Skip to content

Commit eeb3eed

Browse files
authored
Merge pull request #49325 from kskvarci/kskvarci-private-hub-spoke
Added custom DNS
2 parents 2ec4b3d + 2b4ac8d commit eeb3eed

File tree

2 files changed

+12
-0
lines changed

2 files changed

+12
-0
lines changed
186 KB
Loading

articles/aks/private-clusters.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,18 @@ As mentioned, VNet peering is one way to access your private cluster. To use VNe
7777
8. Select **Add**, add the virtual network of the VM, and then create the peering.
7878
9. Go to the virtual network where you have the VM, select **Peerings**, select the AKS virtual network, and then create the peering. If the address ranges on the AKS virtual network and the VM's virtual network clash, peering fails. For more information, see [Virtual network peering][virtual-network-peering].
7979

80+
## Hub and spoke with custom DNS
81+
82+
[Hub and spoke architectures](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) are commonly used to deploy networks in Azure. In many of these deployments, DNS settings in the spoke VNets are configured to reference a central DNS forwarder to allow for on-premises and Azure-based DNS resolution. When deploying an AKS cluster into such a networking environment, there are some special considerations that must be taken into account.
83+
84+
![Private cluster hub and spoke](media/private-clusters/aks-private-hub-spoke.png)
85+
86+
1. By default, when a private cluster is provisioned, a private endpoint (1) and a private DNS zone (2) are created in the cluster managed resource group. The cluster uses an A record in the private zone to resolve the IP of the private endpoint for communication to the API server.
87+
88+
2. The private DNS zone is linked only to the VNet that the cluster nodes are attached to (3). This means that the private endpoint can only be resolved by hosts in that linked VNet. In scenarios where no custom DNS is configured on the VNet (default), this works without issue as hosts point at 168.63.129.16 for DNS which can resolve records in the private DNS zone due to the link.
89+
90+
3. In scenarios where the VNet containing your cluster has custom DNS settings (4), cluster deployment fails unless the private DNS zone is linked to the VNet that contains the custom DNS resolvers (5). This link can be created manually after the private zone is created during cluster provisioning or via automation upon detection of creation of the zone using Azure Policy or other event-based deployment mechanisms (for example, Azure Event Grid and Azure Functions).
91+
8092
## Dependencies
8193

8294
* The Private Link service is supported on Standard Azure Load Balancer only. Basic Azure Load Balancer isn't supported.

0 commit comments

Comments
 (0)