CREATE NETWORK RULE¶
Creates a network rule or replaces an existing network rule.
Syntax¶
CREATE [ OR REPLACE ] NETWORK RULE <name>
TYPE = { IPV4 | AWSVPCEID | AZURELINKID | HOST_PORT | PRIVATE_HOST_PORT }
VALUE_LIST = ( '<value>' [, '<value>', ... ] )
MODE = { INGRESS | INTERNAL_STAGE | EGRESS }
[ COMMENT = '<string_literal>' ]
Required parameters¶
name
Identifier for the network rule.
The identifier value must start with an alphabetic character and cannot contain spaces or special characters unless the entire identifier string is enclosed in double quotes (e.g.
"My object"
). Identifiers enclosed in double quotes are case-sensitive.For more details, see Identifier requirements.
TYPE = { IPV4 | AWSVPCEID | AZURELINKID | HOST_PORT | PRIVATE_HOST_PORT }
Specifies the type of network identifiers being allowed or blocked. A network rule can have only one type.
IPV4
indicates that the network rule will allow or block network traffic based on the IPv4 address of the request origin.AWSVPCEID
indicates that the network rule will allow or block network traffic over AWS PrivateLink.AZURELINKID
indicates that the network rule will allow or block network traffic over Azure Private Link.HOST_PORT
indicates that the network rule will allow outgoing network traffic based on the domain of the request destination.When
TYPE = HOST_PORT
, theMODE
parameter should be set toEGRESS
.PRIVATE_HOST_PORT
indicates that the network rule allows outgoing network traffic to use private connectivity to an external network location.When
TYPE = PRIVATE_HOST_PORT
, theMODE
parameter must be set toEGRESS
.
VALUE_LIST = ( 'value' [, 'value', ... ] )
Specifies the network identifiers that will be allowed or blocked.
Valid values in the list are determined by the type of network rule:
When
TYPE = IPV4
, each value must be a valid IPv4 address or range of addresses.When
TYPE = AWSVPCEID
, each value must be a valid VPCE ID of an AWS S3 endpoint. VPC IDs are not supported.When
TYPE = AZURELINKID
, each value must be a valid LinkID of an Azure private endpoint. Execute the SYSTEM$GET_PRIVATELINK_AUTHORIZED_ENDPOINTS function to retrieve the LinkID associated with an account.When
TYPE = HOST_PORT
, each value must be a valid domain. Optionally, it can also include a port or range of ports.The valid port range is 1-65535. If you do not specify a port, it defaults to 443. If an external network location supports dynamic ports, you need to specify all possible ports.
To allow access to all ports, define the port as 0. For example,
company.com:0
.When
TYPE = PRIVATE_HOST_PORT
, specify one valid domain. Do not include a port or a range of ports.
MODE = { INGRESS | INTERNAL_STAGE | EGRESS }
Specifies what is restricted by the network rule.
INGRESS
The behavior of the
INGRESS
mode depends on the value of the network rule’sTYPE
property.If
TYPE=IPV4
, by default the network rule controls access to the Snowflake service only.If the account administrator enables the ENFORCE_NETWORK_RULES_FOR_INTERNAL_STAGES parameter, then
MODE=INGRESS
andTYPE=IPV4
also protects an AWS internal stage.If
TYPE=AWSVPCEID
, then the network rule controls access to the Snowflake service only.
INTERNAL_STAGE
Allows or blocks requests to an AWS internal stage without restricting access to the Snowflake service. Using this mode requires the following:
The account administrator must enable the ENFORCE_NETWORK_RULES_FOR_INTERNAL_STAGES parameter.
The
TYPE
property of the network rule must beAWSVPCEID
.
EGRESS
Allows Snowflake to send requests to an external destination.
Default:
INGRESS
Optional parameters¶
COMMENT = 'string_literal'
Specifies a comment for the network rule.
Default: No value
Access control requirements¶
A role used to execute this SQL command must have the following privileges at a minimum:
Privilege |
Object |
Notes |
---|---|---|
CREATE NETWORK RULE |
Schema |
Only the ACCOUNTADMIN and SECURITYADMIN roles, along with the schema owner, have this privilege by default. It can be granted to additional roles as needed. |
The USAGE privilege on the parent database and schema are required to perform operations on any object in a schema.
For instructions on creating a custom role with a specified set of privileges, see Creating custom roles.
For general information about roles and privilege grants for performing SQL actions on securable objects, see Overview of Access Control.
Usage notes¶
When specifying IP addresses for a network rule, Snowflake supports ranges of IP addresses using Classless Inter-Domain Routing (CIDR) notation.
For example,
192.168.1.0/24
represents all IPv4 addresses in the range of192.168.1.0
to192.168.1.255
.Regarding metadata:
Attention
Customers should ensure that no personal data (other than for a User object), sensitive data, export-controlled data, or other regulated data is entered as metadata when using the Snowflake service. For more information, see Metadata fields in Snowflake.
Examples¶
Create a network rule that is used to allow or block traffic from an AWS S3 endpoint to the internal stage:
CREATE NETWORK RULE corporate_network
TYPE = AWSVPCEID
VALUE_LIST = ('vpce-123abc3420c1931')
MODE = INTERNAL_STAGE
COMMENT = 'corporate privatelink endpoint';
Create a network rule that is used to allow or block traffic from a range of IP addresses to the Snowflake service and internal stage:
CREATE NETWORK RULE cloud_network
TYPE = IPV4
VALUE_LIST = ('47.88.25.32/27')
COMMENT ='cloud egress ip range';
Create a network rule that is used to allow a domain and domain/port combination when Snowflake is sending requests to external destinations:
CREATE NETWORK RULE external_access_rule
TYPE = HOST_PORT
MODE = EGRESS
VALUE_LIST = ('example.com', 'company.com:443');
Create a network rule to enable outbound private connectivity for external network access:
CREATE OR REPLACE NETWORK RULE ext_network_access_db.network_rules.azure_sql_private_rule
MODE = EGRESS
TYPE = PRIVATE_HOST_PORT
VALUE_LIST = ('externalaccessdemo.database.windows.net');