<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How Azure Databricks manages network security group rules in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/how-azure-databricks-manages-network-security-group-rules/m-p/21874#M14942</link>
    <description>&lt;P&gt;How Azure Databricks manages network security group rules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 22 Jun 2021 09:30:57 GMT</pubDate>
    <dc:creator>User16826994223</dc:creator>
    <dc:date>2021-06-22T09:30:57Z</dc:date>
    <item>
      <title>How Azure Databricks manages network security group rules</title>
      <link>https://community.databricks.com/t5/data-engineering/how-azure-databricks-manages-network-security-group-rules/m-p/21874#M14942</link>
      <description>&lt;P&gt;How Azure Databricks manages network security group rules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 09:30:57 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/how-azure-databricks-manages-network-security-group-rules/m-p/21874#M14942</guid>
      <dc:creator>User16826994223</dc:creator>
      <dc:date>2021-06-22T09:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: How Azure Databricks manages network security group rules</title>
      <link>https://community.databricks.com/t5/data-engineering/how-azure-databricks-manages-network-security-group-rules/m-p/21875#M14943</link>
      <description>&lt;P&gt;The NSG rules listed in the following sections represent those that Azure Databricks auto-provisions and manages in your NSG, by virtue of the delegation of your VNet’s host and container subnets to the&amp;nbsp;&lt;/P&gt;&lt;P&gt;Microsoft.Databricks/workspaces&lt;/P&gt;&lt;P&gt;&amp;nbsp;service. You do not have permission to update or delete these NSG rules; any attempt to do so is blocked by the subnet delegation. Azure Databricks must own these rules in order to ensure that Microsoft can reliably operate and support the Azure Databricks service in your VNet.&lt;/P&gt;&lt;P&gt;Some of these NSG rules have&amp;nbsp;&lt;I&gt;VirtualNetwork&lt;/I&gt;&amp;nbsp;assigned as the source and destination. This has been implemented to simplify the design in the absence of a subnet-level service tag in Azure. All clusters are protected by a second layer of network policy internally, such that cluster A cannot connect to cluster B in the same workspace. This also applies across multiple workspaces if your workspaces are deployed into a different pair of subnets in the same customer-managed VNet&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 09:31:15 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/how-azure-databricks-manages-network-security-group-rules/m-p/21875#M14943</guid>
      <dc:creator>User16826994223</dc:creator>
      <dc:date>2021-06-22T09:31:15Z</dc:date>
    </item>
  </channel>
</rss>

