docs/v3/advanced/configure-network-access.mdx
If your execution environment restricts outbound network access, you must allow traffic to specific endpoints for Prefect to function. This page lists the required and optional endpoints for both Prefect Cloud and self-hosted Prefect server deployments.
Workers, flow runs, and the Prefect CLI need outbound HTTPS access (TCP port 443) to communicate with Prefect Cloud.
| Endpoint | Purpose |
|---|---|
api.prefect.cloud | Prefect Cloud REST API and WebSocket connections |
app.prefect.cloud | Prefect Cloud UI (browser access for users) |
auth.workos.com | Authentication provider for login and SSO |
| Endpoint | Purpose | How to disable |
|---|---|---|
api2.amplitude.com | SDK anonymous usage telemetry | Set DO_NOT_TRACK=1 on the client |
sens-o-matic.prefect.io | Self-hosted server anonymous telemetry heartbeat | Set PREFECT_SERVER_ANALYTICS_ENABLED=false on the server |
api.github.com / github.com | Authentication via GitHub social login | Not needed if you use SSO or email-based login |
ocsp.pki.goog | TLS certificate revocation checks (OCSP) | Cannot be disabled; required by TLS libraries |
Blocking optional telemetry endpoints may produce warning messages in logs but does not affect operation. See Telemetry for details on what data is collected and how to opt out.
Depending on your deployment, workers, and flow runs may also need access to:
When running a self-hosted Prefect server, workers, and the CLI need access to the server's API endpoint. No external Prefect-hosted endpoints are required for core operation.
| Endpoint | Purpose |
|---|---|
Your server's PREFECT_API_URL (for example, https://prefect.internal.example.com/api) | Prefect server REST API |
sens-o-matic.prefect.io (optional) | Anonymous server telemetry heartbeat |
api2.amplitude.com (optional) | SDK anonymous usage telemetry |
Set PREFECT_SERVER_ANALYTICS_ENABLED=false on the server to disable the server heartbeat, and
DO_NOT_TRACK=1 on client processes to disable SDK telemetry.
The Prefect client uses httpx for HTTP requests.
httpx respects standard proxy environment variables, so you can route Prefect traffic through a
corporate proxy:
export HTTPS_PROXY=http://proxy.example.com:8080
export SSL_CERT_FILE=/path/to/corporate-ca-bundle.crt
See the GitHub Discussion on using Prefect Cloud with proxies for additional configuration examples.
To confirm that your environment can reach Prefect Cloud, run:
curl -s https://api.prefect.cloud/api/health
A successful response returns a health check JSON payload. If the request times out or is refused, check your firewall rules and proxy configuration.
You can also verify your full Prefect configuration with:
prefect config view
prefect cloud login
For environments with strict egress controls, Prefect Cloud offers additional options:
Contact your account manager or [email protected] for details on enterprise networking options.