Consume services faster
Easily and securely connect your private network to access services on Google (Cloud Storage, Cloud Bigtable), third parties (Snowflake, MongoDB) or services you own.
Protect your network traffic
Prevent your network traffic from being exposed to the public internet. Data remains secure on Google’s backbone network.
Simplify service management
Removes the need to configure an internet gateway or a VPC peering connection. Simplify the management of complicated cloud network architectures.
Access Google APIs and services
Connect to Google Cloud services like Cloud Storage and Cloud Bigtable using Private Service Connect endpoints with internal IP addresses in your VPC networks.
Connect to a service in another VPC network
Connect to your own services or those provided by other service producers (ex. MongoDB, Snowflake) using a Private Service Connect endpoint.
Publish services as a service producer
You can publish a service (make a service available outside your VPC network) by using an internal TCP/UDP load balancer and create a service attachment in the same region.
Private Service Connect endpoints are registered with Service Directory where you can store, manage, and publish services.
See the latest updates about Private Service Connect
for Google Cloud newsletters to receive product updates,
event information, special offers, and more.
Sign up for Google Cloud newsletters to receive product updates, event information, special offers, and more.
Find resources and documentation for Private Service Connect
Private Service Connect overview
Get an overview of Private Service Connect and key concepts as a consumer of services and as a producer of services.
Configuring Private Service Connect to access Google APIs
Learn how to connect to service producers using endpoints in Private Service Connect.
Configuring Private Service Connect to access services
Learn how to connect to services in another VPC network.
How-to guide for service producers
Learn how to publish services for your customers to connect using Private Service Connect.
Create private endpoints using global internal IP addresses within your VPC network. Assign DNS names to these internal IP addresses. You can control which traffic goes to which endpoint, and can demonstrate that traffic stays within Google Cloud.
Private Service Connect uses endpoints and service attachments to let service consumers send traffic from the consumer's VPC network to services in the service producer's VPC network.
Learn more about Private Service Connect features
|Access Google APIs and services||Connect to Google Cloud services like Cloud Storage and Cloud Bigtable using Private Service Connect endpoints with internal IP addresses in your VPC networks.|
|Connect to a service in another VPC network||Connect to your own services or those provided by other service producers (ex. MongoDB, Snowflake) using a Private Service Connect endpoint.|
|Publish services as a service producer||You can publish a service (make a service available outside your VPC network) by using an internal TCP/UDP load balancer and create a service attachment in the same region.|
|Service Directory||Private Service Connect endpoints are registered with Service Directory for Google APIs where you can store, manage, and publish services.|
|Proxy protocol||Find your consumers' source IP addresses and Private Service Connect ID from one central proxy protocol header.|
|VPC Service Controls||Restrict Private Service Connect within a service perimeter and mitigate data exfiltration risks. VPC Service Controls service perimeters are always enforced on APIs and services that support VPC Service Controls.|
|Enable consumer http(s) service controls using a load balancer||You can create a Private Service Connect endpoint with consumer HTTP(S) service controls using an internal HTTP(S) load balancer, which lets you maintain consistent policies across multiple service producers.|