Skip to content

Commit 14ac89a

Browse files
authored
Merge pull request #267594 from greg-lindsay/qs-graphics
add figures
2 parents f8718f1 + a5866f3 commit 14ac89a

File tree

5 files changed

+62
-73
lines changed

5 files changed

+62
-73
lines changed

articles/dns/dns-private-resolver-get-started-bicep.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: 'Quickstart: Create an Azure DNS Private Resolver - Bicep'
33
titleSuffix: Azure DNS Private resolver
44
description: Learn how to create Azure DNS Private Resolver. This article is a step-by-step quickstart to create and manage your first Azure DNS Private Resolver using Bicep.
55
services: dns
6-
author: aarunraaj
7-
ms.author: arselvar
8-
ms.date: 10/07/2022
6+
author: greg-lindsay
7+
ms.author: greglin
8+
ms.date: 02/28/2024
99
ms.topic: quickstart
1010
ms.service: dns
1111
ms.custom: devx-track-azurepowershell, subject-armqs, mode-arm, devx-track-azurecli, devx-track-bicep
@@ -18,6 +18,10 @@ This quickstart describes how to use Bicep to create Azure DNS Private Resolver.
1818

1919
[!INCLUDE [About Bicep](../../includes/resource-manager-quickstart-bicep-introduction.md)]
2020

21+
The following figure summarizes the general setup used. Subnet address ranges used in templates are slightly different than those shown in the figure.
22+
23+
![Conceptual figure displaying components of the private resolver.](./media/dns-resolver-getstarted-portal/resolver-components.png)
24+
2125
## Prerequisites
2226

2327
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -35,7 +39,7 @@ This Bicep file is configured to create a:
3539

3640
:::code language="bicep" source="~/quickstart-templates/quickstarts/microsoft.network/azure-dns-private-resolver/main.bicep":::
3741

38-
Seven resources have been defined in this template:
42+
Seven resources are defined in this template:
3943

4044
- [**Microsoft.Network/virtualnetworks**](/azure/templates/microsoft.network/virtualnetworks)
4145
- [**Microsoft.Network/dnsResolvers**](/azure/templates/microsoft.network/dnsresolvers)
@@ -145,5 +149,5 @@ Remove-AzDnsResolver -Name mydnsresolver -ResourceGroupName myresourcegroup
145149
146150
## Next steps
147151
148-
In this quickstart, you created a virtual network and DNS private resolver. Now configure name resolution for Azure and on-premises domains
152+
In this quickstart, you created a virtual network and DNS private resolver. Now configure name resolution for Azure and on-premises domains.
149153
- [Resolve Azure and on-premises domains](private-resolver-hybrid-dns.md)

articles/dns/dns-private-resolver-get-started-portal.md

Lines changed: 35 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: In this quickstart, you create and test a private DNS resolver in A
44
services: dns
55
author: greg-lindsay
66
ms.author: greglin
7-
ms.date: 11/03/2023
7+
ms.date: 02/28/2024
88
ms.topic: quickstart
99
ms.service: dns
10-
ms.custom: mode-ui
10+
ms.custom: mode-ui, ignite-2022
1111
#Customer intent: As an experienced network administrator, I want to create an Azure private DNS resolver, so I can resolve host names on my private virtual networks.
1212
---
1313

@@ -20,7 +20,7 @@ Azure DNS Private Resolver enables you to query Azure DNS private zones from an
2020
## In this article:
2121

2222
- Two VNets are created: **myvnet** and **myvnet2**.
23-
- An Azure DNS Private Resolver is created in the first VNet with an inbound endpoint at **10.0.0.4**.
23+
- An Azure DNS Private Resolver is created in the first VNet with an inbound endpoint at **10.10.0.4**.
2424
- A DNS forwarding ruleset is created for the private resolver.
2525
- The DNS forwarding ruleset is linked to the second VNet.
2626
- Example rules are added to the DNS forwarding ruleset.
@@ -40,7 +40,7 @@ An Azure subscription is required.
4040

