Private link egress is in the beta phase of development and may not be available on your enrollment. Functionality may change during active development.
This page outlines how to configure and manage private link egress for Azure-hosted Palantir platforms connecting to customer services hosted in Azure, powered by Azure Private Link ↗.
Private link egress supports private egress to Azure services, user-owned resources deployed on Azure, or third-party APIs deployed on Azure.
Navigate to the Private links tab in the Network egress page in Control Panel to manage private links.

To successfully create a private link connection:
Many Azure services support private endpoints natively, allowing you to connect to them through private link without creating a custom private link service. A comprehensive list of Azure services that support private endpoints can be found in the Azure documentation ↗.
For these services, Azure automatically provides the necessary private link service configuration, and you only need to create a private endpoint connection.
To enable the Palantir platform to create private endpoint connections to your Azure resources, you must configure visibility and optionally, auto-approval settings.
For custom private link services ↗, follow the steps below:
Find the Palantir platform's Azure subscription ID in Control Panel > Network egress > Private links.
Add the Palantir subscription ID to the list of subscriptions that have visibility to your private link service. This allows the Palantir platform to request access to the service.
Optionally, enable auto-approval for the Palantir subscription ID to automatically approve connection requests, eliminating the need for manual approval.
For most Azure PaaS services such as Azure Storage, Azure SQL Database, Azure Key Vault, Cosmos DB, and so on, the default behavior is as follows:
Auto-approval configuration varies by Azure service. Some services support pre-approved subscriptions, while others require manual approval for each connection request. Consult the Azure documentation for your specific service for detailed instructions.
To create a private link in Control Panel, you need the Azure resource ID of the target resource you want to connect to.
blob for Azure Storage or sqlServer for Azure SQL Database).Standard private links are the default configuration for connecting to most Azure resources and custom private link services. Use standard private links for Azure SQL Database, Azure Key Vault, Azure Cosmos DB, custom private link services, and other Azure PaaS services. When creating a standard private link, you need to provide the resource ID and optionally specify sub-resources.

Advanced settings:
privatelink.blob.core.windows.net). Required if a DNS record is specified.DNS configuration is optional for standard private links. If not specified, you must use the Azure-generated private endpoint IP address directly.
Use storage private links specifically for Azure Storage accounts (resources containing /Microsoft.Storage/storageAccounts/ in their resource ID). Unlike standard private links, storage private links automatically define DNS configuration to handle Azure networking edge cases for storage resources. The system generates the required DNS zones and records in the format {storage-account-name}.privatelink.{sub-resource}.core.windows.net.

Important notes for storage private links:
After providing the details above, select Create.
The private link may have the following states:
After successful creation of a private link, create private link egress policies to allow egress to the target resource.

Once the private link is in the Ready state and network egress policies are created, the private link can be used in the Palantir platform.
Possible actions on the private link are displayed under Actions in the private link details page, and in the private links page for each item.


A private link's DNS zone, DNS record, and TCP ports can be updated by selecting Actions > Update.

Private links can be deleted by selecting Actions > Delete.