<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Azure Databricks Classic Compute Plane Firewall in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/azure-databricks-classic-compute-plane-firewall/m-p/94251#M2081</link>
    <description>&lt;P&gt;I’m designing a compute plane configuration that will align our data platform with internal policies from a security perspective. As part of this exercise I'm documenting how the permissible traffic inbound and outbound is controlled using NSG rules, which made me question why Compute Plane VNETs don’t typically make use of Azure Firewalls (in my experience). From what I’ve read they seem to provide a far more sophisticated suite of capabilities for limiting, monitoring, and scanning inbound and outbound traffic, but their use isn't advised anywhere in the documentation. Have I misunderstood their intended purpose, or would it be too expensive to implement?&lt;/P&gt;&lt;P&gt;Keen to hear from Databricks and other customers too &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Oct 2024 07:31:37 GMT</pubDate>
    <dc:creator>Jim-Shady</dc:creator>
    <dc:date>2024-10-16T07:31:37Z</dc:date>
    <item>
      <title>Azure Databricks Classic Compute Plane Firewall</title>
      <link>https://community.databricks.com/t5/administration-architecture/azure-databricks-classic-compute-plane-firewall/m-p/94251#M2081</link>
      <description>&lt;P&gt;I’m designing a compute plane configuration that will align our data platform with internal policies from a security perspective. As part of this exercise I'm documenting how the permissible traffic inbound and outbound is controlled using NSG rules, which made me question why Compute Plane VNETs don’t typically make use of Azure Firewalls (in my experience). From what I’ve read they seem to provide a far more sophisticated suite of capabilities for limiting, monitoring, and scanning inbound and outbound traffic, but their use isn't advised anywhere in the documentation. Have I misunderstood their intended purpose, or would it be too expensive to implement?&lt;/P&gt;&lt;P&gt;Keen to hear from Databricks and other customers too &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2024 07:31:37 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/azure-databricks-classic-compute-plane-firewall/m-p/94251#M2081</guid>
      <dc:creator>Jim-Shady</dc:creator>
      <dc:date>2024-10-16T07:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Databricks Classic Compute Plane Firewall</title>
      <link>https://community.databricks.com/t5/administration-architecture/azure-databricks-classic-compute-plane-firewall/m-p/94270#M2083</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/127302"&gt;@Jim-Shady&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I’m designing a compute plane configuration that will align our data platform with internal policies from a security perspective. As part of this exercise I'm documenting how the permissible traffic inbound and outbound is controlled using NSG rules, which made me question why Compute Plane VNETs don’t typically make use of Azure Firewalls (in my experience). From what I’ve read they seem to provide a far more sophisticated suite of capabilities for limiting, monitoring, and scanning inbound and outbound traffic, but their use isn't advised anywhere in the documentation. Have I misunderstood their intended purpose, or would it be too expensive to implement?&lt;/P&gt;&lt;P&gt;Keen to hear from Databricks and other customers too &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;Hello,&lt;BR /&gt;Azure&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Firewalls&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;offer&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;advanced&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;features&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;like&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;deep&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;packet&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;inspection&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;threat&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;intelligence,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;but&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;they&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;can&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;be&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;more&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;expensive&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;than&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;NSGs&lt;/SPAN&gt;&lt;SPAN&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;NSGs&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;are&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;simpler&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;more&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;cost-effective&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;for&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;basic&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;traffic&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;filtering&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;within&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;VNets&lt;/SPAN&gt;&lt;SPAN&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Your&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;choice&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;depends&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;on&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;your&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;specific&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;security&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;needs&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;budget.&lt;BR /&gt;&lt;BR /&gt;Best Regards,&lt;BR /&gt;Michael Gardner&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2024 10:30:16 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/azure-databricks-classic-compute-plane-firewall/m-p/94270#M2083</guid>
      <dc:creator>michael569gardn</dc:creator>
      <dc:date>2024-10-16T10:30:16Z</dc:date>
    </item>
  </channel>
</rss>

