Azure Private Link ↗ provides private connectivity to Foundry by ensuring that access to Foundry is through a private IP address. Azure Private Link supports connections between different virtual network (VNet) regions. Note that Azure Private Link is a Microsoft service.
Before setting up Azure Private Link, you need to determine which type of private connectivity your use case requires.
Ingress refers to traffic flowing into Foundry from your network. For example, a Data Connection agent in your VNet connecting back to Foundry, or users accessing the Foundry UI from a private network.
Egress refers to traffic flowing out of Foundry to resources in your environment. For example, Foundry syncing data from an Azure SQL Database or other VNet-hosted service. The two directions serve different purposes and each requires a separate setup.
If your data source is Azure Blob Storage or Azure Data Lake Storage Gen2, you may not need a Private Link at all. Azure Storage network policies are self-serve and can be configured directly in Control Panel. Only set up an egress Private Link for Azure Storage if your organization specifically requires it and cannot allowlist VNet subnets via storage policies.
Your environment may involve multiple use cases, each requiring either ingress or egress connectivity. Ingress and egress are independent setups and can be configured separately or together. Refer to the relevant sections below for setup steps for each.
Traffic can occur from your non-Foundry virtual network (VNet) to the Foundry VNet using the Microsoft backbone network. Private Link traffic and open Internet traffic to Foundry are supported at the same time by configuring additional IP whitelists using the Ingress Configuration in Control Panel.
ingress-privatelink.<GUID>.<REGION>.azure.privatelinkservice./subscriptions/<SUBSCRIPTION_UUID>/resourceGroups/<RESOURCE_GROUP_NAME>/providers/Microsoft.Network/privateEndpoints/<PRIVATE_ENDPOINT_NAME><your-enrollment>.palantirfoundry.com). Otherwise, add a subdomain prefix to match the full Foundry domain.*.palantirfoundry.com), there is additional configuration needed to funnel internal Foundry services through the endpoint as well, for which the steps are defined in the documentation on customer-owned domain private links.Traffic that occurs from Foundry to other Azure VNets can be configured to be routed through the Azure backbone instead of the public Internet, regardless of whether the Foundry instance's VNet and the target VNet are in the same or different Azure regions.
Some Azure services support sending all traffic via the Azure backbone without extra Azure costs of using a custom Private Link, by using Azure gateways. The Azure services currently supported are:
For private connectivity to all other Azure services or Azure VNets, an egress Private Link needs to be set up. Contact your Palantir representative for more information.