Skip to content

Commit 5874d4f

Browse files
authored
Update application-gateway-dns-resolution.md
1 parent 89c3ea8 commit 5874d4f

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/application-gateway/application-gateway-dns-resolution.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: mbender
1010
---
1111

1212
# Understanding DNS resolution in Application Gateway
13-
An Application Gateway is a dedicated deployment within your Virtual Network. The DNS resolution for instances of your application gateway resource, which handles incoming traffic, is also affected by your virtual network configurations. This article will discuss the Domain Name System (DNS) configurations and their impact on name resolution.
13+
An Application Gateway is a dedicated deployment within your Virtual Network. The DNS resolution for instances of your application gateway resource, which handles incoming traffic, is also affected by your virtual network configurations. This article discusses the Domain Name System (DNS) configurations and their impact on name resolution.
1414

1515
## Need for name resolution
1616
Application Gateway performs DNS resolution for the Fully Qualified Domain Names (FQDN) of
@@ -21,7 +21,7 @@ Application Gateway performs DNS resolution for the Fully Qualified Domain Names
2121
* Custom error page URL
2222
* Online Certificate Status Protocol (OCSP) verification URL
2323

24-
2) **Management FQDNs** that are utilized for various Azure infrastructure endpoints (control plane). These are the building blocks that form a complete Application Gateway resource. For example, communication with monitoring endpoints enable flow of Logs and Metrics. Thus, it is important for application gateways to internally communicate with other Azure services' endpoints having suffixes like `.windows.net`, `.azure.net`, etc.
24+
2) **Management FQDNs** that are utilized for various Azure infrastructure endpoints (control plane). These are the building blocks that form a complete Application Gateway resource. For example, communication with monitoring endpoints enable flow of Logs and Metrics. Thus, it's important for application gateways to internally communicate with other Azure services' endpoints having suffixes like `.windows.net`, `.azure.net`, etc.
2525

2626
> [!IMPORTANT]
2727
> The management endpoint domain names that an Application Gateway resource interacts with are listed here. Depending on the type of application gateway deployment (detailed in this article), any name resolution issue for these Azure domain names may lead to either partial or complete loss of resource functionality.
@@ -40,39 +40,39 @@ Application Gateway performs DNS resolution for the Fully Qualified Domain Names
4040
Customers have different infrastructure needs, requiring various approaches to name resolution. This document outlines general DNS implementation scenarios and offers recommendations for the efficient operation of application gateway resources.
4141

4242
### Gateways with Public IP address (networkIsolationEnabled: False)
43-
For public gateways, all control plane communication with Azure domains occurs through the default Azure DNS server at 168.63.129.16. In this section we will examine the potential DNS zone configuration with public application gateways, and how to prevent conflicts with Azure domain name resolution.
43+
For public gateways, all control plane communication with Azure domains occurs through the default Azure DNS server at 168.63.129.16. In this section we'll examine the potential DNS zone configuration with public application gateways, and how to prevent conflicts with Azure domain names resolution.
4444

4545
#### Using default Azure-provided DNS
4646
The Azure-provided DNS comes as a default setting with all virtual networks in Azure and has an IP address 168.63.129.16. Along with resolution of any public domain names, the Azure-provided DNS provides internal name resolution for VMs that reside within the same virtual network. In this scenario, all instances of the application gateway connect to 168.63.129.16 for DNS resolution.
4747

4848
:::image source="media/application-gateway-dns-resolution/default-dns.png" alt-text="A diagram showing DNS resolution for Azure-provided DNS.":::
4949

5050
Flows:
51-
* In this diagram, we can see the Application Gateway instance talks to Azure-provided DNS (168.63.129.16) for name resolution of the backend servers FQDN "server1.contoso.com" and "server2.contoso.com", as shown with blue line.
52-
* Similarly, the instance reaches out 168.63.129.16 for the name resolution of private link-enabled Key Vault resource, as shown in orange line. To allow an application gateway to DNS resolve the key vault endpoint to its private IP, it is important to link the Private DNS zone to that application gateway’s virtual network.
51+
* In this diagram, we can see the Application Gateway instance talks to Azure-provided DNS (168.63.129.16) for name resolution of the backend servers FQDN "server1.contoso.com" and "server2.contoso.com," as shown with blue line.
52+
* Similarly, the instance reaches out 168.63.129.16 for the name resolution of private link-enabled Key Vault resource, as shown in orange line. To allow an application gateway to DNS resolve the key vault endpoint to its private IP, it's important to link the Private DNS zone to that application gateway’s virtual network.
5353
* After performing successful DNS resolutions for these FQDNs, the instance can communicate with the Key Vault and backend server endpoints.
5454

5555
Considerations:
56-
* Do not create and link private DNS zones for top-level Azure domain names. You must create DNS zone for a subdomain as specific as possible. For example, having a private DNS zone for `privatelink.vaultcore.azure.net` for a key vault’s private endpoint works in all cases than having a zone for `vaultcore.azure.net` or `azure.net`.
56+
* Don't create and link private DNS zones for top-level Azure domain names. You must create DNS zone for a subdomain as specific as possible. For example, having a private DNS zone for `privatelink.vaultcore.azure.net` for a key vault’s private endpoint works in all cases than having a zone for `vaultcore.azure.net` or `azure.net`.
5757
* For communication with backend servers or any service using a Private Endpoint, ensure the private link DNS zone is linked to your application gateway’s virtual network.
5858

5959
#### Using custom DNS servers
6060

61-
In your virtual network, it is possible to designate custom DNS servers. This configuration may be required for managing zones independently for specific domain names. Such an arrangement directs the application gateway instances within the virtual network also to utilize the specified custom DNS servers for resolving non-Azure domain names.
61+
In your virtual network, it's possible to designate custom DNS servers. This configuration may be required for managing zones independently for specific domain names. Such an arrangement directs the application gateway instances within the virtual network also to utilize the specified custom DNS servers for resolving non-Azure domain names.
6262

6363
:::image source="media/application-gateway-dns-resolution/custom-dns.png" alt-text="A diagram showing DNS resolution with custom DNS servers.":::
6464

6565
Flows:
66-
* The diagram shows that the Application Gateway instance uses Azure-provided DNS (168.63.129.16) for name resolution of the private link Key Vault endpoint "contoso.privatelink.vaultcore.azure.net". The DNS queries for Azure domain names, which includes `azure.net`, are redirected to Azure-provided DNS (shown in orange line).
67-
* For DNS resolution of "server1.contoso.com", the instance honors the custom DNS setup (as shown in blue line).
66+
* The diagram shows that the Application Gateway instance uses Azure-provided DNS (168.63.129.16) for name resolution of the private link Key Vault endpoint "contoso.privatelink.vaultcore.azure.net". The DNS queries for Azure domain names, which include `azure.net`, are redirected to Azure-provided DNS (shown in orange line).
67+
* For DNS resolution of "server1.contoso.com," the instance honors the custom DNS setup (as shown in blue line).
6868

6969
Considerations:
7070

71-
Using custom DNS servers on application gateway virtual network will need you to take the following measures to ensure there is no impact on functioning of application gateway.
71+
Using custom DNS servers on application gateway virtual network needs you to take the following measures to ensure there's no impact on functioning of application gateway.
7272

7373
* After you change the DNS servers associated with application gateway virtual network, you must restart (Stop and Start) your application gateway for these changes to take effect for the instances.
7474
* When using a private endpoint in application gateway virtual network, the private DNS zone must remain linked to the application gateway virtual network to allow resolution to private IP. This DNS zone must be for a subdomain as specific as possible.
75-
* If the custom DNS servers are in a different virtual network, ensure it is peered with the Application Gateway's virtual network and not impacted by any Network Security Group or Route Table configurations.
75+
* If the custom DNS servers are in a different virtual network, ensure it's peered with the Application Gateway's virtual network and not impacted by any Network Security Group or Route Table configurations.
7676

7777
### Gateways with Private IP address only (networkIsolationEnabled: True)
7878
The private application gateway deployment is designed to separate the customer’s data plane and management plane traffic. Therefore, having default Azure DNS or custom DNS servers has no effect on the critical management endpoints name resolutions. However, when using custom DNS servers, you must take care of name resolutions required for any data path operations.
@@ -81,13 +81,13 @@ The private application gateway deployment is designed to separate the customer
8181

8282
Flows:
8383
* The DNS queries for "contoso.com" reaches the custom DNS servers through customer traffic plane.
84-
* The DNS queries for "contoso.privatelink.vaultcore.azure.net" also reaches the custom DNS servers. However, since the DNS server is not authoritative zone for this domain name, it forwards the query recursively to Azure DNS 168.63.129.16. Such a configuration is important to allow name resolution through a private DNS zone that is linked to the virtual network.
84+
* The DNS queries for "contoso.privatelink.vaultcore.azure.net" also reaches the custom DNS servers. However, since the DNS server isn't authoritative zone for this domain name, it forwards the query recursively to Azure DNS 168.63.129.16. Such a configuration is important to allow name resolution through a private DNS zone that is linked to the virtual network.
8585
* The resolution of all management endpoints goes via management plane traffic that directly interacts with the Azure-provided DNS.
8686

8787
Considerations:
8888

8989
* After you change the DNS servers associated with application gateway virtual network, you must restart (Stop and Start) your application gateway for these changes to take effect for the instances.
90-
* You must set forwarding rules to send all other domains resolution queries to Azure DNS 168.63.129.16. This is especially important when you’ve a private DNS zone for private endpoint resolution.
90+
* You must set forwarding rules to send all other domains resolution queries to Azure DNS 168.63.129.16. This configuration is especially important when you have a private DNS zone for private endpoint resolution.
9191
* When using a private endpoint, the private DNS zone must remain linked to the application gateway virtual network to allow resolution to private IP.
9292

9393

0 commit comments

Comments
 (0)