Share via

Cannot create private endpoint outbound rule to third-party Private Link Service (Snowflake) in Azure ML managed VNet

Derek Freed 0 Reputation points
2026-03-20T15:17:37.7766667+00:00

We have an Azure ML workspace with managed VNet isolation mode AllowOnlyApprovedOutbound. We need to create an outbound private endpoint rule to Snowflake's Azure Private Link Service so our compute cluster can reach Snowflake privately.

When using az ml workspace outbound-rule set with --type private_endpoint and a third-party PLS alias as the --service-resource-id, we get: ValidationError: Invalid Target Resource

We've tried multiple --subresource-target values (account, snowflake, empty) — all fail with the same error.

Questions:

Does AML managed VNet support private endpoint outbound rules to third-party Azure Private Link Services (not just Azure PaaS resources)?

If yes, what format should the service-resource-id and subresource-target be for a PLS?

If not currently supported, is there a workaround or roadmap item?

Snowflake KB reference: https://community.snowflake.com/s/article/How-to-set-up-a-managed-private-endpoint-from-Azure-Data-Factory-or-Synapse-to-Snowflake

Region: East US

Azure Machine Learning

1 answer

Sort by: Most helpful
  1. Karnam Venkata Rajeswari 1,145 Reputation points Microsoft External Staff Moderator
    2026-03-20T17:43:35.72+00:00

    Hello Derek Freed,

    Welcome to Microsoft Q&A and Thank you for reaching out.

    The failure occurs because managed VNet outbound “private_endpoint” rules validate the destination as an Azure resource with a supported ARM resource ID and an expected private-link subresource (groupId). Third‑party Private Link Service aliases (for example, Snowflake) are not described in the supported destination patterns, so the request is commonly rejected during validation as Invalid Target Resource.

    Azure Machine Learning managed virtual network outbound rules support private endpoint connections only to supported Azure services that expose a valid Azure Resource Manager (ARM) resource ID.

    Managed VNet outbound private endpoint rules require a destination defined using a full ARM resource ID. The service‑resource‑id must point to a supported Azure resource under a Microsoft.* provider, and the subresource‑target must match a documented private link subresource (groupId) exposed by that Azure service.

    The expected format for supported private endpoint outbound rules is

    managed_network:
      isolation_mode: allow_only_approved_outbound
      outbound_rules:
        - name: storage-private-endpoint
          type: private_endpoint
          destination:
            service_resource_id: /subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/providers/Microsoft.Storage/storageAccounts/<STORAGE_ACCOUNT_NAME>
            subresource_target: blob
    

     

    Please consider the following work arounds

    1. FQDN outbound rule - Add an outbound rule of type fqdn for the required Snowflake endpoint/domain. Please note that FQDN outbound rules are implemented using Azure Firewall and can add billing charges.
    2. Use a customer-managed virtual network (non-managed VNet approach) - If third‑party Private Link integration is mandatory, deploy and secure the workspace using virtual network–based networking (instead of managed VNet isolation) and implement Private Link connectivity patterns within that VNet.

     

    References:

    Managed virtual network isolation - Azure Machine Learning | Microsoft Learn

    Secure an Azure Machine Learning workspace with virtual networks - Azure Machine Learning | Microsoft Learn

    az ml workspace outbound-rule | Microsoft Learn

    Thank you!

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.