You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/dns/dns-alerts-metrics.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,14 @@ title: Metrics and alerts - Azure DNS
3
3
description: With this learning path, get started with Azure DNS metrics and alerts.
4
4
services: dns
5
5
documentationcenter: na
6
-
author: rohinkoul
6
+
author: greg-lindsay
7
7
manager: kumudD
8
8
ms.service: dns
9
9
ms.topic: article
10
10
ms.tgt_pltfrm: na
11
11
ms.workload: infrastructure-services
12
-
ms.date: 04/26/2021
13
-
ms.author: rohink
12
+
ms.date: 09/27/2022
13
+
ms.author: greglin
14
14
---
15
15
16
16
# Azure DNS metrics and alerts
@@ -30,7 +30,7 @@ Azure DNS provides the following metrics to Azure Monitor for your DNS zones:
30
30
For more information, see [metrics definition](../azure-monitor/essentials/metrics-supported.md#microsoftnetworkdnszones).
31
31
32
32
>[!NOTE]
33
-
> At this time, these metrics are only available for Public DNS zones hosted in Azure DNS. If you have Private Zones hosted in Azure DNS, these metrics will not provide data for those zones. In addition, the metrics and alerting feature is only supported in Azure Public cloud. Support for sovereign clouds will follow at a later time.
33
+
> At this time, these metrics are only available for Public DNS zones hosted in Azure DNS. If you have Private Zones hosted in Azure DNS, these metrics won't provide data for those zones. In addition, the metrics and alerting feature is only supported in Azure Public cloud. Support for sovereign clouds will follow at a later time.
34
34
35
35
The most granular element that you can see metrics for is a DNS zone. You currently can't see metrics for individual resource records within a zone.
36
36
@@ -70,14 +70,14 @@ To view this metric, select **Metrics** explorer experience from the **Monitor**
70
70
71
71
## Alerts in Azure DNS
72
72
73
-
Azure Monitor has alerting that you can configure for each available metric values. See [Azure Monitor alerts](../azure-monitor/alerts/alerts-metric.md) for more information.
73
+
Azure Monitor has alerting that you can configure for each available metric value. See [Azure Monitor alerts](../azure-monitor/alerts/alerts-metric.md) for more information.
74
74
75
75
1. To configure alerting for Azure DNS zones, select **Alerts** from *Monitor* page in the Azure portal. Then select **+ New alert rule**.
76
76
77
77
:::image type="content" source="./media/dns-alerts-metrics/alert-metrics.png" alt-text="Screenshot of Alert button on Monitor page.":::
78
78
79
79
80
-
1. Click the **Select resource** link in the Scope section to open the *Select a resource* page. Filter by **DNS zones** and then select the Azure DNS zone you want as the target resource. Select **Done** once you have choose the zone.
80
+
1. Click the **Select resource** link in the Scope section to open the *Select a resource* page. Filter by **DNS zones** and then select the Azure DNS zone you want as the target resource. Select **Done** once you've chosen the zone.
81
81
82
82
:::image type="content" source="./media/dns-alerts-metrics/select-resource.png" alt-text="Screenshot of select resource page in configuring alerts.":::
Copy file name to clipboardExpand all lines: articles/dns/dns-faq-private.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -96,12 +96,12 @@ sections:
96
96
- question: |
97
97
Why don’t my existing private DNS zones show up in new portal experience?
98
98
answer: |
99
-
If your existing private DNS zone were created using preview API, you must migrate these zones to new resource model. Private DNS zones created using preview API will not show up in new portal experience. See below for instructions on how to migrate to new resource model.
99
+
If your existing private DNS zone were created using preview API, you must migrate these zones to new resource model. Private DNS zones created using preview API won't show up in new portal experience. See below for instructions on how to migrate to new resource model.
100
100
101
101
- question: |
102
102
How do I migrate my existing private DNS zones to the new model?
