Skip to content

Commit 1b00bdd

Browse files
Merge pull request #259794 from asudbring/dns-endpoint-integration
Added new diagrams and replaced VM DNS server with Azure Private Resolver
2 parents c3d199a + 1fa4652 commit 1b00bdd

File tree

6 files changed

+64
-48
lines changed

6 files changed

+64
-48
lines changed
110 KB
Loading
122 KB
Loading
147 KB
Loading
109 KB
Loading
84.3 KB
Loading

articles/private-link/private-endpoint-dns-integration.md

Lines changed: 64 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -24,16 +24,17 @@ DNS is a critical component to make the application work correctly by successful
2424

2525
Based on your preferences, the following scenarios are available with DNS resolution integrated:
2626

27-
- [Virtual network workloads without custom DNS server](#virtual-network-workloads-without-custom-dns-server)
27+
- [Virtual network workloads without Azure Private Resolver](#virtual-network-workloads-without-azure-private-resolver)
2828

29-
- [On-premises workloads using a DNS forwarder](#on-premises-workloads-using-a-dns-forwarder)
29+
- [Peered virtual network workloads without Azure Private Resolver](#virtual-network-workloads-without-custom-dns-server)
30+
31+
- [Azure Private Resolver for on-premises workloads](#azure-private-resolver-for-on-premises-workloads)
3032

31-
- [Virtual network and on-premises workloads using a DNS forwarder](#virtual-network-and-on-premises-workloads-using-a-dns-forwarder)
32-
33-
> [!NOTE]
34-
> [Azure Firewall DNS proxy](../firewall/dns-settings.md#dns-proxy) can be used as DNS forwarder for [On-premises workloads](#on-premises-workloads-using-a-dns-forwarder) and [Virtual network workloads using a DNS forwarder](#virtual-network-and-on-premises-workloads-using-a-dns-forwarder).
33+
- [Azure Private Resolver with on-premises DNS forwarder](#on-premises-workloads-using-a-dns-forwarder)
34+
35+
- [Azure Private Resolver for virtual network and on-premises workloads](#virtual-network-and-on-premises-workloads-using-a-dns-forwarder)
3536

36-
## Virtual network workloads without custom DNS server
37+
## Virtual network workloads without Azure Private Resolver
3738

3839
This configuration is appropriate for virtual network workloads without a custom DNS server. In this scenario, the client queries for the private endpoint IP address to the Azure-provided DNS service [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). Azure DNS is responsible for DNS resolution of the private DNS zones.
3940

@@ -44,111 +45,126 @@ To configure properly, you need the following resources:
4445

4546
- Client virtual network
4647

47-
- Private DNS zone [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
48+
- Private DNS zone [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
4849

4950
- Private endpoint information (FQDN record name and private IP address)
5051

5152
The following screenshot illustrates the DNS resolution sequence from virtual network workloads using the private DNS zone:
5253

5354
:::image type="content" source="media/private-endpoint-dns/single-vnet-azure-dns.png" alt-text="Diagram of single virtual network and Azure-provided DNS.":::
5455

55-
You can extend this model to peered virtual networks associated to the same private endpoint. [Add new virtual network links](../dns/private-dns-virtual-network-links.md) to the private DNS zone for all peered virtual networks.
56+
## <a name="virtual-network-workloads-without-custom-dns-server"></a> Peered virtual network workloads without Azure Private Resolver
5657

57-
> [!IMPORTANT]
58-
> A single private DNS zone is required for this configuration. Creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records.
58+
You can extend this model to peered virtual networks associated to the same private endpoint. [Add new virtual network links](../dns/private-dns-virtual-network-links.md) to the private DNS zone for all peered virtual networks.
5959

6060
> [!IMPORTANT]
61-
> If you're using a private endpoint in a hub-and-spoke model from a different subscription or even within the same subscription, link the same private DNS zones to all spokes and hub virtual networks that contain clients that need DNS resolution from the zones.
61+
> - A single private DNS zone is required for this configuration. Creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records.
62+
>
63+
> - If you're using a private endpoint in a hub-and-spoke model from a different subscription or even within the same subscription, link the same private DNS zones to all spokes and hub virtual networks that contain clients that need DNS resolution from the zones.
6264
6365
In this scenario, there's a [hub and spoke](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology. The spoke networks share a private endpoint. The spoke virtual networks are linked to the same private DNS zone.
6466

6567
:::image type="content" source="media/private-endpoint-dns/hub-and-spoke-azure-dns.png" alt-text="Diagram of hub and spoke with Azure-provided DNS.":::
6668

67-
## On-premises workloads using a DNS forwarder
69+
## Azure Private Resolver for on-premises workloads
6870

