Skip to content

Commit bc228ee

Browse files
Merge pull request #272394 from greg-lindsay/dns-design
add statement in note about public DNS resolution requirement.
2 parents a71f97f + 764de42 commit bc228ee

File tree

3 files changed

+7
-4
lines changed

3 files changed

+7
-4
lines changed

articles/dns/dns-private-resolver-get-started-portal.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,8 @@ Add or remove specific rules your DNS forwarding ruleset as desired, such as:
156156
- A wildcard rule to forward unmatched DNS queries to a protective DNS service.
157157

158158
> [!IMPORTANT]
159-
> The rules shown in this quickstart are examples of rules that can be used for specific scenarios. None of the fowarding rules described in this article are required. Be careful to test your forwarding rules and ensure that the rules don't cause DNS resolution issues.
159+
> The rules shown in this quickstart are examples of rules that can be used for specific scenarios. None of the fowarding rules described in this article are required. Be careful to test your forwarding rules and ensure that the rules don't cause DNS resolution issues.<br><br>
160+
> **If you include a wildcard rule in your ruleset, ensure that the target DNS service can resolve public DNS names. Some Azure services have dependencies on public name resolution.**
160161
161162
### Delete a rule from the forwarding ruleset
162163

articles/dns/dns-private-resolver-get-started-powershell.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,8 @@ In this example:
250250
- 10.5.5.5 is a protective DNS service.
251251

252252
> [!IMPORTANT]
253-
> The rules shown in this quickstart are examples of rules that can be used for specific scenarios. None of the fowarding rules described in this article are required. Be careful to test your forwarding rules and ensure that the rules don't cause DNS resolution issues.
253+
> The rules shown in this quickstart are examples of rules that can be used for specific scenarios. None of the fowarding rules described in this article are required. Be careful to test your forwarding rules and ensure that the rules don't cause DNS resolution issues.<br><br>
254+
> **If you include a wildcard rule in your ruleset, ensure that the target DNS service can resolve public DNS names. Some Azure services have dependencies on public name resolution.**
254255
255256
## Test the private resolver
256257

articles/dns/private-resolver-endpoints-rulesets.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: dns
55
author: greg-lindsay
66
ms.service: dns
77
ms.topic: conceptual
8-
ms.date: 03/26/2024
8+
ms.date: 04/16/2024
99
ms.author: greglin
1010
#Customer intent: As an administrator, I want to understand components of the Azure DNS Private Resolver.
1111
---
@@ -106,7 +106,8 @@ A query for `secure.store.azure.contoso.com` matches the **AzurePrivate** rule f
106106

107107
> [!IMPORTANT]
108108
> If a rule is present in the ruleset that has as its destination a private resolver inbound endpoint, do not link the ruleset to the VNet where the inbound endpoint is provisioned. This configuration can cause DNS resolution loops. For example: In the previous scenario, no ruleset link should be added to `myeastvnet` because the inbound endpoint at `10.10.0.4` is provisioned in `myeastvnet` and a rule is present that resolves `azure.contoso.com` using the inbound endpoint.<br><br>
109-
> The rules shown in this article are examples of rules that can be used for specific scenarios. None of the fowarding rules described here are required. Be careful to test your forwarding rules and ensure that the rules don't cause DNS resolution issues.
109+
> The rules shown in this article are examples of rules that you can use for specific scenarios. The examples used aren't required. Be careful to test your forwarding rules.<br><br>
110+
> **If you include a wildcard rule in your ruleset, ensure that the target DNS service can resolve public DNS names. Some Azure services have dependencies on public name resolution.**
110111
111112
#### Rule processing
112113

0 commit comments

Comments
 (0)