103
103
answer: |
104
-
We strongly recommend that you migrate to the new resource model as soon as possible. Legacy resource model will be supported, however, further features will not be developed on top of this model. In future, we intend to deprecate it in favor of new resource model. For guidance on how to migrate your existing private DNS zones to new resource model see[migration guide for Azure DNS private zones](private-dns-migration-guide.md).
104
+
We strongly recommend that you migrate to the new resource model as soon as possible. Legacy resource model will be supported, however, further features won't be developed on top of this model. In future, we intend to deprecate it in favor of new resource model. For guidance on how to migrate your existing private DNS zones to new resource model see[migration guide for Azure DNS private zones](private-dns-migration-guide.md).
105
105
106
106
### Does Azure DNS private zones store any customer content?
107
107
No, Azure DNS private zones doesn't store any customer content.
Copy file name to clipboardExpand all lines: articles/dns/dns-getstarted-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.custom: mode-ui
16
16
17
17
You can configure Azure DNS to resolve host names in your public domain. For example, if you purchased the *contoso.xyz* domain name from a domain name registrar, you can configure Azure DNS to host the *contoso.xyz* domain and resolve *`www.contoso.xyz`* to the IP address of your web server or web app.
18
18
19
-
In this quickstart, you will create a test domain, and then create an address record to resolve *www* to the IP address *10.10.10.10*.
19
+
In this quickstart, you'll create a test domain, and then create an address record to resolve *www* to the IP address *10.10.10.10*.
20
20
21
21
:::image type="content" source="media/dns-getstarted-portal/environment-diagram.png" alt-text="Diagram of DNS deployment environment using the Azure portal." border="false":::
After selecting **Create**, the new DNS resolver will begin deployment. This process might take a minute or two, and you'll see the status of each component as it is deployed.
98
+
After selecting **Create**, the new DNS resolver will begin deployment. This process might take a minute or two, and you'll see the status of each component as it's deployed.
Copy file name to clipboardExpand all lines: articles/dns/dns-reverse-dns-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ For example, the DNS record `www.contoso.com` is implemented using a DNS 'A' rec
32
32
When an organization is assigned an IP address block, they also acquire the right to manage the corresponding ARPA zone. The ARPA zones corresponding to the IP address blocks used by Azure are hosted and managed by Microsoft. Your ISP may host the ARPA zone for you for the IP addresses you owned. They may also allow you to host the ARPA zone in a DNS service of your choice, such as Azure DNS.
33
33
34
34
> [!NOTE]
35
-
> Forward DNS lookups and reverse DNS lookups are implemented in separate, parallel DNS hierarchies. The reverse lookup for 'www.contoso.com' is **not** hosted in the zone 'contoso.com', rather it is hosted in the ARPA zone for the corresponding IP address block. Separate zones are used for IPv4 and IPv6 address blocks.
35
+
> Forward DNS lookups and reverse DNS lookups are implemented in separate, parallel DNS hierarchies. The reverse lookup for 'www.contoso.com' is **not** hosted in the zone 'contoso.com', rather it's hosted in the ARPA zone for the corresponding IP address block. Separate zones are used for IPv4 and IPv6 address blocks.
Copy file name to clipboardExpand all lines: articles/dns/private-dns-import-export.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,13 +46,13 @@ Importing a zone file creates a new zone in Azure private DNS if one does not al
46
46
47
47
The following notes provide additional technical details about the zone import process.
48
48
49
-
* The `$TTL` directive is optional, and it is supported. When no `$TTL` directive is given, records without an explicit TTL are imported set to a default TTL of 3600 seconds. When two records in the same record set specify different TTLs, the lower value is used.
50
-
* The `$ORIGIN` directive is optional, and it is supported. When no `$ORIGIN` is set, the default value used is the zone name as specified on the command line (plus the terminating ".").
49
+
* The `$TTL` directive is optional, and it's supported. When no `$TTL` directive is given, records without an explicit TTL are imported set to a default TTL of 3600 seconds. When two records in the same record set specify different TTLs, the lower value is used.
50
+
* The `$ORIGIN` directive is optional, and it's supported. When no `$ORIGIN` is set, the default value used is the zone name as specified on the command line (plus the terminating ".").
