Skip to content

Commit 79b503c

Browse files
committed
added warning
1 parent fdb1fc5 commit 79b503c

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

articles/storage/files/storage-files-networking-dns.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,11 @@ If you prefer not to deploy DNS server VMs, you can accomplish the same task usi
8989

9090
There's no difference in how you configure your on-premises DNS servers, except that instead of pointing to the IP addresses of the DNS servers in Azure, you point to the resolver's inbound endpoint IP address. The resolver doesn't require any configuration, as it will forward queries to the Azure private DNS server by default. If a private DNS zone is linked to the VNet where the resolver is deployed, the resolver will be able to reply with records from that DNS zone.
9191

92+
> [!Warning]
93+
> When configuring forwarders for the *core.windows.net* zone, all queries for this public domain will be forwarded to your Azure DNS infrastructure. This causes an issue when you try to access a storage account of a different tenant that has been configured with private endpoints, because Azure DNS will answer the query for the storage account public name with a CNAME that doesn’t exist in your private DNS zone. A workaround for this issue is to create a cross-tenant private endpoint in your environment to connect to that storage account.
94+
95+
To configure DNS forwarding using Azure DNS Private Resolver, run this script on your on-premises DNS servers. Replace `<resolver-ip>` with the resolver's inbound endpoint IP address.
96+
9297
```powershell
9398
$privateResolver = "<resolver-ip>"
9499

0 commit comments

Comments
 (0)