Posts The secrets of Databricks
Post
Cancel

The secrets of Databricks

Fantastic Best Practices: The secrets of Databricks

The use of hard-coded passwords or credentials is a really bad practice in the world of software develpment.

If hard-coded passwords are used, it is almost certain that malicious users will gain access through the account in question.

Typical malicious users

So in this blog post, we will see how to securely manage secrets and passwords in our favorites big data platform: Databricks.

Managing secrets begins with creating a secret scope.

A secret scope is collection of secrets identified by a name.

There are two types of secret scope: Azure Key Vault-backed and Databricks-backed. Obviously, Azure Key Vault-backed is only avaliable using Azure.

Databricks-backed secret scope

For the creation of the secret scope we can use the databricks CLI:

1
databricks secrets create-scope --scope my-db-scope --initial-manage-principal "users"

The manage permission (–initial-manage-principal) define who can manage the secrets but if your account does not have the Premium Plan (like me), you must override that default and explicitly grant the MANAGE permission to “users” (all users) when you create the scope.

After the creation of the scope you can list the secret scope:

1
databricks secrets list-scopes

And now we can insert secrets with the command:

1
databricks secrets put --scope my-db-scope --key my-key-1 --string-value "HELLO. I am a key :)"

If we want to get the secrets in databricks we can use dbutils:

NOTE: secrets are redacted in the logs of databricks ;)

Azure Key Vault-backed

Verify that you have the Directory Readers role in your Azure Active Directory tenant.

Verify that you have Contributor or Owner role on the Azure key vault instance that you want to use to back the secret scope.

You can create AKV secret scope using web UI or CLI. We are lazy so let’s do with UI ;).

NOTE: If you want to use databricks CLI or API you need an Azure AD user token to create an Azure Key Vault-backed secret scope with the Databricks CLI. You cannot use an Azure Databricks personal access token or an Azure AD application token that belongs to a service principal.

Go to https://<databricks-instance>#secrets/createScope and insert the name of the secret scope and the informations of the AKV.

These properties of the AKV are available from the Properties tab of an Azure Key Vault in your Azure portal where DNS name is the vault URI.

Then click the Create button.

Now let’s create one secret in our AKV and test on databricks.

Use a secret in a Spark configuration

You can use a secret in a Spark configuration property or environment variable.

The syntax must be:

1
{ { secrets/<scope-name>/<secret-name> } }

The value must start with { { secrets/ and end with }}.

Reference link

Azure databricks secret

OWASP hard code password

More azure databricks secrets

This post is licensed under CC BY 4.0 by the author.