Skip to content

Commit 1f67f48

Browse files
authored
Merge pull request #111662 from ccompy/vnet-update
az dns private zone changes
2 parents d60e7c3 + a2e952d commit 1f67f48

File tree

2 files changed

+17
-5
lines changed

2 files changed

+17
-5
lines changed

articles/app-service/web-sites-integrate-with-vnet.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Integrate app in Azure App Service with Azure virtual networks.
44
author: ccompy
55
ms.assetid: 90bc6ec6-133d-4d87-a867-fcf77da75f5a
66
ms.topic: article
7-
ms.date: 04/15/2020
7+
ms.date: 04/16/2020
88
ms.author: ccompy
99
ms.custom: seodec18
1010

@@ -37,8 +37,6 @@ Azure App Service has two variations:
3737

3838
During the integration, your app is restarted. When integration is finished, you'll see details on the VNet you're integrated with.
3939

40-
After your app is integrated with your VNet, it uses the same DNS server that your VNet is configured with, unless it's Azure DNS Private Zones. Currently, you can't use VNet Integration with Azure DNS Private Zones.
41-
4240
## Regional VNet Integration
4341

4442
[!INCLUDE [app-service-web-vnet-types](../../includes/app-service-web-vnet-regional.md)]
@@ -195,3 +193,4 @@ For gateway-required VNet Integration, you can integrate App Service with an Azu
195193
[setp2saddresses]: https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal#addresspool
196194
[VNETRouteTables]: https://docs.microsoft.com/azure/virtual-network/manage-route-table/
197195
[installCLI]: https://docs.microsoft.com/cli/azure/install-azure-cli?view=azure-cli-latest/
196+
[privateendpoints]: networking/private-endpoint.md

includes/app-service-web-vnet-regional.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Using regional VNet Integration enables your app to access:
1313
* Resources across Azure ExpressRoute connections.
1414
* Resources in the VNet you're integrated with.
1515
* Resources across peered connections, which includes Azure ExpressRoute connections.
16-
* Private endpoints - Note: DNS must be managed separately rather than using Azure DNS private zones.
16+
* Private endpoints
1717

1818
When you use VNet Integration with VNets in the same region, you can use the following Azure networking features:
1919

@@ -44,7 +44,7 @@ There are some limitations with using VNet Integration with VNets in the same re
4444
* You can only integrate with VNets in the same subscription as the app.
4545
* You can have only one regional VNet Integration per App Service plan. Multiple apps in the same App Service plan can use the same VNet.
4646
* You can't change the subscription of an app or a plan while there's an app that's using regional VNet Integration.
47-
* Your app cannot resolve addresses in Azure DNS Private Zones.
47+
* Your app cannot resolve addresses in Azure DNS Private Zones without configuration changes
4848

4949
One address is used for each plan instance. If you scale your app to five instances, then five addresses are used. Since subnet size can't be changed after assignment, you must use a subnet that's large enough to accommodate whatever scale your app might reach. A /26 with 64 addresses is the recommended size. A /26 with 64 addresses accommodates a Premium plan with 30 instances. When you scale a plan up or down, you need twice as many addresses for a short period of time.
5050

@@ -77,9 +77,22 @@ If you want to route all outbound traffic on-premises, you can use a route table
7777

7878
Border Gateway Protocol (BGP) routes also affect your app traffic. If you have BGP routes from something like an ExpressRoute gateway, your app outbound traffic will be affected. By default, BGP routes affect only your RFC1918 destination traffic. If WEBSITE_VNET_ROUTE_ALL is set to 1, all outbound traffic can be affected by your BGP routes.
7979

80+
### Azure DNS Private Zones
81+
82+
After your app integrates with your VNet, it uses the same DNS server that your VNet is configured with. By default, your app won't work with Azure DNS Private Zones. To work with Azure DNS Private Zones you need to add the following app settings:
83+
84+
1. WEBSITE_DNS_SERVER with value 168.63.129.16
85+
1. WEBSITE_VNET_ROUTE_ALL with value 1
86+
87+
These settings will send all of your outbound calls from your app into your VNet in addition to enabling your app to use Azure DNS private zones.
88+
89+
### Private endpoints
90+
91+
If you want to make calls to [Private Endpoints][privateendpoints], then you need to either integrate with Azure DNS Private Zones or manage the private endpoint in the DNS server used by your app.
8092

8193
<!--Image references-->
8294
[4]: ../includes/media/web-sites-integrate-with-vnet/vnetint-appsetting.png
8395

8496
<!--Links-->
8597
[VNETnsg]: https://docs.microsoft.com/azure/virtual-network/security-overview/
98+
[privateendpoints]: https://docs.microsoft.com/azure/app-service/networking/private-endpoint

0 commit comments

Comments
 (0)