You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Data Lake File System Gen2 (Microsoft.Storage/storageAccounts) / Data Lake File System Gen2 (dfs, dfs_secondary) | privatelink.dfs.core.windows.net | dfs.core.windows.net |
The FQDN of the services resolves a public ip address, you have to change your DNS configuration to resolve the private IP address of the private endpoint.
70
+
The FQDN of the services resolves automatically to a public IP address, so in order to resolve to the private IP address of the private endpoint you must change your DNS configuration accordingly.
70
71
71
72
DNS is a critical component to make the application work correctly by resolving in a right manner the private endpoint IP address.
72
73
73
74
Based on your preferences, the following scenarios are available for DNS resolution integrated:
74
75
75
-
-[Virtual Network workloads without custom DNS server](#virtual-network-workloads-without-custom-dns-server)
76
-
76
+
-[Virtual network workloads without custom DNS server](#virtual-network-workloads-without-custom-dns-server)
77
+
-[On premises workloads using a DNS forwarder](#on-premises-workloads-using-a-dns-forwarder)
77
78
78
-
## Virtual Network workloads without custom DNS server
79
+
## Virtual network workloads without custom DNS server
79
80
80
81
This configuration is appropriate for virtual network workloads without custom DNS server. In this scenario the client queries for the private endpoint IP address to Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). Azure DNS will be responsible for DNS resolution of the private DNS zones.
81
82
82
83
83
-
> [!NOTE]
84
+
> [!NOTE]
84
85
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
85
86
86
87
To configure properly you would need the following resources :
@@ -93,16 +94,61 @@ To configure properly you would need the following resources :
93
94
94
95
The following diagram illustrates the DNS resolution sequence from virtual network workloads using private dns zone
95
96
96
-
:::image type="content" source="media/private-endpoint-dns/single-vnet-azure-dns.png" alt-text="single virtual network and azure provided dns":::
97
+
:::image type="content" source="media/private-endpoint-dns/single-vnet-azure-dns.png" alt-text="Single virtual network and Azure-provided DNS":::
97
98
98
99
This model can be extended to multiple peered virtual networks that are associated to the same private endpoint. This can be done by [adding new virtual network links](../dns/private-dns-virtual-network-links.md) to the private DNS zone for all peered virtual networks.
99
100
100
-
> [!IMPORTANT]
101
+
> [!IMPORTANT]
101
102
> A single private DNS zone is required for this configuration, creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records
102
103
103
104
In this scenario there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke virtual network are linked to the same private dns zone.
104
105
105
-
:::image type="content" source="media/private-endpoint-dns/hub-and-spoke-azure-dns.png" alt-text="hub and spoke with azure provided dns":::
106
+
:::image type="content" source="media/private-endpoint-dns/hub-and-spoke-azure-dns.png" alt-text="Hub and spoke with Azure-provided DNS":::
107
+
108
+
## On premises workloads using a DNS forwarder
109
+
110
+
For on premises workloads to be able to resolve an FQDN of a private endpoint into the private IP address, you must use a DNS forwarder to make the resolution of the Azure service [public DNS zone](#azure-services-dns-zone-configuration) deployed in Azure.
111
+
112
+
113
+
The following scenario is appropriate for an on premises network that has a DNS forwarder in Azure, which in turn is responsible for resolving all the DNS queries via a server level forwarder to the Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md)
114
+
115
+
> [!NOTE]
116
+
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
117
+
118
+
To configure properly you would need the following resources:
119
+
120
+
- On premises network
121
+
- Virtual network [connected to on premises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
122
+
- DNS forwarder deployed in Azure
123
+
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A Record](../dns/dns-zones-records.md#record-types)
124
+
- Private endpoint information (FQDN record name and Private IP Address)
125
+
126
+
The following diagram illustrates the DNS resolution sequence from an on premise network that use a DNS forwarder deployed in Azure,
127
+
where the resolution is made by an private DNS zone linked to a virtual network.
128
+
129
+
:::image type="content" source="media/private-endpoint-dns/on-premise-using-azure-dns.png" alt-text="On-premises using Azure DNS":::
130
+
131
+
This configuration can be extended for an on premise network that has already a DNS solution in place.
132
+
The on premises DNS solution needs to be configured to forward DNS traffic to the Azure DNS via a [conditional forwarder](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) referencing the DNS forwarder deployed in Azure.
133
+
134
+
> [!NOTE]
135
+
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
136
+
137
+
To configure properly you would need the following resources :
138
+
139
+
140
+
- On premises network with a custom DNS solution in place
141
+
- Virtual network [connected to on premises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
142
+
- DNS forwarder deployed in Azure
143
+
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A Record](../dns/dns-zones-records.md#record-types)
144
+
- Private endpoint information (FQDN record name and Private IP Address)
145
+
146
+
The following diagram illustrates the DNS resolution sequence from an on premise network that conditionally forwards DNS traffic to Azure,where the resolution is made by an private DNS zone linked to a virtual network
147
+
148
+
> [!IMPORTANT]
149
+
> The conditional forwarding must be made to the [public DNS zone](#azure-services-dns-zone-configuration) Ex: `database.windows.net` , instead of **privatelink**.database.windows.net
150
+
151
+
:::image type="content" source="media/private-endpoint-dns/on-premise-forwarding-to-azure.png" alt-text="On-premises forwarding to Azure DNS":::
0 commit comments