Mantieni tutto organizzato con le raccolte
Salva e classifica i contenuti in base alle tue preferenze.
Questa pagina fornisce una panoramica della rete per Memorystore for Memcached. Per un elenco degli errori di rete comuni, consulta Scenari di errori di rete.
Accesso privato ai servizi
Memorystore for Memcached utilizza l'accesso privato ai servizi per creare un peering di rete tra il tuo progetto e una rete interna per alcuni Google Cloud servizi come Cloud SQL, Memorystore for Redis e Memorystore for Memcached.
L'utilizzo di una connessione di accesso ai servizi privati offre il vantaggio di intervalli di indirizzi IP centralizzati e personalizzabili per i servizi sopra indicati. Per le istruzioni su come selezionare un'allocazione di intervalli IP specifici, consulta Creare un'istanza Memcached che utilizza un intervallo di indirizzi IP specifico.
Accesso on-premise con accesso privato ai servizi
Puoi connetterti da un client in una rete on-premise se la rete on-premise è connessa alla rete VPC a cui è connessa la tua istanza Memorystore per Memcached. Per consentire le connessioni da una rete on-premise:
Assicurati che la rete VPC condivisa sia connessa alla rete on-premise utilizzando una delle seguenti opzioni
Identifica il peering prodotto dalla connessione privata ai servizi.
Il peering utilizzato da Memorystore for Memcached è denominato
servicenetworking-googleapis-com.
Aggiorna la connessione in peering per scambiare route personalizzate impostando entrambi i flag --import-custom-routes e --export-custom-routes.
In genere, il team di networking e/o l'amministratore di rete della tua organizzazione è responsabile della configurazione di una connessione di accesso privato ai servizi. In questo modo, il team di networking può assicurarsi che nessun indirizzo IP o intervallo utilizzato per altre risorseGoogle Cloud si sovrapponga, il che può causare problemi di connettività.
Ti consigliamo di contattare il team di rete/sicurezza della tua organizzazione per farti configurare la connessione privata ai servizi, in particolare se riscontri un errore durante la procedura di configurazione. Quando contatti il team di networking, inviagli le seguenti informazioni:
The Memorystore for Memcached instance cannot be created due to the following
error:
"Google private services access is not enabled. Enable privates service access
and try again."
Before an instance can be created, a private service access connection needs to
be established for network <project name: network>. Please refer to the
following Memorystore documentation links for more information on how to create
this connection:
* Networking.
* Establishing a private services access connection.
* Verifying a private services access connection.
Indirizzi IP
Ogni istanza Memorystore per Memcached ha un endpoint di discovery e ogni nodo dell'istanza ha il proprio indirizzo IP. Puoi visualizzare questi indirizzi IP nella Google Cloud console o utilizzando gcloud memcache instances describe.
Gli indirizzi IP dei nodi e dell'endpoint di rilevamento non cambiano.
Reti supportate e intervalli IP dei client
Sono supportate le seguenti reti o istanze con indirizzi IP RFC 1918:
Istanze VM Compute Engine, ad eccezione di 172.17.0.0/16 perché questa intervallo IP è riservato ai componenti interni
Ti consigliamo di utilizzare un intervallo di accesso ai servizi privati con una dimensione del blocco di almeno /24 per supportare Memorystore for Memcached e altri servizi. Tuttavia, la dimensione minima del blocco necessaria per supportare Memorystore for Memcached è /26.
