cancel
Showing results forย 
Search instead forย 
Did you mean:ย 
Administration & Architecture
Explore discussions on Databricks administration, deployment strategies, and architectural best practices. Connect with administrators and architects to optimize your Databricks environment for performance, scalability, and security.
cancel
Showing results forย 
Search instead forย 
Did you mean:ย 

Private Route53 hosted zone for cloud.databricks.com

margarita_shir
New Contributor III
We have Tailscale deployed on the same VPC as our Databricks workspaces. To enable PrivateLink for some workspaces, we created a private Route53 hosted zone for cloud.databricks.com with CNAME records pointing workspace hostnames to the PrivateLink endpoint.

The problem is that this private zone shadows all of *.cloud.databricks.com within the VPC, including:

  • accounts.cloud.databricks.com โ€” needed for public authentication
  • ui-assets.cloud.databricks.com โ€” CDN for UI static assets

For accounts.cloud.databricks.com we worked around this by adding an explicit A alias record in the private zone pointing to the public ELB. However, Databricks recently rotated that ELB hostname, breaking our hardcoded record.

For ui-assets.cloud.databricks.com โ€” we only discovered today that this subdomain is also under cloud.databricks.com and was returning NXDOMAIN from the private zone, causing a blank page on all workspaces for Tailscale users.

Question: What is the recommended approach for maintaining a private hosted zone for cloud.databricks.com while keeping public subdomains like accounts and ui-assets resolvable? Is there a supported way to handle this without hardcoding ELB hostnames that can rotate?

Thank you,

4 REPLIES 4

suranga
Databricks Partner

The safer approach is not to shadow cloud.databricks.com with one private hosted zone. Databricks recommends the privatelink.cloud.databricks.com DNS pattern with conditional forwarding, which avoids hardcoding rotating ELB hostnames and keeps public services like accounts and ui-assets resolvable through normal public DNS.

stbjelcevic
Databricks Employee
Databricks Employee

Your current setup is a known anti-pattern. By creating a PHZ for cloud.databricks.com, you're shadowing every subdomain under that zone, including accounts, ui-assets, and any future public subdomains Databricks adds.

How it works

Databricks workspace URLs resolve through a CNAME chain:

<workspace>.cloud.databricks.com โ†’ <region>.privatelink.cloud.databricks.com

So the PHZ only needs to cover privatelink.cloud.databricks.com with regional A records pointing to your VPC endpoint private IPs. This leaves all public subdomains (accounts, ui-assets, etc.) resolving normally through public DNS.

Recommended Steps

1. Create a new PHZ for privatelink.cloud.databricks.com associated with your VPC
2. Add A records for your region(s), e.g. us-east-1.privatelink.cloud.databricks.com โ†’ VPC endpoint private IPs
3. Delete the old cloud.databricks.com PHZ
4. Verify accounts.cloud.databricks.com and ui-assets.cloud.databricks.com resolve publicly again

This eliminates all hardcoded ELB hostnames and is resilient to Databricks infrastructure rotations.

References
- https://docs.databricks.com/aws/en/security/network/classic/privatelink-dns
- https://community.databricks.com/t5/community-articles/configuring-dns-resolution-for-private-databr...

Thank you for your response. I added a new private hosted zone in Amazon Route 53 for privatelink.cloud.databricks.com, and created an A record for us-east-1.privatelink.cloud.databricks.com pointing to the private endpoint IP.

I had a question regarding split DNS in Tailscale. It is currently configured to forward cloud.databricks.com to 10.104.248.2 (our VPC DNS resolver), as it was for the original private hosted zone. However, when I switch the split DNS domain to privatelink.cloud.databricks.com, it breaks private DNS resolution for workspaces using Private Link and starts returning public IPs instead. Does this mean we should keep the split DNS configuration in Tailscale set to cloud.databricks.com โ†’ 10.104.248.2?

margarita_shir
New Contributor III

Thank you for your response. I added a new private hosted zone in Amazon Route 53 for privatelink.cloud.databricks.com, and created an A record for us-east-1.privatelink.cloud.databricks.com pointing to the private endpoint IP.

I had a question regarding split DNS in Tailscale. It is currently configured to forward cloud.databricks.com to 10.104.248.2 (our VPC DNS resolver), as it was for the original private hosted zone. However, when I switch the split DNS domain to privatelink.cloud.databricks.com, it breaks private DNS resolution for workspaces using Private Link and starts returning public IPs instead. Does this mean we should keep the split DNS configuration in Tailscale set to cloud.databricks.com โ†’ 10.104.248.2?