You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**Requirement**: You must create a virtual network link in the zone to the virtual network where you will deploy your Azure DNS Private Resolver. In the example shown below, the private zone is linked to two vnets: **myeastvnet** and **mywestvnet**. At least one link is required.
56
+
**Requirement**: You must create a virtual network link in the zone to the virtual network where you'll deploy your Azure DNS Private Resolver. In the example shown below, the private zone is linked to two vnets: **myeastvnet** and **mywestvnet**. At least one link is required.
57
57
58
58
[](./media/private-resolver-hybrid-dns/private-zone-links.png#lightbox)
59
59
@@ -86,7 +86,7 @@ Next, create a rule in your ruleset for your on-premise domain. In this example,
86
86
87
87
## Configure on-premise DNS conditional forwarders
88
88
89
-
The procedure to configure on-premise DNS depends on the type of DNS server you're using. In the following example, a Windows DNS server at **10.100.0.2** is configured with a conditional forwarder for the private DNS zone **azure.contoso.com**. The conditional forwarder is is set to forward queries to **10.10.0.4**, which is the inbound endpoint IP address for your Azure DNS Private Resolver. There's another IP address also configured here to enable DNS failover. For more information about enabling failover, see [Tutorial: Set up DNS failover using private resolvers](tutorial-dns-private-resolver-failover.md). For the purposes of this demonstration, only the **10.10.0.4** inbound endpoint is required.
89
+
The procedure to configure on-premise DNS depends on the type of DNS server you're using. In the following example, a Windows DNS server at **10.100.0.2** is configured with a conditional forwarder for the private DNS zone **azure.contoso.com**. The conditional forwarder is set to forward queries to **10.10.0.4**, which is the inbound endpoint IP address for your Azure DNS Private Resolver. There's another IP address also configured here to enable DNS failover. For more information about enabling failover, see [Tutorial: Set up DNS failover using private resolvers](tutorial-dns-private-resolver-failover.md). For the purposes of this demonstration, only the **10.10.0.4** inbound endpoint is required.
Copy file name to clipboardExpand all lines: articles/dns/tutorial-dns-private-resolver-failover.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,14 +30,14 @@ The following diagram shows the failover scenario discussed in this article.
30
30
In this scenario, you have connections from two on-premise locations to two Azure hub vnets.
31
31
- In the east region, the primary path is to the east vnet hub. You have a secondary connection to the west hub. The west region is configured in the reverse.
32
32
- Due to an Internet connectivity issue, the connection to one vnet (west) is temporarily broken.
33
-
-Services are maintained in both regions due to the redundant design.
33
+
-Service is maintained in both regions due to the redundant design.
34
34
35
35
The DNS resolution path is:
36
36
1) Redundant on-premise DNS [conditional forwarders](#on-premise-forwarding) send DNS queries to inbound endpoints.
37
37
2)[Inbound endpoints](#inbound-endpoints) receive DNS queries from on-premise.
38
38
3) Outbound endpoints and DNS forwarding rulesets process DNS queries and return replies to your on-premise resources.
39
39
40
-
Outbound endpoints and DNS forwarding rulesets are not needed for the failover scenario, but are included here for completeness. Rulesets can be used is to resolve on-premise domains from Azure. For more information, see [Azure DNS Private Resolver endpoints and rulesets](private-resolver-endpoints-rulesets.md) and [Resolve Azure and on-premise domains](private-resolver-hybrid-dns.md).
40
+
Outbound endpoints and DNS forwarding rulesets aren't needed for the failover scenario, but are included here for completeness. Rulesets can be used is to resolve on-premise domains from Azure. For more information, see [Azure DNS Private Resolver endpoints and rulesets](private-resolver-endpoints-rulesets.md) and [Resolve Azure and on-premise domains](private-resolver-hybrid-dns.md).
41
41
42
42
## Prerequisites
43
43
@@ -125,7 +125,7 @@ Check that DNS settings for your virtual networks are set to Default (Azure-prov
125
125
Now that DNS resolution is working from on-premise to Azure using two different Azure DNS Private Resolvers, we can configure forwarding to use both of these addresses. This will enable redundancy in case one of the connections to Azure is interrupted. The procedure to configure forwarders will depend on the type of DNS server that you're using. The following example uses a Windows Server that is running the DNS Server role service and has an IP address of 10.100.0.2.
126
126
127
127
> [!NOTE]
128
-
> The DNS server that you use to configure forwarding should be a server that client devices on your network will use for DNS resolution. If the server you're configuring is not the default, you will need to query it's IP address directly (ex: nslookup test.azure.contoso.com 10.100.0.2) after forwarding is configured.
128
+
> The DNS server that you use to configure forwarding should be a server that client devices on your network will use for DNS resolution. If the server you're configuring is not the default, you'll need to query it's IP address directly (ex: nslookup test.azure.contoso.com 10.100.0.2) after forwarding is configured.
129
129
130
130
1. Open an elevated Windows PowerShell prompt and prompt commands. Replace **azure.contoso.com** with the name of your private zone, and replace the IP addresses below with the IP addresses for your private resolvers.
0 commit comments