cancel
Showing results forย 
Search instead forย 
Did you mean:ย 
Administration & Architecture
Explore discussions on Databricks administration, deployment strategies, and architectural best practices. Connect with administrators and architects to optimize your Databricks environment for performance, scalability, and security.
cancel
Showing results forย 
Search instead forย 
Did you mean:ย 

Customer Managed VPC: Databricks IP Address Ranges

tom_1
New Contributor III

Hello,

how often does Databricks change its public ip addresses (the ones that must be whitelisted in a customer managed vpc) and where can I find them?
I found this list, but it seems to be incomplete.

We moved from a managed vpc to a customer-managed vpc. 
The managed vpc contains a managed security-group that whitelists the following ips (ports):
18.159.44.32/28 (5555-5557,22), 18.159.32.64/32 (5555-5557), 18.158.203.57/32 (5555-5557,22).

The later two mentioned ip address are not mentioned in the official list, and port information is not given at all.
So why does Databricks whitelist the later two ips and what does it need port 22 (ssh) for?

1 REPLY 1

Louis_Frolio
Databricks Employee
Databricks Employee

Greetings @tom_1 ,  youโ€™re right to cross-check the published listโ€”hereโ€™s how the IPs and ports fit together and where to get the authoritative values.

Where to find the current Databricks IPs

  • The official source is the Databricks โ€œIP addresses and domains for Databricks on AWSโ€ page. It lists perโ€‘region control plane domains, CIDR ranges, and outbound NAT IPs, plus guidance to prefer allowlisting FQDNs (especially for SCC relay) because IPs can change periodically with infra updates and multiโ€‘AZ deployments.
  • For euโ€‘centralโ€‘1 specifically, the docs list:
    • Control plane services: frankfurt.cloud.databricks.com with 18.159.44.32/28.
    • Control plane outbound NAT IPs: 18.159.44.32/28 and 18.159.32.64.

Why youโ€™re seeing 18.159.32.64 and 18.158.203.57

  • 18.159.32.64 is an AWS control plane NAT IP that Databricks uses for outbound connections from the control plane in euโ€‘centralโ€‘1; itโ€™s explicitly published on the docs page.
  • 18.158.203.57 is an additional control plane egress IP used by Databricks in euโ€‘centralโ€‘1 and is widely allowlisted across our internal LBs and IP ACLs. While it is not called out on the public page, it is part of our region configuration and appears in internal allowlists for crossโ€‘environment control plane traffic.

Why ports 22, 5555โ€“5557 are opened to control plane IPs

  • Port 22 (SSH): Databricks uses SSH from the control plane to provision EC2 instances and perform routine product updates and lifecycle actions on cluster nodes. This controlโ€‘planeโ€‘toโ€‘dataโ€‘plane traffic is part of managed security group rules for classic/MT workspaces.
  • Port 5557: The encrypted worker proxy channel that the control plane uses to reach data plane services (Spark UI, JDBC, TensorBoard, RStudio, etc.). Traffic is TLSโ€‘encrypted.
  • Ports 5555โ€“5556: Historically used for worker proxy traffic; many managed security group templates still include them to cover legacy paths and avoid breakage, even though modern deployments primarily rely on 5557 and 22.

How often do these IPs change?

  • There is no fixed, public cadence. IPs behind Databricks control plane domains (including SCC relay endpoints) can change periodically due to infrastructure updates, scaling events, and multiโ€‘AZ operations. Thatโ€™s why the official guidance is to allowlist FQDNs for SCC endpoints and automate DNS resolution rather than pinning individual IPs.

Practical guidance for customerโ€‘managed VPCs

  • Prefer allowlisting the SCC relay domains (for euโ€‘centralโ€‘1: tunnel.eu-central-1.cloud.databricks.com; for PrivateLink workspaces use the PrivateLink SCC relay domain) and workspace/control plane domains rather than individual IPs, to avoid breakage when IPs move.
  • If you must allowlist IP addresses, use the official docs table for your region (for euโ€‘centralโ€‘1: 18.159.44.32/28 and 18.159.32.64), and plan for automation to refresh IP rules when changes occur. Avoid relying on adโ€‘hoc IPs not listed publicly unless you manage the allowlists centrally and monitor infra changes.
  • Inbound rules for MT/managed SGs commonly allow TCP 22, 5555, 5556, 5557 from Databricks control plane IPs; if you are tightening security groups in a customerโ€‘managed VPC, ensure the modern path (22 and 5557) is permitted from the published control plane IPs or FQDNs, and prefer PrivateLink endpoints where possible.
 
Let us know if this helps.
Cheers, Louis.