The ability to configure VPN ingress is in beta and may not be available on all enrollments. Some functionality may change before this feature becomes generally available. Contact your Palantir representative to enable self-service VPN ingress.
VPN ingress is only supported for AWS-hosted Foundry instances via the AWS Site-to-Site VPN service ↗.
Platform administrators can configure VPN network ingress through an AWS Site-to-Site VPN ↗ service. This allows you to establish a connection to AWS-hosted Foundry instances without connecting over the internet.
You can configure up to three distinct ingresses through a VPN connection per Foundry enrollment. Contact your Palantir representative to request a limit increase.
Navigate to the VPNs tab in the Network ingress page in Control Panel to manage VPNs.
To create a VPN connection, select + New VPN and follow the steps below:
You can enter the following details in the VPN configuration section:
Select one of the displayed CIDR ranges that Foundry may reserve to establish the VPN connection. The CIDR range you select must not overlap with the CIDR range of your private network. Foundry reserves the connection's CIDR in its infrastructure to support the VPN connection.
Each VPN connection contains two Internet Protocol Security (IPsec) tunnels for redundancy. Foundry configures these tunnels to Use AWS defaults, and you can configure the IPsec tunnels as a subset of the AWS defaults by referencing the current AWS VPN Tunnels documentation ↗. Select Custom configuration to customize a tunnel beyond the AWS defaults.
If Tunnel 1 uses the AWS default configuration, then Tunnel 2 will also use the AWS default configuration. If Tunnel 1 has a custom configuration, then Tunnel 2 may also use that custom configuration if you select Use tunnel 1 configuration. Additionally, you can configure Tunnel 2 separately from Tunnel 1 when you select Custom configuration from the Tunnel 2 configuration step in the Add VPN connection pop-up window.
Select Submit to complete the VPN configuration process and initialize the connection, which may take a few minutes. The VPN connection will progress from Creating
to Ready
once Foundry completes the installation.
Once the VPN connection is ready, the Download VPN configuration window in Control Panel will display a list of example gateway configurations for various gateway devices. Download the configuration corresponding to your gateway device and follow the instructions to configure it to allow traffic to be routed via the created tunnels.
You can find the list of supported gateway devices in the AWS VPN documentation ↗.
Your tunnel status will display as Up
to indicate the IPsec tunnel's establishment once you configure your gateway device.
To connect to Foundry, you will:
You can reference the existing ingress configuration documentation to allow ingress from a customer's private CIDRs into Foundry.
You can reach Foundry over the Frontdoor domain displayed in the VPN configuration details panel once its tunnels are Ready
.
To connect to Foundry, you can:
<mycompany>.palantirfoundry.com
to vpn-xxxx.palantircloud.com
.<mycompany>.palantirfoundry.com
to Frontdoor IPs. For example, 10.x.x.x. <mycompany>.palantirfoundry.com
in /etc/hosts
in the desired system. This method of overriding DNS is not preferred as Frontdoor IPs may change.To test the VPN's successful configuration, you should receive pass
when you run the command below:
Copied!1
curl -s https://<mycompany>.palantirfoundry.com/magritte-coordinator/api/ping > /dev/null && echo pass || echo fail
You can manage a VPN's state by navigating to your VPN list and selecting the Actions dropdown to Disable or Delete a VPN. There is a 24-hour grace period in which you can restore a VPN after you select Delete. Additionally, you can disable or enable a Ready
VPN connection.
A VPN's configuration is immutable after you create the connection. To make configuration changes, you can Delete and recreate the VPN connection.
You can access up to 10,000 tunnel logs from the VPN page, which include details on the tunnel's establishment, Internet Key Exchange (IKE) negotiations, and dead peer detection (DPD) protocol messages. Use the Starting from filter to narrow your search, which pulls logs for the most recent week by default.