69-
For on-premises workloads to resolve the FQDN of a private endpoint, use a DNS forwarder to resolve the Azure service [public DNS zone](private-endpoint-dns.md) in Azure. A [DNS forwarder](/windows-server/identity/ad-ds/plan/reviewing-dns-concepts#resolving-names-by-using-forwarding) is a Virtual Machine running on the Virtual Network linked to the Private DNS Zone that can proxy DNS queries coming from other Virtual Networks or from on-premises. This is required as the query must be originated from the Virtual Network to Azure DNS. A few options for DNS proxies are: Windows running DNS services, Linux running DNS services, [Azure Firewall](../firewall/dns-settings.md).
71+
For on-premises workloads to resolve the FQDN of a private endpoint, use Azure Private Resolver to resolve the Azure service public DNS zone in Azure. Azure Private Resolver is an Azure managed service that can resolve DNS queries without the need for a virtual machine acting as a DNS forwarder.
7072

71-
The following scenario is for an on-premises network that has a DNS forwarder in Azure. This forwarder resolves DNS queries via a server-level forwarder to the Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md).
73+
The following scenario is for an on-premises network configured to use an Azure Private Resolver. The private resolver forwards the request for the private endpoint to Azure DNS.
7274

7375
> [!NOTE]
74-
> This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: [Azure services DNS zone configuration](private-endpoint-dns.md).
76+
> This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: [Azure services DNS zone values](private-endpoint-dns.md).
7577
76-
To configure properly, you need the following resources:
78+
The following resources are required for a proper configuration:
7779

78-
- On-premises network
79-
- Virtual network [connected to on-premises](/azure/architecture/reference-architectures/hybrid-networking/)
80-
- DNS forwarder deployed in Azure 
81-
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
82-
- Private endpoint information (FQDN record name and private IP address)
80+
- On-premises network
81+
82+
- Virtual network [connected to on-premises](/azure/architecture/reference-architectures/hybrid-networking/)
83+
84+
- [Azure Private Resolver](/azure/dns/dns-private-resolver-overview)
85+
86+
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
87+
- Private endpoint information (FQDN record name and private IP address)
8388

84-
The following diagram illustrates the DNS resolution sequence from an on-premises network. The configuration uses a DNS forwarder deployed in Azure. The resolution is made by a private DNS zone [linked to a virtual network](../dns/private-dns-virtual-network-links.md):
89+
The following diagram illustrates the DNS resolution sequence from an on-premises network. The configuration uses a Private Resolver deployed in Azure. The resolution is made by a private DNS zone [linked to a virtual network](../dns/private-dns-virtual-network-links.md):
8590

8691
:::image type="content" source="media/private-endpoint-dns/on-premises-using-azure-dns.png" alt-text="Diagram of on-premises using Azure DNS.":::
8792

88-
This configuration can be extended for an on-premises network that already has a DNS solution in place. 
89-
The on-premises DNS solution is configured to forward DNS traffic to Azure DNS via a [conditional forwarder](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server). The conditional forwarder references the DNS forwarder deployed in Azure.
93+
## <a name="on-premises-workloads-using-a-dns-forwarder"></a> Azure Private Resolver with on-premises DNS forwarder
94+
95+
This configuration can be extended for an on-premises network that already has a DNS solution in place.
96+
97+
The on-premises DNS solution is configured to forward DNS traffic to Azure DNS via a [conditional forwarder](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server). The conditional forwarder references the Private Resolver deployed in Azure.
9098

9199
> [!NOTE]
92-
> This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: [Azure services DNS zone configuration](private-endpoint-dns.md)
100+
> This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: [Azure services DNS zone values](private-endpoint-dns.md)
93101
94-
To configure properly, you need the following resources:
102+
To configure properly, you need the following resources:
95103

96-
- On-premises network with a custom DNS solution in place 
97-
- Virtual network [connected to on-premises](/azure/architecture/reference-architectures/hybrid-networking/)
98-
- DNS forwarder deployed in Azure
99-
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md)  with [type A record](../dns/dns-zones-records.md#record-types)
100-
- Private endpoint information (FQDN record name and private IP address)
104+
- On-premises network with a custom DNS solution in place
105+
106+
- Virtual network [connected to on-premises](/azure/architecture/reference-architectures/hybrid-networking/)
107+
108+
- [Azure Private Resolver](/azure/dns/dns-private-resolver-overview)
101109

102-
The following diagram illustrates the DNS resolution from an on-premises network. DNS resolution is conditionally forwarded to Azure. The resolution is made by a private DNS zone [linked to a virtual network](../dns/private-dns-virtual-network-links.md).
110+
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
111+
112+
- Private endpoint information (FQDN record name and private IP address)
113+
114+
The following diagram illustrates the DNS resolution from an on-premises network. DNS resolution is conditionally forwarded to Azure. The resolution is made by a private DNS zone [linked to a virtual network](../dns/private-dns-virtual-network-links.md).
103115

104116
> [!IMPORTANT]
105-
> The conditional forwarding must be made to the recommended [public DNS zone forwarder](private-endpoint-dns.md). For example: `database.windows.net` instead of **privatelink**.database.windows.net.
117+
> The conditional forwarding must be made to the recommended [public DNS zone forwarder](private-endpoint-dns.md). For example: `database.windows.net` instead of **privatelink**.database.windows.net.
106118
107119
:::image type="content" source="media/private-endpoint-dns/on-premises-forwarding-to-azure.png" alt-text="Diagram of on-premises forwarding to Azure DNS.":::
108120

