Connect with Private Services and Networks

You can connect from a SingleStore Helios workspace to private services and networks. Private services/networks simplify networking and connectivity by allowing users to connect directly from a virtual/private network to SingleStore through VPC/private endpoints.

Use the SingleStore Private Connections feature to configure a private connection to AWS PrivateLink. Setting up a connection to Azure Private Link and Google Private Service Connect involves actions from both your and SingleStore's end. You may need to share the details related to your workspace and Azure/Google account with SingleStore support. To make the setup process seamless, acquire the required information before reaching out to SingleStore support. The list of information required is specified in the configuration process for the respective private service/network.

To successfully set up a private connection, you need to configure both the outbound and inbound connections. Additionally, SingleStore can only process the connection request when your workspace is in the Active state. If you need separate reader and writer endpoints for each workspace, specify this in the support ticket while configuring Azure/Google private service/networks. SingleStore recommends using a single endpoint as SingleStore internally manages (reader/writer) query forwarding to this endpoint.

SingleStore recommends having hands-on experience on using private services and networks. For more information, refer to the relevant documentation:


When using a third-party SQL client or development tool, you must first add a database user to log into a SingleStore Helios database.

SingleStore Private Connections

SingleStore Private Connections (SPC) allows you set up and configure connections to private services and networks through the Cloud Portal. This feature is only supported for SingleStore Helios workspaces deployed using AWS, and it only supports connections to AWS PrivateLink. For more information, refer to SingleStore Private Connections.

Configure Private Connections

Configure both the outbound and inbound connections to connect to any of the following private services/networks:

You can connect multiple private links to a single workspace. Refer to ExpressRoute for more information.

Google Private Service Connect

If you have more than one subnet/zone you want to connect via Private Service Connect to your workspace, you should select each of them while configuring the load balancer backend. For more information, refer to Configure the load balancer.


  • Once a private connection is set up, for example AWS PrivateLink, does the data to be ingested have to go through AWS PrivateLink?

    No, this is simply a separate endpoint.

  • While using Kubernetes with Google Private Service Connect, suppose that each node pool creates 3 instance groups, 1 per zone. Should you select every group available in the backend step of the create a load balancer step?

    Yes, if you have more than a single subnet/zone and you want to connect via Google Private Service Connect to your workspace, you should select every available group.

  • Can I connect directly to the DDL and DML endpoints of a workspace via a private link (service/network)?

    No, you need a private service endpoint to connect to the DDL and DML endpoints of a workspace via a private link. You cannot directly access the DDL and DML endpoints of a workspace from private services and networks.

In this section

Last modified: May 17, 2024

Was this article helpful?