- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-23-2023 06:02 AM
Hi,
I'm using Azure databricks service and having trouble blocking public access to my workspace.
The security groups that are attached to the subnets that databrics is using are being ignored.
From what I've learned in the last couple of days, the databricks control plane doesn't run in my vnet and subnets but in Microsoft backbone network. I've tried solve that out using a firewall but couldn't make it work and it is an ugly approach. I've asked in Azure community forum and got a procedure to follow which hadn't worked as well. The procedure was to create a NIC with a public IP and attach it to the subnet. Then. create a route table which consists of a route rule from the control plane to the NIC public IP but this hadn't worked as well.
Any guidence here would be appreciated
Thanks
Gil
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-25-2023 12:14 AM
Hi
Forgot to mention that I was using standard edition when writing this question but after struggling too long with that we've decided to upgrade to premium and use the IP access list feature and that worked!
Thanks
Gil
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-24-2023 05:00 PM
@gilShin did you tried this approach, this is other way to block access to your workspace
https://learn.microsoft.com/en-us/azure/databricks/security/network/ip-access-list-workspace
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-25-2023 12:14 AM
Hi
Forgot to mention that I was using standard edition when writing this question but after struggling too long with that we've decided to upgrade to premium and use the IP access list feature and that worked!
Thanks
Gil

