I have two projects A and B.
I am running my future workload in project B that is behind a GLB and through an Nginx proxy.
In order for me to send requests from project A to project B, I am using an internet network end point group pointing to the GLB of project B(this is part of the migration plan so one backend it removed and other is attached to go to project through INEG).
Now on project B I have a security policy that is attached to the backend service which does a deny all expect a few whitelisted IP's that need to hit our service.
At this point unless I open project B to internet, requests from project A's GLB backend internet network end point group are getting blocked.
The questions is what ip ranges of google does an internet end point group use and how do i allow it in project B locking it to be accessible from project A?
PS: I have enabled trueclient-ip at nginx in project B but that has too many public IP's its hard to figure it out and not certain if all are captured for me to set up a rule against it in security policy(cloud armor). Thanks!
Tried allowing only the cloud NAT ip's of project A thinking the egress would be from the NAT but it doesn't work unless opened to internet