All posts

The simplest way to make Cloud Run GlusterFS work like it should

Your container boots. Requests fly in. Then someone asks why logs vanish every time you deploy a new revision. That’s when you realize Cloud Run’s temporary filesystem isn’t the villain, it’s just doing exactly what it promised—stateless execution. You need persistent storage with shared access, and that’s where Cloud Run GlusterFS comes into play. GlusterFS is a distributed file system that scales horizontally and unifies storage from multiple nodes into one mount point. Cloud Run is Google’s

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Your container boots. Requests fly in. Then someone asks why logs vanish every time you deploy a new revision. That’s when you realize Cloud Run’s temporary filesystem isn’t the villain, it’s just doing exactly what it promised—stateless execution. You need persistent storage with shared access, and that’s where Cloud Run GlusterFS comes into play.

GlusterFS is a distributed file system that scales horizontally and unifies storage from multiple nodes into one mount point. Cloud Run is Google’s fully managed container platform that scales your apps down to zero when idle. Together, they create a neat trick: a serverless workload that still gets reliable, multi-node storage without rewriting half your application. It’s the tension between ephemeral compute and persistent state resolved cleanly.

But integration takes precision. Cloud Run doesn’t mount network volumes directly, so you orchestrate the link through an intermediary—typically a Gluster client running in a separate managed VM or Kubernetes pod. That client speaks CIFS or NFS to Gluster, then proxies requests to your Cloud Run service via private VPC connection. Identity and access management flow through Google IAM, while storage permissions align via POSIX or RBAC inside GlusterFS.

The workflow looks like this: deploy Gluster across multiple persistent disks, configure volume replication, expose the share through NFS, and route Cloud Run requests over private networking. Each Gluster volume provides redundancy and speed through striping and replication. You get high availability without refactoring every file write to blob storage.

A few best practices keep things sane:

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
  • Use IAM to enforce least-privilege access between Cloud Run and the Gluster gateway.
  • Rotate service account keys automatically with tools like Vault or workload identity federation.
  • Enable geo-replication in GlusterFS for consistent multi-region performance.
  • Monitor file I/O latency through Cloud Monitoring; spikes mean replication needs tuning.

The result feels almost telepathic:

  • Stateful transaction logs survive across revisions.
  • Shared uploads persist for concurrent service instances.
  • Backup jobs run through native Gluster replication.
  • No sticky sessions, no messy pods, just fast persistent data anywhere Cloud Run goes.

For developers, the daily friction drops fast. Testing persistent features doesn’t require external mocks. Deployments move quicker because filesystem differences vanish behind a unified Gluster layer. Your DevOps team can automate state handling rather than scramble to rebuild it after every service push.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. When Cloud Run and GlusterFS mix with identity-aware routing, hoop.dev makes sure the permissions stick—no accidental exposure, no surprise public endpoints. It’s policy built into the workflow, not bolted on later.

How do I connect Cloud Run to GlusterFS storage reliably?
Run GlusterFS on Compute Engine or within GKE, expose the NFS share on a private IP, and connect Cloud Run through a Serverless VPC Connector. This setup keeps the traffic internal, fast, and compliant with SOC 2-level isolation.

As AI systems start automating build and deployment decisions, pairing Cloud Run with GlusterFS ensures model outputs and artifacts persist securely. It guards prompts, logs, and generated data against accidental deletion while letting copilots observe real application state in production.

In the end, Cloud Run plus GlusterFS gives ephemeral compute a memory. You keep serverless speed, get distributed durability, and cut storage overhead to muscle instead of fat.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts