LOG IN SIGN UP
Documentation

Google Cloud Storage

Google Cloud Storage (GCS) can be used as an origin server with your Fastly services once you set up and configure your GCS account and link it to a Fastly service. It can also be configured to use private content. This speeds up your content delivery and reduces your origin’s workload and response times with the dedicated links between Google and Fastly's POPs.

Using GCS as an origin server

To make your GCS data available through Fastly, follow the steps below.

Setting up and configuring your GCS account

  1. Sign up for Google Cloud Storage and start the basic setup.
  2. Create a bucket to store your origin's data and remember the name. You'll need the bucket name to connect your GCS account to your Fastly service.

    Google Cloud Storage New Bucket window

  3. Add a file to the bucket and then make the file public.

    Google Cloud Storage Public File example

Creating a new origin in your Fastly service for your GCS account

Link your GCS account to a Fastly service following the steps below.

  1. Log in to the Fastly web interface and click the Configure link.
  2. Create a new service if you don't already have one set up.
  3. From the service menu, select the appropriate service.
  4. Click the Edit configuration button and then select Clone active. The service version page appears.
  5. Click the Origins tab. The Origins page appears.
  6. Click the Create host button. The Create a new host page appears.

    adding Google Cloud new host

  7. Fill out the Create a new host fields as follows:

    • In the Address field, type the address of your secure server (for example, origin.example.com), and in the port field, type 443.
    • From the Shielding menu, select an available interconnect location from the list of shielding locations. See our information on interconnect locations below for more details.
    • Leave the Health check and Auto load balance menus set to their default values.
    • In the Description field, type the name of your server (for example, Google Cloud Storage).
  8. Click the Create button. A new host appears on the Origins page.

Interconnect locations

The following interconnects allow you to establish direct links with Google's edge network when you choose your shielding location. By selecting one of the locations listed below, you will be eligible to receive discounted pricing from Google CDN Interconnect for traffic traveling from Google Cloud Platform to Fastly's network. Most customers select interconnects closest to their origin.

Interconnects exist in the following locations within North America:

Interconnects outside of North America exist in:

Review our caveats of shielding and select an interconnect accordingly.

Setting the Cache-Control header for your GCS bucket

GCS performs its own caching, which may complicate efforts to purge cache. To avoid potential problems, we recommend using the gsutil command line utility to set the Cache-Control header for one or more files in your GCS bucket:

gsutil setmeta -h "Cache-Control: max-age=0, s-maxage=86400" gs://bucket/*.html

Replace bucket in the example above with your GCS bucket's name. Note that max-age should instruct GCS to cache your content for zero seconds, and Fastly to cache your content for one day. See Google's setmeta docs for more information.

Setting the default host for your service to your GCS bucket

  1. Log in to the Fastly web interface and click the Configure link.
  2. From the service menu, select the appropriate service.
  3. Click the Edit configuration button and then select Clone active. The service version page appears.
  4. Click the Settings tab. The Settings page appears.

    the Settings page

  5. In the Override host area, click the Specify an override host button. The Add an override host header window appears.

    the Add an override host header window

  6. Type the name of the override host for this service. The name you type should match the name of the bucket you created in your GCS account and will take the format <your bucket name>.storage.googleapis.com. For example, if your bucket name is test123, your override host name would be test123.storage.googleapis.com.

  7. Click the Save button. A new override host appears on the Settings page.

Changing the default TTL for your GCS bucket

If you want to change the default TTL for your GCS bucket, if at all, keeping the following in mind:

Creating new domains for GCS to respond to

  1. Log in to the Fastly web interface and click the Configure link.
  2. From the service menu, select the appropriate service.
  3. Click the Edit configuration button and then select Clone active. The service version page appears.
  4. Click the Domains tab. The Domains page appears.

    the Domains page, without any domains created

  5. Click the Create domain button. The Create a new domain page appears.

    the new domain

  6. In the Domain Name field, type the name users will type in their browsers to access your site.

  7. Click the Create button. A new domain appears on the Domains page.

  8. Because GCS responds to different hostnames than your Fastly service, click the Create domain button to create a second domain. The Domains page appears. Follow the domain creation steps immediately above.

  9. In the Domain Name field of the second domain you create, type the same value as the default host you created earlier (e.g., <your bucket name>.storage.googleapis.com) and click the Create button. A new domain appears on the Domains page. Shielding POPs need this additional domain so they can route requests correctly. (See Caveats of Shielding for more information.)

  10. Click the Activate button to deploy your configuration changes.

Once you deploy, you can use http://<domain>.global.prod.fastly.net/<filename> to access the files you uploaded.

