When you deploy your function's source code to Cloud Run functions,
that source code is stored in a Cloud Storage bucket. Cloud Build then
automatically builds your code into a container image and pushes that image to
an Artifact Registry image registry.
Cloud Run functions accesses this image when it needs to run the
container to execute your function.
In the following diagram, the Cloud Run functions box represents
a function that is deployed in Cloud Run, using either the
Cloud Run Admin API or the Cloud Functions API. Typically, newer functions
are deployed using the Cloud Run Admin API, and older functions are deployed
using the Cloud Functions API.
Figure 1. A user prepares functions source code and
deploys it to Cloud Run.
Depending on which API is used when deploying a function, the following occurs:
If you deployed your function using use the Cloud Run Admin API, the
following occurs:
Your source code is uploaded to a Cloud Storage bucket that has no
retention period.
If you're using default encryption, the name of the bucket is
autogenerated and named
run-sources-PROJECT_ID-REGION.
The source code is submitted to Cloud Build, where
Google Cloud's buildpacks and the Functions Framework create a container
image. Note that the Cloud Build service account builds the container
image. Cloud Run defaults to using the
e2-standard-2 machine type
provided by Cloud Build.
Your container image is then uploaded to Artifact Registry through an auto-created
bucket called REGION-docker.pkg.dev/PROJECT_ID/cloud-run-source-deploy.
The image is deployed to Cloud Run as a service.
You can trigger or invoke the function with Eventarc,
Pub/Sub, or other HTTP triggers.
If you deployed your function using use the Cloud Functions API (v2), the
following occurs:
Your source code is uploaded to a Cloud Storage bucket that has no
retention period.
The name of the bucket is autogenerated and follows this format:
If you're using default encryption, this bucket is named
gcf-v2-sources-PROJECT_NUMBER-REGION.
If you're protecting your data with CMEK, the bucket is named
gcf-sources-PROJECT_NUMBER-REGION-CMEK_KEY_HASH.
The source code is submitted to Cloud Build, where
Google Cloud's buildpacks and the Functions Framework create a container
image. Note that the Cloud Build service account builds the container
image. Cloud Run defaults to using the
e2-standard-2 machine type
provided by Cloud Build.
Your container image is then uploaded to Artifact Registry through an auto-created
bucket called REGION-docker.pkg.dev/PROJECT_ID/gcf-artifacts.
The image is deployed to Cloud Run as a service.
You can trigger or invoke the function with Eventarc,
Pub/Sub, or other HTTP triggers.
If you previously created functions with the Cloud Functions API, see the
Cloud Run functions comparison guide
to learn about the differences between the two versions of
Cloud Run functions.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-29 UTC."],[],[],null,["# Cloud Run functions overview\n\nThis guide provides an introductory overview of how other Google Cloud services\nare involved in the Cloud Run functions deployment process.\n\nBefore you begin\n----------------\n\nFamiliarize yourself with Cloud Run functions and source deployment\nconcepts from the\n[Cloud Run deployment options and resource model](/run/docs/resource-model)\nguide.\n\nArchitecture overview\n---------------------\n\nWhen you deploy your function's source code to Cloud Run functions,\nthat source code is stored in a Cloud Storage bucket. Cloud Build then\nautomatically builds your code into a container image and pushes that image to\nan Artifact Registry [image registry](/run/docs/deploy-functions#image-repository).\nCloud Run functions accesses this image when it needs to run the\ncontainer to execute your function.\n\nIn the following diagram, the Cloud Run functions box represents\na function that is deployed in Cloud Run, using either the\nCloud Run Admin API or the Cloud Functions API. Typically, newer functions\nare deployed using the Cloud Run Admin API, and older functions are deployed\nusing the Cloud Functions API.\n**Figure 1.** A user prepares functions source code and deploys it to Cloud Run.\n\nDepending on which API is used when deploying a function, the following occurs:\n\n- If you deployed your function using use the *Cloud Run Admin API*, the\n following occurs:\n\n 1. Your source code is uploaded to a Cloud Storage bucket that has no\n retention period.\n\n 1. If you're using default encryption, the name of the bucket is autogenerated and named `run-sources-`\u003cvar translate=\"no\"\u003ePROJECT_ID\u003c/var\u003e`-`\u003cvar translate=\"no\"\u003eREGION\u003c/var\u003e.\n 2. If you're protecting your data with [Customer-managed encryption keys (CMEK)](/kms/docs/cmek), the bucket name is not autogenerated, and you must provide a bucket name.\n 2. The source code is submitted to Cloud Build, where\n Google Cloud's buildpacks and the Functions Framework create a container\n image. Note that the Cloud Build service account builds the container\n image. Cloud Run defaults to using the\n [`e2-standard-2` machine type](/build/pricing)\n provided by Cloud Build.\n\n 3. Your container image is then uploaded to Artifact Registry through an auto-created\n bucket called \u003cvar translate=\"no\"\u003eREGION\u003c/var\u003e`-docker.pkg.dev/`\u003cvar translate=\"no\"\u003ePROJECT_ID\u003c/var\u003e`/cloud-run-source-deploy`.\n\n 4. The image is deployed to Cloud Run as a service.\n\n 5. You can trigger or invoke the function with Eventarc,\n Pub/Sub, or other HTTP triggers.\n\n- If you deployed your function using use the *Cloud Functions API (v2)*, the\n following occurs:\n\n 1. Your source code is uploaded to a Cloud Storage bucket that has no\n retention period.\n\n The name of the bucket is autogenerated and follows this format:\n 1. If you're using default encryption, this bucket is named `gcf-v2-sources-`\u003cvar translate=\"no\"\u003ePROJECT_NUMBER\u003c/var\u003e`-`\u003cvar translate=\"no\"\u003eREGION\u003c/var\u003e.\n 2. If you're protecting your data with CMEK, the bucket is named `gcf-sources-`\u003cvar translate=\"no\"\u003ePROJECT_NUMBER\u003c/var\u003e`-`\u003cvar translate=\"no\"\u003eREGION\u003c/var\u003e`-`\u003cvar translate=\"no\"\u003eCMEK_KEY_HASH\u003c/var\u003e.\n 2. The source code is submitted to Cloud Build, where\n Google Cloud's buildpacks and the Functions Framework create a container\n image. Note that the Cloud Build service account builds the container\n image. Cloud Run defaults to using the\n [`e2-standard-2` machine type](/build/pricing)\n provided by Cloud Build.\n\n 3. Your container image is then uploaded to Artifact Registry through an auto-created\n bucket called \u003cvar translate=\"no\"\u003eREGION\u003c/var\u003e`-docker.pkg.dev/`\u003cvar translate=\"no\"\u003ePROJECT_ID\u003c/var\u003e`/gcf-artifacts`.\n\n 4. The image is deployed to Cloud Run as a service.\n\n 5. You can trigger or invoke the function with Eventarc,\n Pub/Sub, or other HTTP triggers.\n\nWhat's next\n-----------\n\n- Learn about the [different types of functions](/run/docs/write-functions) and your options for [triggering functions](/run/docs/function-triggers).\n- If you previously created functions with the Cloud Functions API, see the [Cloud Run functions comparison guide](/run/docs/functions/comparison) to learn about the differences between the two versions of Cloud Run functions."]]