For AI agents: a documentation index is available at the root level at /llms.txt and /llms-full.txt. Append /llms.txt to any URL for a page-level index, or .md for the markdown version of any page.
Trust CenterStatusSupportGet a demoPlatform
DocumentationEvals API ReferenceIntegrations & OTELPlatform SettingsSelf-HostingChangelog
DocumentationEvals API ReferenceIntegrations & OTELPlatform SettingsSelf-HostingChangelog
    • Self-Hosting
    • Security & Compliance
  • AWS Deployment
    • Overview
    • Quickstart
    • Requirements
  • Azure Deployment
    • Overview
    • Quickstart
    • Requirements
  • GCP Deployment
    • Overview
    • Quickstart
    • Requirements
LogoLogo
Trust CenterStatusSupportGet a demoPlatform
On this page
  • Overview
  • Technologies
  • Resource allocation
  • Understanding resource sizing
  • GCP services
  • Outbound network requirements
  • Permissions
  • Estimated costs
  • Pre-deployment checklist
  • Next steps
GCP Deployment

Requirements

Was this page helpful?
Previous

Prerequisites

Next
Built with

Overview

Before starting deployment, review these requirements with your infrastructure and security teams. This page covers:

  • Technologies that need approval in your environment
  • Resource sizing for staging and production
  • GCP services that will be provisioned
  • Permissions required for deployment
  • Estimated costs and considerations

Understanding these requirements upfront prevents delays caused by missing approvals or insufficient quotas.

Technologies

Confident AI uses the following technologies. Your organization may require approval before deploying new technologies:

TechnologyVersionPurpose
PostgreSQL17.xPrimary database (via Cloud SQL for PostgreSQL)
ClickHouseLatestAnalytics database (via ClickHouse Operator)
Redis7.xSession cache and job queues
Kubernetes1.31+Container orchestration (via GKE)
Node.js20.xBackend and frontend runtime
Python3.11+Evaluations service runtime
Terraform1.5+Infrastructure provisioning
Helm3.xKubernetes package management
ArgoCD2.xGitOps continuous delivery
External Secrets Operator0.9+Secrets sync from Google Secret Manager
cert-manager1.17+TLS certificate automation

Why this tech stack? PostgreSQL is the application’s source of truth. Redis provides fast caching and manages background job queues. Kubernetes enables reliable, scalable container orchestration. External Secrets keeps credentials in Secret Manager (your security team’s preferred location) while making them available to pods.

Technology approval processes: Many enterprises have technology review boards or approved software lists. If PostgreSQL, Kubernetes, or Terraform aren’t already approved in your environment, initiate that process early—it can take weeks.

Resource allocation

Default resource configurations for staging and production environments. These represent starting points—adjust based on your expected workload.

ResourceStagingProduction
GKE System Pool2x n2-standard-4 (4 vCPU, 16GB)2x n2-standard-4 (4 vCPU, 16GB)
GKE Worker Pool4x n2-standard-8 (8 vCPU, 32GB)4x n2-standard-8 (8 vCPU, 32GB)
GKE Worker Autoscaling2-8 nodes2-8 nodes
Cloud SQLdb-custom-4-16384 (4 vCPU, 16GB), 64GB storagedb-custom-4-16384 (4 vCPU, 16GB), 64GB storage

Understanding resource sizing

GKE worker nodes run your application containers. More nodes = more capacity for concurrent users and evaluations. The autoscaler adds nodes during high load and removes them when idle.

GKE system pool runs Kubernetes system components (kube-dns, kube-proxy, etc.) on a fixed set of 2 nodes.

Cloud SQL for PostgreSQL stores all application data. The machine type affects query performance; storage grows as you accumulate data.

Which service is most resource-intensive? The evaluations service (confident-evals) consumes the most CPU during evaluation runs—it processes LLM outputs and computes metrics. If evaluations are slow, scale this service first before adding nodes.

GCP CPU quotas can block deployment. GCP projects have default limits on CPUs per region and per VM family. A typical deployment needs ~40 vCPUs of N2_CPUS (2×4 system + 4×8 worker).

Check your quotas before starting:

  • GCP Console → IAM & Admin → Quotas → Filter by “N2 CPUs” in your target region

If your limit is low, request an increase—this can take hours to days.

