You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/dns/private-resolver-endpoints-rulesets.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: dns
5
5
author: greg-lindsay
6
6
ms.service: dns
7
7
ms.topic: conceptual
8
-
ms.date: 10/23/2023
8
+
ms.date: 03/26/2024
9
9
ms.author: greglin
10
10
#Customer intent: As an administrator, I want to understand components of the Azure DNS Private Resolver.
11
11
---
@@ -56,9 +56,9 @@ Outbound endpoints are also part of the private virtual network address space wh
56
56
DNS forwarding rulesets enable you to specify one or more custom DNS servers to answer queries for specific DNS namespaces. The individual [rules](#rules) in a ruleset determine how these DNS names are resolved. Rulesets can also be linked one or more virtual networks, enabling resources in the VNets to use the forwarding rules that you configure.
57
57
58
58
Rulesets have the following associations:
59
-
- A single ruleset can be associated with up to 2 outbound endpoints belonging to the same DNS Private Resolver instance. It cannot be associated with 2 outbound endpoints in two different DNS Private Resolver instances.
59
+
- A single ruleset can be associated with up to 2 outbound endpoints belonging to the same DNS Private Resolver instance. It can't be associated with 2 outbound endpoints in two different DNS Private Resolver instances.
60
60
- A ruleset can have up to 1000 DNS forwarding rules.
61
-
- A ruleset can be linked to up to 500 virtual networks in the same region
61
+
- A ruleset can be linked to up to 500 virtual networks in the same region.
62
62
63
63
A ruleset can't be linked to a virtual network in another region. For more information about ruleset and other private resolver limits, see [What are the usage limits for Azure DNS?](dns-faq.yml#what-are-the-usage-limits-for-azure-dns-).
64
64
@@ -109,8 +109,8 @@ A query for `secure.store.azure.contoso.com` matches the **AzurePrivate** rule f
109
109
110
110
#### Rule processing
111
111
112
-
- If multiple DNS servers are entered as the destination for a rule, the first IP address that is entered is used unless it doesn't respond. An exponential backoff algorithm is used to determine whether or not a destination IP address is responsive. Destination addresses that are marked as unresponsive aren't used for 30 minutes.
113
-
- Certain domains are ignored when using a wildcard rule for DNS resolution, because they are reserved for Azure services. See [Azure services DNS zone configuration](../private-link/private-endpoint-dns.md#azure-services-dns-zone-configuration) for a list of domains that are reserved. The two-label DNS names listed in this article (for example: windows.net, azure.com, azure.net, windowsazure.us) are reserved for Azure services.
112
+
- If multiple DNS servers are entered as the destination for a rule, the first IP address that is entered is used unless it doesn't respond. An exponential backoff algorithm is used to determine whether or not a destination IP address is responsive.
113
+
- Certain domains are ignored when using a wildcard rule for DNS resolution, because they're reserved for Azure services. See [Azure services DNS zone configuration](../private-link/private-endpoint-dns.md#azure-services-dns-zone-configuration) for a list of domains that are reserved. The two-label DNS names listed in this article (for example: windows.net, azure.com, azure.net, windowsazure.us) are reserved for Azure services.
114
114
115
115
> [!IMPORTANT]
116
116
> - You can't enter the Azure DNS IP address of 168.63.129.16 as the destination IP address for a rule. Attempting to add this IP address outputs the error: **Exception while making add request for rule**.
@@ -122,7 +122,7 @@ How you deploy forwarding rulesets and inbound endpoints in a hub and spoke arch
122
122
123
123
### Forwarding ruleset links
124
124
125
-
Linking a **forwarding ruleset** to a VNet enables DNS forwarding capabilities in that VNet. For example, if a ruleset contains a rule to forward queries to a private resolver's inbound endpoint, this type of rule can be used to enable resolution of private zones that are linked to the inbound endpoint's VNet. This configuration can be used where a Hub VNet is linked to a private zone and you want to enable the private zone to be resolved in spoke VNets that are not linked to the private zone. In this scenario, DNS resolution of the private zone is carried out by the inbound endpoint in the hub VNet.
125
+
Linking a **forwarding ruleset** to a VNet enables DNS forwarding capabilities in that VNet. For example, if a ruleset contains a rule to forward queries to a private resolver's inbound endpoint, this type of rule can be used to enable resolution of private zones that are linked to the inbound endpoint's VNet. This configuration can be used where a Hub VNet is linked to a private zone and you want to enable the private zone to be resolved in spoke VNets that aren't linked to the private zone. In this scenario, DNS resolution of the private zone is carried out by the inbound endpoint in the hub VNet.
126
126
127
127
The ruleset link design scenario is best suited to a [distributed DNS architecture](private-resolver-architecture.md#distributed-dns-architecture) where network traffic is spread across your Azure network, and might be unique in some locations. With this design, you can control DNS resolution in all VNets linked to the ruleset by modifying a single ruleset.
128
128
@@ -131,7 +131,7 @@ The ruleset link design scenario is best suited to a [distributed DNS architectu
131
131
132
132
### Inbound endpoints as custom DNS
133
133
134
-
**Inbound endpoints** are able to process inbound DNS queries, and can be configured as custom DNS for a VNet. This configuration can replace instances where you are[using your own DNS server](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) as custom DNS in a VNet.
134
+
**Inbound endpoints** are able to process inbound DNS queries, and can be configured as custom DNS for a VNet. This configuration can replace instances where you're[using your own DNS server](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) as custom DNS in a VNet.
135
135
136
136
The custom DNS design scenario is best suited to a [centralized DNS architecture](private-resolver-architecture.md#centralized-dns-architecture) where DNS resolution and network traffic flow are mostly to a hub VNet, and is controlled from a central location.
137
137
@@ -142,7 +142,7 @@ To resolve a private DNS zone from a spoke VNet using this method, the VNet wher
142
142
* Review components, benefits, and requirements for [Azure DNS Private Resolver](dns-private-resolver-overview.md).
143
143
* Learn how to create an Azure DNS Private Resolver by using [Azure PowerShell](./dns-private-resolver-get-started-powershell.md) or [Azure portal](./dns-private-resolver-get-started-portal.md).
144
144
* Understand how to [Resolve Azure and on-premises domains](private-resolver-hybrid-dns.md) using the Azure DNS Private Resolver.
145
-
* Learn how to [Set up DNS failover using private resolvers](tutorial-dns-private-resolver-failover.md)
145
+
* Learn how to [Set up DNS failover using private resolvers](tutorial-dns-private-resolver-failover.md).
146
146
* Learn how to [configure hybrid DNS](private-resolver-hybrid-dns.md) using private resolvers.
147
147
* Learn about some of the other key [networking capabilities](../networking/fundamentals/networking-overview.md) of Azure.
148
148
*[Learn module: Introduction to Azure DNS](/training/modules/intro-to-azure-dns).
0 commit comments