109-
## Virtual network and on-premises workloads using a DNS forwarder
121+
## <a name="virtual-network-and-on-premises-workloads-using-a-dns-forwarder"></a> Azure Private Resolver for virtual network and on-premises workloads
110122

111-
For workloads accessing a private endpoint from virtual and on-premises networks, use a DNS forwarder to resolve the Azure service [public DNS zone](private-endpoint-dns.md) deployed in Azure.
123+
For workloads accessing a private endpoint from virtual and on-premises networks, use Azure Private Resolver to resolve the Azure service [public DNS zone](private-endpoint-dns.md) deployed in Azure.
112124

113125
The following scenario is for an on-premises network with virtual networks in Azure. Both networks access the private endpoint located in a shared hub network.
114126

115-
This DNS forwarder is responsible for resolving all the DNS queries via a server-level forwarder to the Azure-provided DNS service [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md).
127+
The private resolver is responsible for resolving all the DNS queries via the Azure-provided DNS service [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md).
116128

117129
> [!IMPORTANT]
118-
> A single private DNS zone is required for this configuration. All client connections made from on-premises and [peered virtual networks](../virtual-network/virtual-network-peering-overview.md) must  also use the same private DNS zone.
130+
> A single private DNS zone is required for this configuration. All client connections made from on-premises and [peered virtual networks](../virtual-network/virtual-network-peering-overview.md) must also use the same private DNS zone.
119131
120132
> [!NOTE]
121133
> This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: [Azure services DNS zone configuration](private-endpoint-dns.md).
122134
123135
To configure properly, you need the following resources:
124136

125137
- On-premises network
138+
126139
- Virtual network [connected to on-premises](/azure/architecture/reference-architectures/hybrid-networking/)
140+
127141
- [Peered virtual network](../virtual-network/virtual-network-peering-overview.md) 
128-
- DNS forwarder deployed in Azure
142+
143+
- Azure Private Resolver
144+
129145
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md)  with [type A record](../dns/dns-zones-records.md#record-types)
146+
130147
- Private endpoint information (FQDN record name and private IP address)
131148

132-
The following diagram shows the DNS resolution for both networks, on-premises and virtual networks. The resolution is using a DNS forwarder. The resolution is made by a private DNS zone [linked to a virtual network](../dns/private-dns-virtual-network-links.md):
149+
The following diagram shows the DNS resolution for both networks, on-premises and virtual networks. The resolution is using Azure Private Resolver.
150+
151+
The resolution is made by a private DNS zone [linked to a virtual network](../dns/private-dns-virtual-network-links.md):
133152

134153
:::image type="content" source="media/private-endpoint-dns/hybrid-scenario.png" alt-text="Diagram of hybrid scenario.":::
135154

136155
## Private DNS zone group
137156

138157
If you choose to integrate your private endpoint with a private DNS zone, a private DNS zone group is also created. The DNS zone group has a strong association between the private DNS zone and the private endpoint. It helps with managing the private DNS zone records when there's an update on the private endpoint. For example, when you add or remove regions, the private DNS zone is automatically updated with the correct number of records.
139158

140-
Previously, the DNS records for the private endpoint were created via scripting (retrieving certain information about the private endpoint and then adding it on the DNS zone). With the DNS zone group, there is no need to write any additional CLI/PowerShell lines for every DNS zone. Also, when you delete the private endpoint, all the DNS records within the DNS zone group will be deleted as well.
141-
142-
A common scenario for DNS zone group is in a hub-and-spoke topology, where it allows the private DNS zones to be created only once in the hub and allows the spokes to register to it, rather than creating different zones in each spoke.
159+
Previously, the DNS records for the private endpoint were created via scripting (retrieving certain information about the private endpoint and then adding it on the DNS zone). With the DNS zone group, there's no need to write any extra CLI/PowerShell lines for every DNS zone. Also, when you delete the private endpoint, all the DNS records within the DNS zone group are deleted.
143160

144-
> [!NOTE]
145-
> Each DNS zone group can support up to 5 DNS zones.
161+
In a hub-and-spoke topology, a common scenario allows the creation of private DNS zones only once in the hub. This setup permits the spokes to register to it, instead of creating different zones in each spoke.
146162

147-
> [!NOTE]
148-
> Adding multiple DNS zone groups to a single Private Endpoint is not supported.
149163

150164
> [!NOTE]
151-
> Delete and update operations for DNS records can be seen performed by "Azure Traffic Manager and DNS." This is a normal platform operation necessary for managing your DNS Records.
165+
> - Each DNS zone group can support up to 5 DNS zones.
166+
> - Adding multiple DNS zone groups to a single Private Endpoint is not supported.
167+
> - Delete and update operations for DNS records can be seen performed by **Azure Traffic Manager and DNS.** This is a normal platform operation necessary for managing your DNS Records.
152168
153169
## Next steps
154170
- [Learn about private endpoints](private-endpoint-overview.md)

0 commit comments

Comments
 (0)