Connect to SingleStore Helios using AWS PrivateLink
On this page
Configure both outbound and inbound connections to connect your workspace to AWS PrivateLink.
To connect via AWS PrivateLink using Flow, specify the VPC endpoint service name of your private link in the destination database configuration.
Contact SingleStore Support for assistance with setting up or configuring private connections.
Note
This tutorial builds cross-account connectivity to Amazon MSK clusters with AWS PrivateLink by fronting all brokers in the cluster with a single NLB that has cross-zone load balancing enabled.
Configure Inbound Connections
To successfully set up an inbound connection to SingleStore Helios using AWS PrivateLink, perform the following tasks:
Create an Inbound Connection on the Cloud Portal
On the Cloud Portal,
-
Select Workspaces.
-
Select the three dots under Actions for your workspace and select Access & Security from the list.
-
Under Private Links, select Create Connection.
-
On the Create Connection dialog, enter or select the following information:
-
Endpoint: Select SingleStore Endpoint.
-
Connection Type: Select the Inbound connection type from the list.
-
AWS Account ID (Inbound connections only): Enter the AWS Account ID associated with your VPC/private endpoint.
-
-
Select Create Connection.
Once the connection is ready to use, which may take a few minutes, its status changes to ACTIVE.DELETED status indicator to view the error message.
Copy the VPC Endpoint Service Name of your connection, and enter it in the Service name field while creating a private endpoint on the Amazon VPC Console.
Create a Private Endpoint on the Amazon VPC Console
Note
Your workspace and endpoint must be in the same region.
Create a private endpoint using the Service name copied earlier:
-
On the Amazon VPC console, select Endpoints > Create endpoint.
-
Under Service Category, select Other endpoint services.
-
Enter the Service name copied from the Cloud Portal in the Service name box.
-
Select Verify service to verify the Service name.
-
Under VPC, select the VPC from which you'll connect with the AWS service.
-
Under Subnets, select one subnet per Availability Zone from which you'll connect to the AWS service.
-
Select Create endpoint.
You can use the endpoint after it enters the Available state.
Note
SingleStore Helios does not support Certificate Authority (CA) verification for inbound connections.
Configure Outbound Connections
To successfully set up an outbound connection to SingleStore Helios using AWS PrivateLink, perform the following tasks:
If you are using Kafka brokers with AWS MSK, you must specify the IP address of the broker endpoints while creating the target groups of the load balancer.nslookup command with the DNS names of the MSK brokers to get their IP addresses.CREATE PIPELINE command.
Copy the AWS Account ID from the Cloud Portal
On the Cloud Portal,
-
Select Workspaces.
-
Select the three dots under Actions for your workspace and select Access & Security from the list.
-
Under Private Links, select Create Connection.
-
On the Create Connection dialog, from the Connection Type list, select Outbound.
Copy the AWS account ID displayed.
You'll need to whitelist this ID while creating your endpoint service.
Create an Endpoint Service on the AWS Console
On the AWS Console,
-
Create a target group for each of the AWS services that you want to access using AWS PrivateLink, select EC2 > Target groups > Create Target group.
Refer to Target Groups for more information. -
Create a network load balancer, select EC2 > Load Balancers > Create Load Balancer.
-
Under Network Load Balancer, select Create.
Your workspace and the load balancer must be in the same region. Ensure that Cross-zone load balancing is enabled. Refer to Create a Network Load Balancer for related information. -
In the AWS Console, select VPC > Endpoint Services > Create Endpoint Service.
Note
Your workspace and endpoint service must be in the same region.
-
Associate the endpoint service with the Network Load Balancer created in the previous step.
-
Enable Require acceptance for endpoint for additional security.
-
-
For this service, under Allow principals, add the AWS account ID copied from the Cloud Portal in the
"arn:aws:iam::<account id>:root"format.This enables SingleStore to find and access the private endpoint service. -
Verify that the security group rules in your VPC allow inbound traffic from the endpoint service.
Refer to Control traffic to resources using security groups for more information. -
Copy the Service Name of this AWS endpoint service.
Create an Outbound Connection on the Cloud Portal
On the Cloud Portal,
-
Select Workspaces.
-
Select the three dots under Actions for your workspace and select Access & Security from the list.
-
Under Private Links, select Create Connection.
-
On the Create Connection dialog, enter or select the following information:
-
Endpoint: Select SingleStore Endpoint.
-
Connection Type: Select the Outbound connection type from the list.
-
Service name (Outbound connections only): Enter the Service Name associated with your AWS endpoint service.
-
-
Select Create Connection.
-
(Optional) Accept the connection request in your AWS Console.
The connection is ready to use once the endpoint status changes to ACTIVE.DELETED status indicator to view the error message.
Accept the Connection Request in your AWS Console
If Require acceptance for endpoint is enabled while creating the endpoint service, you must accept the connection request from SingleStore in your AWS account.
-
Select VPC > Endpoint Services, and then select your endpoint service.
-
On the Endpoints Connections tab, find the request from the SingleStore AWS account with the Pending Acceptance status.
-
From the Actions menu, select Accept Endpoint Connection Request.
The connection status changes to Available, indicating that the connection is successfully established and is ready to use.
Configure Flow
To configure Flow to connect using AWS PrivateLink:
-
Log in to the Cloud Portal.
-
Copy the VPC Endpoint Service Name of your outbound private link.
-
Select Workspaces.
-
Select the three dots under Actions for your workspace and select Access & Security from the list.
-
Under Private Links, select the three dots under Actions for your private link, and then select View Connection.
-
Copy the VPC Endpoint Service Name for your private link.
-
-
Select Ingestion > Load Data, and then select a source supported by Flow.
-
Configure the destination database, connection name, Flow instance size, and then select Create Flow Instance.
-
Select Open Flow under the Actions column of the Flow instance created in the previous step.
-
On the Setup tab, configure the source database and then select Next.
-
Under Destination Database, enter the VPC Endpoint Service Name copied earlier in the Host Name field.
-
Enter the username and password of the SingleStore database user with which to connect.
-
Select Test to test the connection.
Once the connection is verified, configure the Flow instance as required and proceed with data ingestion.
Refer to Load Data with SingleStore Flow on Helios for more information.
References
In this section
Last modified: