Join us at FabCon Atlanta from March 16 - 20, 2026, for the ultimate Fabric, Power BI, AI and SQL community-led event. Save $200 with code FABCOMM.
Register now!The Power BI Data Visualization World Championships is back! Get ahead of the game and start preparing now! Learn more
First off, I am on a networking team tasked with getting Power BI traffic to avoid the Internet. I am not well versed in all things PowerBI but am learning quickly.
We have an on-prem data gateway running on an EC2 instance in AWS that connects to a Snowflake data source via privatelink and this connections works as expected. For security reasons, we are trying to have the data source traffic return from the data gateway in AWS, towards the Power BI service via private link, avoiding the open Internet entirely. We have the privatelink for PowerBI enabled in Azure, with the private DNS zones, and routing between the two clouds via site-to-site VPN tunnels. The problem we are having is getting the AWS on-prem data gateway to know how to send this return traffic to the Power BI service via the privatelink path.
Is this even possible?
Solved! Go to Solution.
@netoptics So the short answer is no, not in the way you’re hoping, at least today. To the best of my knowledge, you can’t currently force an on-premises data gateway running in AWS to send its control/data plane traffic to the Power BI service over Azure Private Link instead of the public internet.
The on-prem data gateway is designed to be “outbound only.”
Establishes outbound HTTPS connections (TCP 443) to a set of public Power BI endpoints (e.g., *.analysis.windows.net, *.pbidedicated.windows.net, etc.).
Must be able to resolve those FQDNs to public IP addresses and reach them over the internet (possibly via proxy).
There is no supported option today for the gateway client to target an Azure Private Endpoint / Private Link IP for the Power BI SaaS service.
Azure Private Link for Power BI is currently oriented towards:
Clients inside Azure VNETs (e.g., Azure VMs, VNets where you deploy Private Endpoints),
So that those Azure resources reach Power BI over the Microsoft backbone instead of the internet.
The gateway, however, is a client running outside Azure (in AWS), and there is no config knob on the gateway that says: “Use this private IP / this private endpoint DNS zone when talking to Power BI.”
Even if you expose the Private Link endpoint via S2S VPN and tweak DNS, the gateway software:
Expects to reach Microsoft’s public endpoints with Microsoft-controlled certificates.
Is not documented/Supported to work with forced resolution of those names to your Private Endpoint IPs in another cloud.
So from a supportability standpoint: this scenario is not supported, and practically, it’s very brittle even if you “hack” DNS.
You can’t eliminate the public internet entirely, but you can constrain and harden it quite a lot. I see two main options:
Lock down the EC2 instance so the gateway can only:
Reach a tightly controlled HTTP(S) proxy or firewall,
Which in turn only allows egress to the documented Power BI FQDNs over 443.
Optionally enable TLS inspection / logging / advanced threat protection.
You’re still using the internet, but:
Only to specific Microsoft endpoints,
From a single egress point,
With full monitoring and control.
If you’re willing to change where the gateway runs:
Spin up an Azure VM in a VNet that uses Private Link to Power BI.
Connect AWS to that Azure VNet via VPN or ExpressRoute.
Put the gateway on that Azure VM and:
Have it reach Snowflake in AWS over the inter-cloud connection.
Have it reach Power BI service over Private Link inside Azure.
@netoptics So the short answer is no, not in the way you’re hoping, at least today. To the best of my knowledge, you can’t currently force an on-premises data gateway running in AWS to send its control/data plane traffic to the Power BI service over Azure Private Link instead of the public internet.
The on-prem data gateway is designed to be “outbound only.”
Establishes outbound HTTPS connections (TCP 443) to a set of public Power BI endpoints (e.g., *.analysis.windows.net, *.pbidedicated.windows.net, etc.).
Must be able to resolve those FQDNs to public IP addresses and reach them over the internet (possibly via proxy).
There is no supported option today for the gateway client to target an Azure Private Endpoint / Private Link IP for the Power BI SaaS service.
Azure Private Link for Power BI is currently oriented towards:
Clients inside Azure VNETs (e.g., Azure VMs, VNets where you deploy Private Endpoints),
So that those Azure resources reach Power BI over the Microsoft backbone instead of the internet.
The gateway, however, is a client running outside Azure (in AWS), and there is no config knob on the gateway that says: “Use this private IP / this private endpoint DNS zone when talking to Power BI.”
Even if you expose the Private Link endpoint via S2S VPN and tweak DNS, the gateway software:
Expects to reach Microsoft’s public endpoints with Microsoft-controlled certificates.
Is not documented/Supported to work with forced resolution of those names to your Private Endpoint IPs in another cloud.
So from a supportability standpoint: this scenario is not supported, and practically, it’s very brittle even if you “hack” DNS.
You can’t eliminate the public internet entirely, but you can constrain and harden it quite a lot. I see two main options:
Lock down the EC2 instance so the gateway can only:
Reach a tightly controlled HTTP(S) proxy or firewall,
Which in turn only allows egress to the documented Power BI FQDNs over 443.
Optionally enable TLS inspection / logging / advanced threat protection.
You’re still using the internet, but:
Only to specific Microsoft endpoints,
From a single egress point,
With full monitoring and control.
If you’re willing to change where the gateway runs:
Spin up an Azure VM in a VNet that uses Private Link to Power BI.
Connect AWS to that Azure VNet via VPN or ExpressRoute.
Put the gateway on that Azure VM and:
Have it reach Snowflake in AWS over the inter-cloud connection.
Have it reach Power BI service over Private Link inside Azure.
Thank you so much for this very detailed response! This answers my question and even some additional thoughts swirling around in my head.
The Power BI Data Visualization World Championships is back! Get ahead of the game and start preparing now!