Returns hostnames and port numbers for AWS PrivateLink and
Azure Private Link deployments to add to your firewall’s allowed list so that
you can access Snowflake from behind your firewall.
The output of this function can then be passed into SnowCD to diagnose and troubleshoot your network connection
Typically, Snowflake customers use a firewall to prevent unauthorized access. By default, your firewall might block access to Snowflake. To
update your firewall’s allowed list, you need to know the hostnames and port numbers for the URL associated with your Snowflake
account identifier, stages, and other hosts used by Snowflake.
For more details about allowed lists for the Snowflake clients you use, see Allowing Hostnames.
Location (i.e. Amazon S3, Google Cloud Storage, or Microsoft Azure) where files that the Snowflake client can read or write are stored.
Endpoint accessed by SnowSQL to perform automatic downloads/upgrades.
The hosts to which drivers report metrics and out-of-band incidents such as OCSP issues.
Snowflake-provided alternative source of OCSP certificate information in case the primary OCSP responder cannot be reached. Most of the
latest versions of the Snowflake clients access the OCSP cache rather than connecting directly to the OCSP responder.
Snowflake-provided alternative source of OCSP certificate information for your organization. Most of
the latest versions of the Snowflake clients access the OCSP cache rather than connecting directly to the OCSP responder.