Yeah, itโs definitely possible for Databricks to hit Azure Storage through a private endpoint without turning on โallow trusted services.โ The key is making sure everythingโs using the private network path.
Right now, that 10.0.35.x IP youโre seeing is from the Databricks subnet inside your VNet, but it sounds like the storage account traffic is still resolving to the public endpoint. Thatโs why itโs getting blocked.
To fix it, make sure:
- The Databricks workspace is VNet-injected (not the managed VNet type).
- Youโve got a Private Endpoint for your storage account (blob/dfs) in the same VNet or a peered one.
- The Private DNS zone (like privatelink.blob.core.windows.net or privatelink.dfs.core.windows.net) is linked to the Databricks VNet, so lookups for the storage account resolve to the private IP.
- NSGs and routes allow traffic between the Databricks and private endpoint subnets.
Once DNS is resolving correctly, Databricks should talk to storage entirely within your VNet, and you can safely keep โtrusted servicesโ turned off.