AWS PrivateLink
This guide helps you set up a secure and private connection between your AWS Virtual Private Cloud (VPC) and SambaNova Cloud using AWS PrivateLink. It’s designed for enterprise users who require low-latency, high-security access to AI models and APIs without exposing traffic to the public internet.
With PrivateLink, your data stays on the AWS network, never touching the public internet. It connects services across different accounts and availability zones, including on-prem setups. SambaNova Cloud supports PrivateLink in the us-west-1
region (N. California), giving you better performance and stronger security for enterprise-level AI inference.
All SambaNova API endpoints and features are available through the PrivateLink connection. You can use your existing API token and standard Cloud API authentication methods to access them.
Check your region access here.
Key benefits
Connecting through AWS PrivateLink offers the following benefits:
- Secure connectivity: Your data remains within the Amazon network, eliminating exposure to the public internet.
- Reduced attack surface: Limits external access points, significantly lowering security risks.
- Lower latency: Ensures faster communication by keeping traffic within the same AWS region as your workloads.
- Improved compliance: Supports stricter security policies and enhances audit readiness.
- Enterprise compatibility: Integrates easily with existing corporate networking, identity, and access management frameworks.
How the connection works
When you’re connecting to SambaNova Cloud through AWS PrivateLink, there are a few key things to understand about how the connection behaves and what security measures are in place. This section gives you a clear picture of what to expect and how to keep your setup secure.
Security and connection behavior
- HTTPS is required: All API traffic must use HTTPS to ensure encryption.
- Certificates: For HTTPS under your domain (e.g.,
example.com
), configure matching TLS certificates. - Traffic remains private: Data stays on the AWS backbone—never exposed to the public internet.
- Standard authentication: SambaNova’s API tokens and auth flows apply.
- Optional endpoint policies: Use AWS VPC endpoint policies to control access.
- Monitoring: Track endpoint health and usage with AWS CloudWatch.
- High availability: Our services span multiple Availability Zones in
us-west-1
. - No extra rate limits: Only standard API rate limits apply.
Set up your PrivateLink
Prerequisites
Before you begin, make sure you have:
- An active AWS account
- AWS CLI installed
- A VPC in the
us-west-1
region - Access to the SambaNova PrivateLink service
- Your AWS account ID added to our allowlist
Step 1: Request access
Before you can create a PrivateLink endpoint, you’ll need to request access from SambaNova. Reach out to your SambaNova representative with the following details:
- Your AWS Account ID (the one that will create the endpoint)
- A brief description of your use case or access needs
- Expected usage pattern or data volume
- AWS region(s) where you plan to connect
Step 2: SambaNova actions
After we receive your request, SambaNova will:
- Review your request details.
- Add your AWS Account ID to the allowed principals list.
- Approve the endpoint connection once it’s visible to us.
- Notify you when your account is ready to complete the setup.
Once approved, you’re ready to create the VPC endpoint in your AWS account.
Step 3: Create your VPC endpoint
After approval:
- Go ahead and create the PrivateLink endpoint in your VPC
- We’ll accept the connection on our end—typically within one business day
- Once accepted, you’re ready to roll
Create and configure the VPC endpoint
Follow the instructions below to create your VPC endpoint and connect it to SambaNova Cloud using AWS PrivateLink.
- Watch the setup video.
1. Setup your VPC
If you don’t already have a VPC in us-west-1
, let’s start by creating one.
Next, enable DNS support (required for PrivateLink):
2. Create subnets
Create subnets in two availability zones for high availability:
3. Configure security group
Set up a security group to allow secure traffic to the endpoint:
Ensure this security group allows port 443
inbound from your VPC CIDR—PrivateLink requires HTTPS.
4. Create VPC endpoint
Now connect your VPC to SambaNova’s PrivateLink service:
This is the default endpoint for general API access. If you need a model-specific endpoint (e.g., Mixtral 8x22B), contact SambaNova Support to receive a separate service name.
5. Configure custom DNS
You’ll need a custom domain using Route 53 to make endpoint access seamless.
