You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/langsmith/cloud.mdx
+114-8Lines changed: 114 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -167,15 +167,121 @@ The LangChain endpoints map to the following static IP addresses for traffic tha
167
167
168
168
You may need to allowlist these to enable traffic from your private network to LangSmith SaaS endpoints (`api.smith.langchain.com`, `smith.langchain.com`, `beacon.langchain.com`, `eu.api.smith.langchain.com`, `eu.smith.langchain.com`, `eu.beacon.langchain.com`, `aws.api.smith.langchain.com`, `aws.smith.langchain.com`).
**Enterprise only.** Private Service Connect is available exclusively for Enterprise customers. Contact your account representative or [sales@langchain.dev](mailto:sales@langchain.dev) to enable this feature.
173
+
**Enterprise only.** Private connectivity is available exclusively for Enterprise customers. Contact your account representative or [sales@langchain.dev](mailto:sales@langchain.dev) to enable this feature.
174
174
</Callout>
175
175
176
+
Enterprise customers can connect to LangSmith without exposing traffic to the public internet using **AWS PrivateLink** or **GCP Private Service Connect (PSC)**.
177
+
178
+
#### AWS PrivateLink
179
+
180
+
Customers on **AWS** can connect to LangSmith via [AWS PrivateLink](https://docs.aws.amazon.com/vpc/latest/privatelink/), providing private connectivity from any VPC in any US region (`us-east-1`, `us-east-2`, `us-west-1`, `us-west-2`). Cross-region connectivity is supported natively — no VPC peering or Transit Gateway required.
181
+
182
+
##### Endpoint service name
183
+
184
+
| Region | Service Name |
185
+
|--------|-------------|
186
+
| US (`us-east-2`) |`<LANGSMITH_PRIVATELINK_SERVICE_NAME>`|
187
+
188
+
##### Setup
189
+
190
+
**1. Request access:** Contact your account representative or [sales@langchain.dev](mailto:sales@langchain.dev) with your AWS account ID. LangChain will add your account to the endpoint service's allowed principals list.
191
+
192
+
**2. Create an Interface VPC Endpoint** in your AWS account:
193
+
194
+
<CodeGroup>
195
+
```bash AWS CLI
196
+
aws ec2 create-vpc-endpoint \
197
+
--vpc-id <YOUR_VPC_ID> \
198
+
--service-name <SERVICE_NAME_FROM_TABLE_ABOVE> \
199
+
--vpc-endpoint-type Interface \
200
+
--subnet-ids <YOUR_SUBNET_IDS> \
201
+
--security-group-ids <YOUR_SECURITY_GROUP_ID> \
202
+
--region <YOUR_REGION>
203
+
```
204
+
205
+
```hcl Terraform
206
+
resource "aws_vpc_endpoint" "langsmith" {
207
+
vpc_id = "<YOUR_VPC_ID>"
208
+
service_name = "<SERVICE_NAME_FROM_TABLE_ABOVE>"
209
+
vpc_endpoint_type = "Interface"
210
+
subnet_ids = ["<YOUR_SUBNET_IDS>"]
211
+
security_group_ids = ["<YOUR_SECURITY_GROUP_ID>"]
212
+
}
213
+
```
214
+
</CodeGroup>
215
+
216
+
**3. Wait for acceptance.** LangChain will accept the connection. The endpoint status will change from `pendingAcceptance` to `available`.
217
+
218
+
##### Configure DNS
219
+
220
+
Create a Route 53 Private Hosted Zone so LangSmith API hostnames resolve to your endpoint's private IPs:
records = [aws_vpc_endpoint.langsmith.dns_entry[0]["dns_name"]]
268
+
}
269
+
```
270
+
</CodeGroup>
271
+
272
+
##### Verify connectivity
273
+
274
+
From an EC2 instance or container in your VPC:
275
+
276
+
```bash
277
+
curl https://aws.api.smith.langchain.com/ok
278
+
```
279
+
280
+
#### GCP Private Service Connect
281
+
176
282
Enterprise customers on **GCP** can connect to LangSmith via [Private Service Connect (PSC)](https://cloud.google.com/vpc/docs/private-service-connect), providing private connectivity without exposing traffic to the public internet.
177
283
178
-
#### Service attachment URIs
284
+
#####Service attachment URIs
179
285
180
286
Use the following service attachment URIs to create a PSC endpoint in your VPC:
181
287
@@ -184,7 +290,7 @@ Use the following service attachment URIs to create a PSC endpoint in your VPC:
184
290
| US (`us-central1`) |`projects/langchain-prod/regions/us-central1/serviceAttachments/gateway-psc-publish`|
185
291
| EU (`europe-west4`) |`projects/langchain-prod/regions/europe-west4/serviceAttachments/gateway-psc-publish`|
186
292
187
-
#### PSC domains
293
+
#####PSC domains
188
294
189
295
After setup, use the following domains to connect to LangSmith over your PSC connection:
190
296
@@ -193,13 +299,13 @@ After setup, use the following domains to connect to LangSmith over your PSC con
193
299
| US |`us-central1.p.api.smith.langchain.com`|
194
300
| EU |`europe-west4.p.api.smith.langchain.com`|
195
301
196
-
#### Setup
302
+
#####Setup
197
303
198
304
**Request access:** Contact your account representative or [sales@langchain.dev](mailto:sales@langchain.dev) with your GCP project ID. LangChain will add your project to the service attachment's allowed consumer list.
199
305
200
306
After access is granted, create a PSC endpoint and configure DNS using either the gcloud CLI or Terraform.
201
307
202
-
#### Create a PSC endpoint
308
+
#####Create a PSC endpoint
203
309
204
310
Create a forwarding rule in your VPC targeting the service attachment:
0 commit comments