Databricks clouds and regions
Databricks workspaces can be hosted on Amazon AWS, Microsoft Azure, and Google Cloud Platform. You can use Databricks on any of these hosting platforms to access data wherever you keep it, regardless of cloud.
This article lists:
The regions supported by Databricks on AWS.
Features available in each region, where there is regional differentiation in feature availability.
IP addresses and domains for Databricks services and assets.
You may need this information if you create your Databricks workspaces in your own VPC, a feature known as customer-managed VPC, or if you use AWS PrivateLink within your Databricks network environment.
Supported regions list
This table lists the AWS regions supported by Databricks. There are some features that are available only in a subset of regions. The table indicates whether or not a region supports each of these features. If a feature is supported in all regions, it is not included in the table.
Features that are excluded from at least one region include:
E2 version of the Databricks platform.
E2 is required for a number of security and privacy features, including HIPAA support.
CMK (customer-managed keys) for both managed services (control plane storage of notebook commands, secrets, and Databricks SQL queries) and workspace storage (root S3 bucket and cluster node EBS volumes).
Serverless SQL warehouses. See also Serverless compute.
Region |
Location |
UC |
E2 |
CMK |
PrivateLink |
Serverless SQL warehouses |
Model Serving |
---|---|---|---|---|---|---|---|
|
Asia Pacific (Tokyo) |
X |
X |
X |
X |
||
|
Asia Pacific (Seoul) |
X |
X |
X |
X |
||
|
Asia Pacific (Mumbai) |
X |
X |
X |
X |
||
|
Asia Pacific (Singapore) |
X |
X |
X |
X |
X |
|
|
Asia Pacific (Sydney) |
X |
X |
X |
X |
X |
X |
|
Canada (Central) |
X |
X |
X |
X |
X |
|
|
EU (Frankfurt) |
X |
X |
X |
X |
X |
X |
|
EU (Ireland) |
X |
X |
X |
X |
X |
X |
|
EU (London) |
X |
X |
X |
X |
||
|
EU (Paris) |
X |
X |
X |
X |
||
|
South America (Sao Paulo) |
X |
X |
X |
X |
||
|
US West (Northern California) |
X |
X |
||||
|
US West (Oregon) |
X |
X |
X |
X |
X |
X |
|
US East (Northern Virginia) |
X |
X |
X |
X |
X |
X |
|
US East (Ohio) |
X |
X |
X |
X |
X |
X |
IP addresses and domains
You may need the following information if:
You create your Databricks workspaces in your own VPC, a feature known as customer-managed VPC.
See Customer-managed VPC.
You use AWS PrivateLink within your Databricks network environment.
Webapp addresses
This table lists the address and port of the Databricks web application for each supported region.
VPC region |
Address |
Port |
---|---|---|
|
tokyo.cloud.databricks.com |
443 |
|
seoul.cloud.databricks.com |
443 |
|
mumbai.cloud.databricks.com |
443 |
|
singapore.cloud.databricks.com |
443 |
|
sydney.cloud.databricks.com |
443 |
|
canada.cloud.databricks.com |
443 |
|
frankfurt.cloud.databricks.com |
443 |
|
ireland.cloud.databricks.com |
443 |
|
london.cloud.databricks.com |
443 |
|
paris.cloud.databricks.com |
443 |
|
saopaulo.cloud.databricks.com |
443 |
|
nvirginia.cloud.databricks.com |
443 |
|
ohio.cloud.databricks.com |
443 |
|
oregon.cloud.databricks.com |
443 |
|
oregon.cloud.databricks.com |
443 |
SCC relay addresses
This table lists the address and port used by the secure cluster connectivity (SCC) relay for each supported region.
See Secure cluster connectivity.
VPC region |
Address |
Port |
---|---|---|
|
tunnel.ap-northeast-1.cloud.databricks.com |
443 |
|
tunnel.ap-northeast-2.cloud.databricks.com |
443 |
|
tunnel.ap-south-1.cloud.databricks.com |
443 |
|
tunnel.ap-southeast-1.cloud.databricks.com |
443 |
|
tunnel.ap-southeast-2.cloud.databricks.com |
443 |
|
tunnel.ca-central-1.cloud.databricks.com |
443 |
|
tunnel.eu-central-1.cloud.databricks.com |
443 |
|
tunnel.eu-west-1.cloud.databricks.com |
443 |
|
tunnel.eu-west-2.cloud.databricks.com |
443 |
|
tunnel.eu-west-3.cloud.databricks.com |
443 |
|
tunnel.sa-east-1.cloud.databricks.com |
443 |
|
tunnel.us-east-1.cloud.databricks.com |
443 |
|
tunnel.us-east-2.cloud.databricks.com |
443 |
|
tunnel.cloud.databricks.com |
443 |
|
tunnel.cloud.databricks.com |
443 |
S3 addresses
To add the global S3 bucket service to a route or allow list, use the following address and port, regardless of region:
s3.amazonaws.com:443
For regional S3 buckets, we provide the following address and port (substituting your region name), but Databricks recommends that you use a VPC endpoint instead.
s3.<region-name>.amazonaws.com:443
STS addresses
To add the global STS (AWS Secure Token Service) to a route or allow list, use the following address and port, regardless of region:
sts.amazonaws.com:443
For regional STS, we provide the following address and port (substituting your region name), but Databricks recommends that you use a VPC endpoint instead:
sts.<region-name>.amazonaws.com:443
Kinesis addresses
For the Kinesis service, we provide the following addresses, but Databricks recommends that you use a VPC endpoint instead.
