You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md
+25-7Lines changed: 25 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.devlang: na
10
10
ms.topic: article
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: infrastructure-services
13
-
ms.date: 3/25/2019
13
+
ms.date: 3/2/2020
14
14
ms.author: rohink
15
15
---
16
16
@@ -20,16 +20,20 @@ Depending on how you use Azure to host IaaS, PaaS, and hybrid solutions, you mig
20
20
21
21
When resources deployed in virtual networks need to resolve domain names to internal IP addresses, they can use one of two methods:
22
22
23
+
*[Azure DNS private zones](../dns/private-dns-overview.md)
23
24
*[Azure-provided name resolution](#azure-provided-name-resolution)
24
25
*[Name resolution that uses your own DNS server](#name-resolution-that-uses-your-own-dns-server) (which might forward queries to the Azure-provided DNS servers)
25
26
26
27
The type of name resolution you use depends on how your resources need to communicate with each other. The following table illustrates scenarios and corresponding name resolution solutions:
27
28
28
29
> [!NOTE]
29
-
> Depending on your scenario, you might want to use Azure DNS private zones. For more information, see [Using Azure DNS for private domains](../dns/private-dns-overview.md).
30
-
>
30
+
> Azure DNS private zones is the preferred solution and gives you flexibility in managing your DNS zones and records. For more information, see [Using Azure DNS for private domains](../dns/private-dns-overview.md).
31
+
32
+
> [!NOTE]
33
+
> If you use Azure Provided DNS then appropriate DNS suffix will be automatically applied to your virtual machines.
34
+
> For all other options you must either use Fully Qualified Domain Names (FQDN) or manually apply appropriate DNS suffix to your virtual machines.
31
35
32
-
|**Scenario**|**Solution**|**Suffix**|
36
+
|**Scenario**|**Solution**|**DNS Suffix**|
33
37
| --- | --- | --- |
34
38
| Name resolution between VMs located in the same virtual network, or Azure Cloud Services role instances in the same cloud service. |[Azure DNS private zones](../dns/private-dns-overview.md) or [Azure-provided name resolution](#azure-provided-name-resolution)|Hostname or FQDN |
35
39
| Name resolution between VMs in different virtual networks or role instances in different cloud services. |[Azure DNS private zones](../dns/private-dns-overview.md) or, Customer-managed DNS servers forwarding queries between virtual networks for resolution by Azure (DNS proxy). See [Name resolution using your own DNS server](#name-resolution-that-uses-your-own-dns-server). |FQDN only |
@@ -38,17 +42,18 @@ The type of name resolution you use depends on how your resources need to commun
38
42
| Name resolution from App Service Web Apps in one virtual network to VMs in a different virtual network. |Customer-managed DNS servers forwarding queries between virtual networks for resolution by Azure (DNS proxy). See [Name resolution using your own DNS server](#name-resolution-that-uses-your-own-dns-server). |FQDN only |
39
43
| Resolution of on-premises computer and service names from VMs or role instances in Azure. |Customer-managed DNS servers (on-premises domain controller, local read-only domain controller, or a DNS secondary synced using zone transfers, for example). See [Name resolution using your own DNS server](#name-resolution-that-uses-your-own-dns-server). |FQDN only |
40
44
| Resolution of Azure hostnames from on-premises computers. |Forward queries to a customer-managed DNS proxy server in the corresponding virtual network, the proxy server forwards queries to Azure for resolution. See [Name resolution using your own DNS server](#name-resolution-that-uses-your-own-dns-server). |FQDN only |
41
-
| Reverse DNS for internal IPs. |[Name resolution using your own DNS server](#name-resolution-that-uses-your-own-dns-server). |Not applicable |
45
+
| Reverse DNS for internal IPs. |[Azure DNS private zones](../dns/private-dns-overview.md) or [Azure-provided name resolution](#azure-provided-name-resolution) or [Name resolution using your own DNS server](#name-resolution-that-uses-your-own-dns-server). |Not applicable |
42
46
| Name resolution between VMs or role instances located in different cloud services, not in a virtual network. |Not applicable. Connectivity between VMs and role instances in different cloud services is not supported outside a virtual network. |Not applicable|
43
47
44
48
## Azure-provided name resolution
45
49
46
-
Along with resolution of public DNS names, Azure provides internal name resolution for VMs and role instances that reside within the same virtual network or cloud service. VMs and instances in a cloud service share the same DNS suffix, so the host name alone is sufficient. But in virtual networks deployed using the classic deployment model, different cloud services have different DNS suffixes. In this situation, you need the FQDN to resolve names between different cloud services. In virtual networks deployed using the Azure Resource Manager deployment model, the DNS suffix is consistent across the virtual network, so the FQDN is not needed. DNS names can be assigned to both VMs and network interfaces. Although Azure-provided name resolution does not require any configuration, it is not the appropriate choice for all deployment scenarios, as detailed in the previous table.
