Skip to main content

Private connectivity using Google Private Service Connect

Note

This topic applies to Striim Cloud on Google Cloud Platform.

Google Cloud Private Service Connect (PSC) enables private connectivity between Virtual Private Cloud (VPC) networks and services without exposing traffic to the public internet. With PSC, you can privately access Google APIs and services, as well as customer- or partner-published services across VPCs.

Depending on your security and networking requirements, you can use PSC with:

  • Google-managed services and APIs (for example, BigQuery, Cloud Storage, and Cloud Spanner).

  • Customer-managed databases (for example, Cloud SQL, Cloud PostgreSQL, and Cloud MySQL) routed through your own GCP project infrastructure.

  • Self-managed or partner services published behind a Network Load Balancer (for example, databases running on VMs, on-premises databases via VPN, cross-cloud databases from AWS/Azure/OCI, MongoDB Atlas, or Snowflake).

  • A Striim Forwarding Agent to push data privately to Striim Cloud over PSC when direct pulls are not desired.

Note

Your Striim Cloud bill can increase when you enable Private Service Connect as a result of increased compute and data transfer costs. For details, contact your Striim account representative.

Proceed to the sections below for step-by-step setup by service type:

For an introduction to Google Cloud Private Service Connect, see: