<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Networking Challenges with Databricks Serverless Compute (Control Plane) When Connecting to On-Prem in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/networking-challenges-with-databricks-serverless-compute-control/m-p/117532#M3319</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Databricks Serverless Community Post.drawio (2).png" style="width: 999px;"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/16431iACFC07EEFDC9D252/image-size/large?v=v2&amp;amp;px=999" role="button" title="Databricks Serverless Community Post.drawio (2).png" alt="Databricks Serverless Community Post.drawio (2).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hi Databricks Community,&lt;/P&gt;&lt;P&gt;I'm working through some networking challenges when connecting Databricks clusters to various data sources and wanted to get advice or best practices from others who may have faced similar issues.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current Setup:&lt;/STRONG&gt;&lt;BR /&gt;I have four types of source systems that I need to connect to from Databricks:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. Customer Plane Clusters → Source in Azure VNet&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Approach:&lt;/STRONG&gt; Peered the Databricks Customer VNet with the source system’s VNet.&lt;BR /&gt;&lt;STRONG&gt;Connectivity:&lt;/STRONG&gt; Whitelisted the NAT Gateway Public IP in the source system’s firewall.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. Customer Plane Clusters → On-Prem System&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Approach:&lt;/STRONG&gt; Established a Site-to-Site VPN between the Databricks Customer VNet and On-Prem network.&lt;BR /&gt;&lt;STRONG&gt;Connectivity:&lt;/STRONG&gt; Whitelisted the private IPs on the on-prem side.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;3. Control Plane Clusters (Serverless Compute) → Azure Services (Storage Account, MySQL, etc.)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Approach:&lt;/STRONG&gt; Using Network Connectivity Configuration (NCC) in Databricks.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4. Control Plane Clusters (Serverless Compute) → On-Prem System&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Approach:&lt;/STRONG&gt; Not applicable yet — looking for guidance here.&lt;BR /&gt;&lt;STRONG&gt;Connectivity challenge:&lt;/STRONG&gt; Unable to establish direct connectivity due to lack of support for peering or site-to-site connections from Control Plane to On-Prem.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The Problem:&amp;nbsp;&lt;/STRONG&gt;However, I'm running into networking limitations when trying to connect Serverless Compute (Control Plane) to systems behind firewalls - especially in on-premises or other CSPs / SaaS applications.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue A: No Static Outbound IPs for Serverless Compute&lt;/STRONG&gt;&lt;BR /&gt;For external systems behind a firewall, there is no static public IP address available from serverless compute to whitelist.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue B: No Network-Level Integration with On-Prem Networks&lt;/STRONG&gt;&lt;BR /&gt;Unlike customer-managed clusters, serverless compute does not support peering or site-to-site connections, and there is no direct network-level communication.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue C: Limited Support for Hybrid or Multi-Cloud Scenarios&lt;/STRONG&gt;&lt;BR /&gt;There’s currently no supported way to securely connect Databricks serverless compute to:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;On-prem systems&lt;/LI&gt;&lt;LI&gt;Other cloud providers (AWS/GCP)&lt;/LI&gt;&lt;LI&gt;Third-party SaaS applications requiring IP-based access control&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Fri, 02 May 2025 16:46:33 GMT</pubDate>
    <dc:creator>chandru44</dc:creator>
    <dc:date>2025-05-02T16:46:33Z</dc:date>
    <item>
      <title>Networking Challenges with Databricks Serverless Compute (Control Plane) When Connecting to On-Prem</title>
      <link>https://community.databricks.com/t5/administration-architecture/networking-challenges-with-databricks-serverless-compute-control/m-p/117532#M3319</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Databricks Serverless Community Post.drawio (2).png" style="width: 999px;"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/16431iACFC07EEFDC9D252/image-size/large?v=v2&amp;amp;px=999" role="button" title="Databricks Serverless Community Post.drawio (2).png" alt="Databricks Serverless Community Post.drawio (2).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hi Databricks Community,&lt;/P&gt;&lt;P&gt;I'm working through some networking challenges when connecting Databricks clusters to various data sources and wanted to get advice or best practices from others who may have faced similar issues.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current Setup:&lt;/STRONG&gt;&lt;BR /&gt;I have four types of source systems that I need to connect to from Databricks:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. Customer Plane Clusters → Source in Azure VNet&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Approach:&lt;/STRONG&gt; Peered the Databricks Customer VNet with the source system’s VNet.&lt;BR /&gt;&lt;STRONG&gt;Connectivity:&lt;/STRONG&gt; Whitelisted the NAT Gateway Public IP in the source system’s firewall.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. Customer Plane Clusters → On-Prem System&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Approach:&lt;/STRONG&gt; Established a Site-to-Site VPN between the Databricks Customer VNet and On-Prem network.&lt;BR /&gt;&lt;STRONG&gt;Connectivity:&lt;/STRONG&gt; Whitelisted the private IPs on the on-prem side.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;3. Control Plane Clusters (Serverless Compute) → Azure Services (Storage Account, MySQL, etc.)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Approach:&lt;/STRONG&gt; Using Network Connectivity Configuration (NCC) in Databricks.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4. Control Plane Clusters (Serverless Compute) → On-Prem System&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Approach:&lt;/STRONG&gt; Not applicable yet — looking for guidance here.&lt;BR /&gt;&lt;STRONG&gt;Connectivity challenge:&lt;/STRONG&gt; Unable to establish direct connectivity due to lack of support for peering or site-to-site connections from Control Plane to On-Prem.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The Problem:&amp;nbsp;&lt;/STRONG&gt;However, I'm running into networking limitations when trying to connect Serverless Compute (Control Plane) to systems behind firewalls - especially in on-premises or other CSPs / SaaS applications.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue A: No Static Outbound IPs for Serverless Compute&lt;/STRONG&gt;&lt;BR /&gt;For external systems behind a firewall, there is no static public IP address available from serverless compute to whitelist.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue B: No Network-Level Integration with On-Prem Networks&lt;/STRONG&gt;&lt;BR /&gt;Unlike customer-managed clusters, serverless compute does not support peering or site-to-site connections, and there is no direct network-level communication.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue C: Limited Support for Hybrid or Multi-Cloud Scenarios&lt;/STRONG&gt;&lt;BR /&gt;There’s currently no supported way to securely connect Databricks serverless compute to:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;On-prem systems&lt;/LI&gt;&lt;LI&gt;Other cloud providers (AWS/GCP)&lt;/LI&gt;&lt;LI&gt;Third-party SaaS applications requiring IP-based access control&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 02 May 2025 16:46:33 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/networking-challenges-with-databricks-serverless-compute-control/m-p/117532#M3319</guid>
      <dc:creator>chandru44</dc:creator>
      <dc:date>2025-05-02T16:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: Networking Challenges with Databricks Serverless Compute (Control Plane) When Connecting to On-P</title>
      <link>https://community.databricks.com/t5/administration-architecture/networking-challenges-with-databricks-serverless-compute-control/m-p/134917#M4214</link>
      <description>&lt;P&gt;Thank you for posting this question.&amp;nbsp; I am encountering the exact same scenarios with Databricks serverless compute while trying to connect to on-prem systems via site-to-site VPN as well as third party SaaS applications requiring IP-based access control.&amp;nbsp; Has anyone figured out the correct way to address these issues?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2025 21:21:00 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/networking-challenges-with-databricks-serverless-compute-control/m-p/134917#M4214</guid>
      <dc:creator>bitc</dc:creator>
      <dc:date>2025-10-14T21:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: Networking Challenges with Databricks Serverless Compute (Control Plane) When Connecting to On-P</title>
      <link>https://community.databricks.com/t5/administration-architecture/networking-challenges-with-databricks-serverless-compute-control/m-p/135451#M4243</link>
      <description>&lt;P&gt;Greetings&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/155042"&gt;@chandru44&lt;/a&gt;&amp;nbsp;, Thanks for sharing this detailed networking setup—you've clearly done thorough work mapping out your connectivity patterns. You've correctly identified the fundamental architectural limitation with serverless compute and on-premises connectivity. Let me address your concerns and provide some practical guidance.&lt;/P&gt;
&lt;H2&gt;Understanding the Limitation&lt;/H2&gt;
&lt;P&gt;You're absolutely right that &lt;STRONG&gt;Databricks serverless compute does not currently support direct network-level integration with on-premises systems&lt;/STRONG&gt;. This is by design—serverless compute runs in the Databricks-managed control plane, not in your customer VNet, which means traditional networking approaches (VNet peering, Site-to-Site VPN) cannot be applied.&lt;/P&gt;
&lt;H4&gt;Why NCC Doesn't Solve On-Prem Connectivity&lt;/H4&gt;