GCP services

The deployment provisions the following GCP services:

ServicePurposeWhy it’s needed
GCP ProjectLogical container for all resourcesOrganizes and manages lifecycle
VPC NetworkIsolated network with multiple subnetsNetwork isolation and security
GKEManaged Kubernetes control plane and nodesRuns application containers
Cloud SQL for PostgreSQLManaged PostgreSQL instanceStores all application data
Cloud StorageGCS buckets for application dataFile uploads, exports, and backups
Secret ManagerSecure credential storageStores API keys, DB passwords, secrets
Service AccountsIAM service accounts for Workload IdentityGrants pods specific GCP permissions
Cloud NATOutbound internet for GKE subnetAllows pods to call external APIs
VPC Firewall RulesFirewall rules for GKE subnetControls inbound/outbound traffic
Cloud DNS Private ZoneDNS resolution for Cloud SQLPrivate database connectivity
Private Service ConnectPrivate access to GCSStorage traffic stays on Google backbone
Cloud Load BalancingNetwork LB for NGINX IngressRoutes traffic to services

Some organizations restrict which GCP services can be used. Organization policies or folder-level constraints may prohibit certain services. Verify the services above are allowed in your project before proceeding.

Common restrictions that cause issues:

  • Cloud NAT (some orgs require shared NAT infrastructure)
  • Secret Manager (some orgs require centrally managed vaults)
  • Service Account creation (some orgs require pre-provisioned identities)
  • External IP allocation (some orgs restrict public IPs)

Outbound network requirements

Confident AI needs to reach external services. Ensure your network allows outbound HTTPS (port 443) to:

ServiceWhy
api.openai.comRunning LLM evaluations
*.ecr.amazonaws.comPulling container images
github.comArgoCD GitOps syncing

Corporate proxies and firewalls: If your organization routes traffic through a proxy or inspects HTTPS, you may need to:

  • Allowlist the domains above
  • Configure proxy settings in the deployment
  • Get certificate exceptions for HTTPS inspection

Network restrictions are a common cause of deployment failures that appear as timeouts or SSL errors.

Permissions

The identity running Terraform needs the following GCP IAM roles or equivalent permissions:

  • Editor on the project (or a custom equivalent)
  • Project IAM Admin for creating IAM bindings
  • Secret Manager Admin for managing Secret Manager secrets

Terraform creates and manages:

  • Projects (if creating new), VPCs, subnets, firewall rules, Cloud NAT
  • GKE clusters and node pools
  • Cloud SQL instances and databases
  • GCS buckets and IAM
  • Secret Manager secrets
  • Service Accounts and Workload Identity bindings
  • IAM role bindings

Permissions are a common cause of deployment failures. Most organizations don’t grant broad permissions by default.

Options:

  1. Use Editor + Project IAM Admin temporarily — Simplest for initial deployment. Restrict after success.
  2. Request specific permissions — Work with your cloud security team to create a deployment service account with the permissions above.
  3. Have a platform team deploy — If you can’t get permissions, have someone who does run Terraform.

Estimated costs

GCP costs vary by region and usage. Approximate monthly costs for always-on infrastructure:

ComponentStagingProduction
GKE Control Plane$75 (Standard)$75 (Standard)
GKE Nodes (VMs)$800-1600$800-1600
Cloud SQL$200$200
Cloud NAT$35$35
Storage + Data Transfer~$10$10-50
Load Balancer$20$20
Total (approx)$1140-1940$1140-1940

These are estimates. Actual costs depend on:

  • Region (us-central1 is typically cost-effective)
  • Usage (more evaluations = more compute = higher cost)
  • Data volume (Cloud SQL storage, GCS objects)
  • Committed-use discounts (can reduce VM costs 30-50%)

Use GCP Billing and Cost Management after deployment to track actual spending.

Pre-deployment checklist

Before proceeding to Prerequisites, verify:

  • Technologies listed above are approved for use
  • GCP services above can be provisioned (no Org Policy blocks)
  • Permissions available or obtainable
  • CPU quotas sufficient for desired node count
  • Outbound network access available or exceptions requested
  • Budget approved for estimated costs
  • Security team aware of deployment plan

Next steps

Once requirements are understood and approved, proceed to Prerequisites to set up your deployment environment.