Network egress observability [Beta]

Beta

Network egress observability is in the beta phase of development and may not be available on your enrollment. Functionality may change during active development.

Observability in Control Panel

In the network egress policy page, the Observability tab contains logs and metrics for uses of the network egress policy per data connection source that imports this policy.

Logs

Select a data connection source in the source picker and view network egress logs that were created with the policy.

Network egress logs in Control Panel

Metrics

Select a data connection source in the source picker and view network egress successes and failure graphs.

Network egress metrics in Control panel

Observability in Builds

Logs

Network egress logs are included in build telemetry. To view only network egress logs, add the suggested filter Network egress logs.

Network egress logs filter

Log defintion

Network egress logs contain the following information:

  • response_flags: Response can be either success or failed.
  • request_size: The request size of the connection.
  • response_size: The response size of the connection.
  • destination_port: The destination port of the connection.
  • duration_ms: The duration of the connection in milliseconds.
  • metadata:
    • network_policy: Resource identifier of the network egress policy that egress was attempted with.
    • source: Resource identifier of the data connection source that egress was attempted for.
    • network_type: Type can be either direct or agent proxy.
    • network_resources: Data connection agent IDs if agent proxy network egress policy.

Network egress log

Direct connection

There are two possible outcomes for direct connection egress: successful or failed.

Successful egress

Traffic successfully egressed out of the Palantir platform. The connection could still fail due to issues with ingress firewalls on the destination, authentication, or TLS handshake, but this is considered a successful egress as traffic has left the Palantir platform.

Failed egress

Traffic failed to egress out of the Palantir platform.

Next steps:

  • Verify the existence of the address and port through which egress was attempted and ensure that they are resolvable by the Palantir platform's direct connected network.
  • If traffic is still failing to egress, contact Palantir Support.

Agent proxy

There are two possible outcomes for agent proxy: successful egress or failed egress.

Successful egress

Traffic was successfully proxied to one of the data connection agents of the policy. The connection could still fail due to issues with ingress firewalls on the destination, authentication, or TLS handshake, but this is considered a successful egress as traffic was proxied to a backing data connection agent.

Failed egress

Traffic failed to egress out of the Palantir platform.

Next steps:

  • Verify that the address and port through which egress was attempted have a corresponding network egress policy imported in the data connection source.
  • Ensure that all of the backing data connection agents of the agent proxy policy are healthy.
  • If traffic is still failing to proxy to the data connection agent, contact Palantir Support.

Limits

Network egress observability is only provided for network egress policies which use TCP-level allowlisting.