Using GCS with private objects

To use Fastly with GCS private objects, be sure you've already made your GCS data available to Fastly by pointing to the right GCS bucket, then follow the steps below.

Setting up interoperable access

By default, GCS authenticates requests using OAuth2, which Fastly does not support. To access private objects on GCS, your project must have HMAC authentication enabled and interoperable storage access keys (an "Access Key" and "Secret" pair) created. Do this by following the steps below.

  1. Open the Google Cloud Platform console and select the appropriate project.
  2. Click Settings. The Settings appear with the Project Access controls highlighted.
  3. Click the Interoperability tab. The Interoperability API access controls appear.
  4. If you have not set up interoperability before, click Enable interoperability access.
  5. Click Make <PROJECT-ID> your default project for interoperable access. If that project already serves as the default project, that information appears instead.

    the interoperability tab

  6. Click Create a new key. An access key and secret code appear.

    the google cloud storage access key

  7. Save the access key and secret code that appear. You'll need these later when you're creating an authorization header.

Setting up Fastly to use GCS private content

To use GCS private content with Fastly, create two headers, a Date header (required Authorization Signature) and an Authorization header.

Creating a Date header

  1. Log in to the Fastly web interface and click the Configure link.
  2. From the service menu, select the appropriate service.
  3. Click the Edit configuration button and then select Clone active. The service version page appears.
  4. Click the Content tab. The Content page appears.
  5. Click the Create header button. The Create a new header page appears.

    creating a date header via the new header page

  6. Fill out the Create a new header fields as follows:

    • From the Type menu, select Request, and from the Action menu, select Set.
    • In the Destination field, type http.Date.
    • In the Source field, type now.
    • From the Ignore if set menu, select No.
    • In the Priority field, type 10.
    • In the Description field, type Date.
  7. Click the Create button. A new Date header appears on the Content page. You will use this later within the Signature of the Authorization header.

Creating an Authorization header

  1. Click the Create header button again to create another new header. The Create a new header page appears.

    creating an authorization header via the new header page

  2. Fill out the Create a new header fields as follows:

    • From the Type menu, select Request, and from the Action menu, select Set.
    • In the Destination field, type http.Authorization.
    • From the Ignore if set menu, select No.
    • In the Priority field, type 20.
    • In the Description field, type Authorization.
  3. In the Source field, type the header authorization information using the following format:

      "AWS <access key>:" digest.hmac_sha1_base64("<GCS secret>", req.request LF LF LF req.http.Date LF "/<GCS bucket name>" req.url.path)
    

    replacing <access key>, <GCS secret>, and <GCS bucket name> with the information you gathered before you began. For example:

      "AWS GOOGQORE5WOJJHLXH6OD:" digest.hmac_sha1_base64("oQb0hdmaxFOc5UmC6F833Cde0+ghRSgsr7CCnX62", req.request LF LF LF req.http.Date LF "/test123" req.url.path)
    
  4. Click the Create button. A new Authorization header appears on the Content page.

  5. Click the Activate button to deploy your configuration changes.

A detailed look at the Source field

So what's going on in the Source field of the Authorization header? Here's the basic format:

AWS<access key><signature function><key><message>

It tells us the following:

Element Description
AWS A constant placed before the access key. It's always AWS.
access key The access key ID from your GCS developer's account. We used GOOGQORE5WOJJHLXH6OD in this example.
signature function The algorithm used to validate the key and message of the signature. We used digest.hmac_sha1_base64(<key>, <message>) in this example.
key The secret key ID from your GCS developer's account. We used oQb0hdmaxFOc5UmC6F833Cde0+ghRSgsr7CCnX62 in this example.
message The UTF-8 encoding of the StringToSign. See the table below for a break down of each portion of the message.

The message that's part of the Source field in the Authorization header takes on this basic format:

<HTTP-verb><\n><Content-MD5>\n<Content-Type><\n><Date><\n><CanonicalExtensionHeaders><\n><CanonicalizedResource>

It tells us the following:

Element Description
HTTP-verb The REST verb. We use req.request in this example.
\n A newline indicator constant. It's always \n.
Content-MD5 The content-md5 header value, used as a message integrity check. It's often left blank. We use LF (line feed) in this example.
Content-Type The content-type header value, used to specify the MIME-type. It's often left blank. We use LFin this example.
Date The date and time stamp. We use req.http.Date (which we created first as a separate header in the steps above).
CanonicalExtensionHeaders The x-amz- or x-goog- headers, which customize your GCS implementation. It's often left blank. We use LF in this example.
CanonicalizedResource Your GCS resource path name. We're concatenating GCS bucket name "/test123" with object path req.url.path in this example.

Back to Top