You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/web-sites-integrate-with-vnet.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Integrate app in Azure App Service with Azure virtual networks.
4
4
author: ccompy
5
5
ms.assetid: 90bc6ec6-133d-4d87-a867-fcf77da75f5a
6
6
ms.topic: article
7
-
ms.date: 04/15/2020
7
+
ms.date: 04/16/2020
8
8
ms.author: ccompy
9
9
ms.custom: seodec18
10
10
@@ -37,8 +37,6 @@ Azure App Service has two variations:
37
37
38
38
During the integration, your app is restarted. When integration is finished, you'll see details on the VNet you're integrated with.
39
39
40
-
After your app is integrated with your VNet, it uses the same DNS server that your VNet is configured with, unless it's Azure DNS Private Zones. Currently, you can't use VNet Integration with Azure DNS Private Zones.
Copy file name to clipboardExpand all lines: includes/app-service-web-vnet-regional.md
+15-2Lines changed: 15 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ Using regional VNet Integration enables your app to access:
13
13
* Resources across Azure ExpressRoute connections.
14
14
* Resources in the VNet you're integrated with.
15
15
* Resources across peered connections, which includes Azure ExpressRoute connections.
16
-
* Private endpoints - Note: DNS must be managed separately rather than using Azure DNS private zones.
16
+
* Private endpoints
17
17
18
18
When you use VNet Integration with VNets in the same region, you can use the following Azure networking features:
19
19
@@ -44,7 +44,7 @@ There are some limitations with using VNet Integration with VNets in the same re
44
44
* You can only integrate with VNets in the same subscription as the app.
45
45
* You can have only one regional VNet Integration per App Service plan. Multiple apps in the same App Service plan can use the same VNet.
46
46
* You can't change the subscription of an app or a plan while there's an app that's using regional VNet Integration.
47
-
* Your app cannot resolve addresses in Azure DNS Private Zones.
47
+
* Your app cannot resolve addresses in Azure DNS Private Zones without configuration changes
48
48
49
49
One address is used for each plan instance. If you scale your app to five instances, then five addresses are used. Since subnet size can't be changed after assignment, you must use a subnet that's large enough to accommodate whatever scale your app might reach. A /26 with 64 addresses is the recommended size. A /26 with 64 addresses accommodates a Premium plan with 30 instances. When you scale a plan up or down, you need twice as many addresses for a short period of time.
50
50
@@ -77,9 +77,22 @@ If you want to route all outbound traffic on-premises, you can use a route table
77
77
78
78
Border Gateway Protocol (BGP) routes also affect your app traffic. If you have BGP routes from something like an ExpressRoute gateway, your app outbound traffic will be affected. By default, BGP routes affect only your RFC1918 destination traffic. If WEBSITE_VNET_ROUTE_ALL is set to 1, all outbound traffic can be affected by your BGP routes.
79
79
80
+
### Azure DNS Private Zones
81
+
82
+
After your app integrates with your VNet, it uses the same DNS server that your VNet is configured with. By default, your app won't work with Azure DNS Private Zones. To work with Azure DNS Private Zones you need to add the following app settings:
83
+
84
+
1. WEBSITE_DNS_SERVER with value 168.63.129.16
85
+
1. WEBSITE_VNET_ROUTE_ALL with value 1
86
+
87
+
These settings will send all of your outbound calls from your app into your VNet in addition to enabling your app to use Azure DNS private zones.
88
+
89
+
### Private endpoints
90
+
91
+
If you want to make calls to [Private Endpoints][privateendpoints], then you need to either integrate with Azure DNS Private Zones or manage the private endpoint in the DNS server used by your app.
0 commit comments