Skip to content

Commit fec0bc6

Browse files
Merge pull request #114721 from mblanco77/privatelink-dns-development
private link dns suggested wording
2 parents fcc9007 + bc7b509 commit fec0bc6

File tree

3 files changed

+22
-22
lines changed

3 files changed

+22
-22
lines changed

articles/private-link/private-endpoint-dns.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -11,20 +11,20 @@ ms.author: allensu
1111
# Azure Private Endpoint DNS Configuration
1212

1313

14-
When connecting to a private link resource using a fully qualified domain name (FQDN) as part of the connection string, it's important to correctly configure your DNS settings to resolve to the allocated private IP address. Existing Azure services might already have a DNS configuration to use when connecting over a public endpoint. This needs to be overridden to connect using your private endpoint.
14+
When connecting to a private link resource using a fully qualified domain name (FQDN) as part of the connection string, it's important to correctly configure your DNS settings to resolve to the allocated private IP address. Existing Azure services might already have a DNS configuration to use when connecting over a public endpoint. This configuration needs to be overridden to connect using your private endpoint.
1515

1616
The network interface associated with the private endpoint contains the complete set of information required to configure your DNS, including FQDN and private IP addresses allocated for a given private link resource.
1717

1818
You can use the following options to configure your DNS settings for private endpoints:
1919
- **Use the Host file (only recommended for testing)**. You can use the host file on a virtual machine to override the DNS.
2020
- **Use a private DNS zone**. You can use [private DNS zones](../dns/private-dns-privatednszone.md) to override the DNS resolution for a given private endpoint. A private DNS zone can be linked to your virtual network to resolve specific domains.
21-
- **Use your custom DNS server**. You can use your own DNS server to override the DNS resolution for a given private link resource. If your [DNS server](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) is hosted on a virtual network, you can create a DNS forwarding rule to use a private DNS zone to simplify the configuration for all private link resources.
21+
- **Use your DNS forwarder (Optional)**. You can use your DNS forwarder to override the DNS resolution for a given private link resource. If your [DNS server](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) is hosted on a virtual network, you can create a DNS forwarding rule to use a private DNS zone to simplify the configuration for all private link resources.
2222

2323
> [!IMPORTANT]
2424
> It's not recommended to override a zone that is actively in use to resolve public endpoints. Connections to resources won't be able to resolve correctly without DNS forwarding to the public DNS. To avoid issues, create a different domain name or follow the suggested name for each service below.
2525
2626
## Azure services DNS zone configuration
27-
Azure services will create a canonical name DNS record (CNAME) on the public DNS to redirect the resolution to the suggested private domain names. You'll be able to override the resolution with the private IP address of your private endpoints.
27+
Azure services will create a canonical name DNS record (CNAME) on the public DNS to redirect the resolution to the suggested private domain name. You can override the resolution with the private IP address of your private endpoints.
2828

2929
Your applications don't need to change the connection URL. When attempting to resolve using a public DNS, the DNS server will now resolve to your private endpoints. The process does not impact your existing applications.
3030

@@ -74,7 +74,7 @@ DNS is a critical component to make the application work correctly by resolving
7474
Based on your preferences, the following scenarios are available for DNS resolution integrated:
7575

7676
- [Virtual network workloads without custom DNS server](#virtual-network-workloads-without-custom-dns-server)
77-
- [On premises workloads using a DNS forwarder](#on-premises-workloads-using-a-dns-forwarder)
77+
- [On-premises workloads using a DNS forwarder](#on-premises-workloads-using-a-dns-forwarder)
7878

7979
## Virtual network workloads without custom DNS server
8080

@@ -84,7 +84,7 @@ This configuration is appropriate for virtual network workloads without custom D
8484
> [!NOTE]
8585
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
8686
87-
To configure properly you would need the following resources :
87+
To configure properly, you would need the following resources:
8888

8989
- Client virtual network
9090

@@ -101,54 +101,54 @@ This model can be extended to multiple peered virtual networks that are associat
101101
> [!IMPORTANT]
102102
> A single private DNS zone is required for this configuration, creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records
103103
104-
In this scenario there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke virtual network are linked to the same private dns zone.
104+
In this scenario, there's a [hub & spoke](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) networking topology with the spoke networks sharing a common private endpoint and all the spoke virtual network are linked to the same private dns zone.
105105

106106
:::image type="content" source="media/private-endpoint-dns/hub-and-spoke-azure-dns.png" alt-text="Hub and spoke with Azure-provided DNS":::
107107

