2 weeks ago
Hi
I am trying to run notebooks on serverless compute but I cannot access the public internet. I cannot perform a get on google.com getting "[Errno -3] Temporary failure in name resolution".
I checked my admin console network policies and they all were on the default provided by databricks so I am not sure what I am missing. Could you please provide support?
Thanks
2 weeks ago - last edited 2 weeks ago
Hi @jpm2617 ,
Network policies have two primary modes: Full Access (unrestricted outbound internet) and Restricted Access (tightly controlled outbound connections). The default policy is associated with all workspaces that have no explicit network policy assignment.
The key thing to check is what your default policy's internet access mode is actually set to. "Default provided by Databricks" doesn't automatically mean "Full Access" - if your account admin (or a previous admin) has modified the default policy to restricted mode, public internet will be blocked.
As an account admin, do the following:
If my answer was helpful, please consider marking it as accepted solution
2 weeks ago
Hi,
I cannot find the place that you have in your screenshot, this is what my network tab looks like.
Thanks,
2 weeks ago
I can also see that my default_policy attached to my workspace looks like this:
a week ago
Greetings @jpm2617 , I did some digging and would like to share my thoughts:
@szymon_dybczak nailed the root cause. Your [Errno -3] Temporary failure in name resolution when calling google.com is the classic symptom of a workspace attached to a restricted serverless egress policy, even when the policy is named default_policy and looks like the Databricks default. The name "default" does not guarantee full internet access.
A few clarifications and a clear set of next steps.
The controls live at the account layer, not the workspace one:
Account Console → Security → Networking → Context-based ingress & egress control
If you only see workspace VPC options and no "Context-based ingress & egress control" section, one of two things is happening. You're still in the workspace UI, or you don't have account admin rights. Cluster VPC and secure cluster connectivity settings live in the workspace Network tab, but they're not what you need here.
Only users with the account admin role (or equivalent) can open the network policy object and change its egress and internet access mode. If the "Context-based ingress & egress control" section is missing entirely, it's one of these:
If it's the third case, I don't know of a supported way for you to override serverless egress on your own today. You'd need your account team or Databricks Support to confirm what's available on your specific tenant. I can't tell which account type you're on from the screenshot alone, so I won't guess at it.
Once you're in the Account Console as an account admin, do this in order:
a. Go to Security → Networking → Context-based ingress & egress control. b. Open the policy attached to your workspace (you've already identified it as default_policy). c. On the Egress tab, set Internet access to one of these:
google.com and similar resolve.GET against https://www.google.com to confirm.Many customers deliberately keep serverless off the public internet and front required services through Private Link or NCC (Network Connectivity Configuration). All traffic stays on private cloud networks, which reduces exposure. Databricks engineering has written about this pattern for exactly this scenario. If that's your real goal, follow those patterns instead of opening full outbound internet.
Takeaway
If you can confirm you're in the Account Console as an account admin and you still don't see "Context-based ingress & egress control," this is almost certainly an account or plan configuration limit. Open a Databricks Support ticket or contact your account team to verify whether serverless egress policy management is enabled for your tenant, and if not, what your options are.
Hope this helps.
Regards, Louis.