4141
Before you can use **Microsoft.Network** services with your Azure subscription, you must register the **Microsoft.Network** namespace:
4242

43-
1. Select the **Subscription** blade in the Azure portal, and then choose your subscription by selecting on it.
43+
1. Select the **Subscription** blade in the Azure portal, and then choose your subscription.
4444
2. Under **Settings** select **Resource Providers**.
4545
3. Select **Microsoft.Network** and then select **Register**.
4646

@@ -58,31 +58,24 @@ First, create or choose an existing resource group to host the resources for you
5858

5959
Next, add a virtual network to the resource group that you created, and configure subnets.
6060

61-
1. In the Azure portal, search for and select **Virtual networks**.
62-
2. On the **Virtual networks** page, select **Create**.
63-
3. On the **Basics** tab, select the resource group you just created, enter **myvnet** for the virtual network name, and select the **Region** that is the same as your resource group.
64-
4. Select the **IP Addresses** tab and enter an **IPv4 address space** of 10.0.0.0/16. This address range might be entered by default.
65-
5. Select the **default** subnet.
66-
6. Enter the following values on the **Edit subnet** page:
67-
- Name: snet-inbound
68-
- IPv4 address range: 10.0.0.0/16
69-
- Starting address: 10.0.0.0
70-
- Size: /28 (16 IP addresses)
71-
- Select **Save**
72-
7. Select **Add a subnet** and enter the following values on the **Add a subnet** page:
73-
- Subnet purpose: Default
74-
- Name: snet-outbound
75-
- IPv4 address range: 10.0.0.0/16
76-
- Starting address: 10.0.1.0
77-
- Size: /28 (16 IP addresses)
78-
- Select **Add**
79-
8. Select the **Review + create** tab and then select **Create**.
61+
1. Select the resource group you created, select **Create**, select **Networking** from the list of categories, and then next to **Virtual network**, select **Create**.
62+
2. On the **Basics** tab, enter a name for the new virtual network and select the **Region** that is the same as your resource group.
63+
3. On the **IP Addresses** tab, modify the **IPv4 address space** to be 10.0.0.0/8.
64+
4. Select **Add subnet** and enter the subnet name and address range:
65+
- Subnet name: snet-inbound
66+
- Subnet address range: 10.0.0.0/28
67+
- Select **Add** to add the new subnet.
68+
5. Select **Add subnet** and configure the outbound endpoint subnet:
69+
- Subnet name: snet-outbound
70+
- Subnet address range: 10.1.1.0/28
71+
- Select **Add** to add this subnet.
72+
6. Select **Review + create** and then select **Create**.
8073

8174
![create virtual network](./media/dns-resolver-getstarted-portal/virtual-network.png)
8275

8376
## Create a DNS resolver inside the virtual network
8477

85-
1. In the Azure portal, search for **DNS Private Resolvers**.
78+
1. Open the Azure portal and search for **DNS Private Resolvers**.
8679
2. Select **DNS Private Resolvers**, select **Create**, and then on the **Basics** tab for **Create a DNS Private Resolver** enter the following:
8780
- Subscription: Choose the subscription name you're using.
8881
- Resource group: Choose the name of the resource group that you created.
@@ -95,32 +88,28 @@ Next, add a virtual network to the resource group that you created, and configur
9588
![create resolver - basics](./media/dns-resolver-getstarted-portal/dns-resolver.png)
9689

