Hi everyone,
Over the past three days, we've been seeing charges under the SKU "Network Internet Data Transfer Out from Americas to South America" in our GCP billing reports.
We've checked our VM instances, storage buckets, and other services but couldn't trace which specific resource is responsible for this outbound data. Even after enabling grouping by project, SKU, and labels in the billing dashboard, it’s still unclear where the traffic is originating from.
We’ve raised a support request but haven’t received any response yet.
Has anyone experienced a similar issue or can suggest how to:
Any help or insight would be greatly appreciated!
Thanks in advance.
Hi @Vijay4,
Welcome to Google Cloud Community!
VPC Flow Logs provide valuable insights into network throughput and performance, allowing you to identify sources within your VPC network. By analyzing these logs, you can optimize network traffic costs and use them for network forensics.
Here's a breakdown of how to trace this:
VPC Flow Logs provide detailed insights into both ingress and egress traffic within your VPC, helping you identify which instances, services, or IP addresses are generating traffic to South America.
Check for any firewall rules that might be causing routing outbound traffic across regions. Misconfigured firewall settings could cause traffic to be directed even if it's not originating from your resources.
External integrations or third-party services, such as Google Maps APIs or Cloud Pub/Sub, may unintentionally cause data to flow out of your region. Check if any of these services are generating cross-region traffic.
You can set up custom dashboards and alerts in Google Cloud Monitoring (formerly Stackdriver) to track network usage in real time.
If you have VPC peering or VPN connections established, cross-region traffic might be routed through those connections. Review your VPC peering or interconnect configurations to identify any potential causes of the charges.
Export your billing data to BigQuery for more detailed insights, and run SQL queries to pinpoint the specific services generating the charges. This will help identify any resources responsible for the data transfer to South America.
If you need further assistance, you can reach out to Google Cloud Support at any time.
Was this helpful? If so, please accept this answer as “Solution”. If you need additional assistance, reply here within 2 business days and I’ll be happy to help.
Hi...we are facing similar issues. During last 30 days, we see Network Data Cost going as high as 50% due to data transfer to "North America". We hardly have any user base in North America and historically Network Data Cost to North America was almost zero.
Vijay4, have you found any solution for huge Network Data cost from "Mumbai to South America". We are facing huge data cost due to this issue since last 30 days.
Yes, we recently encountered a similar issue involving unexpected charges under the "Network Internet Data Transfer Out from Americas to South America" SKU.
Here’s what we did to identify the root cause:
Enabled BigQuery Billing Export
We set up BigQuery export for detailed billing data. While it takes up to 24 hours to populate, it enabled us to run queries grouped by project, SKU, and instance ID. This was crucial in pinpointing the VM responsible for the outbound traffic.
Enabled Cloud Monitoring (Operations Suite)
We configured network-related metrics (like sent_bytes_count) across all VM instances and created dashboards to track traffic patterns. The visual spike in outbound traffic helped us quickly identify the affected instance.
Checked VPC Flow Logs (if enabled)
If VPC Flow Logs are active, they can help trace the exact source and destination of network traffic, providing deeper insight into unexpected egress.
Filtered BigQuery Data by resource.labels.instance_id or location
Filtering billing data by instance ID and location and grouping by project name and resource allowed us to isolate the issue effectively.
In our case, the source was a test server that had started generating high egress traffic. We immediately shut down and destroyed the server to prevent further charges.
If your issue involves a production server, we recommend enabling Google Cloud Armor and configuring tighter egress firewall rules to mitigate such risks in the future.
Thanks!