The Memorystore for Memcached instance cannot be created due to the following
error:
"Google private services access is not enabled. Enable privates service access
and try again."
Before an instance can be created, a private service access connection needs to
be established for network <project name: network>. Please refer to the
following Memorystore documentation links for more information on how to create
this connection:
* Networking.
* Establishing a private services access connection.
* Verifying a private services access connection.
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-05。"],[],[],null,["# Networking\n\nThis page gives an overview of networking for Memorystore for Memcached. For a list of\ncommon networking errors, see [Networking error scenarios](/memorystore/docs/memcached/troubleshoot-issues#networking_error_scenarios).\n\nPrivate services access\n-----------------------\n\nMemorystore for Memcached uses [private services access](/vpc/docs/private-services-access)\nto create a network peering between your project and an internal network for\nsome Google Cloud services like Cloud SQL, Memorystore for Redis,\nand Memorystore for Memcached.\n\n**This means that you must first [establish a private services access connection](/memorystore/docs/memcached/establishing-connection)\nfor a network before you can create a Memcached instance using that network.**\n\nUsing a private services access connection offers you the benefit of\ncentralized, customizable IP address ranges for the aforementioned services. For\ninstructions on selecting a specific IP range allocation, see [Creating a Memcached instance that uses a specific IP address range](/memorystore/docs/memcached/create-manage-instances#creating_a_memcached_instance_that_uses_a_specific_ip_address_range).\n| **Important:** Once a private services connection is established for any of these services on a network, it is established for all other services on that network that use the private services access networking architecture.\n\nOn-premises access with private services access\n-----------------------------------------------\n\nYou can connect from a client in an on-premises network if the on-premises\nnetwork is connected to the VPC network to which your\nMemorystore for Memcached instance is connected. To permit connections from an\non-premises network, do the following:\n\n1. Ensure your Shared VPC network is connected to your on-premises network using a one of the following options\n - [Cloud VPN tunnel](/network-connectivity/docs/vpn/concepts/overview)\n - an interconnect attachment (VLAN) for [Dedicated Interconnect](/network-connectivity/docs/interconnect/how-to/dedicated/provisioning-overview) or [Partner Interconnect](/network-connectivity/docs/interconnect/how-to/partner/provisioning-overview).\n2. [Identify the peering](/vpc/docs/configure-private-services-access#listing-connections) produced by the private services connection. The peering used by Memorystore for Memcached is named `servicenetworking-googleapis-com`.\n3. [Update the peering](/vpc/docs/using-vpc-peering#update-peer-connection) connection to exchange custom routes by setting both `--import-custom-routes` and `--export-custom-routes` flag\n4. [Identify the allocated range](/vpc/docs/configure-private-services-access#listing_allocated_ip_address_ranges) used by the private services connection.\n5. [Create a Cloud Router custom advertised route](/network-connectivity/docs/router/how-to/advertising-custom-ip) for the allocated range on the Cloud Routers managing BGP sessions for your Cloud VPN tunnels or Cloud Interconnect attachments (VLANs).\n\nCommunicating networking requirements\n-------------------------------------\n\nUsually the networking team and/or network admin for your organization is\nresponsible for setting up a private services access connection. This allows the\nnetworking team to ensure that no IP addresses or ranges used for other\nGoogle Cloud resources overlap, which can cause connectivity issues.\n\nWe recommend that you contact the network\\\\security team in your organization to\nset up the private service connection for you, especially if you encounter an\nerror during the setup process. When reaching out to your networking team, send\nthem the following information: \n\n```\nThe Memorystore for Memcached instance cannot be created due to the following\nerror:\n\n\"Google private services access is not enabled. Enable privates service access\nand try again.\"\n\nBefore an instance can be created, a private service access connection needs to\nbe established for network \u003cproject name: network\u003e. Please refer to the\nfollowing Memorystore documentation links for more information on how to create\nthis connection:\n\n* Networking.\n* Establishing a private services access connection.\n* Verifying a private services access connection.\n```\n\nIP addresses\n------------\n\nEach Memorystore for Memcached instance has a [discovery endpoint](/memorystore/docs/memcached/auto-discovery-overview),\nand each node in the instance has its own IP address. You can view these IP\naddresses in the Google Cloud console, or by using [`gcloud memcache instances describe`](/sdk/gcloud/reference/memcache/instances/describe).\n\nIP addresses for nodes and for the discovery endpoint do not change.\n\nSupported networks and client IP ranges\n---------------------------------------\n\n###### The following network or instances with RFC 1918 IP addresses are supported:\n\n- [VPC networks](/vpc/docs/vpc) except [legacy networks](/vpc/docs/legacy)\n- [Shared VPC networks](/vpc/docs/shared-vpc)\n- on-premise systems\n- Compute Engine VM instances except for 172.17.0.0/16 because this IP range is reserved for internal components\n- We recommend using a private services access range with a block size of at least `/24` to support Memorystore for Memcached and other services. However, the minimum block size needed to support Memorystore for Memcached is `/26`.\n\nWhat's next\n-----------\n\n- [Establish a private services access connection](/memorystore/docs/memcached/establishing-connection).\n- [Create a Memcached instance](/memorystore/docs/memcached/creating-managing-instances)."]]