9790
3. Select the **Inbound Endpoints** tab, select **Add an endpoint**, and then enter a name next to **Endpoint name** (ex: myinboundendpoint).
98-
4. Next to **Subnet**, select the inbound endpoint subnet you created (ex: snet-inbound, 10.0.0.0/28).
99-
5. Next to **IP address assignment**, select **Static**.
100-
6. Next to IP address, enter **10.0.0.4** and then select **Save**.
101-
102-
> [!NOTE]
103-
> You can choose a static or dynamic IP address for the inbound endpoint. A dynamic IP address is used by default. Typically the first available [non-reserved](../virtual-network/virtual-networks-faq.md#are-there-any-restrictions-on-using-ip-addresses-within-these-subnets) IP address is assigned (example: 10.0.0.4). This dynamic IP address does not change unless the endpoint is deleted and reprovisioned (for example using a different subnet). In this example **Static** is selected and the first available IP address is entered.
104-
91+
4. Next to **Subnet**, select the inbound endpoint subnet you created (ex: snet-inbound, 10.0.0.0/28) and then select **Save**.
10592
5. Select the **Outbound Endpoints** tab, select **Add an endpoint**, and then enter a name next to **Endpoint name** (ex: myoutboundendpoint).
10693
6. Next to **Subnet**, select the outbound endpoint subnet you created (ex: snet-outbound, 10.1.1.0/28) and then select **Save**.
10794
7. Select the **Ruleset** tab, select **Add a ruleset**, and enter the following:
10895
- Ruleset name: Enter a name for your ruleset (ex: **myruleset**).
109-
- Endpoints: Select the outbound endpoint that you created (ex: myoutboundendpoint).
96+
- Endpoints: Select the outbound endpoint that you created (ex: myoutboundendpoint).
11097
8. Under **Rules**, select **Add** and enter your conditional DNS forwarding rules. For example:
11198
- Rule name: Enter a rule name (ex: contosocom).
11299
- Domain Name: Enter a domain name with a trailing dot (ex: contoso.com.).
113100
- Rule State: Choose **Enabled** or **Disabled**. The default is enabled.
114-
- Under **Destination** enter a desired destination IPv4 address (ex: 11.0.1.4).
101+
- Select **Add a destination** and enter a desired destination IPv4 address (ex: 11.0.1.4).
115102
- If desired, select **Add a destination** again to add another destination IPv4 address (ex: 11.0.1.5).
116103
- When you're finished adding destination IP addresses, select **Add**.
117104
9. Select **Review and Create**, and then select **Create**.
118105

119106
![create resolver - ruleset](./media/dns-resolver-getstarted-portal/resolver-ruleset.png)
120107

121-
This example has only one conditional forwarding rule, but you can create many. Edit the rules to enable or disable them as needed. You can also add or edit rules and rulesets at any time after deployment.
108+
This example has only one conditional forwarding rule, but you can create many. Edit the rules to enable or disable them as needed.
122109

123-
After selecting **Create**, the new DNS resolver begins deployment. This process might take a minute or two. The status of each component is displayed during deployment.
110+
![Screenshot of Create resolver - review.](./media/dns-resolver-getstarted-portal/resolver-review.png)
111+
112+
After selecting **Create**, the new DNS resolver will begin deployment. This process might take a minute or two. The status of each component is displayed during deployment.
124113

125114
![create resolver - status](./media/dns-resolver-getstarted-portal/resolver-status.png)
126115

@@ -132,28 +121,20 @@ Create a second virtual network to simulate an on-premises or other environment.
132121
2. Select **Create**, and then on the **Basics** tab select your subscription and choose the same resource group that you have been using in this guide (ex: myresourcegroup).
133122
3. Next to **Name**, enter a name for the new virtual network (ex: myvnet2).
134123
4. Verify that the **Region** selected is the same region used previously in this guide (ex: West Central US).
135-
5. Select the **IP Addresses** tab and edit the default IP address space. Replace the address space with a simulated on-premises address space (ex: 10.1.0.0/16).
136-
6. Select and edit the **default** subnet:
137-
- Subnet purpose: Default
138-
- Name: backendsubnet
139-
- Subnet address range: 10.1.0.0/16
140-
- Starting address: 10.1.0.0
141-
- Size: /24 (256 addresses)
142-
7. Select **Save**, select **Review + create**, and then select **Create**.
124+
5. Select the **IP Addresses** tab and edit the default IP address space. Replace the address space with a simulated on-premises address space (ex: 12.0.0.0/8).
125+
6. Select **Add subnet** and enter the following:
126+
- Subnet name: backendsubnet
127+
- Subnet address range: 12.2.0.0/24
128+
7. Select **Add**, select **Review + create**, and then select **Create**.
143129