[[["Facile da capire","easyToUnderstand","thumb-up"],["Il problema è stato risolto","solvedMyProblem","thumb-up"],["Altra","otherUp","thumb-up"]],[["Difficile da capire","hardToUnderstand","thumb-down"],["Informazioni o codice di esempio errati","incorrectInformationOrSampleCode","thumb-down"],["Mancano le informazioni o gli esempi di cui ho bisogno","missingTheInformationSamplesINeed","thumb-down"],["Problema di traduzione","translationIssue","thumb-down"],["Altra","otherDown","thumb-down"]],["Ultimo aggiornamento 2025-09-05 UTC."],[],[],null,["# Networking\n\nThis page gives an overview of networking for Memorystore for Memcached. For a list of\ncommon networking errors, see [Networking error scenarios](/memorystore/docs/memcached/troubleshoot-issues#networking_error_scenarios).\n\nPrivate services access\n-----------------------\n\nMemorystore for Memcached uses [private services access](/vpc/docs/private-services-access)\nto create a network peering between your project and an internal network for\nsome Google Cloud services like Cloud SQL, Memorystore for Redis,\nand Memorystore for Memcached.\n\n**This means that you must first [establish a private services access connection](/memorystore/docs/memcached/establishing-connection)\nfor a network before you can create a Memcached instance using that network.**\n\nUsing a private services access connection offers you the benefit of\ncentralized, customizable IP address ranges for the aforementioned services. For\ninstructions on selecting a specific IP range allocation, see [Creating a Memcached instance that uses a specific IP address range](/memorystore/docs/memcached/create-manage-instances#creating_a_memcached_instance_that_uses_a_specific_ip_address_range).\n| **Important:** Once a private services connection is established for any of these services on a network, it is established for all other services on that network that use the private services access networking architecture.\n\nOn-premises access with private services access\n-----------------------------------------------\n\nYou can connect from a client in an on-premises network if the on-premises\nnetwork is connected to the VPC network to which your\nMemorystore for Memcached instance is connected. To permit connections from an\non-premises network, do the following:\n\n1. Ensure your Shared VPC network is connected to your on-premises network using a one of the following options\n - [Cloud VPN tunnel](/network-connectivity/docs/vpn/concepts/overview)\n - an interconnect attachment (VLAN) for [Dedicated Interconnect](/network-connectivity/docs/interconnect/how-to/dedicated/provisioning-overview) or [Partner Interconnect](/network-connectivity/docs/interconnect/how-to/partner/provisioning-overview).\n2. [Identify the peering](/vpc/docs/configure-private-services-access#listing-connections) produced by the private services connection. The peering used by Memorystore for Memcached is named `servicenetworking-googleapis-com`.\n3. [Update the peering](/vpc/docs/using-vpc-peering#update-peer-connection) connection to exchange custom routes by setting both `--import-custom-routes` and `--export-custom-routes` flag\n4. [Identify the allocated range](/vpc/docs/configure-private-services-access#listing_allocated_ip_address_ranges) used by the private services connection.\n5. [Create a Cloud Router custom advertised route](/network-connectivity/docs/router/how-to/advertising-custom-ip) for the allocated range on the Cloud Routers managing BGP sessions for your Cloud VPN tunnels or Cloud Interconnect attachments (VLANs).\n\nCommunicating networking requirements\n-------------------------------------\n\nUsually the networking team and/or network admin for your organization is\nresponsible for setting up a private services access connection. This allows the\nnetworking team to ensure that no IP addresses or ranges used for other\nGoogle Cloud resources overlap, which can cause connectivity issues.\n\nWe recommend that you contact the network\\\\security team in your organization to\nset up the private service connection for you, especially if you encounter an\nerror during the setup process. When reaching out to your networking team, send\nthem the following information: \n\n```\nThe Memorystore for Memcached instance cannot be created due to the following\nerror:\n\n\"Google private services access is not enabled. Enable privates service access\nand try again.\"\n\nBefore an instance can be created, a private service access connection needs to\nbe established for network \u003cproject name: network\u003e. Please refer to the\nfollowing Memorystore documentation links for more information on how to create\nthis connection:\n\n* Networking.\n* Establishing a private services access connection.\n* Verifying a private services access connection.\n```\n\nIP addresses\n------------\n\nEach Memorystore for Memcached instance has a [discovery endpoint](/memorystore/docs/memcached/auto-discovery-overview),\nand each node in the instance has its own IP address. You can view these IP\naddresses in the Google Cloud console, or by using [`gcloud memcache instances describe`](/sdk/gcloud/reference/memcache/instances/describe).\n\nIP addresses for nodes and for the discovery endpoint do not change.\n\nSupported networks and client IP ranges\n---------------------------------------\n\n###### The following network or instances with RFC 1918 IP addresses are supported:\n\n- [VPC networks](/vpc/docs/vpc) except [legacy networks](/vpc/docs/legacy)\n- [Shared VPC networks](/vpc/docs/shared-vpc)\n- on-premise systems\n- Compute Engine VM instances except for 172.17.0.0/16 because this IP range is reserved for internal components\n- We recommend using a private services access range with a block size of at least `/24` to support Memorystore for Memcached and other services. However, the minimum block size needed to support Memorystore for Memcached is `/26`.\n\nWhat's next\n-----------\n\n- [Establish a private services access connection](/memorystore/docs/memcached/establishing-connection).\n- [Create a Memcached instance](/memorystore/docs/memcached/creating-managing-instances)."]]