51
51
* The `$INCLUDE` and `$GENERATE` directives are not supported.
52
52
* These record types are supported: A, AAAA, CAA, CNAME, MX, NS, SOA, SRV, and TXT.
53
53
* The SOA record is created automatically by Azure DNS when a zone is created. When you import a zone file, all SOA parameters are taken from the zone file *except* the `host` parameter. This parameter uses the value provided by Azure DNS. This is because this parameter must refer to the primary name server provided by Azure DNS.
54
54
* The name server record set at the zone apex is also created automatically by Azure DNS when the zone is created. Only the TTL of this record set is imported. These records contain the name server names provided by Azure DNS. The record data is not overwritten by the values contained in the imported zone file.
55
-
* During Public Preview, Azure DNS supports only single-string TXT records. Multistring TXT records are be concatenated and truncated to 255 characters.
55
+
* During Public Preview, Azure DNS supports only single-string TXT records. Multistring TXT records will be concatenated and truncated to 255 characters.
56
56
57
57
### CLI format and values
58
58
@@ -68,7 +68,7 @@ Values:
68
68
*`<zone name>` is the name of the zone.
69
69
*`<zone file name>` is the path/name of the zone file to be imported.
70
70
71
-
If a zone with this name does not exist in the resource group, it is created for you. If the zone already exists, the imported record sets are merged with existing record sets.
71
+
If a zone with this name does not exist in the resource group, it's created for you. If the zone already exists, the imported record sets are merged with existing record sets.
72
72
73
73
### Import a zone file
74
74
@@ -80,7 +80,7 @@ To import a zone file for the zone **contoso.com**.
80
80
az group create --resource-group myresourcegroup -l westeurope
81
81
```
82
82
83
-
2. To import the zone **contoso.com** from the file **contoso.com.txt** into a new DNS zone in the resource group **myresourcegroup**, you will run the command `az network private-dns zone import`.<BR>This command loads the zone file and parses it. The command executes a series of commands on the Azure DNS service to create the zone and all the record sets in the zone. The command reports progress in the console window, along with any errors or warnings. Because record sets are created in series, it may take a few minutes to import a large zone file.
83
+
2. To import the zone **contoso.com** from the file **contoso.com.txt** into a new DNS zone in the resource group **myresourcegroup**, you'll run the command `az network private-dns zone import`.<BR>This command loads the zone file and parses it. The command executes a series of commands on the Azure DNS service to create the zone and all the record sets in the zone. The command reports progress in the console window, along with any errors or warnings. Because record sets are created in series, it may take a few minutes to import a large zone file.
84
84
85
85
```azurecli
86
86
az network private-dns zone import -g myresourcegroup -n contoso.com -f contoso.com.txt
title: Resiliency in Azure DNS Private Resolver #Required; Must be "Resiliency in *your official service name*"
3
+
description: Find out about reliability in Azure DNS Private Resolver #Required;
4
+
author: greg-lindsay #Required; your GitHub user alias, with correct capitalization.
5
+
ms.author: greglin #Required; Microsoft alias of author; optional team alias.
6
+
ms.custom: subject-reliability
7
+
ms.service: dns
8
+
ms.topic: conceptual
9
+
ms.date: 09/27/2022 #Required; mm/dd/yyyy format.
10
+
#Customer intent: As a customer, I want to understand reliability support for Azure DNS Private Resolver. I need to avoid failures and respond to them so that I can minimize down time and data loss.
11
+
---
12
+
13
+
# Resiliency in Azure DNS Private Resolver
14
+
15
+
This article describes reliability support in Azure DNS Private Resolver, and covers both regional resiliency with [availability zones](#availability-zones) and cross-region resiliency with disaster recovery.
16
+
17
+
> [!NOTE]
18
+
> Azure DNS Private Resolver supports availability zones without any further configuration! When the service is provisioned, it's deployed across the different availability zones, and will provide zone resiliency out of the box.
19
+
20
+
For a comprehensive overview of reliability in Azure, see [Azure reliability](/azure/architecture/framework/resiliency/overview).
