cancel
Showing results for 
Search instead for 
Did you mean: 
Administration & Architecture
Explore discussions on Databricks administration, deployment strategies, and architectural best practices. Connect with administrators and architects to optimize your Databricks environment for performance, scalability, and security.
cancel
Showing results for 
Search instead for 
Did you mean: 

NAT Gateway IP update

gillesfromparis
New Contributor II

Hi,

 
My Databricks (Premium) account was deployed on AWS.
It was provisioned a few months ago from the AWS MarketPlace with the QuickStart method, based on CloudFormation.
 
The NAT Gateway initially created by the CloudFormation stack has been incidentally destroyed.
I created a new NAT Instance and updated the private subnets route table accordingly.
Yet the EIP (Elastic IP) associated with the previous NAT Gateway was released, and my new NAT instance gets a different EIP.
As a consequence, the Control Plane can no longer communicate with the resources deployed in the private subnets where my Databricks account is deployed, as says the message visible in my account network settings:
"WarningCannot find any NAT Gateways for vpc-0exxxxxxx."
 
Is there any way to update the NAT Gateway IP declared for my VPC workspace at the Control Plane end ?
 
Thanks
Gilles
1 ACCEPTED SOLUTION

Accepted Solutions

Walter_C
Databricks Employee
Databricks Employee

Have you adjusted te network routing to point to the new nat gateway and the nat gateway to point to the internet gateway?

https://docs.databricks.com/aws/en/security/network/classic/customer-managed-vpc#additional-subnet-r...

 

View solution in original post

3 REPLIES 3

Walter_C
Databricks Employee
Databricks Employee

Have you adjusted te network routing to point to the new nat gateway and the nat gateway to point to the internet gateway?

https://docs.databricks.com/aws/en/security/network/classic/customer-managed-vpc#additional-subnet-r...

 

Problem solved (the IP forward option was not declared in the right config file of the NAT Instance).

My cluster is now up and running.

Thanks anyway Walter for your support.

gillesfromparis
New Contributor II

Thanks for your answer.

Yes I did all of that, as well as allowing the traffic coming from my NAT Instance as an inbound rule of the Security Group of the private instances (and the other way around), and no restriction on the outbound traffic.

I suspect that the NAT Gateway IP was "hard coded" in Databricks Control Plane (associated with my VPC reference) when it was provisioned by CloudFormation, but I don't know how it could be updated with the IP of my new NAT Instance (since this update should be made by Databricks).

Join Us as a Local Community Builder!

Passionate about hosting events and connecting people? Help us grow a vibrant local community—sign up today to get started!

Sign Up Now