Private connectivity for Snowflake Notebooks¶

This topic describes using AWS PrivateLink or Azure Private Link when accessing Snowflake Notebooks. This feature is available in both warehouse and container runtimes.

Configure access to Snowflake Notebooks¶

To determine the hostname:

  • Call SYSTEM$GET_PRIVATELINK_CONFIG in your Snowflake account. The Notebooks hostname is displayed under the app-service-privatelink-url key, which is the wildcard URL required for routing Notebooks application traffic through AWS PrivateLink or Azure Private Link.

Note

You can set up a new VPC endpoint for Notebooks or create a DNS record to the same VPC endpoint of your Snowflake account, as shown in the following example:

  • Record name: *.abcd.privatelink.snowflake.app

  • Type: CNAME

  • Route traffic to: same VPC as your Snowflake traffic.

Hostname routing at an account level is currently not supported.

Security considerations¶

Notebooks apps serve both HTTPS-encrypted traffic and WebSocket-encrypted traffic. The Notebooks browser client application is mounted in a third-party, cross-origin iframe within Snowsight. This enables strict cross-site browser isolation control.

Snowflake Notebooks use a separate URL scheme for specific security requirements. Notebook URLs have their own top-level domain that does not share any elements with Snowsight. Each notebook has a unique origin.

Note

When using AWS PrivateLink or Azure Private Link, you control the DNS resolution; no AWS PrivateLink or Azure Private Link DNS records are controlled by Snowflake.