Network egress observability is in the beta phase of development and may not be available on your enrollment. Functionality may change during active development.
In the network egress policy page, the Observability tab contains logs and metrics for uses of the network egress policy per data connection source that imports this policy.
Select a data connection source in the source picker and view network egress logs that were created with the policy.
Select a data connection source in the source picker and view network egress successes and failure graphs.
Network egress logs are included in build telemetry. To view only network egress logs, add the suggested filter Network egress logs
.
Network egress logs contain the following information:
response_flags
: Response can be either success or failed.request_size
: The request size of the connection.response_size
: The response size of the connection.destination_port
: The destination port of the connection.duration_ms
: The duration of the connection in milliseconds.metadata
:
network_policy
: Resource identifier of the network egress policy that egress was attempted with.source
: Resource identifier of the data connection source that egress was attempted for.network_type
: Type can be either direct or agent proxy.network_resources
: Data connection agent IDs if agent proxy network egress policy.There are two possible outcomes for direct connection egress: successful or failed.
Traffic successfully egressed out of the Palantir platform. The connection could still fail due to issues with ingress firewalls on the destination, authentication, or TLS handshake, but this is considered a successful egress as traffic has left the Palantir platform.
Traffic failed to egress out of the Palantir platform.
Next steps:
There are two possible outcomes for agent proxy: successful egress or failed egress.
Traffic was successfully proxied to one of the data connection agents of the policy. The connection could still fail due to issues with ingress firewalls on the destination, authentication, or TLS handshake, but this is considered a successful egress as traffic was proxied to a backing data connection agent.
Traffic failed to egress out of the Palantir platform.
Next steps:
Network egress observability is only provided for network egress policies which use TCP-level allowlisting.