Skip to content

Commit 770a752

Browse files
committed
close #54308
1 parent bc7b509 commit 770a752

File tree

2 files changed

+5
-7
lines changed

2 files changed

+5
-7
lines changed
7.77 KB
Loading

articles/private-link/private-endpoint-dns.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -99,21 +99,21 @@ The following diagram illustrates the DNS resolution sequence from virtual netwo
9999
This model can be extended to multiple peered virtual networks that are associated to the same private endpoint. This can be done by [adding new virtual network links](../dns/private-dns-virtual-network-links.md) to the private DNS zone for all peered virtual networks.
100100

101101
> [!IMPORTANT]
102-
> A single private DNS zone is required for this configuration, creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records
102+
> A single private DNS zone is required for this configuration, creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records
103103
104104
In this scenario, there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke virtual network are linked to the same private dns zone.
105105

106106
:::image type="content" source="media/private-endpoint-dns/hub-and-spoke-azure-dns.png" alt-text="Hub and spoke with Azure-provided DNS":::
107107

108108
## On-premises workloads using a DNS forwarder
109-
 
109+
110110
For on-premises workloads to be able to resolve an FQDN of a private endpoint into the private IP address, you must use a DNS forwarder to make the resolution of the Azure service [public DNS zone](#azure-services-dns-zone-configuration) deployed in Azure.
111111

112112

113113
The following scenario is appropriate for an on-premises network that has a DNS forwarder in Azure, which in turn is responsible for resolving all the DNS queries via a server level forwarder to the Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md)
114114

115115
> [!NOTE]
116-
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
116+
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
117117
118118
To configure properly, you would need the following resources:
119119

@@ -123,8 +123,7 @@ To configure properly, you would need the following resources:
123123
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A Record](../dns/dns-zones-records.md#record-types)
124124
- Private endpoint information (FQDN record name and Private IP Address)
125125

126-
The following diagram illustrates the DNS resolution sequence from an on-premises network that uses a DNS forwarder deployed in Azure,
127-
where the resolution is made by a private DNS zone linked to a virtual network.
126+
The following diagram illustrates the DNS resolution sequence from an on-premises network that uses a DNS forwarder deployed in Azure, where the resolution is made by a private DNS zone [linked to a virtual network.](../dns/private-dns-virtual-network-links.md)
128127

129128
:::image type="content" source="media/private-endpoint-dns/on-premises-using-azure-dns.png" alt-text="On-premises using Azure DNS":::
130129

@@ -136,14 +135,13 @@ The on-premises DNS solution needs to be configured to forward DNS traf
136135
137136
To configure properly, you would need the following resources:
138137

139-
140138
- On-premises network with a custom DNS solution in place 
141139
- Virtual network [connected to on-premises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
142140
- DNS forwarder deployed in Azure
143141
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md)  with [type A Record](../dns/dns-zones-records.md#record-types)
144142
- Private endpoint information (FQDN record name and Private IP Address)
145143

146-
The following diagram illustrates the DNS resolution sequence from an on-premises network that conditionally forwards DNS traffic to Azure, where the resolution is made by a private DNS zone linked to a virtual network
144+
The following diagram illustrates the DNS resolution sequence from an on-premises network that conditionally forwards DNS traffic to Azure, where the resolution is made by a private DNS zone [linked to a virtual network.](../dns/private-dns-virtual-network-links.md)
147145

148146
> [!IMPORTANT]
149147
> The conditional forwarding must be made to the [public DNS zone](#azure-services-dns-zone-configuration) Ex: `database.windows.net` , instead of **privatelink**.database.windows.net

0 commit comments

Comments
 (0)