You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/private-endpoint-dns.md
+22-22Lines changed: 22 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,20 +11,20 @@ ms.author: allensu
11
11
# Azure Private Endpoint DNS Configuration
12
12
13
13
14
-
When connecting to a private link resource using a fully qualified domain name (FQDN) as part of the connection string, it's important to correctly configure your DNS settings to resolve to the allocated private IP address. Existing Azure services might already have a DNS configuration to use when connecting over a public endpoint. This needs to be overridden to connect using your private endpoint.
14
+
When connecting to a private link resource using a fully qualified domain name (FQDN) as part of the connection string, it's important to correctly configure your DNS settings to resolve to the allocated private IP address. Existing Azure services might already have a DNS configuration to use when connecting over a public endpoint. This configuration needs to be overridden to connect using your private endpoint.
15
15
16
16
The network interface associated with the private endpoint contains the complete set of information required to configure your DNS, including FQDN and private IP addresses allocated for a given private link resource.
17
17
18
18
You can use the following options to configure your DNS settings for private endpoints:
19
19
-**Use the Host file (only recommended for testing)**. You can use the host file on a virtual machine to override the DNS.
20
20
-**Use a private DNS zone**. You can use [private DNS zones](../dns/private-dns-privatednszone.md) to override the DNS resolution for a given private endpoint. A private DNS zone can be linked to your virtual network to resolve specific domains.
21
-
-**Use your custom DNS server**. You can use your own DNS server to override the DNS resolution for a given private link resource. If your [DNS server](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) is hosted on a virtual network, you can create a DNS forwarding rule to use a private DNS zone to simplify the configuration for all private link resources.
21
+
-**Use your DNS forwarder (Optional)**. You can use your DNS forwarder to override the DNS resolution for a given private link resource. If your [DNS server](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) is hosted on a virtual network, you can create a DNS forwarding rule to use a private DNS zone to simplify the configuration for all private link resources.
22
22
23
23
> [!IMPORTANT]
24
24
> It's not recommended to override a zone that is actively in use to resolve public endpoints. Connections to resources won't be able to resolve correctly without DNS forwarding to the public DNS. To avoid issues, create a different domain name or follow the suggested name for each service below.
25
25
26
26
## Azure services DNS zone configuration
27
-
Azure services will create a canonical name DNS record (CNAME) on the public DNS to redirect the resolution to the suggested private domain names. You'll be able to override the resolution with the private IP address of your private endpoints.
27
+
Azure services will create a canonical name DNS record (CNAME) on the public DNS to redirect the resolution to the suggested private domain name. You can override the resolution with the private IP address of your private endpoints.
28
28
29
29
Your applications don't need to change the connection URL. When attempting to resolve using a public DNS, the DNS server will now resolve to your private endpoints. The process does not impact your existing applications.
30
30
@@ -74,7 +74,7 @@ DNS is a critical component to make the application work correctly by resolving
74
74
Based on your preferences, the following scenarios are available for DNS resolution integrated:
75
75
76
76
-[Virtual network workloads without custom DNS server](#virtual-network-workloads-without-custom-dns-server)
77
-
-[Onpremises workloads using a DNS forwarder](#on-premises-workloads-using-a-dns-forwarder)
77
+
-[On-premises workloads using a DNS forwarder](#on-premises-workloads-using-a-dns-forwarder)
78
78
79
79
## Virtual network workloads without custom DNS server
80
80
@@ -84,7 +84,7 @@ This configuration is appropriate for virtual network workloads without custom D
84
84
> [!NOTE]
85
85
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
86
86
87
-
To configure properly you would need the following resources:
87
+
To configure properly, you would need the following resources:
88
88
89
89
- Client virtual network
90
90
@@ -101,54 +101,54 @@ This model can be extended to multiple peered virtual networks that are associat
101
101
> [!IMPORTANT]
102
102
> A single private DNS zone is required for this configuration, creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records
103
103
104
-
In this scenario there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke virtual network are linked to the same private dns zone.
104
+
In this scenario, there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke virtual network are linked to the same private dns zone.
