Skip to content

Commit

Permalink
Minor update to ADB recipe (#39)
Browse files Browse the repository at this point in the history
* Minor update to ADB recipe documentation.
  • Loading branch information
promisinganuj committed Jun 7, 2023
1 parent 82ae79c commit 2975976
Show file tree
Hide file tree
Showing 2 changed files with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions src/az-databricks/README.md
Expand Up @@ -408,6 +408,16 @@ If you don't want to allow all the trusted services to be able to access Azure K

A different approach is to use REST API calls to retrieve the Azure Key Vault secrets. And this will work if you have the private endpoints created for Azure Key Vault from Databricks VNet. But it has other downside that the retrieved password won't be redacted and thus this approach needs to be applied carefully.

### **DBFS root** storage account has public access enabled

The **DBFS root** is the default storage location for an Azure Databricks workspace, provisioned as part of workspace creation in the cloud account containing the Azure Databricks workspace. It contains a number of special locations that serve as defaults for various actions performed by users in the workspace, the details can be checked [here](https://learn.microsoft.com/azure/databricks/dbfs/root-locations). The root container of the Azure Blob storage, created and managed by Azure Databricks, contains the workspace’s DBFS root.

At the moment, this Azure Databricks managed storage account is accessible from all networks. The access to this storage account is managed by Azure Databricks and is protected by a "deny assignment" at managed resource group level. Because of this assignment, it's not possible to make any changes to the configuration of this storage account.

![Showing Azure Databricks "DBFS root" public access](./media/adb-dbfs-access.gif)

The DBFS public endpoint can be further protected by deploying Azure Databricks with secure cluster connectivity (SCC) and protecting it with a Firewall. This will prevent unauthorized access, and all traffic traverses on the Microsoft backbone. Please read through this [blog](https://www.databricks.com/blog/2020/03/27/data-exfiltration-protection-with-azure-databricks.html) for details.

### The Azure CLI command to generate Databricks access token fails on Ubuntu

If you are deploying this recipe from VM running on Ubuntu (and few other version of linux), the Azure CLI command to generate the Databricks access token might fail:
Expand Down
Binary file added src/az-databricks/media/adb-dbfs-access.gif
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 2975976

Please sign in to comment.