AWS PrivateLink ↗ allows users to access Foundry via a private AWS network without traversing the public Internet. AWS Private Link supports connections between different VPCs (virtual private clouds) regions. Note that there may be additional limitations to cross-region support; contact your Palantir representative with the desired (start_region, destination_region) combination to verify support. Note that AWS PrivateLink is an AWS service.
Traffic can flow from a customer's Virtual Private Cloud (VPC) to the Foundry VPC using the AWS backbone network. PrivateLink traffic and open Internet traffic to Foundry are supported at the same time by configuring additional IP whitelists using Control Panel.
com.amazonaws.vpce.<REGION>.vpce-svc-<18_CHARACTER_UID>.Screenshot of Foundry Enrollment ID in the Foundry Control Panel:

*.palantirfoundry.com), there is additional configuration needed to funnel internal Foundry services through the endpoint as well; these steps are described in the documentation on customer-owned private links.Traffic that occurs from Foundry to other AWS VPCs can also be configured to be routed through the AWS backbone instead of the public Internet, even if the Foundry instance's VPC and the target VPC are in different AWS regions.
Some AWS services support sending all traffic via the AWS backbone without extra AWS costs of using a custom PrivateLink, by using AWS Gateway Endpoints ↗. The AWS services currently supported are:
For all other AWS services or any other types of traffic, a PrivateLink (VPC Endpoint) must be set up in AWS and configured in Foundry. This setup process is fully self-service and is described in the documentation on private link egress.
Ensure that you sent the correct AWS Account ID to your Palantir representative in the first step. Note that if the account ID starts with zeroes, these still need to be included in the ID.
No; you must use Palantir's Endpoint Service name to create an VPC Endpoint as described in steps 1-3 of the guide to setting up ingress to Foundry.
No, VPC peering with a non-Palantir network is not supported; we suggest using a Private Link instead as described in the documentation on this page.
Yes, AWS PrivateLink supports cross-region Private Links. See the ingress and egress instructions above to establish this connection.