Skip to content

Commit 0e35d11

Browse files
committed
fixed publishing comments
1 parent bc0dd2d commit 0e35d11

File tree

2 files changed

+31
-31
lines changed

2 files changed

+31
-31
lines changed

articles/azure-vmware/native-connect-multiple-private-clouds.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,19 +13,19 @@ ms.custom: engagement-fy25
1313

1414
# Connect multiple Azure VMware Solution Generation 2 private clouds
1515

16-
In this article, you learn how to connect a Azure VMware Solution Generation 2 (Gen 2) private cloud to other Gen 2 private clouds.
16+
In this article, you learn how to connect an Azure VMware Solution Generation 2 (Gen 2) private cloud to other Gen 2 private clouds.
1717

1818
## Prerequisite
1919

2020
Have multiple Azure VMware Solution Gen 2 private clouds deployed successfully.
2121

22-
## Connect multiple Azure VMware Solution Gen 2
22+
## Use Virtual Network peering to connect multiple private clouds
2323

24-
Private clouds deployed in different Azure Virtual Networks can be connected using Virtual Network peering. The Virtual Network peering provides the best possible throughput and latency between Azure VMware Solution private clouds in the same region. For more information about how to do Azure Virtual Network peering, see [Create, change, or delete a Virtual Network peering](/azure/virtual-network/virtual-network-peering-overview).
24+
You can connect private clouds deployed in different Azure Virtual Networks using virtual network peering. The virtual network peering provides the best possible throughput and latency between Azure VMware Solution private clouds in the same region. For more information about how to do Azure Virtual Network peering, see [Create, change, or delete a Virtual Network peering](/azure/virtual-network/virtual-network-peering-overview).
2525

2626
Depending on the location of the private cloud, you may require local Virtual Network peering or a global Virtual Network peering.
2727

28-
:::image type="content" source="./media/native-connectivity/native-connect-multiple-solutions-on-premises.png" alt-text="Diagram of an multiple Azure VMware Solution Gen 2 private clouds connected together." lightbox="media/native-connectivity/native-connect-multiple-solutions-on-premises.png":::
28+
:::image type="content" source="./media/native-connectivity/native-connect-multiple-solutions-on-premises.png" alt-text="Diagram of multiple Azure VMware Solution Gen 2 private clouds connected together." lightbox="media/native-connectivity/native-connect-multiple-solutions-on-premises.png":::
2929

3030
## Related topics
3131
- [Connectivity to an Azure Virtual Network](native-network-connectivity.md)

articles/azure-vmware/native-dns-forward-lookup-zone.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ In this article, you learn how to configure a Domain Name System (DNS) forward l
1414

1515
## Prerequisite
1616

17-
Gen 2 private cloud successfully deployed.
17+
Gen 2 private cloud is successfully deployed.
1818

1919
## DNS forward lookup zone configuration options
2020

@@ -28,44 +28,44 @@ DNS forward lookup zone can be configured at the time of creation or changed aft
2828

2929
:::image type="content" source="./media/native-connectivity/native-connect-dns-lookup.png" alt-text="Diagram showing an Azure VMware Solution Gen 2 DNS forward lookup." lightbox="media/native-connectivity/native-connect-dns-lookup.png":::
3030

31-
## Configuring Private DNS for your Azure VMware Solution Generation 2 Private Cloud
31+
## Configure private DNS for your Azure VMware Solution Generation 2 private cloud
3232

3333
If you select the Private DNS option, the private cloud will be resolvable from the Virtual Network where the private cloud is provisioned. This is done by linking the private DNS zone to your Virtual Network. If you need to enable this zone to be resolvable outside of this Virtual Network, such as in your on-premises environment, you need to configure an Azure DNS Private Resolver, or deploy your own DNS server in your Virtual Network. Private DNS will use the Azure DNS Service (168.63.129.16) to resolve your private cloud FQDNs. This section explains configuring an Azure DNS Private Resolver.
3434

3535
### Prerequisite
36-
37-
First, create two /28 subnets to delegate to the Azure DNS Private Resolver service. As an example. They can be named dns-in and dns-out.
38-
36+
37+
Create two /28 subnets to delegate to the Azure DNS Private Resolver service. As an example, they can be named ```dns-in``` and ```dns-out```.
38+
3939
### Deploy Azure DNS Private Resolver
4040

