<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Delta Sharing Issue between AWS and Azure in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/delta-sharing-issue-between-aws-and-azure/m-p/139934#M51321</link>
    <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/198508"&gt;@el_mark&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Root Cause&lt;BR /&gt;Serverless SQL or notebook queries that whitelist the Databricks serverless cluster IP succeed because those IP addresses are allowed access through the Azure storage account firewall&lt;/P&gt;&lt;P&gt;Dedicated compute instances or non-serverless SQL warehouses on AWS typically use different IP addresses (e.g., from AWS VPC egress) that must be explicitly allowed on the Azure storage account firewall.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Solution:&lt;/P&gt;&lt;P&gt;Storage Firewall Rules&lt;/P&gt;&lt;P&gt;Verify the Azure Storage Account firewall includes the egress IP addresses used by your dedicated AWS VPC and non-serverless compute instances.&lt;/P&gt;&lt;P&gt;Network Connectivity Configuration&lt;/P&gt;&lt;P&gt;If your dedicated compute uses private IPs or VPC security groups, ensure proper routing and DNS resolution to access Azure storage endpoint URLs internally&lt;/P&gt;&lt;P&gt;Delta Sharing IP Access List&lt;/P&gt;&lt;P&gt;If using Delta Sharing IP access lists on the provider side, add the dedicated IP addresses to those lists to ensure data access.&lt;/P&gt;&lt;P&gt;Cross-Cloud Access Best Practices&lt;/P&gt;&lt;P&gt;Check that the IPs or CIDR blocks your dedicated AWS VPC compute uses are explicitly allowed in Azure Storage firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Azure Databricks Delta Sharing troubleshooting guide: &lt;A href="https://learn.microsoft.com/en-us/azure/databricks/delta-sharing/troubleshooting" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/databricks/delta-sharing/troubleshooting&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;IP restrictions and access controls for Delta Sharing: &lt;A href="https://learn.microsoft.com/en-us/azure/databricks/delta-sharing/access-list" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/databricks/delta-sharing/access-list&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Nov 2025 14:58:15 GMT</pubDate>
    <dc:creator>ManojkMohan</dc:creator>
    <dc:date>2025-11-21T14:58:15Z</dc:date>
    <item>
      <title>Delta Sharing Issue between AWS and Azure</title>
      <link>https://community.databricks.com/t5/data-engineering/delta-sharing-issue-between-aws-and-azure/m-p/139905#M51320</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We have attempted to setup a delta share between from Azure to AWS.&lt;/P&gt;&lt;P&gt;We can see the delta share table and meta data in AWS, however when we attempt to query the table we hit a problem.&lt;/P&gt;&lt;P&gt;If we use serverless SQL or Notebook and whitelist the IP address from the databricks serverless cluster the query returns expected results.&lt;/P&gt;&lt;P&gt;However, if we attempt to use dedicated IP address from AWS VPC and a non-serverless SQL warehouse and dedicated Compute instances we get the following error:&lt;/P&gt;&lt;P&gt;“HTTP 500 INTERNAL_ERROR&lt;/P&gt;&lt;P&gt;Reason: DS_INTERNAL_ERROR_FROM_DB_DS_SERVER&lt;/P&gt;&lt;P&gt;Endpoint: &lt;A href="https://data-sharing.ewe.pzpukw1gc01.internal.azuredatabricks.net/api/2.0/delta-sharing/metastores/9633ff73-338f-472d-a203-dd3cdfd59e8a/shares/electralink-poc-test/schemas/helix/tables/electralink_mpans_consumption_test/query/nMethod" target="_blank"&gt;https://data-sharing.****.internal.azuredatabricks.net:443/api/2.0/delta-sharing/metastores/&amp;lt;metastore&amp;gt;/query\nMethod&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Trace ID: f92422c0b36284fe3d03aca010de9953”&lt;/P&gt;&lt;P&gt;Any ideas what is stopping the dedicated IP from returning results from the same share?&lt;/P&gt;&lt;P&gt;Thanks in advance for any insights.&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2025 11:03:20 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/delta-sharing-issue-between-aws-and-azure/m-p/139905#M51320</guid>
      <dc:creator>el_mark</dc:creator>
      <dc:date>2025-11-21T11:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Delta Sharing Issue between AWS and Azure</title>
      <link>https://community.databricks.com/t5/data-engineering/delta-sharing-issue-between-aws-and-azure/m-p/139934#M51321</link>