50
+
Azure provided name resolution provides only basic authoritative DNS capabilities. If you use this option the DNS zone names and records will be automatically managed by Azure and you will not be able to control the DNS zone names or the life cycle of DNS records. If you need a fully featured DNS solution for your virtual networks you must use [Azure DNS private zones](../dns/private-dns-overview.md) or [Customer-managed DNS servers](#name-resolution-that-uses-your-own-dns-server).
51
+
52
+
Along with resolution of public DNS names, Azure provides internal name resolution for VMs and role instances that reside within the same virtual network or cloud service. VMs and instances in a cloud service share the same DNS suffix, so the host name alone is sufficient. But in virtual networks deployed using the classic deployment model, different cloud services have different DNS suffixes. In this situation, you need the FQDN to resolve names between different cloud services. In virtual networks deployed using the Azure Resource Manager deployment model, the DNS suffix is consistent across the all virtual machines within a virtual network, so the FQDN is not needed. DNS names can be assigned to both VMs and network interfaces. Although Azure-provided name resolution does not require any configuration, it is not the appropriate choice for all deployment scenarios, as detailed in the previous table.
47
53
48
54
> [!NOTE]
49
55
> When using cloud services web and worker roles, you can also access the internal IP addresses of role instances using the Azure Service Management REST API. For more information, see the [Service Management REST API Reference](https://msdn.microsoft.com/library/azure/ee460799.aspx). The address is based on the role name and instance number.
50
56
>
51
-
>
52
57
53
58
### Features
54
59
@@ -64,13 +69,26 @@ Azure-provided name resolution includes the following features:
64
69
65
70
Points to consider when you are using Azure-provided name resolution:
66
71
* The Azure-created DNS suffix cannot be modified.
72
+
* DNS lookup is scoped to a virtual network. DNS names created for one virtual networks can't be resolved from other virtual networks.
67
73
* You cannot manually register your own records.
68
74
* WINS and NetBIOS are not supported. You cannot see your VMs in Windows Explorer.
69
75
* Host names must be DNS-compatible. Names must use only 0-9, a-z, and '-', and cannot start or end with a '-'.
70
76
* DNS query traffic is throttled for each VM. Throttling shouldn't impact most applications. If request throttling is observed, ensure that client-side caching is enabled. For more information, see [DNS client configuration](#dns-client-configuration).
71
77
* Only VMs in the first 180 cloud services are registered for each virtual network in a classic deployment model. This limit does not apply to virtual networks in Azure Resource Manager.
72
78
* The Azure DNS IP address is 168.63.129.16. This is a static IP address and will not change.
73
79
80
+
### Reverse DNS Considerations
81
+
Reverse DNS is supported in all ARM based virtual networks. You can issue reverse DNS queries (PTR queries) to map IP addresses of virtual machines to FQDNs of virtual machines.
82
+
* All PTR queries for IP addresses of virtual machines will return FQDNs of form \[vmname\].internal.cloudapp.net
83
+
* Forward lookup on FQDNs of form \[vmname\].internal.cloudapp.net will resolve to IP address assigned to the virtual machine.
84
+
* If the virtual network is linked to an [Azure DNS private zones](../dns/private-dns-overview.md) as a registration virtual network, the reverse DNS queries will return two records. One record will the of the form \[vmname\].[priatednszonename] and other would be of the form \[vmname\].internal.cloudapp.net
85
+
* Reverse DNS lookup is scoped to a given virtual network even if it is peered to other virtual networks. Reverse DNS queries (PTR queries) for IP addresses of virtual machines located in peered virtual networks will return NXDOMAIN.
86
+
87
+
> [!NOTE]
88
+
> If you want reverse DNS lookup to span across virtual network you can create a reverse lookup zone (in-addr.arpa) [Azure DNS private zones](../dns/private-dns-overview.md) and links it to multiple virtual networks. You'll however have to manually manage the reverse DNS records for the virtual machines.
89
+
>
90
+
91
+
74
92
## DNS client configuration
75
93
76
94
This section covers client-side caching and client-side retries.
0 commit comments