Skip to content

Commit 90a1d63

Browse files
Merge pull request #208523 from greg-lindsay/private-resolver-ga
edit statement
2 parents 6cd68b9 + 1406d1b commit 90a1d63

File tree

2 files changed

+6
-2
lines changed

2 files changed

+6
-2
lines changed

articles/dns/private-resolver-endpoints-rulesets.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,11 @@ Rulesets have the following associations:
4242
- A ruleset can have up to 1000 DNS forwarding rules.
4343
- A ruleset can be linked to any number of virtual networks in the same region
4444

45-
A ruleset can't be linked to a virtual network in another region. When you link a ruleset to a virtual network, resources within that virtual network will use the DNS forwarding rules enabled in the ruleset. The linked virtual network must peer with the virtual network where the outbound endpoint exists. This configuration is typically used in a hub and spoke design, with spoke vnets peered to a hub vnet that has one or more private resolver endpoints. The following screenshot shows a DNS forwarding ruleset linked to two virtual networks: a hub vnet: **myeastvnet**, and a spoke vnet: **myeastspoke**.
45+
A ruleset can't be linked to a virtual network in another region.
46+
47+
When you link a ruleset to a virtual network, resources within that virtual network will use the DNS forwarding rules enabled in the ruleset. The linked virtual network must peer with the virtual network where the outbound endpoint exists. This configuration is typically used in a hub and spoke design, with spoke vnets peered to a hub vnet that has one or more private resolver endpoints. In this hub and spoke scenario, the spoke vnet does not need to be linked to the private DNS zone in order to resolve resource records in the zone, because the forwarding ruleset rule for the private zone sends queries to the hub vnet's inbound endpoint. For example: **azure.contoso.com** to **10.10.0.4**.
48+
49+
The following screenshot shows a DNS forwarding ruleset linked to two virtual networks: a hub vnet: **myeastvnet**, and a spoke vnet: **myeastspoke**.
4650

4751
![View ruleset links](./media/private-resolver-endpoints-rulesets/ruleset-links.png)
4852

articles/dns/private-resolver-hybrid-dns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Next, create a rule in your ruleset for your on-premises domain. In this example
8686
8787
## Configure on-premises DNS conditional forwarders
8888

89-
The procedure to configure on-premises DNS depends on the type of DNS server you're using. In the following example, a Windows DNS server at **10.100.0.2** is configured with a conditional forwarder for the private DNS zone **azure.contoso.com**. The conditional forwarder is set to forward queries to **10.10.0.4**, which is the inbound endpoint IP address for your Azure DNS Private Resolver. There's another IP address also configured here to enable DNS failover. For more information about enabling failover, see [Tutorial: Set up DNS failover using private resolvers](tutorial-dns-private-resolver-failover.md). For the purposes of this demonstration, only the **10.10.0.4** inbound endpoint is required.
89+
The procedure to configure on-premises DNS depends on the type of DNS server you're using. In the following example, a Windows DNS server at **10.100.0.2** is configured with a conditional forwarder for the private DNS zone **azure.contoso.com**. The conditional forwarder is set to forward queries to **10.10.0.4**, which is the inbound endpoint IP address for your Azure DNS Private Resolver. There's another IP address also configured here that can be used to enable DNS resolution in a spoke vnet. For the purposes of this demonstration, only the **10.10.0.4** inbound endpoint is required.
9090

9191
![View on-premises forwarding](./media/private-resolver-hybrid-dns/on-premises-forwarders.png)
9292

0 commit comments

Comments
 (0)