You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/private-endpoint-dns-integration.md
+64-48Lines changed: 64 additions & 48 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,16 +24,17 @@ DNS is a critical component to make the application work correctly by successful
24
24
25
25
Based on your preferences, the following scenarios are available with DNS resolution integrated:
26
26
27
-
-[Virtual network workloads without custom DNS server](#virtual-network-workloads-without-custom-dns-server)
27
+
-[Virtual network workloads without Azure Private Resolver](#virtual-network-workloads-without-azure-private-resolver)
28
28
29
-
-[On-premises workloads using a DNS forwarder](#on-premises-workloads-using-a-dns-forwarder)
29
+
-[Peered virtual network workloads without Azure Private Resolver](#virtual-network-workloads-without-custom-dns-server)
30
+
31
+
-[Azure Private Resolver for on-premises workloads](#azure-private-resolver-for-on-premises-workloads)
30
32
31
-
-[Virtual network and on-premises workloads using a DNS forwarder](#virtual-network-and-on-premises-workloads-using-a-dns-forwarder)
32
-
33
-
> [!NOTE]
34
-
> [Azure Firewall DNS proxy](../firewall/dns-settings.md#dns-proxy) can be used as DNS forwarder for [On-premises workloads](#on-premises-workloads-using-a-dns-forwarder) and [Virtual network workloads using a DNS forwarder](#virtual-network-and-on-premises-workloads-using-a-dns-forwarder).
33
+
-[Azure Private Resolver with on-premises DNS forwarder](#on-premises-workloads-using-a-dns-forwarder)
34
+
35
+
-[Azure Private Resolver for virtual network and on-premises workloads](#virtual-network-and-on-premises-workloads-using-a-dns-forwarder)
35
36
36
-
## Virtual network workloads without custom DNS server
37
+
## Virtual network workloads without Azure Private Resolver
37
38
38
39
This configuration is appropriate for virtual network workloads without a custom DNS server. In this scenario, the client queries for the private endpoint IP address to the Azure-provided DNS service [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). Azure DNS is responsible for DNS resolution of the private DNS zones.
39
40
@@ -44,111 +45,126 @@ To configure properly, you need the following resources:
44
45
45
46
- Client virtual network
46
47
47
-
- Private DNS zone [privatelink.database.windows.net](../dns/private-dns-privatednszone.md)with [type A record](../dns/dns-zones-records.md#record-types)
48
+
- Private DNS zone [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
48
49
49
50
- Private endpoint information (FQDN record name and private IP address)
50
51
51
52
The following screenshot illustrates the DNS resolution sequence from virtual network workloads using the private DNS zone:
52
53
53
54
:::image type="content" source="media/private-endpoint-dns/single-vnet-azure-dns.png" alt-text="Diagram of single virtual network and Azure-provided DNS.":::
54
55
55
-
You can extend this model to peered virtual networks associated to the same private endpoint. [Add new virtual network links](../dns/private-dns-virtual-network-links.md) to the private DNS zone for all peered virtual networks.
56
+
## <aname="virtual-network-workloads-without-custom-dns-server"></a> Peered virtual network workloads without Azure Private Resolver
56
57
57
-
> [!IMPORTANT]
58
-
> A single private DNS zone is required for this configuration. Creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records.
58
+
You can extend this model to peered virtual networks associated to the same private endpoint. [Add new virtual network links](../dns/private-dns-virtual-network-links.md) to the private DNS zone for all peered virtual networks.
59
59
60
60
> [!IMPORTANT]
61
-
> If you're using a private endpoint in a hub-and-spoke model from a different subscription or even within the same subscription, link the same private DNS zones to all spokes and hub virtual networks that contain clients that need DNS resolution from the zones.
61
+
> - A single private DNS zone is required for this configuration. Creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records.
62
+
>
63
+
> - If you're using a private endpoint in a hub-and-spoke model from a different subscription or even within the same subscription, link the same private DNS zones to all spokes and hub virtual networks that contain clients that need DNS resolution from the zones.
62
64
63
65
In this scenario, there's a [hub and spoke](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology. The spoke networks share a private endpoint. The spoke virtual networks are linked to the same private DNS zone.
64
66
65
67
:::image type="content" source="media/private-endpoint-dns/hub-and-spoke-azure-dns.png" alt-text="Diagram of hub and spoke with Azure-provided DNS.":::
66
68
67
-
## On-premises workloads using a DNS forwarder
69
+
## Azure Private Resolver for on-premises workloads
68
70
69
-
For on-premises workloads to resolve the FQDN of a private endpoint, use a DNS forwarder to resolve the Azure service [public DNS zone](private-endpoint-dns.md) in Azure. A [DNS forwarder](/windows-server/identity/ad-ds/plan/reviewing-dns-concepts#resolving-names-by-using-forwarding) is a Virtual Machine running on the Virtual Network linked to the Private DNS Zone that can proxy DNS queries coming from other Virtual Networks or from on-premises. This is required as the query must be originated from the Virtual Network to Azure DNS. A few options for DNS proxies are: Windows running DNS services, Linux running DNS services, [Azure Firewall](../firewall/dns-settings.md).
