Network reference architecture overview

Different organizations have different network isolation requirements. This page outlines three reference architectures for common requirements. Identify the architecture that best fits your network topology, data governance needs, and egress control policies.

Databricks architecture

Azure Databricks operates out of a control plane and a compute plane.

  • The control plane includes the backend services that Azure Databricks manages in your Azure Databricks account. The web application is in the control plane.
  • The compute plane is where your data is processed. There are two types of compute planes depending on the compute that you are using.
    • For classic Azure Databricks compute, the compute resources are in your Azure subscription in what is called the classic compute plane. This refers to the network in your Azure subscription and its resources. Classic compute plane resources are in the same region as your workspace.
    • For serverless compute, the serverless compute resources run in a serverless compute plane in your Azure Databricks account. Serverless compute plane resources are in the same cloud region as your workspace's classic compute plane. You select this region when creating a workspace.

To learn more about classic compute and serverless compute, see Compute. For additional architecture information, see High-level architecture.

Types of network connectivity

Databricks provides a secure networking environment by default, but if your organization has additional needs, you can configure network connectivity features between the different networking connections. Each architecture configures features across three types of network connectivity:

  1. Inbound: Users and applications to Azure Databricks: You can configure features to control access and provide private connectivity between users and their Azure Databricks workspaces. See Users to Azure Databricks networking.
  2. Classic: The control plane and the classic compute plane: Classic compute resources, such as clusters, are deployed in your Azure subscription and connect to the control plane. You can use classic network connectivity features to deploy classic compute plane resources in your own virtual network and to enable private connectivity from the clusters to the control plane. See Classic compute plane networking.
  3. Outbound: The serverless compute plane and storage: You can configure firewalls on your resources to allow access from the Azure Databricks serverless compute plane. See Serverless compute plane networking.

Use the following diagram to visualize the way data flows through Databricks.

Network connectivity overview diagram

Choose your network architecture

These architectures provide network security for each type of connectivity in a progression. Start with Managed security as your baseline and layer on controls as your requirements increase. Most organizations harden ingress and egress before moving to full private connectivity.

Architecture Description
Managed security Your starting point. Azure Databricks-managed infrastructure with secure defaults: customer-managed VPC, SCC enabled, classic compute plane Private Link for private control-plane connectivity, and serverless stable IPs out of the box. No custom networking required. Apply Unity Catalog controls on top of this baseline for data governance.
Hardened connectivity Hardens ingress and egress on top of Managed security. Adds IP access lists for workspace and account console access, VPC endpoints for cloud service access, serverless egress controls (network policies and NCC private endpoints), and an optional external firewall for full egress inspection. Best for organizations that must have auditability and access control without eliminating public endpoints.
Isolated environment Makes all access private on top of Hardened connectivity. Adds inbound Private Link so workspace access no longer traverses the public internet. Requires the external firewall (optional in Hardened connectivity) for full egress inspection. For regulated industries (financial services, healthcare, government) with strict data exfiltration requirements.

Feature matrix

The following table shows which network security features apply to each architecture:

Connectivity Feature Managed security Hardened connectivity Isolated environment
Classic compute Secure Cluster Connectivity (SCC) Yes Yes Yes
Classic compute VNet injection Yes Yes Yes
Classic compute Classic compute plane Private Link Yes Yes Yes
Inbound Workspace inbound Private Link No No Yes
Inbound Inbound Private Link for performance-intensive services No No Yes
Inbound Workspace IP access lists No Yes Yes
Inbound Account-level IP access lists No Yes Yes
Inbound Delta Sharing IP access lists No Yes Yes
Outbound Serverless egress control No Yes Yes
Outbound Serverless Private Link (NCC private endpoints) No Yes Yes
Outbound Serverless stable IPs Yes Yes Yes
Outbound External firewall Optional Optional Yes

Additional resources

Resource Description
Databricks security best practices Security reference architectures, Security Analysis Tool (SAT), and the AWS security white paper.
Networking costs Plan and manage networking costs across Azure Databricks deployments.