Since private service connect endpoint is shared across all PAAS services, is there a way to map PAAS asset based on firewall logs destination IP address or anything unique in firewall logs to figure out the asset where the request is sent to?
Also for public deployments, any random public IP will be chosen, Is there any documentation on mapping PAAS services to respective public IP subnets so that If I see public IP in firewall logs, I can figure out which PAAS service the request has been sent to?
Hi @Likhitha1,
Welcome to Google Cloud Community!
When utilizing Private Service Connect, multiple PaaS services may share the same private endpoint, which can complicate the identification of specific services based solely on destination IP addresses in firewall logs. Use VPC flow logs and correlate it with service logs to enhance visibility:
Enable VPC Flow Logs
Correlate with Service Logs
For more information on configuring security and logging for Private Service Connect, refer to this link.
For publicly accessible PaaS services, Google Cloud assigns IP addresses from a broad range of public IPs. To obtain the net list of default domain IP ranges for Google APIs and services, see Obtain Google IP address ranges.
For more detailed insights you may reach out to Google Cloud Support for assistance.
Was this helpful? If so, please accept this answer as “Solution”. If you need additional assistance, reply here within 2 business days and I’ll be happy to help.