144-
![second vnet create](./media/dns-resolver-getstarted-portal/vnet-create.png)
130+
![Screenshot showing creation of a second vnet.](./media/dns-resolver-getstarted-portal/vnet-create.png)
145131

146132
## Link your forwarding ruleset to the second virtual network
147133

148-
> [!NOTE]
149-
> In this procedure, a forwarding ruleset is linked to a VNet that was created earlier to simulate an on-premises environment. It is not possible to create a ruleset link to non-Azure resources. The purpose of the following procedure is only to demonstrate how ruleset links can be added or deleted. To understand how a private resolver can be used to resolve on-premises names, see [Resolve Azure and on-premises domains](private-resolver-hybrid-dns.md).
150-
151134
To apply your forwarding ruleset to the second virtual network, you must create a virtual link.
152135

153136
1. Search for **DNS forwarding rulesets** in the Azure services list and select your ruleset (ex: **myruleset**).
154-
2. Under **Settings**, select **Virtual Network Links**
155-
- The link **myvnet-link** is already present. This was created automatically when the ruleset was provisioned.
156-
3. Select **Add**, choose **myvnet2** from the **Virtual Network** drop-down list. Use the default **Link Name** of **myvnet2-link**.
137+
2. Select **Virtual Network Links**, select **Add**, choose **myvnet2** and use the default Link Name **myvnet2-link**.
157138
3. Select **Add** and verify that the link was added successfully. You might need to refresh the page.
158139

159140
![Screenshot of ruleset virtual network links.](./media/dns-resolver-getstarted-portal/ruleset-links.png)
@@ -178,8 +159,8 @@ Add or remove specific rules your DNS forwarding ruleset as desired, such as:
178159

179160
Individual rules can be deleted or disabled. In this example, a rule is deleted.
180161

181-
1. Search for **DNS Forwarding Rulesets** in the Azure Services list and select it.
182-
2. Select the ruleset you previously configured (ex: **myruleset**) and then under **Settings** select **Rules**.
162+
1. Search for **Dns Forwarding Rulesets** in the Azure Services list and select it.
163+
2. Select the ruleset you previously configured (ex: **myruleset**) and then select **Rules**.
183164
3. Select the **contosocom** sample rule that you previously configured, select **Delete**, and then select **OK**.
184165

185166
### Add rules to the forwarding ruleset
@@ -195,7 +176,7 @@ Add three new conditional forwarding rules to the ruleset.
195176
- Rule Name: **Internal**
196177
- Domain Name: **internal.contoso.com.**
197178
- Rule State: **Enabled**
198-
4. Under **Destination IP address** enter 10.1.0.5, and then select **Add**.
179+
4. Under **Destination IP address** enter 192.168.1.2, and then select **Add**.
199180
5. On the **myruleset | Rules** page, select **Add**, and enter the following rule data:
200181
- Rule Name: **Wildcard**
201182
- Domain Name: **.** (enter only a dot)
@@ -206,7 +187,7 @@ Add three new conditional forwarding rules to the ruleset.
206187

207188
In this example:
208189
- 10.0.0.4 is the resolver's inbound endpoint.
209-
- 10.1.0.5 is an on-premises DNS server.
190+
- 192.168.1.2 is an on-premises DNS server.
210191
- 10.5.5.5 is a protective DNS service.
211192

212193
## Test the private resolver

0 commit comments

Comments
 (0)