71
+
For on-premises workloads to resolve the FQDN of a private endpoint, use Azure Private Resolver to resolve the Azure service public DNS zone in Azure. Azure Private Resolver is an Azure managed service that can resolve DNS queries without the need for a virtual machine acting as a DNS forwarder.
70
72
71
-
The following scenario is for an on-premisesnetwork that has a DNS forwarder in Azure. This forwarder resolves DNS queries via a server-level forwarder to the Azure provided DNS[168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md).
73
+
The following scenario is for an on-premisesnetwork configured to use an Azure Private Resolver. The private resolver forwards the request for the private endpoint to Azure DNS.
To configure properly, you need the followingresources:
78
+
The followingresources are required for a proper configuration:
77
79
78
-
- On-premises network
79
-
- Virtual network [connected to on-premises](/azure/architecture/reference-architectures/hybrid-networking/)
80
-
- DNS forwarder deployed in Azure
81
-
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
82
-
- Private endpoint information (FQDN record name and private IP address)
80
+
- On-premises network
81
+
82
+
- Virtual network [connected to on-premises](/azure/architecture/reference-architectures/hybrid-networking/)
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
87
+
- Private endpoint information (FQDN record name and private IP address)
83
88
84
-
ThefollowingdiagramillustratestheDNSresolutionsequencefrom an on-premisesnetwork. The configuration uses a DNS forwarder deployed in Azure. Theresolution is made by a privateDNSzone [linked to a virtualnetwork](../dns/private-dns-virtual-network-links.md):
89
+
ThefollowingdiagramillustratestheDNSresolutionsequencefrom an on-premisesnetwork. The configuration uses a Private Resolver deployed in Azure. Theresolution is made by a privateDNSzone [linked to a virtualnetwork](../dns/private-dns-virtual-network-links.md):
85
90
86
91
:::image type="content" source="media/private-endpoint-dns/on-premises-using-azure-dns.png" alt-text="Diagram of on-premises using Azure DNS.":::
87
92
88
-
This configuration can be extended for an on-premises network that already has a DNS solution in place.
89
-
The on-premises DNS solution is configured to forward DNS traffic to Azure DNS via a [conditional forwarder](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server). The conditional forwarder references the DNS forwarder deployed in Azure.
93
+
## <aname="on-premises-workloads-using-a-dns-forwarder"></a> Azure Private Resolver with on-premises DNS forwarder
94
+
95
+
This configuration can be extended for an on-premises network that already has a DNS solution in place.
96
+
97
+
The on-premises DNS solution is configured to forward DNS traffic to Azure DNS via a [conditional forwarder](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server). The conditional forwarder references the Private Resolver deployed in Azure.
- On-premisesnetworkwith a customDNSsolution in place
97
-
- Virtual network [connected to on-premises](/azure/architecture/reference-architectures/hybrid-networking/)
98
-
-DNS forwarder deployed in Azure
99
-
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
100
-
- Private endpoint information (FQDN record name and private IP address)
104
+
- On-premisesnetworkwith a customDNSsolution in place
105
+
106
+
-Virtual network [connected to on-premises](/azure/architecture/reference-architectures/hybrid-networking/)
The following diagram illustrates the DNS resolution from an on-premises network. DNS resolution is conditionally forwarded to Azure. The resolution is made by a private DNS zone [linked to a virtual network](../dns/private-dns-virtual-network-links.md).
110
+
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
111
+
112
+
- Private endpoint information (FQDN record name and private IP address)
113
+
114
+
The following diagram illustrates the DNS resolution from an on-premises network. DNS resolution is conditionally forwarded to Azure. The resolution is made by a private DNS zone [linked to a virtual network](../dns/private-dns-virtual-network-links.md).
103
115
104
116
> [!IMPORTANT]
105
-
>Theconditionalforwardingmust be made to the recommended [publicDNSzone forwarder](private-endpoint-dns.md).For example:`database.windows.net`instead of **privatelink**.database.windows.net.
117
+
>Theconditionalforwardingmust be made to the recommended [publicDNSzone forwarder](private-endpoint-dns.md).For example:`database.windows.net`instead of **privatelink**.database.windows.net.
