Databricks App in Azure Databricks with private link cluster (no Public IP)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
โ01-17-2025 04:01 AM
Hello,
I've deployed Azure Databricks with a standard Private Link setup (no public IP). Everything works as expectedโI can log in via the private/internal network, create clusters, and manage workloads without any issues.
When I create a Databricks App, it generates a URL like: <name>.azure.databricksapps.com
Since I didnโt initially have a Private DNS Zone for azure.databricksapps.com, my system resolved this address to a public IP. To fix this, I:
- Created a Private DNS Zone for azure.databricksapps.com.
- Added an A record pointing <name>.azure.databricksapps.com to my Databricks workspace private IP endpoint (same as used in privatelink.azuredatabricks.net for this workspace).
Behavior Before Adding the Private DNS Zone:
nslookup <app-name>.azure.databricksapps.com โ Resolved to a public IP.
curl or accessing via a browser resulted in:
{"X-Databricks-Reason-Phrase":"Public access is not allowed for workspace: xyz"}
Behavior After Adding the Private DNS Zone:
nslookup <app-name>.azure.databricksapps.com โ Now resolves to the private IP (as expected).
However, curl and browser requests still go through the public IP and return the same error:
{"X-Databricks-Reason-Phrase":"Public access is not allowed for workspace: xyz"}
Is additional configuration needed to ensure Databricks Apps work over Private Link?
Does this feature require a Public IP, or should it work fully within a private network?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
โ01-17-2025 04:40 AM
Hello @Behwar,
Did you make sure that your internal DNS is configured to map the web application workspace URL to your front-end VPC endpoint. This involves creating an A-record in your internal DNS that maps the workspace URL directly to the front-end (workspace) VPC endpoint private IP
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
โ01-17-2025 05:12 AM
I'm using Azure, so instead of a VPC endpoint, I'm working with Azure Private Link. Here's what I checked and did:
- Verified my Databricks workspace private endpoint under privatelink.azuredatabricks.net.
- Created a Private DNS Zone for azure.databricksapps.com and mapped <app-name> to the same private IP as my Databricks workspace.
- Linked my VNet to the Private DNS Zone so all internal resources resolve it correctly.
- Confirmed that nslookup now returns the private IP, but browser and curl still attempt to route via the public IP.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
โ02-20-2025 12:38 AM
I am also facing the same issue. Is the recommendation to create one A-record for each app, which sounds a bit cumbersome.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
โ02-21-2025 11:10 AM
Do you have a private endpoint for databricks_ui_api ? You need to establish a private endpoint for users to access web app.

