You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/private-endpoint-dns.md
+10-34Lines changed: 10 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,64 +70,40 @@ The FQDN of the services resolves a public ip address, you have to change your D
70
70
71
71
DNS is a critical component to make the application work correctly by resolving in a right manner the private endpoint IP address.
72
72
73
-
Based on your preferences the following scenarios will guide you on how to get the DNS resolution integrated
73
+
Based on your preferences, the following scenarios are available for DNS resolution integrated:
74
74
75
75
-[Virtual Network workloads without custom DNS server](#virtual-network-workloads-without-custom-dns-server)
76
-
-[On Premise forwarding DNS to Azure](#on-premise-forwarding-dns-to-azure)
76
+
77
77
78
78
## Virtual Network workloads without custom DNS server
79
79
80
-
This configuration is appropriate for virtual network workloads without custom DNS server, in this scenario the client queries for the private endpoint IP address to Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). Azure DNS will be responsible for DNS resolution of the private DNS zones.
80
+
This configuration is appropriate for virtual network workloads without custom DNS server. In this scenario the client queries for the private endpoint IP address to Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). Azure DNS will be responsible for DNS resolution of the private DNS zones.
81
81
82
82
83
83
> [!NOTE]
84
84
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
85
85
86
86
To configure properly you would need the following resources :
87
87
88
-
-client virtual network
88
+
-Client virtual network
89
89
90
-
-private dns zones[(privatelink.database.windows.net)](../dns/private-dns-privatednszone.md) with [A Record](../dns/dns-zones-records.md#record-types)
90
+
-Private DNS zone[(privatelink.database.windows.net)](../dns/private-dns-privatednszone.md) with [A Record](../dns/dns-zones-records.md#record-types)
91
91
92
-
-private endpoint information (FQDN record name and Private IP Address)
92
+
-Private endpoint information (FQDN record name and Private IP Address)
93
93
94
94
The following diagram illustrates the DNS resolution sequence from virtual network workloads using private dns zone
95
95
96
96
97
-

97
+

98
98
99
99
100
-
This model can be extended to multiple VNet peered that are associated to the same private endpoint. this can be done by adding new links to the private DNS zone for all peered VNets
100
+
This model can be extended to multiple peered virtual networks that are associated to the same private endpoint. This can be done by [adding new virtual network links](../dns/private-dns-virtual-network-links) to the private DNS zone for all peered virtual networks.
101
101
102
102
> [!IMPORTANT]
103
-
> A single private DNS zone is required for this configuration, creating multiple zones with the same name for different VNets would need manual operations to merge the DNS records
103
+
> A single private DNS zone is required for this configuration, creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records
104
104
105
-
In this scenario there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke VNet are linked to the same private dns zone.
105
+
In this scenario there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke virtual network are linked to the same private dns zone.
106
106
107
107

108
108
109
109
110
-
## On Premise forwarding DNS to Azure
111
-
112
-
This configuration is appropriate for an on premise network that has already an internal dns solution.
113
-
This internal DNS solution needs to be configured to forward DNS traffic to Azure via a conditional forwarder.
114
-
115
-
> [!NOTE]
116
-
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
117
-
118
-
To configure properly you would need the following resources :
119
-
120
-
- on premise network with a DNS solution in place
121
-
- client virtual network
122
-
- private dns zones [(privatelink.database.windows.net)](../dns/private-dns-privatednszone.md) with [A Record](../dns/dns-zones-records.md#record-types)
123
-
- private endpoint information (FQDN record name and Private IP Address)
124
-
125
-
The following diagram illustrates the DNS resolution sequence from virtual network workloads using private dns zone
126
-
127
-
> [!IMPORTANT]
128
-
> The conditional forwarding must be made to the base DNS zone Ex: database.windows.net , NOT **privatelink**.database.windows.net
129
-
130
-

0 commit comments