      <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/198508"&gt;@el_mark&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Root Cause&lt;BR /&gt;Serverless SQL or notebook queries that whitelist the Databricks serverless cluster IP succeed because those IP addresses are allowed access through the Azure storage account firewall&lt;/P&gt;&lt;P&gt;Dedicated compute instances or non-serverless SQL warehouses on AWS typically use different IP addresses (e.g., from AWS VPC egress) that must be explicitly allowed on the Azure storage account firewall.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Solution:&lt;/P&gt;&lt;P&gt;Storage Firewall Rules&lt;/P&gt;&lt;P&gt;Verify the Azure Storage Account firewall includes the egress IP addresses used by your dedicated AWS VPC and non-serverless compute instances.&lt;/P&gt;&lt;P&gt;Network Connectivity Configuration&lt;/P&gt;&lt;P&gt;If your dedicated compute uses private IPs or VPC security groups, ensure proper routing and DNS resolution to access Azure storage endpoint URLs internally&lt;/P&gt;&lt;P&gt;Delta Sharing IP Access List&lt;/P&gt;&lt;P&gt;If using Delta Sharing IP access lists on the provider side, add the dedicated IP addresses to those lists to ensure data access.&lt;/P&gt;&lt;P&gt;Cross-Cloud Access Best Practices&lt;/P&gt;&lt;P&gt;Check that the IPs or CIDR blocks your dedicated AWS VPC compute uses are explicitly allowed in Azure Storage firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Azure Databricks Delta Sharing troubleshooting guide: &lt;A href="https://learn.microsoft.com/en-us/azure/databricks/delta-sharing/troubleshooting" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/databricks/delta-sharing/troubleshooting&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;IP restrictions and access controls for Delta Sharing: &lt;A href="https://learn.microsoft.com/en-us/azure/databricks/delta-sharing/access-list" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/databricks/delta-sharing/access-list&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2025 14:58:15 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/delta-sharing-issue-between-aws-and-azure/m-p/139934#M51321</guid>
      <dc:creator>ManojkMohan</dc:creator>
      <dc:date>2025-11-21T14:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: Delta Sharing Issue between AWS and Azure</title>
      <link>https://community.databricks.com/t5/data-engineering/delta-sharing-issue-between-aws-and-azure/m-p/140066#M51340</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/155141"&gt;@ManojkMohan&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;I can see the correct IP address when if IPIFY from a compute notebook.&amp;nbsp; So from what you are saying above, that implies the issue is with the Azure Storage firewall right?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 09:11:40 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/delta-sharing-issue-between-aws-and-azure/m-p/140066#M51340</guid>
      <dc:creator>el_mark</dc:creator>
      <dc:date>2025-11-24T09:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Delta Sharing Issue between AWS and Azure</title>
      <link>https://community.databricks.com/t5/data-engineering/delta-sharing-issue-between-aws-and-azure/m-p/140391#M51411</link>
      <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/198508"&gt;@el_mark&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if your notebook on the dedicated compute shows the expected public IP via ipify, but queries still fail while serverless works, it strongly suggests the Azure Storage firewall (or network rules on the storage account) is only allowing the serverless IPs and not the egress IPs from your AWS VPC.&lt;/P&gt;&lt;P&gt;Check&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The egress IP/CIDR of your AWS VPC (non‑serverless warehouse / compute) is added to the Azure Storage Account firewall allow list.&lt;/LI&gt;&lt;LI&gt;Any Delta Sharing IP access list on the provider side also includes this IP/CIDR&amp;nbsp;&lt;A href="https://community.databricks.com/t5/data-engineering/delta-sharing-open-issue-with-access-data-on-storage/td-p/113014" target="_blank"&gt;https://community.databricks.com/t5/data-engineering/delta-sharing-open-issue-with-access-data-on-storage/td-p/113014&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;DNS/routing from that VPC can reach the Azure storage endpoint&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2025 09:45:30 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/delta-sharing-issue-between-aws-and-azure/m-p/140391#M51411</guid>
      <dc:creator>ManojkMohan</dc:creator>
      <dc:date>2025-11-26T09:45:30Z</dc:date>
    </item>
  </channel>
</rss>

