Ensure that secure cluster connectivity (also known as No Public IP Configuration) is enabled for your Microsoft Azure Databricks workspaces. This configuration ensures that clusters are provisioned without public IP addresses and communicate with the control plane exclusively over a secure, private network connection.
To enable secure cluster connectivity, Microsoft Azure Databricks workspaces should run within a customer-managed Virtual Network (VNet). If your Databricks workspace was not deployed to a customer-managed VNet, refer to Check for Virtual Network (VNet) Injection for VNet integration.
Audit
To determine if secure cluster connectivity is enabled for your Azure Databricks workspaces, perform the following operations:
Remediation / Resolution
With Secure Cluster Connectivity, customer-managed Virtual Network (VNet) have no open ports and Databricks Runtime cluster nodes have no public IP addresses. To enable Secure Cluster Connectivity for your Azure Databricks workspaces, perform the following operations:
References
- Azure Official Documentation
- Networking
- Deploy Azure Databricks in your Azure virtual network (VNet injection)
- Quickstart: Create an Azure Databricks workspace in your own Virtual Network
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az databricks workspace list
- az databricks workspace show
- az databricks workspace update