- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-15-2022 01:42 AM
In Azure Databricks the DBFS storage account is open to all networks. Changing that to use a private endpoint or minimizing access to selected networks is not allowed.
Is there any way to add network security to this storage account?
Alternatively, is it possible to configure another storage account for DBFS that is owned, secured and maintained by the customer?
Clarification: This post is intended to be about the DBFS root
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-04-2022 02:50 AM
Hello,
for information I've asked Microsoft Support, there's any other security recommandations than those listed in the official documentation:
Recommendations for working with DBFS root - Azure Databricks | Microsoft Learn
Thanks,
Léo
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2024 05:13 AM
How can we secure the storage account in the managed resource group which holds the DBFS with restricted network access, since access from all networks is blocked by our Azure storage account policy?


- « Previous
-
- 1
- 2
- Next »