If your Elementum organization runs on AWS, you can connect to your Snowflake account over AWS PrivateLink instead of the public internet. PrivateLink creates a private connection between Elementum’s AWS Virtual Private Cloud (VPC) and your Snowflake VPC, so CloudLink traffic stays on the AWS network. This is offered as an alternative to IP whitelisting for customers with stricter security or compliance requirements.Documentation Index
Fetch the complete documentation index at: https://docs.elementum.io/llms.txt
Use this file to discover all available pages before exploring further.
How it works
End users still reach Elementum over the public internet, but data traffic between Elementum and your Snowflake account is routed through an Amazon PrivateLink endpoint inside AWS. Elementum supports PrivateLink to customer Snowflake accounts in any AWS region with PrivateLink support.When to use PrivateLink
PrivateLink is a good fit when:- Your Elementum organization is hosted on AWS.
- Your Snowflake account is on AWS in a region with PrivateLink support and is on the Business Critical Snowflake edition (or higher).
- Your security or compliance program requires data traffic to bypass the public internet.
- You want to block all public access to Snowflake and only allow connections from your corporate network and Elementum.
Prerequisites
Elementum on AWS
Snowflake edition and region
Snowflake ACCOUNTADMIN access
ACCOUNTADMIN role to authorize PrivateLink and retrieve the configuration.Snowflake CloudLink in place
Setup workflow
The customer-side setup happens in your Snowflake account. Elementum handles the consumer-side AWS VPC endpoint, DNS, and CloudLink hostname configuration.Contact Elementum to initiate PrivateLink
Generate an AWS federation token
SYSTEM$AUTHORIZE_PRIVATELINK requires a federated token from your AWS account. Generate one with the AWS CLI:Authorize Elementum's AWS account on your Snowflake account
ACCOUNTADMIN role, call SYSTEM$AUTHORIZE_PRIVATELINK with the AWS account ID Elementum gave you and the federated token from the previous step:aws sts get-federation-token.Verify the authorization
SYSTEM$GET_PRIVATELINK with the same arguments:Account is authorized for PrivateLink.Retrieve the PrivateLink configuration for Elementum
SYSTEM$GET_PRIVATELINK_CONFIG:privatelink-account-url— the private hostname for your Snowflake accountprivatelink-vpce-id— the VPC endpoint service identifierprivatelink-ocsp-url— the OCSP cache server hostname
Confirm connectivity from Elementum
Block public access to Snowflake
After PrivateLink is verified, you can tighten security further by restricting your Snowflake account to PrivateLink and your corporate network only. Add a Snowflake network policy that allows only your corporate CIDR ranges and activate it for the account.44.210.166.136, 44.209.114.114, etc.) is no longer required for Elementum traffic. You can safely remove those IPs from your Snowflake network policy after confirming the PrivateLink connection is healthy.Cross-region considerations
Elementum hosts its production AWS environments in two regions:| Elementum environment | AWS region | Region name |
|---|---|---|
| PROD | us-east-1 | US East (N. Virginia) |
| PROD-EU | eu-central-1 | EU Central (Frankfurt) |
Troubleshooting
Authorization fails or token expired
Authorization fails or token expired
Connection still routes over the public internet
Connection still routes over the public internet
privatelink hostname returned by SYSTEM$GET_PRIVATELINK_CONFIG (it should contain .privatelink.snowflakecomputing.com). If the CloudLink still points at the public account URL, traffic continues to use the public route. You can also call SYSTEM$ALLOWLIST_PRIVATELINK in your Snowflake account to list the hostnames that should be reachable over the private endpoint.How do I disable PrivateLink later?
How do I disable PrivateLink later?
SYSTEM$REVOKE_PRIVATELINK with the same aws_id and federated_token arguments you used to authorize. Notify Elementum so the consumer-side endpoint can be removed and the CloudLink hostname can be reverted. Re-add the Elementum public IP allow list before revoking if you want to fall back to public-internet CloudLink connectivity.