&lt;P&gt;Network Connectivity Configurations (NCC) are designed specifically for &lt;STRONG&gt;Azure-native resources only&lt;/STRONG&gt;&amp;nbsp;(Storage Accounts, MySQL, Cosmos DB, etc.) using Azure Private Link and managed private endpoints. NCC cannot establish connectivity to on-premises systems because it relies on Azure's Private Link infrastructure, which doesn't extend to on-prem networks.&lt;/P&gt;
&lt;H3&gt;Recommended Workarounds&lt;/H3&gt;
&lt;H3&gt;Option 1: Hybrid Data Sync Pattern (Recommended for Most Cases)&lt;/H3&gt;
&lt;P&gt;The most reliable approach is to &lt;STRONG&gt;use a staging/synchronization layer&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;1. Use your &lt;STRONG&gt;customer plane clusters&lt;/STRONG&gt;&amp;nbsp;(with Site-to-Site VPN connectivity) to extract data from on-prem systems&lt;BR /&gt;2. Land the data in Azure storage (ADLS Gen2, Blob Storage) with appropriate governance&lt;BR /&gt;3. Use &lt;STRONG&gt;serverless compute&lt;/STRONG&gt;&amp;nbsp;to process the data in Azure&lt;BR /&gt;4. Optionally sync processed results back to on-prem via customer plane clusters&lt;/P&gt;
&lt;P&gt;This pattern prevents overwhelming on-prem systems with cloud-scale operations and provides better performance and cost optimization.&lt;/P&gt;
&lt;H3&gt;Option 2: Expose On-Prem Services via Azure Gateway&lt;/H3&gt;
&lt;P&gt;If real-time access is required:&lt;/P&gt;
&lt;P&gt;1. Deploy an &lt;STRONG&gt;Azure Application Gateway&lt;/STRONG&gt;&amp;nbsp;or &lt;STRONG&gt;API Management&lt;/STRONG&gt;&amp;nbsp;service in your Azure VNet&lt;BR /&gt;2. Configure ExpressRoute or Site-to-Site VPN from Azure to on-prem&lt;BR /&gt;3. Expose on-prem services through this gateway with appropriate authentication&lt;BR /&gt;4. Configure NCC firewall rules to allow serverless compute to access the gateway's subnet&lt;/P&gt;
&lt;P&gt;Note: This still requires the gateway to be an Azure resource that NCC can reach.&lt;/P&gt;
&lt;H3&gt;Option 3: Use Classic Compute for On-Prem Connectivity&lt;/H3&gt;
&lt;P&gt;For workloads that &lt;STRONG&gt;must&lt;/STRONG&gt;&amp;nbsp;have direct on-prem connectivity, continue using &lt;STRONG&gt;customer plane clusters&lt;/STRONG&gt;&amp;nbsp;with VNet injection. You can design a hybrid architecture where:&lt;/P&gt;
&lt;P&gt;- Serverless compute handles Azure-native workloads (better performance, lower cost)&lt;BR /&gt;- Classic compute clusters handle on-prem connectivity workloads&lt;BR /&gt;- Both layers interact via Unity Catalog tables&lt;/P&gt;
&lt;H2&gt;Addressing Your Specific Issues&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Issue A - No Static Outbound IPs&lt;/STRONG&gt;: Correct—serverless compute does not provide static public IPs for whitelisting. For customer plane clusters, you can whitelist NAT Gateway IPs, but this isn't available for serverless.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Issue B - No Network Integration&lt;/STRONG&gt;: This is a fundamental architectural constraint. Serverless compute prioritizes rapid scaling and zero infrastructure management over custom networking.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Issue C - Multi-Cloud/SaaS Limitations&lt;/STRONG&gt;: For external systems requiring IP whitelisting, the hybrid sync pattern (Option 1) or exposing services via Azure-native endpoints (Option 2) are your best options.&lt;/P&gt;
&lt;H2&gt;Additional Considerations&lt;/H2&gt;
&lt;P&gt;- &lt;STRONG&gt;Delta Sharing&lt;/STRONG&gt;: For governed data distribution between on-prem and cloud environments, consider using Delta Sharing to share curated datasets without data duplication.&lt;BR /&gt;- &lt;STRONG&gt;Cost Optimization&lt;/STRONG&gt;: The hybrid approach actually helps with cost—you avoid unnecessary data egress charges and can optimize compute usage based on workload type.&lt;BR /&gt;- &lt;STRONG&gt;Security&lt;/STRONG&gt;: The staging pattern provides better data governance and audit trails compared to direct connectivity.&lt;/P&gt;
&lt;P&gt;Unfortunately, there's no direct solution for serverless-to-on-prem connectivity in the current architecture. The workarounds above represent the practical approaches used by organizations facing similar constraints.&lt;/P&gt;
&lt;P&gt;Hope this helps clarify your options!&lt;/P&gt;
&lt;P&gt;Cheers, Louis.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 18:55:15 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/networking-challenges-with-databricks-serverless-compute-control/m-p/135451#M4243</guid>
      <dc:creator>Louis_Frolio</dc:creator>
      <dc:date>2025-10-20T18:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: Networking Challenges with Databricks Serverless Compute (Control Plane) When Connecting to On-P</title>
      <link>https://community.databricks.com/t5/administration-architecture/networking-challenges-with-databricks-serverless-compute-control/m-p/135597#M4251</link>
      <description>&lt;P&gt;Thank you Louis for the detailed explanation and guidance!&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 21:58:47 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/networking-challenges-with-databricks-serverless-compute-control/m-p/135597#M4251</guid>
      <dc:creator>bitc</dc:creator>
      <dc:date>2025-10-21T21:58:47Z</dc:date>
    </item>
  </channel>
</rss>

