Hello @Daniel Widdis ,
Welcome to microsoft Q&A platform.
Unfortunately, you are not allowed to configure network security group (NSG) rules in the managed resource group because the managed resource group is locked.
To resolve this issue, there are couple of options to restricts access to a port in the NSG rules.
Option1: Deploy Azure Databricks in your Azure Virtual Network (VNet injection).
The default deployment of Azure Databricks is a fully managed service on Azure: all data plane resources, including a virtual network (VNet) that all clusters will be associated with, are deployed to a locked resource group. If you require network customization, however, you can deploy Azure Databricks data plane resources in your own virtual network (sometimes called VNet injection), enabling you to:
- Connect Azure Databricks to other Azure services (such as Azure Storage) in a more secure manner using service endpoints.
- Connect to on-premises data sources for use with Azure Databricks, taking advantage of user-defined routes.
- Connect Azure Databricks to a network virtual appliance to inspect all outbound traffic and take actions according to allow and deny rules.
- Configure Azure Databricks to use custom DNS.
- Configure network security group (NSG) rules to specify egress traffic restrictions.
- Deploy Azure Databricks clusters in your existing virtual network.
Option2: Please do raise a support request, so that databricks team helps to remove System deny assignment for your managed resource group.
Hope this helps. Do let us know if you any further queries.
------------
- Please accept an answer if correct. Original posters help the community find answers faster by identifying the correct answer. Here is how.
- Want a reminder to come back and check responses? Here is how to subscribe to a notification.