VPC region |
Address |
Port |
---|---|---|
|
kinesis-fips.us-west-2.amazonaws.com |
443 |
All other regions |
kinesis.<region-name>.amazonaws.com |
443 |
RDS addresses
To add the Amazon RDS services used by Databricks to a route or allow list, use the following addresses. These are necessary only if you use the default workspace-level Hive metastore for your workspaces.
VPC region |
Address |
Port |
---|---|---|
|
mddx5a4bpbpm05.cfrfsun7mryq.ap-northeast-1.rds.amazonaws.com |
3306 |
|
md1915a81ruxky5.cfomhrbro6gt.ap-northeast-2.rds.amazonaws.com |
3306 |
|
mdjanpojt83v6j.c5jml0fhgver.ap-south-1.rds.amazonaws.com |
3306 |
|
md1n4trqmokgnhr.csnrqwqko4ho.ap-southeast-1.rds.amazonaws.com |
3306 |
|
mdnrak3rme5y1c.c5f38tyb1fdu.ap-southeast-2.rds.amazonaws.com |
3306 |
|
md1w81rjeh9i4n5.co1tih5pqdrl.ca-central-1.rds.amazonaws.com |
3306 |
|
mdv2llxgl8lou0.ceptxxgorjrc.eu-central-1.rds.amazonaws.com |
3306 |
|
md15cf9e1wmjgny.cxg30ia2wqgj.eu-west-1.rds.amazonaws.com |
3306 |
|
mdio2468d9025m.c6fvhwk6cqca.eu-west-2.rds.amazonaws.com |
3306 |
|
metastorerds-dbconsolidationmetastore-asda4em2u6eg.c2ybp3dss6ua.eu-west-3.rds.amazonaws.com |
3306 |
|
metastorerds-dbconsolidationmetastore-fqekf3pck8yw.cog1aduyg4im.sa-east-1.rds.amazonaws.com |
3306 |
|
mdb7sywh50xhpr.chkweekm4xjq.us-east-1.rds.amazonaws.com |
3306 |
|
md7wf1g369xf22.cluz8hwxjhb6.us-east-2.rds.amazonaws.com |
3306 |
|
mdzsbtnvk0rnce.c13weuwubexq.us-west-1.rds.amazonaws.com |
3306 |
|
mdpartyyphlhsp.caj77bnxuhme.us-west-2.rds.amazonaws.com |
3306 |
Control plane infrastructure addresses
This table lists the address and port used by standby infrastructure to improve the stability of Databricks services.
VPC region |
Address |
Port |
---|---|---|
|
35.72.28.0/28 |
443 |
|
3.38.156.176/28 |
443 |
|
65.0.37.64/28 |
443 |
|
13.214.1.96/28 |
443 |
|
3.26.4.0/28 |
443 |
|
3.96.84.208/28 |
443 |
|
3.250.244.112/28 |
443 |
|
18.134.65.240/28 |
443 |
|
13.39.141.128/28 |
443 |
|
18.159.44.32/28 |
443 |
|
15.229.120.16/28 |
443 |
|
3.237.73.224/28 |
443 |
|
3.128.237.208/28 |
443 |
|
44.234.192.32/28 |
443 |
Control plane NAT and storage bucket addresses
This table includes information required to configure S3 bucket policies and VPC endpoint policies to restrict access to your workspace’s S3 buckets. For more information, see Restrict access to S3 buckets (Optional).
Region |
Control plane NAT IP |
Artifact storage bucket |
Log storage bucket |
Shared datasets bucket |
---|---|---|---|---|
|
18.177.16.95 |
|
|
|
|
54.180.50.119 |
|
|
|
|
13.232.248.161 |
|
|
|
|
13.213.212.4 |
|
|
|
|
13.237.96.217 |
|
|
|
|
35.183.59.105 |
|
|
|
|
18.159.32.64 |
|
|
|
|
46.137.47.49 |
|
|
|
|
3.10.112.150 |
|
|
|
|
15.236.174.74 |
|
|
|
|
177.71.254.47 |
|
|
|
|
54.156.226.103 |
|
|
|
|
18.221.200.169 |
|
|
|
|
52.27.216.188 |
|
|
|
|
52.27.216.188 |
|
|
|
PrivateLink VPC endpoint services
To configure your workspace to use AWS PrivateLink, use the following table to determine your region’s VPC endpoint service domains. You can use any availability zone in your region.
The endpoint service identified as Workspace (including REST API) is used for both the front-end connection (user-to-workspace for web application and REST APIs) and the back-end connection (to connect to REST APIs). If you are implementing both front-end and back-end connections, use this same workspace VPC endpoint service for both use cases.
For more information, see Enable AWS PrivateLink.
Region |
Create VPC endpoints to these regional VPC endpoint services |
---|---|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
Workspace (including REST API):
Secure cluster connectivity relay:
|
|
PrivateLink connectivity is not supported for this region. |
|
Workspace (including REST API):
Secure cluster connectivity relay:
|