Create a private hosted zone
Get the endpoint’s private IPs
Create a record for your custom domain
DNS configuration tips
- Your custom domain will resolve to the endpoint’s private IP
- DNS works only within your VPC
- You can now call:
https://api.sambanova.yourcompany.com
- TTL of 5 minutes allows flexibility if endpoint IPs change
Example domains
https://api.sambanova.yourcompany.com
https://sambanova-api.internal.yourcompany.com
https://ml-api.yourcompany.local
6. Test the connection
Once everything’s set up, validate the PrivateLink integration with the following checks.
Get the endpoint DNS names
Use this to confirm the DNS names assigned to your VPC endpoint:
Check private DNS resolution
Ensure the private DNS resolves correctly from within your VPC: nslookup api.sambanova.custom.com
Send a test request
Try an actual API call using your custom domain and token:
-k
skips SSL verification (useful for internal testing). Use with caution in production.
Successful response
A valid connection will return a response stream from the LLM model—confirming that:
- Your DNS is correctly resolving
- The VPC endpoint is reachable
- Your API token is working
- The SambaNova LLM is ready to serve your requests
Endpoint configuration
Use the following information when configuring your PrivateLink connection to SambaNova Cloud:
Category | Details |
---|---|
Primary region | us-west-1 |
Availability zones | us-west-1a , us-west-1b |
Service port | Port 443 (HTTPS only) — HTTP requests are automatically redirected |
Network load balancer | acp-production-sc3-1-ingress-1 |
VPC endpoint service name | com.amazonaws.vpce.us-west-1.vpce-svc-0bfec72bfb8a753a1 |
SambaNova VPC ID | vpc-0b7900a153c27435c |
Additional regions | Contact SambaNova Support for availability |
Service limits and quotas
- AWS PrivateLink limits apply (see AWS limits).
- SambaNova standard API rate limits still apply.
- Need higher throughput? Contact [email protected].
Cost overview
- AWS PrivateLink pricing applies (billed by AWS).
- SambaNova does not charge extra for enabling or using PrivateLink.
- Standard API usage fees remain unchanged per your current service plan.
Troubleshooting guide
If you’re encountering issues during setup or testing, refer to the following categorized checks.
Connection issues
- Confirm your subnets are in
us-west-1a
orus-west-1c
. - Ensure the VPC endpoint status is “Available”.
- Check DNS resolution for
api.sambanova.custom.com
. - Confirm your security group allows inbound HTTPS (port 443) from your VPC CIDR.
- Make sure your AWS account is listed in the allowed principals for the endpoint service.
DNS resolution issues
-
VPC DNS settings must be enabled: both DNS hostnames and DNS resolution support.
-
Private DNS cannot be enabled for this endpoint service—this is expected.
-
Confirm the Route 53 private hosted zone is associated with the correct VPC.
-
Ensure an A record maps your custom domain to the endpoint’s IP addresses.
-
Run DNS checks from an instance in the VPC using:
-
Use the exact custom domain as documented.
HTTPS connection issues
-
Always connect via HTTPS (port 443).
-
Use the
-k
flag withcurl
to accept self-signed certificates:curl -k ...
-
Include all required headers:
Host: api.sambanova.ai
Authorization: Bearer <your-api-token>
Content-Type: application/json
Validation commands
Use the following commands to validate your endpoint configuration and DNS setup.
1. Check endpoint status and private DNS settings
2. Test DNS resolution for custom domain
3. Test HTTPS connectivity
4. Verify route 53 configuration
5. Get endpoint network interfaces and private IPs
Next steps
After successfully connecting to SambaNova Cloud via AWS PrivateLink:
- Start making API requests using your private or custom DNS name.
- Use AWS CloudWatch to monitor endpoint performance and availability.
- Share this setup internally as a reference for additional teams or use cases.
- Reach out to [email protected] if you need access to additional models, custom endpoints, or higher throughput capacity.
Summary
By following these recommendations, you can ensure high availability, maintain strict security controls, and optimize DNS configuration and performance for your VPC endpoints.
- All resources must be created in the
us-west-1
region. - Use both
us-west-1a
andus-west-1c
availability zones to ensure high availability. - Configure security group rules to be as restrictive as possible while still allowing necessary traffic.
- The VPC endpoint’s DNS name is unique and automatically generated.
- Private DNS resolution is only available from within the VPC.
- You can assign a custom domain name within your VPC for easier access and management.
- DNS changes may take up to five minutes to propagate (
TTL = 300
). - Regularly monitor the health and performance of your VPC endpoint.