11-21-2025 03:03 AM
Hi
We have attempted to setup a delta share between from Azure to AWS.
We can see the delta share table and meta data in AWS, however when we attempt to query the table we hit a problem.
If we use serverless SQL or Notebook and whitelist the IP address from the databricks serverless cluster the query returns expected results.
However, if we attempt to use dedicated IP address from AWS VPC and a non-serverless SQL warehouse and dedicated Compute instances we get the following error:
“HTTP 500 INTERNAL_ERROR
Reason: DS_INTERNAL_ERROR_FROM_DB_DS_SERVER
Trace ID: f92422c0b36284fe3d03aca010de9953”
Any ideas what is stopping the dedicated IP from returning results from the same share?
Thanks in advance for any insights.
Mark
11-26-2025 01:45 AM
if your notebook on the dedicated compute shows the expected public IP via ipify, but queries still fail while serverless works, it strongly suggests the Azure Storage firewall (or network rules on the storage account) is only allowing the serverless IPs and not the egress IPs from your AWS VPC.
Check
11-21-2025 06:58 AM
Root Cause
Serverless SQL or notebook queries that whitelist the Databricks serverless cluster IP succeed because those IP addresses are allowed access through the Azure storage account firewall
Dedicated compute instances or non-serverless SQL warehouses on AWS typically use different IP addresses (e.g., from AWS VPC egress) that must be explicitly allowed on the Azure storage account firewall.
Solution:
Storage Firewall Rules
Verify the Azure Storage Account firewall includes the egress IP addresses used by your dedicated AWS VPC and non-serverless compute instances.
Network Connectivity Configuration
If your dedicated compute uses private IPs or VPC security groups, ensure proper routing and DNS resolution to access Azure storage endpoint URLs internally
Delta Sharing IP Access List
If using Delta Sharing IP access lists on the provider side, add the dedicated IP addresses to those lists to ensure data access.
Cross-Cloud Access Best Practices
Check that the IPs or CIDR blocks your dedicated AWS VPC compute uses are explicitly allowed in Azure Storage firewalls.
Azure Databricks Delta Sharing troubleshooting guide: https://learn.microsoft.com/en-us/azure/databricks/delta-sharing/troubleshooting
IP restrictions and access controls for Delta Sharing: https://learn.microsoft.com/en-us/azure/databricks/delta-sharing/access-list
11-24-2025 01:11 AM
Thank you @ManojkMohan.
I can see the correct IP address when if IPIFY from a compute notebook. So from what you are saying above, that implies the issue is with the Azure Storage firewall right?
11-26-2025 01:45 AM
if your notebook on the dedicated compute shows the expected public IP via ipify, but queries still fail while serverless works, it strongly suggests the Azure Storage firewall (or network rules on the storage account) is only allowing the serverless IPs and not the egress IPs from your AWS VPC.
Check