why serverless services need a bridge

Serverless products like App Engine, Cloud Run, and Cloud Functions abstract away infrastructure management, and that abstraction extends to networking. You do not pick a subnet, you do not attach a NIC, you do not manage a network interface at all. That is the entire appeal of going serverless. You hand off scaling and provisioning to Google, and your code runs.

The trade-off is that your serverless workload does not automatically live inside any VPC network. It runs in Google-managed infrastructure with public egress. If the resource you need to talk to has a public IP and accepts requests from the internet, you are fine. If the resource lives inside a VPC and only accepts traffic from inside that VPC, your serverless workload has no path to it.

What Serverless VPC Access does

Serverless VPC Access creates that path. It provisions a connector that sits between your serverless service and a VPC network. Outbound traffic from the serverless workload routes through the connector and enters the VPC as if it originated from inside the network. From there it can reach any resource the VPC routes to, including resources connected through Cloud VPN or Cloud Interconnect.

The example I find clearest is an App Engine application that needs to reach an on-premises database. The database sits in a corporate data center and is connected to a VPC through Cloud VPN. The VPC routing tables already know how to reach the on-prem network. The missing piece is getting App Engine traffic into the VPC in the first place. Serverless VPC Access provides that entry point. App Engine sends the request through the connector, the connector hands it to the VPC, and the VPC routes it through the VPN tunnel to the on-prem database.

What this means for the exam

For the Professional Cloud Architect exam, the pattern to recognize is any scenario where a serverless service needs to reach a resource that is not on the public internet. That includes Compute Engine VMs with private IPs, GKE pods, Cloud SQL instances configured for private IP access, and anything reachable through a hybrid connection like Cloud VPN or Cloud Interconnect. In all of these cases, Serverless VPC Access is the answer.

The inverse direction is a different problem. If you need a VPC resource to call a serverless service, you do not need Serverless VPC Access. You need Private Google Access or Private Service Connect, depending on the specifics. Serverless VPC Access is specifically about traffic flowing out of the serverless workload and into the VPC.

My Professional Cloud Architect course covers Serverless VPC Access alongside the rest of the networking material.

arrow