SingleStore Helios Endpoints
On this page
An endpoint is a URL used to connect with SingleStore Helios workspaces.
-
Navigate to Deployments > Workspaces.
-
Select the three dots under the Actions column of your workspace, and then select Connect Directly from the list.
-
On the CLI Client tab, select SingleStore Endpoints from the list.
The endpoint of your SingleStore deployment is displayed in the Endpoint section.
Access SingleStore Helios deployment using the available endpoint with any of the supported SQL clients and/or development tools.
Note
When using a third-party SQL client or development tool, you must first add a database user to log into a SingleStore Helios database.
Connect to SingleStore Helios via TLS/SSL
To establish an encrypted connection from a stand-alone SQL client, you need a TLS/SSL public certificate.
For example, using the MySQL command line (CLI) client, you can connect to the SingleStore Helios endpoints using the singlestore_ certificate file.. file enables support for encrypted connections.--ssl-mode=VERIFY_ option to verify the certificate.
Note: Include the --ssl-mode=REQUIRED option to establish a secure connection in older versions of the MySQL client, even when the --ssl-ca option is specified.
mysql -u admin -p -h <endpoint-host> -P 3306 --default-auth=mysql_native_password --ssl-ca=./singlestore_bundle.pem --ssl-mode=VERIFY_CA
Important
The singlestore_ file, which SQL clients can use to connect to SingleStore Helios, will be updated as of October 20, 2023.
If your SQL client uses the singlestore_ file and the --ssl-mode=VERIFY_ flag to connect, and your SQL client can no longer connect to SingleStore Helios, please download and use the latest singlestore_ file.
See Connect to SingleStore Helios using TLS/SSL topic for more information.
Secure the SingleStore Helios Connection
Server Configuration to Require Secure Client Connections
To make the server restrict access to clients over SSL only, add the REQUIRE SSL clause to the user’s GRANT statement, for example:
CREATE USER 'user'@'%' IDENTIFIED BY 'password';ALTER USER 'user'@'%' REQUIRE SSL;
For example, if REQUIRE SSL is specified for the user user:
## This connection attempt is rejected with an "Access denied" error:mysql -u user -h 1.2.3.4
## This one works:mysql -u user -h 1.2.3.4 --ssl-ca=ca-cert.pem
Unless the client is configured properly, the client may or may not use SSL to connect to SingleStore Helios even if SSL is enabled on the SingleStore Helios workspace.REQUIRE SSL helps protect against misconfigured clients by preventing them from connecting over an insecure plaintext connection.
Note that the server currently uses a hardcoded version of the TLS protocol.
Last modified: July 16, 2025