Cloud Run solves some common serverless pain points

Google recently announced Cloud Run, a new serverless compute platform for containerized apps that offers built-in portability. It’s meant to help solve some of the biggest pain points for developers when it comes to working with serverless offerings. To learn more about the tool and what it provides, here’s a rundown.

About Cloud Run

Cloud Run is now available in beta. It allows you to run stateless HTTP-driven containers while it takes care of all the infrastructure management tasks like provisioning, configuring, scaling, and server management. It also scales automatically depending on traffic to help users keep costs under control.

Traditionally, serverless tools have presented some challenges for users, like constrained runtime support and vendors that are locked in. Basically, developers had to choose whether or not the speed and ease of serverless was worth losing that flexibility and portability that comes with containers. Cloud Run is meant to help you solve that problem, giving developers what it calls “the best of both worlds.”

You also have the option of customizing your Cloud Run experience using third party tools and APIs. Here are a couple of the options that users are taking advantage of.


Cloud Run is based on an open API and runtime environment called Knative. Knative lets you run serverless workloads that are fully managed on GCP or your own clusters from anywhere. So if you want to run workloads on-premises or across multiple cloud environments. You can use Knative in your own clusters or migrate that data to Cloud Run.


Cloud Run is also available on GKE, allowing you to access all the benefits of both platforms at once. This means you can deploy stateless HTTP service and run serverless workloads right on your existing GKE clusters. This also allows you to take advantage of custom machine types, Compute Engine networks, and side-by-side workloads in the same cluster.

Featured image: Google

Annie Pilon

Annie Pilon is a freelance writer specializing in topics related to business, marketing, social media, and tech. She has a degree in journalism and marketing from Columbia College Chicago and currently works and lives in Michigan.

Published by
Annie Pilon

Recent Posts

Exchange Server log files growth and inadequate disk space allocation

When it comes to Exchange, if you build it, it will grow. Exchange Server log file growth can fill up…

3 hours ago

Hold the phone! Voice communication is becoming cool again

Business telephone conversations have largely been supplanted by email. But voice communication is far from dead — and it may…

6 hours ago

What are the potential disadvantages of SSL/TLS?

There’s wide consensus on the benefits of SSL/TLS. However, not as much attention has been given to SSL/TLS disadvantages.

3 days ago

Exploring native software inventory logging in Windows Server

Windows Server has built-software inventory logging that can be very useful. Here’s how to use this little-known feature.

3 days ago

Passwordless authentication: Safer, better, and about time

Passwordless authentication has quickly become one of the primary means by which users access their laptops, phones, and tablets because…

3 days ago

Automated Incident Response in Office 365 ATP simplifies cybersecurity

Microsoft has pumped up Office 365 Advanced Threat Protection with a new feature, Automated Incident Response. Here’s what you need…

4 days ago