How to assign a single public IP for VNet-injected workspaces using Azure Firewall
You can use an Azure Firewall to create a VNet-injected workspace in which all clusters have a single IP outbound address. The single IP address can be used as an additional security layer with other Azure services and applications that allow access based on specific IP addresses.
- Set up an Azure Databricks Workspace in your own virtual network.
- Set up a firewall within the virtual network. See Create an NVA. When you create the firewall, you should:
- Note both the private and public IP addresses for the firewall for later use.
- Create a network rule for the public subnet to forward all traffic to the internet:
- Name: any arbitrary name
- Priority: 100
- Protocol: Any
- Source Addresses: IP range for the public subnet in the virtual network that you created
- Destination Addresses: 0.0.0.0/1
- Destination Ports: *
- Create a Custom Route Table and associate it with the public subnet.
- Add custom routes, also known as user-defined routes (UDR) for the following services. Specify the Azure Databricks region addresses for your region. For Next hop type, enter
Internet
, as shown in creating a route table.- Control Plane NAT VIP
- Webapp
- Metastore
- Artifact Blob Storage
- Logs Blob Storage
- Add a custom route for the firewall with the following values:
- Address prefix: 0.0.0.0./0
- Next hop type: Virtual appliance
- Next hop address: The private IP address for the firewall.
- Associate the route table with the public subnet.
- Add custom routes, also known as user-defined routes (UDR) for the following services. Specify the Azure Databricks region addresses for your region. For Next hop type, enter
- Validate the setup
- Create a cluster in the Azure Databricks workspace.
- Next, query blob storage to your own paths or run
%fs ls
in a cell. - If it fails, confirm that the route table has all required UDRs (including Service Endpoint instead of the UDR for Blob Storage)
For more information, see Route Azure Databricks traffic using a virtual appliance or firewall.
Feedback
Submit and view feedback for