Skip to content

When private load generation beats public runners

Use private runner locations when the target is internal, regulated, latency-sensitive, or protected by network boundaries.

Public cloud runners are the simplest place to start for internet-facing applications. They are easy to scale, easy to repeat, and close to how many users reach the service.

Private load generation is different. It is the right choice when the target is not meant to be reachable from the public internet or when the test must respect a specific network boundary.

Common private-location triggers

Teams usually add private runners when one of these is true:

  • the target API is only reachable from a private network;
  • staging mirrors production but is not internet-exposed;
  • compliance rules limit where traffic and test data can travel;
  • the team needs to test east-west service paths;
  • network latency from a managed region would distort the result.

Maxoperf supports this pattern through private runner locations that connect back to the control plane. The test remains visible in the same console, but traffic originates from the network you choose.

Keep blast radius explicit

Private generation is powerful because it sits near sensitive systems. Treat it with the same care as any production-adjacent tool:

  • test only authorized targets;
  • keep load windows visible to the owning team;
  • cap virtual users and request rate for the environment;
  • record which location generated the run;
  • review logs and results before repeating a failed profile.

Combine locations deliberately

The best strategy is often mixed. Use managed locations to understand public user experience across regions. Use private locations to validate internal APIs, partner paths, or systems that should never be public. The important part is making the location plan explicit before the run starts.

Questions this article answers

What is private load generation?

Private load generation runs test traffic from an environment you control, usually so internal or regulated targets do not need to be exposed publicly.

Can private and managed locations be used together?

Yes. A single testing strategy can use managed locations for public user paths and private locations for internal services or restricted networks.