You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/private-endpoint-dns.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,7 +81,7 @@ Based on your preferences, the following scenarios are available for DNS resolut
81
81
This configuration is appropriate for virtual network workloads without custom DNS server. In this scenario the client queries for the private endpoint IP address to Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). Azure DNS will be responsible for DNS resolution of the private DNS zones.
82
82
83
83
84
-
> [!NOTE]
84
+
> [!NOTE]
85
85
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
86
86
87
87
To configure properly you would need the following resources :
@@ -94,16 +94,16 @@ To configure properly you would need the following resources :
94
94
95
95
The following diagram illustrates the DNS resolution sequence from virtual network workloads using private dns zone
96
96
97
-
:::image type="content" source="media/private-endpoint-dns/single-vnet-azure-dns.png" alt-text="single virtual network and azure provided dns":::
97
+
:::image type="content" source="media/private-endpoint-dns/single-vnet-azure-dns.png" alt-text="Single virtual network and Azure-provided DNS":::
98
98
99
99
This model can be extended to multiple peered virtual networks that are associated to the same private endpoint. This can be done by [adding new virtual network links](../dns/private-dns-virtual-network-links.md) to the private DNS zone for all peered virtual networks.
100
100
101
-
> [!IMPORTANT]
101
+
> [!IMPORTANT]
102
102
> A single private DNS zone is required for this configuration, creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records
103
103
104
104
In this scenario there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke virtual network are linked to the same private dns zone.
105
105
106
-
:::image type="content" source="media/private-endpoint-dns/hub-and-spoke-azure-dns.png" alt-text="hub and spoke with azure provided dns":::
106
+
:::image type="content" source="media/private-endpoint-dns/hub-and-spoke-azure-dns.png" alt-text="Hub and spoke with Azure-provided DNS":::
107
107
108
108
## On premises workloads using a DNS forwarder
109
109
@@ -112,26 +112,26 @@ For on premises workloads to be able to resolve an FQDN of a private endpoint in
112
112
113
113
The following scenario is appropriate for an on premises network that has a DNS forwarder in Azure, which in turn is responsible for resolving all the DNS queries via a server level forwarder to the Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md)
114
114
115
-
> [!NOTE]
115
+
> [!NOTE]
116
116
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
117
117
118
118
To configure properly you would need the following resources:
119
119
120
120
- On premises network
121
121
- Virtual network [connected to on premises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
122
122
- DNS forwarder deployed in Azure
123
-
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md)with [type A Record](../dns/dns-zones-records.md#record-types)
123
+
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A Record](../dns/dns-zones-records.md#record-types)
124
124
- Private endpoint information (FQDN record name and Private IP Address)
125
125
126
126
The following diagram illustrates the DNS resolution sequence from an on premise network that use a DNS forwarder deployed in Azure,
127
127
where the resolution is made by an private DNS zone linked to a virtual network.
128
128
129
-
:::image type="content" source="media/private-endpoint-dns/on-premise-using-azure-dns.png" alt-text="on premise using azure dns":::
129
+
:::image type="content" source="media/private-endpoint-dns/on-premise-using-azure-dns.png" alt-text="On-premises using Azure DNS":::
130
130
131
131
This configuration can be extended for an on premise network that has already a DNS solution in place.
132
132
The on premises DNS solution needs to be configured to forward DNS traffic to the Azure DNS via a [conditional forwarder](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) referencing the DNS forwarder deployed in Azure.
133
133
134
-
> [!NOTE]
134
+
> [!NOTE]
135
135
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
136
136
137
137
To configure properly you would need the following resources :
@@ -145,10 +145,10 @@ To configure properly you would need the following resources :
145
145
146
146
The following diagram illustrates the DNS resolution sequence from an on premise network that conditionally forwards DNS traffic to Azure,where the resolution is made by an private DNS zone linked to a virtual network
147
147
148
-
> [!IMPORTANT]
148
+
> [!IMPORTANT]
149
149
> The conditional forwarding must be made to the [public DNS zone](#azure-services-dns-zone-configuration) Ex: `database.windows.net` , instead of **privatelink**.database.windows.net
150
150
151
-
:::image type="content" source="media/private-endpoint-dns/on-premise-forwarding-to-azure.png" alt-text="on premise forwarding to azure dns":::
151
+
:::image type="content" source="media/private-endpoint-dns/on-premise-forwarding-to-azure.png" alt-text="On-premises forwarding to Azure DNS":::
0 commit comments