106
118
107
119
:::image type="content" source="media/private-endpoint-dns/on-premises-forwarding-to-azure.png" alt-text="Diagram of on-premises forwarding to Azure DNS.":::
108
120
109
-
## Virtual networkandon-premisesworkloadsusing a DNS forwarder
121
+
## <aname="virtual-network-and-on-premises-workloads-using-a-dns-forwarder"></a> Azure Private Resolver for virtual network and on-premises workloads
110
122
111
-
For workloads accessing a private endpoint from virtual and on-premises networks, use a DNS forwarder to resolve the Azure service [public DNS zone](private-endpoint-dns.md) deployed in Azure.
123
+
For workloads accessing a private endpoint from virtual and on-premises networks, use Azure Private Resolver to resolve the Azure service [public DNS zone](private-endpoint-dns.md) deployed in Azure.
112
124
113
125
The following scenario is for an on-premises network with virtual networks in Azure. Both networks access the private endpoint located in a shared hub network.
114
126
115
-
This DNS forwarder is responsible for resolving all the DNS queries via a server-level forwarder to the Azure-provided DNS service [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md).
127
+
The private resolver is responsible for resolving all the DNS queries via the Azure-provided DNS service [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md).
116
128
117
129
> [!IMPORTANT]
118
-
> A single private DNS zone is required for this configuration. All client connections made from on-premises and [peered virtual networks](../virtual-network/virtual-network-peering-overview.md) must also use the same private DNS zone.
130
+
> A single private DNS zone is required for this configuration. All client connections made from on-premises and [peered virtual networks](../virtual-network/virtual-network-peering-overview.md) must also use the same private DNS zone.
119
131
120
132
> [!NOTE]
121
133
> This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: [Azure services DNS zone configuration](private-endpoint-dns.md).
122
134
123
135
To configure properly, you need the following resources:
124
136
125
137
- On-premises network
138
+
126
139
- Virtual network [connected to on-premises](/azure/architecture/reference-architectures/hybrid-networking/)
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A record](../dns/dns-zones-records.md#record-types)
146
+
130
147
- Private endpoint information (FQDN record name and private IP address)
131
148
132
-
The following diagram shows the DNS resolution for both networks, on-premises and virtual networks. The resolution is using a DNS forwarder. The resolution is made by a private DNS zone [linked to a virtual network](../dns/private-dns-virtual-network-links.md):
149
+
The following diagram shows the DNS resolution for both networks, on-premises and virtual networks. The resolution is using Azure Private Resolver.
150
+
151
+
The resolution is made by a private DNS zone [linked to a virtual network](../dns/private-dns-virtual-network-links.md):
133
152
134
153
:::image type="content" source="media/private-endpoint-dns/hybrid-scenario.png" alt-text="Diagram of hybrid scenario.":::
135
154
136
155
## Private DNS zone group
137
156
138
157
If you choose to integrate your private endpoint with a private DNS zone, a private DNS zone group is also created. The DNS zone group has a strong association between the private DNS zone and the private endpoint. It helps with managing the private DNS zone records when there's an update on the private endpoint. For example, when you add or remove regions, the private DNS zone is automatically updated with the correct number of records.
139
158
140
-
Previously, the DNS records for the private endpoint were created via scripting (retrieving certain information about the private endpoint and then adding it on the DNS zone). With the DNS zone group, there is no need to write any additional CLI/PowerShell lines for every DNS zone. Also, when you delete the private endpoint, all the DNS records within the DNS zone group will be deleted as well.
141
-
142
-
A common scenario for DNS zone group is in a hub-and-spoke topology, where it allows the private DNS zones to be created only once in the hub and allows the spokes to register to it, rather than creating different zones in each spoke.
159
+
Previously, the DNS records for the private endpoint were created via scripting (retrieving certain information about the private endpoint and then adding it on the DNS zone). With the DNS zone group, there's no need to write any extra CLI/PowerShell lines for every DNS zone. Also, when you delete the private endpoint, all the DNS records within the DNS zone group are deleted.
143
160
144
-
> [!NOTE]
145
-
> Each DNS zone group can support up to 5 DNS zones.
161
+
In a hub-and-spoke topology, a common scenario allows the creation of private DNS zones only once in the hub. This setup permits the spokes to register to it, instead of creating different zones in each spoke.
146
162
147
-
> [!NOTE]
148
-
> Adding multiple DNS zone groups to a single Private Endpoint is not supported.
149
163
150
164
> [!NOTE]
151
-
> Delete and update operations for DNS records can be seen performed by "Azure Traffic Manager and DNS." This is a normal platform operation necessary for managing your DNS Records.
165
+
> - Each DNS zone group can support up to 5 DNS zones.
166
+
> - Adding multiple DNS zone groups to a single Private Endpoint is not supported.
167
+
> - Delete and update operations for DNS records can be seen performed by **Azure Traffic Manager and DNS.** This is a normal platform operation necessary for managing your DNS Records.
152
168
153
169
## Next steps
154
170
-[Learn about private endpoints](private-endpoint-overview.md)
0 commit comments