21
+
22
+
## Azure DNS Private Resolver
23
+
24
+
[Azure DNS Private Resolver](dns-private-resolver-overview.md) enables you to query Azure DNS private zones from an on-premises environment, and vice versa, without deploying VM based DNS servers. You no longer need to provision IaaS based solutions on your virtual networks to resolve names registered on Azure private DNS zones. You can configure conditional forwarding of domains back to on-premises, multicloud, and public DNS servers.
25
+
26
+
## Availability zones
27
+
28
+
For more information about availability zones, see [Regions and availability zones](/azure/availability-zones/az-overview).
29
+
30
+
### Prerequisites
31
+
32
+
For a list of regions that support availability zones, see [Azure regions with availability zones](/azure/availability-zones/az-region#azure-regions-with-availability-zones). If your Azure DNS Private Resolver is located in one of the regions listed, you don't need to take any other action beyond provisioning the service.
33
+
34
+
#### Enabling availability zones with private resolver
35
+
36
+
To enable AZ support for Azure DNS Private Resolver, you do not need to take further steps beyond provisioning the service. Just create the private resolver in the region with AZ support, and it will be available across all AZs.
37
+
38
+
For detailed steps on how to provision the service, see [Create an Azure private DNS Resolver using the Azure portal](dns-private-resolver-get-started-portal.md).
39
+
40
+
### Fault tolerance
41
+
42
+
During a zone-wide outage, no action is required during zone recovery. The service will self-heal and rebalance to take advantage of the healthy zone automatically. The service is provisioned across all the AZs.
43
+
44
+
## Disaster recovery and cross-region failover
45
+
46
+
For cross-region failover in Azure DNS Private Resolver, see [Set up DNS failover using private resolvers](tutorial-dns-private-resolver-failover.md).
47
+
48
+
In the event of a regional outage, use the same design as that described in [Set up DNS failover using private resolvers](tutorial-dns-private-resolver-failover.md). When you configure this failover design, you can keep resolving names using the other active regions, and also increase the resiliency of your workloads.
49
+
50
+
All instances of Azure DNS Private Resolver run as Active-Active within the same region.
51
+
52
+
The service health is onboarded to [Azure Resource Health](/azure/service-health/resource-health-overview), so you'll be able to check for health notifications when you subscribe to them. For more information, see [Create activity log alerts on service notifications using the Azure portal](/azure/service-health/alerts-activity-log-service-notifications-portal).
53
+
54
+
Also see the [SLA for Azure DNS](https://azure.microsoft.com/support/legal/sla/dns/v1_1/).
55
+
56
+
## Next steps
57
+
58
+
> [!div class="nextstepaction"]
59
+
> [Resiliency in Azure](/azure/availability-zones/overview)
Copy file name to clipboardExpand all lines: articles/dns/tutorial-dns-private-resolver-failover.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,14 +5,14 @@ services: dns
5
5
author: greg-lindsay
6
6
ms.service: dns
7
7
ms.topic: tutorial
8
-
ms.date: 08/18/2022
8
+
ms.date: 09/27/2022
9
9
ms.author: greglin
10
10
#Customer intent: As an administrator, I want to avoid having a single point of failure for DNS resolution.
11
11
---
12
12
13
13
# Tutorial: Set up DNS failover using private resolvers
14
14
15
-
This article details how to eliminate a single point of failure in your on-premises DNS services by using two or more Azure DNS private resolvers deployed across different regions. DNS failover is enabled by assigning a local resolver as your primary DNS and the resolver in an adjacent region as secondary DNS.
15
+
This article details how to eliminate a single point of failure in your on-premises DNS services by using two or more Azure DNS private resolvers deployed across different regions. DNS failover is enabled by assigning a local resolver as your primary DNS and the resolver in an adjacent region as secondary DNS. If the primary DNS server fails to respond, DNS clients automatically retry using the secondary DNS server.
16
16
17
17
> [!IMPORTANT]
18
18
> Azure DNS Private Resolver is currently in [public preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
0 commit comments