Skip to content

Commit a7d2256

Browse files
committed
adjusting based on comments
1 parent 2e4ac77 commit a7d2256

File tree

4 files changed

+10
-34
lines changed

4 files changed

+10
-34
lines changed
0 Bytes
Loading
Binary file not shown.
0 Bytes
Loading

articles/private-link/private-endpoint-dns.md

Lines changed: 10 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -70,64 +70,40 @@ The FQDN of the services resolves a public ip address, you have to change your D
7070

7171
DNS is a critical component to make the application work correctly by resolving in a right manner the private endpoint IP address.
7272

73-
Based on your preferences the following scenarios will guide you on how to get the DNS resolution integrated
73+
Based on your preferences, the following scenarios are available for DNS resolution integrated:
7474

7575
- [Virtual Network workloads without custom DNS server](#virtual-network-workloads-without-custom-dns-server)
76-
- [On Premise forwarding DNS to Azure](#on-premise-forwarding-dns-to-azure)
76+
7777

7878
## Virtual Network workloads without custom DNS server
7979

80-
This configuration is appropriate for virtual network workloads without custom DNS server, in this scenario the client queries for the private endpoint IP address to Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). Azure DNS will be responsible for DNS resolution of the private DNS zones.
80+
This configuration is appropriate for virtual network workloads without custom DNS server. In this scenario the client queries for the private endpoint IP address to Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). Azure DNS will be responsible for DNS resolution of the private DNS zones.
8181

8282

8383
> [!NOTE]
8484
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
8585
8686
To configure properly you would need the following resources :
8787

88-
- client virtual network
88+
- Client virtual network
8989

90-
- private dns zones [(privatelink.database.windows.net)](../dns/private-dns-privatednszone.md) with [A Record](../dns/dns-zones-records.md#record-types)
90+
- Private DNS zone [(privatelink.database.windows.net)](../dns/private-dns-privatednszone.md) with [A Record](../dns/dns-zones-records.md#record-types)
9191

92-
- private endpoint information (FQDN record name and Private IP Address)
92+
- Private endpoint information (FQDN record name and Private IP Address)
9393

9494
The following diagram illustrates the DNS resolution sequence from virtual network workloads using private dns zone
9595

9696

97-
![single vnet and azure provided dns](media/private-endpoint-dns/single-vnet-azure-dns.png)
97+
![single virtual network and azure provided dns](media/private-endpoint-dns/single-vnet-azure-dns.png)
9898

9999

100-
This model can be extended to multiple VNet peered that are associated to the same private endpoint. this can be done by adding new links to the private DNS zone for all peered VNets
100+
This model can be extended to multiple peered virtual networks that are associated to the same private endpoint. This can be done by [adding new virtual network links](../dns/private-dns-virtual-network-links) to the private DNS zone for all peered virtual networks.
101101

102102
> [!IMPORTANT]
103-
> A single private DNS zone is required for this configuration, creating multiple zones with the same name for different VNets would need manual operations to merge the DNS records
103+
> A single private DNS zone is required for this configuration, creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records
104104
105-
In this scenario there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke VNet are linked to the same private dns zone.
105+
In this scenario there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke virtual network are linked to the same private dns zone.
106106

107107
![hub & spoke with azure provided dns](media/private-endpoint-dns/hubandspoke-azure-dns.png)
108108

109109

110-
## On Premise forwarding DNS to Azure
111-
112-
This configuration is appropriate for an on premise network that has already an internal dns solution.
113-
This internal DNS solution needs to be configured to forward DNS traffic to Azure via a conditional forwarder.
114-
115-
> [!NOTE]
116-
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
117-
118-
To configure properly you would need the following resources :
119-
120-
- on premise network with a DNS solution in place
121-
- client virtual network
122-
- private dns zones [(privatelink.database.windows.net)](../dns/private-dns-privatednszone.md) with [A Record](../dns/dns-zones-records.md#record-types)
123-
- private endpoint information (FQDN record name and Private IP Address)
124-
125-
The following diagram illustrates the DNS resolution sequence from virtual network workloads using private dns zone
126-
127-
> [!IMPORTANT]
128-
> The conditional forwarding must be made to the base DNS zone Ex: database.windows.net , NOT **privatelink**.database.windows.net
129-
130-
![On-prem forward to azure](media/private-endpoint-dns/onpremdns-forward-to-azure.png)
131-
132-
133-

0 commit comments

Comments
 (0)