105
105
106
106
:::image type="content" source="media/private-endpoint-dns/hub-and-spoke-azure-dns.png" alt-text="Hub and spoke with Azure-provided DNS":::
107
107
108
-
## Onpremises workloads using a DNS forwarder
108
+
## On-premises workloads using a DNS forwarder
109
109
110
-
For onpremises workloads to be able to resolve an FQDN of a private endpoint into the private IP address, you must use a DNS forwarder to make the resolution of the Azure service [public DNS zone](#azure-services-dns-zone-configuration) deployed in Azure.
110
+
For on-premises workloads to be able to resolve an FQDN of a private endpoint into the private IP address, you must use a DNS forwarder to make the resolution of the Azure service [public DNS zone](#azure-services-dns-zone-configuration) deployed in Azure.
111
111
112
112
113
-
The following scenario is appropriate for an onpremises network that has a DNS forwarder in Azure, which in turn is responsible for resolving all the DNS queries via a server level forwarder to the Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md)
113
+
The following scenario is appropriate for an on-premises network that has a DNS forwarder in Azure, which in turn is responsible for resolving all the DNS queries via a server level forwarder to the Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md)
114
114
115
115
> [!NOTE]
116
116
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
117
117
118
-
To configure properly you would need the following resources:
118
+
To configure properly, you would need the following resources:
119
119
120
-
- Onpremises network
121
-
- Virtual network [connected to onpremises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
120
+
- On-premises network
121
+
- Virtual network [connected to on-premises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
122
122
- DNS forwarder deployed in Azure
123
123
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A Record](../dns/dns-zones-records.md#record-types)
124
124
- Private endpoint information (FQDN record name and Private IP Address)
125
125
126
-
The following diagram illustrates the DNS resolution sequence from an on premise network that use a DNS forwarder deployed in Azure,
127
-
where the resolution is made by an private DNS zone linked to a virtual network.
126
+
The following diagram illustrates the DNS resolution sequence from an on-premises network that uses a DNS forwarder deployed in Azure,
127
+
where the resolution is made by a private DNS zone linked to a virtual network.
128
128
129
-
:::image type="content" source="media/private-endpoint-dns/on-premise-using-azure-dns.png" alt-text="On-premises using Azure DNS":::
129
+
:::image type="content" source="media/private-endpoint-dns/on-premises-using-azure-dns.png" alt-text="On-premises using Azure DNS":::
130
130
131
-
This configuration can be extended for an on premise network that has already a DNS solution in place.
132
-
The onpremises DNS solution needs to be configured to forward DNS traffic to the Azure DNS via a [conditional forwarder](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) referencing the DNS forwarder deployed in Azure.
131
+
This configuration can be extended for an on-premises network that has already a DNS solution in place.
132
+
The on-premises DNS solution needs to be configured to forward DNS traffic to the Azure DNS via a [conditional forwarder](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) referencing the DNS forwarder deployed in Azure.
133
133
134
134
> [!NOTE]
135
135
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
136
136
137
-
To configure properly you would need the following resources:
137
+
To configure properly, you would need the following resources:
138
138
139
139
140
-
- Onpremises network with a custom DNS solution in place
141
-
- Virtual network [connected to onpremises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
140
+
- On-premises network with a custom DNS solution in place
141
+
- Virtual network [connected to on-premises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
142
142
- DNS forwarder deployed in Azure
143
143
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A Record](../dns/dns-zones-records.md#record-types)
144
144
- Private endpoint information (FQDN record name and Private IP Address)
145
145
146
-
The following diagram illustrates the DNS resolution sequence from an on premise network that conditionally forwards DNS traffic to Azure,where the resolution is made by an private DNS zone linked to a virtual network
146
+
The following diagram illustrates the DNS resolution sequence from an on-premises network that conditionally forwards DNS traffic to Azure,where the resolution is made by a private DNS zone linked to a virtual network
147
147
148
148
> [!IMPORTANT]
149
149
> The conditional forwarding must be made to the [public DNS zone](#azure-services-dns-zone-configuration) Ex: `database.windows.net` , instead of **privatelink**.database.windows.net
150
150
151
-
:::image type="content" source="media/private-endpoint-dns/on-premise-forwarding-to-azure.png" alt-text="On-premises forwarding to Azure DNS":::
151
+
:::image type="content" source="media/private-endpoint-dns/on-premises-forwarding-to-azure.png" alt-text="On-premises forwarding to Azure DNS":::
0 commit comments