cancel
Showing results for 
Search instead for 
Did you mean: 
Administration & Architecture
Explore discussions on Databricks administration, deployment strategies, and architectural best practices. Connect with administrators and architects to optimize your Databricks environment for performance, scalability, and security.
cancel
Showing results for 
Search instead for 
Did you mean: 

Reaching out to Azure Storage with IP from Private VNET pool

zaicnupagadi
New Contributor

Hey All,

Is there a way for Databricks to reach out to Azure Storage using private endpoint?

We would like no omit enabling access by "all trusted services".

All resources are in the same VNET however when Databrics tries to reach out to Storage instead of our 179.x.x.x network we see in the logs that access is blocked and that might be since the ip with which databricks reaches out to storage is from 10.0.35.x pool.

Kindest regards,

Pawel Jarosz

 

1 REPLY 1

nayan_wylde
Esteemed Contributor

Yeah, it’s definitely possible for Databricks to hit Azure Storage through a private endpoint without turning on “allow trusted services.” The key is making sure everything’s using the private network path.

Right now, that 10.0.35.x IP you’re seeing is from the Databricks subnet inside your VNet, but it sounds like the storage account traffic is still resolving to the public endpoint. That’s why it’s getting blocked.

To fix it, make sure:

  • The Databricks workspace is VNet-injected (not the managed VNet type).
  • You’ve got a Private Endpoint for your storage account (blob/dfs) in the same VNet or a peered one.
  • The Private DNS zone (like privatelink.blob.core.windows.net or privatelink.dfs.core.windows.net) is linked to the Databricks VNet, so lookups for the storage account resolve to the private IP.
  • NSGs and routes allow traffic between the Databricks and private endpoint subnets.

Once DNS is resolving correctly, Databricks should talk to storage entirely within your VNet, and you can safely keep “trusted services” turned off.