Network egress observability is in the beta phase of development and may not be available on your enrollment. Functionality may change during active development.
In the network egress policy page, the Observability tab contains logs and metrics for uses of the network egress policy per data connection source that imports this policy.
Select a data connection source in the source picker and view the network egress logs and metrics that were created with the policy.

Network egress logs are included in build telemetry. To view only network egress logs, add the suggested Network egress logs filter .

Network egress logs derived from different origins are available to help diagnose connectivity issues across all Foundry networking layer methods, such as direct connection or agent proxy policies.
connectivity-sidecar originconnectivity-sidecar routes connections to the appropriate network egress policy used for transparent proxy routing, and its logs contain the following parameters:
connection_id: A unique identifier for the connection.response_flags: Response can be either success or failed.bytes_sent: The number of bytes sent from the sidecar to the outbound proxy.bytes_received: The number of bytes received by the sidecar from the outbound proxy.duration_ms: The duration of the connection in milliseconds.destination_port: The destination port of the connection.metadata:
network_policy: Resource identifier of the network egress policy that egress was attempted with.source: Resource identifier of the data connection source that egress was attempted for.network_type: Type can be either direct or agent proxy.network_resources: Data connection agent IDs if agent proxy network egress policy.
egress-proxy originegress-proxy is the service that handles explicit proxy connections.
on-prem-proxy originon-prem-proxy is the service running in Foundry that proxies traffic to a data connection agent when using agent network egress policies.
agent-proxy originagent-proxy is the service running on a data connection agent in a private network. It opens the connection to the end destination for agent network egress policies.
There are two possible outcomes for direct connection egress: successful or failed.
Traffic successfully egressed out of the Palantir platform. The connection could still fail due to issues with ingress firewalls on the destination, authentication, or TLS handshake, but this is considered a successful egress as traffic has left the Palantir platform.
Traffic failed to egress out of the Palantir platform.
Next steps:
There are two possible outcomes for agent proxy: successful egress or failed egress.
Traffic was successfully proxied to one of the data connection agents of the policy. The connection could still fail due to issues with ingress firewalls on the destination, authentication, or TLS handshake, but this is considered a successful egress as traffic was proxied to a backing data connection agent.
Traffic failed to egress out of the Palantir platform.
Next steps:
Network egress observability is only provided for network egress policies which use TCP-level allowlisting.