108-
## On premises workloads using a DNS forwarder
108+
## On-premises workloads using a DNS forwarder
109109

110-
For on premises workloads to be able to resolve an FQDN of a private endpoint into the private IP address, you must use a DNS forwarder to make the resolution of the Azure service [public DNS zone](#azure-services-dns-zone-configuration) deployed in Azure.
110+
For on-premises workloads to be able to resolve an FQDN of a private endpoint into the private IP address, you must use a DNS forwarder to make the resolution of the Azure service [public DNS zone](#azure-services-dns-zone-configuration) deployed in Azure.
111111

112112

113-
The following scenario is appropriate for an on premises network that has a DNS forwarder in Azure, which in turn is responsible for resolving all the DNS queries via a server level forwarder to the Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md)
113+
The following scenario is appropriate for an on-premises network that has a DNS forwarder in Azure, which in turn is responsible for resolving all the DNS queries via a server level forwarder to the Azure provided DNS [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md)
114114

115115
> [!NOTE]
116116
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
117117
118-
To configure properly you would need the following resources:
118+
To configure properly, you would need the following resources:
119119

120-
- On premises network
121-
- Virtual network [connected to on premises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
120+
- On-premises network
121+
- Virtual network [connected to on-premises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
122122
- DNS forwarder deployed in Azure 
123123
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md) with [type A Record](../dns/dns-zones-records.md#record-types)
124124
- Private endpoint information (FQDN record name and Private IP Address)
125125

126-
The following diagram illustrates the DNS resolution sequence from an on premise network that use a DNS forwarder deployed in Azure,
127-
where the resolution is made by an private DNS zone linked to a virtual network.
126+
The following diagram illustrates the DNS resolution sequence from an on-premises network that uses a DNS forwarder deployed in Azure,
127+
where the resolution is made by a private DNS zone linked to a virtual network.
128128

129-
:::image type="content" source="media/private-endpoint-dns/on-premise-using-azure-dns.png" alt-text="On-premises using Azure DNS":::
129+
:::image type="content" source="media/private-endpoint-dns/on-premises-using-azure-dns.png" alt-text="On-premises using Azure DNS":::
130130

131-
This configuration can be extended for an on premise network that has already a DNS solution in place. 
132-
The on premises DNS solution needs to be configured to forward DNS traffic to the Azure DNS via a [conditional forwarder](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) referencing the DNS forwarder deployed in Azure.
131+
This configuration can be extended for an on-premises network that has already a DNS solution in place. 
132+
The on-premises DNS solution needs to be configured to forward DNS traffic to the Azure DNS via a [conditional forwarder](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) referencing the DNS forwarder deployed in Azure.
133133

134134
> [!NOTE]
135135
> This scenario is using Azure SQL database recommended Private DNS zone. For other services you can adjust the model using the following reference [Azure services DNS zone configuration](#azure-services-dns-zone-configuration).
136136
137-
To configure properly you would need the following resources :
137+
To configure properly, you would need the following resources:
138138

139139

140-
- On premises network with a custom DNS solution in place 
141-
- Virtual network [connected to on premises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
140+
- On-premises network with a custom DNS solution in place 
141+
- Virtual network [connected to on-premises](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/)
142142
- DNS forwarder deployed in Azure
143143
- Private DNS zones [privatelink.database.windows.net](../dns/private-dns-privatednszone.md)  with [type A Record](../dns/dns-zones-records.md#record-types)
144144
- Private endpoint information (FQDN record name and Private IP Address)
145145

146-
The following diagram illustrates the DNS resolution sequence from an on premise network that conditionally forwards DNS traffic to Azure,where the resolution is made by an private DNS zone linked to a virtual network
146+
The following diagram illustrates the DNS resolution sequence from an on-premises network that conditionally forwards DNS traffic to Azure, where the resolution is made by a private DNS zone linked to a virtual network
147147

148148
> [!IMPORTANT]
149149
> The conditional forwarding must be made to the [public DNS zone](#azure-services-dns-zone-configuration) Ex: `database.windows.net` , instead of **privatelink**.database.windows.net
150150
151-
:::image type="content" source="media/private-endpoint-dns/on-premise-forwarding-to-azure.png" alt-text="On-premises forwarding to Azure DNS":::
151+
:::image type="content" source="media/private-endpoint-dns/on-premises-forwarding-to-azure.png" alt-text="On-premises forwarding to Azure DNS":::
152152

153153

154154
## Next steps

0 commit comments

Comments
 (0)