41-
In your Resource Group, deploy the Private DNS Resolver.
41+
In the Resource Group, deploy the Private DNS Resolver.
4242

43-
1. Click create.
44-
2. In the Search the Marketplace field, type Private DNS Resolver and click enter.
45-
3. Click create for the Private DNS Resolver.
46-
4. Ensure the Subscription, Resource group, and Region fields are correct. Enter a name and choose your Virtual Network. This network must be the same as where you deployed your private cloud, then click Next: Inbound Endpoints.
47-
5. Click Add an Endpoint, enter a name for the Inbound endpoint, such as dns-in and select the subnet for the DNS inbound endpoint and click Save.
48-
6. Click Next: Outbound Endpoints.
49-
7. Click Add an Endpoint, enter a name for the Outbound endpoint, such as dns-out and select the subnet for the DNS outbound endpoint and click Save.
50-
8. Click Next: Ruleset.
51-
9. Click Next: Tags.
52-
10. Click Next: Review + Create.
53-
11. When the Validation passes, click create.
43+
1. Select Create.
44+
2. In the Search the Marketplace field, type Private DNS Resolver and select enter.
45+
3. Select Create for the Private DNS Resolver.
46+
4. Ensure the Subscription, Resource group, and Region fields are correct. Enter a name and choose your Virtual Network. This network must be the same as where you deployed your private cloud, then select Next: Inbound Endpoints.
47+
5. Select Add an Endpoint, enter a name for the Inbound endpoint, such as dns-in and select the subnet for the DNS inbound endpoint and select Save.
48+
6. Select Next: Outbound Endpoints.
49+
7. Select Add an Endpoint, enter a name for the Outbound endpoint, such as dns-out and select the subnet for the DNS outbound endpoint and select Save.
50+
8. Select Next: Ruleset.
51+
9. Select Next: Tags.
52+
10. Select Next: Review + Create.
53+
11. When the Validation passes, select Create.
5454

55-
You can now resolve your private cloud DNS records from any workload using the Inbound endpoint of the Azure DNS Private Resolver as it’s DNS server. You should now create a conditional forwarder in your on-premesis DNS server and point it to the Inbound Endpoint of the Azure DNS Private Resolver to allow DNS resolution of your private cloud from your corporate network.
55+
You can now resolve private cloud DNS records from any workload using the Inbound endpoint of the Azure DNS Private Resolver as it’s DNS server. You should now create a conditional forwarder in your on-premises DNS server and point it to the Inbound Endpoint of the Azure DNS Private Resolver to allow DNS resolution of the private cloud from your corporate network.
5656

57-
### Enable Resolution for private cloud Workload Virtual Machines
57+
### Enable Resolution for private cloud workload virtual machines
5858

59-
If you need workload Virtual Machines deployed in your private cloud to resolve the private cloud management components you must add a forwarder to VMware NSX.
59+
If you need workload virtual machines deployed in your private cloud to resolve the private cloud management components you must add a forwarder to VMware NSX.
6060

6161
1. In your Resource group, open your private cloud.
62-
2. Expand Workload Networking and click on DNS.
63-
3. Click the Add button, select FQDN zone, enter your private cloud’s DNS zone name and Domain, for IP address enter the IP address of the inbound endpoint of your Azure DNS Private Resolver and click OK.
64-
4. Click on DNS Service.
65-
5. Click Edit.
66-
6. Select the zone you just created in the FQDN zones dropdown and click OK.
67-
68-
Your workload Virtual Machines can now resolve the private cloud management components.
62+
2. Expand Workload Networking and select DNS.
63+
3. Select the Add button, select FQDN zone, enter your private cloud’s DNS zone name and Domain. For IP address enter the IP address of the inbound endpoint of your Azure DNS Private Resolver and select OK.
64+
4. Select DNS Service.
65+
5. Select Edit.
66+
6. Select the zone you just created in the FQDN zones dropdown and select OK.
67+
68+
Your workload virtual machines can now resolve the private cloud management components.
6969

7070
## Related topics
7171
- [Connectivity to an Azure Virtual Network](native-network-connectivity.md)

0 commit comments

Comments
 (0)