GCP Private Service Connect for Databricks

circle-info

Private preview: This feature is available to select accounts. Contact your Immuta representative for details.

GCP Private Service Connectarrow-up-right provides private connectivity from the Immuta SaaS platform to Databricks accounts hosted on Google Cloud Platform (GCP). It ensures that all traffic to the configured endpoints only traverses private networks over the Immuta private cloud exchange. This front-end Private Service Connect connection allows users to connect to the Databricks web application, REST API, and Databricks Connect API over a VPC endpoint.

Requirements

Ensure that your accounts meet the following requirements:

This process will require configuring a service account in GCP and administrative access to the Databricks account in GCP. For details about Databricks authentication with Google Identity, see the Databricks documentation on Google ID authenticationarrow-up-right.

Configure Databricks with GCP Private Service Connect

Follow these steps to establish private connectivity between Immuta and your Databricks environment:

  1. Create a service account in GCP. Ensure that a principal (either a user or a different service account) has the roles/iam.serviceAccountTokenCreator role attached for this newly created service account. For more information, refer to the GCP documentation on service account impersonationarrow-up-right.

  2. Add the newly created service account email to your Databricks account with admin rights to be able to add network endpoints. For guidance, see the Databricks documentation on adding user accountsarrow-up-right.

  3. Open an Immuta support ticketarrow-up-right and provide the following information:

  4. Immuta will create the Private Service Connect (PSC) endpoints in the different regions that contain your workspaces and attach a role to the provided service account that allows it to view the created VPC endpoints. Immuta will then provide you the following details:

    • VPC endpoint ID and region

    • Immuta project ID

  5. Run the script (or manually make the necessary API calls to Databricksarrow-up-right) to connect the Immuta-created PSC endpoints to your Databricks account using all of the information provided by the Immuta support team. To run the script, you will need to have gcloud, curl, and jq installed and be logged in with a principal that can impersonate the service account that was provided to Immuta.

  1. Validate that any private access settings attached to your workspaces that need connectivity have the newly created endpoints added (either accepting the Account level or adding the specific endpoints to the private access settingarrow-up-right).

After these steps, you should be able to connect your Immuta tenant to Databricks workspaces in GCP under the connected account.

Last updated

Was this helpful?