An Apache Spark-based analytics platform optimized for Azure.
Hi @Anushree N
When both the public and private Databricks subnets are configured to route virtual network traffic and internet traffic through Azure Firewall (using UDRs), the key requirement is to allow the required outbound connectivity from the Databricks data plane to the Databricks control plane and dependent Azure services.
Azure Databricks does not require broad open communication between the public and private subnets. The focus should be on allowing the documented outbound dependencies while keeping east-west traffic restricted unless your workload specifically requires it.
Recommended firewall considerations:
- Allow Databricks control-plane connectivity Allow outbound connectivity from both Databricks subnets to the Azure Databricks control plane using the AzureDatabricks service tag where possible instead of maintaining static IP ranges.
- Allow Azure platform dependencies used by Databricks Depending on the workload, allow outbound access to:
- Azure Storage (DBFS, logs, artifacts)
- Event Hubs (cluster telemetry and platform communication where applicable)
- Microsoft Entra ID (authentication/token acquisition)
- Azure Key Vault (if integrated)
- Azure Container Registry or external package repositories if clusters install dependencies
- DNS connectivity Ensure the Databricks subnets can resolve required Azure and Databricks endpoints through the configured DNS path.
- Public ↔ Private subnet communication Additional broad firewall rules between the Databricks public and private subnets are generally not required solely because VNet traffic is routed through Azure Firewall. Azure Databricks manages the workspace networking model and NSG requirements for delegated subnets. Only permit inter-subnet traffic if your own applications require it.
- If Private Link is enabled Additional documented Private Link connectivity requirements apply for the private endpoint subnet and should be configured accordingly.
Recommendation: Use service tags + UDR + Azure Firewall rather than static IP allowlists wherever possible to reduce operational overhead and avoid connectivity issues during service updates.
References:
https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/udr?
https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/vnet-inject
https://learn.microsoft.com/en-us/azure/databricks/resources/ip-domain-region
https://learn.microsoft.com/en-us/azure/databricks/security/network/concepts/private-link
https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/secure-cluster-connectivity
https://learn.microsoft.com/en-us/azure/databricks/security/network/classic/on-prem-network
Please let us know if you have any questions or concerns.