AKS Cluster API Server FQDN not registered with Azure DNS

James McGuire 0 Reputation points
2025-05-03T18:30:38.6833333+00:00

I recently deployed an AKS Cluster using terraform but I cannot connect to it using the API Server FQDN visible from the portal as it doesn't appear to have registered itself with Azure DNS.

I googled for solutions and found the following troubleshooting guide, but although it mentions checking the DNS of the FQDN for the API Server, it doesn't mention how to correct the problem if the FQDN does not resolve. https://learn.microsoft.com/en-us/troubleshoot/azure/azure-kubernetes/connectivity/troubleshoot-cluster-connection-issues-api-server

I've tried "reconciling" the cluster using "az aks update" but this doesn't appear to have corrected the missing DNS entry. Can anyone suggest how I can fix this please and what may have caused it?

Additionally, since I can't get the FQDN to resolve, I could potentially just add a static entry into my local hosts file for now, but could anyone tell me how I can identify the private IP of the API server without the FQDN please?

Thanks,

James

Azure Kubernetes Service (AKS)
Azure Kubernetes Service (AKS)
An Azure service that provides serverless Kubernetes, an integrated continuous integration and continuous delivery experience, and enterprise-grade security and governance.
2,400 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. hossein jalilian 10,580 Reputation points Moderator
    2025-05-03T19:12:59.7866667+00:00

    Hello James McGuire,

    Thanks for posting your question in the Microsoft Q&A forum.

    The FQDN resolution failure typically stems from missing links between the Private DNS Zone and your custom DNS infrastructure:

    • Link the Private DNS Zone to your VNet: AKS automatically creates a Private DNS Zone during deployment. This zone must be linked to the VNet hosting your custom DNS servers.
    • Verify Conditional Forwarding: Ensure your custom DNS server forwards requests for privatelink.<region>.azmk8s.io to Azure’s built-in DNS. Conditional forwarding rules must cover subdomains.

    For DNS servers in a separate VNet or subscription: Navigate to the Private DNS Zone in the AKS-managed resource group. Under Virtual network links, add a link to the VNet where your DNS servers reside


    Please don't forget to close up the thread here by upvoting and accept it as an answer if it is helpful


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.