Private link egress is in the beta phase of development and may not be available on your enrollment. Functionality may change during active development.
This page outlines how to configure and manage private link egress for AWS-hosted Palantir platforms connecting to customer services hosted in the same AWS region, powered by AWS PrivateLink ↗. If your target resource is in a different region, configure VPC peering ↗ to the Palantir platform's region, then create a private link.
Private link egress supports private egress to AWS services, user-owned resources deployed on AWS, or third-party APIs deployed on AWS.
Navigate to the Private links tab in the Network egress page in Control Panel to manage private links.

To successfully create a private link connection:
A list of private link compatible AWS services and their endpoint service names can be found in the AWS documentation ↗. Creation of an endpoint service is not required for AWS services; the endpoint service name provided by AWS can be used. An example of an AWS service that supports private links is Amazon Bedrock ↗.
Private links to AWS S3 are not supported. Use same region S3 bucket policies for private connectivity to S3.
For a user-owned resource deployed on AWS, create an endpoint service following the steps in the AWS documentation ↗. An example of a user-owned resource is databases powered by AWS RDS ↗.
For user-owned third-party APIs deployed on AWS, create an endpoint service following the steps from the AWS documentation ↗. If owned by another party, request their VPC endpoint service name. For example, Snowflake's VPC endpoint service name can be requested as shown in the Snowflake documentation ↗.
Additionally, request the private domains of third-party APIs if the service uses custom transport layer security (TLS) certificates that are not valid for the AWS-generated domain ↗ of the private link. For example, Snowflake's private domains can be found following the Snowflake documentation ↗. Below is an example of a private third party domain:
abc.us-east-1.privatelink.snowflakecomputing.com
To access the target resource through a private link, allow the Palantir platform to access the resource. Add the Palantir platform's AWS account in the allowed principal list of your endpoint service by following the AWS documentation ↗. The allowed principal should look as follows:
arn:aws:iam::<palantir_platform_aws_account_id>:root

Navigate to Control Panel > Network egress > Private links and select New private link to create a private link.
Enter the following details for your target resource for the private link:
Endpoint service name: The endpoint service name of the target resource that was retrieved in the step above.
Advanced settings:
CNAME records for these domains that map to the other end of the private link.
After providing the details above, select Create.
The private link may have the following states:
If the private link is in the Failed state, one of the following errors has occurred:
After successful creation of a private link, create private link egress policies to allow egress to the target resource.

Possible actions on the private link are displayed under Actions in the private link details page, and in the private links page for each item.


A private link's Private domains and TCP ports can be updated by selecting Actions > Update.

Private links can be deleted by selecting Actions > Delete.
Share the created network egress policies with users who intend to egress to the target resource through the private link. On the domain or IP that is to be shared, select Actions > View network egress policy and navigate to the network policy page. On the network policy page, select Actions > Manage sharing and add the intended user or user group to share the network egress policy.

In Data Connection, configure a source using the default domain or the third-party API domain, and attach the created network egress policies. After configuring, test connectivity by previewing or exploring the source and verifying that the source's data is accurate.
To create a Snowflake source connected through a private link, follow these steps:
For the Palantir platform to create a private link to Snowflake, the Palantir platform's account needs to be allowlisted in your Snowflake account. To do this:
SYSTEM$AUTHORIZE_PRIVATELINK cannot be used, since Palantir users do not have direct access to the underlying cloud provider infrastructure and are not provided with the required federated_token.Once Snowflake has allowlisted the Palantir platform's cloud provider account, continue to the next step.
Before creating a private link between the Palantir platform and Snowflake, retrieve the private link configuration from Snowflake by running the command SYSTEM$GET_PRIVATELINK_CONFIG ↗. This command outputs the required information to create a private link in the Palantir platform.
privatelink-vpce-id from the output of SYSTEM$GET_PRIVATELINK_CONFIG.SYSTEM$GET_PRIVATELINK_CONFIG:
privatelink-account-urlprivatelink-connection-ocsp-urlsprivatelink-connection-urlsprivatelink-ocsp-urlregionless-privatelink-account-urlregionless-snowsight-privatelink-urlsnowsight-privatelink-url443 and 80 as mentioned in the Snowflake documentation ↗.Once configured, select Create to create the private link. When the private link is in the Ready state, continue to the next step.

Create network egress policies for all of the URLs output by the command SYSTEM$ALLOWLIST_PRIVATELINK ↗. Additionally, create an S3 bucket policy for the STAGE of the output as shown below:

For more information on Snowflake configuration refer to Palantir's Snowflake documentation.