Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Azure Private Endpoint DNS integration is essential for enabling secure, private connectivity to Azure services within your virtual network. This article describes common DNS configuration scenarios for Azure Private Endpoints, including options for virtual networks, peered networks, and on-premises environments. Use these scenarios and best practices to ensure reliable and secure name resolution for your applications and services.
For private DNS zone settings for Azure services that support a private endpoint, see Azure Private Endpoint private DNS zone values.
DNS configuration scenarios
The FQDN of the service automatically resolves to a public IP address. To resolve to the private IP address of the private endpoint, change your DNS configuration.
DNS is critical for your application to work correctly because it resolves the private endpoint IP address.
You can use the following DNS resolution scenarios:
Peered virtual network workloads without Azure Private Resolver
On-premises workloads using a DNS forwarder without Azure Private Resolver)
Azure Private Resolver for virtual network and on-premises workloads
Virtual network workloads without Azure Private Resolver
This configuration is appropriate for virtual network workloads without a custom DNS server. In this scenario, the client queries for the private endpoint IP address to the Azure-provided DNS service 168.63.129.16. Azure DNS is responsible for DNS resolution of the private DNS zones.
Note
This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: Azure services DNS zone configuration.
To configure properly, you need the following resources:
Client virtual network
Private DNS zone privatelink.database.windows.net with type A record
Private endpoint information (FQDN record name and private IP address)
The following screenshot illustrates the DNS resolution sequence from virtual network workloads using the private DNS zone:
Peered virtual network workloads without Azure Private Resolver
You can extend this model to peered virtual networks associated to the same private endpoint. Add new virtual network links to the private DNS zone for all peered virtual networks.
Important
A single private DNS zone is required for this configuration. Creating multiple zones with the same name for different virtual networks would need manual operations to merge the DNS records.
If you're using a private endpoint in a hub-and-spoke model from a different subscription or even within the same subscription, link the same private DNS zones to all spokes and hub virtual networks that contain clients that need DNS resolution from the zones.
In this scenario, there's a hub and spoke networking topology. The spoke networks share a private endpoint. The spoke virtual networks are linked to the same private DNS zone.
On-premises workloads using a DNS forwarder without Azure Private Resolver
For on-premises workloads to resolve the FQDN of a private endpoint, configure a DNS forwarder in Azure. The DNS forwarder should be deployed in the virtual network that is linked to the private DNS zone for your private endpoint.
A DNS forwarder is typically a virtual machine running DNS services or a managed service like Azure Firewall. The DNS forwarder receives DNS queries from on-premises or other virtual networks and forwards them to Azure DNS.
Note
DNS queries for private endpoints must originate from the virtual network that is linked to the private DNS zone. The DNS forwarder enables this by proxying queries on behalf of on-premises clients. This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: Azure services DNS zone configuration.
The following scenario is for an on-premises network that has a DNS forwarder in Azure. This forwarder resolves DNS queries via a server-level forwarder to the Azure provided DNS 168.63.129.16.
To configure properly, you need the following resources:
- On-premises network with a custom DNS solution in place
- Virtual network connected to on-premises
- DNS solution in deployed in your Azure environment with the capability to conditionally forward DNS requests
- Private DNS zone privatelink.database.windows.net with type A record
- Private endpoint information (FQDN record name and private IP address)
Important
The conditional forwarding must be made to the recommended public DNS zone forwarder. For example: database.windows.net
instead of privatelink.database.windows.net.
- Extend this configuration for on-premises networks that already have a custom DNS solution.
- Configure your on-premises DNS solution with a conditional forwarder for the private DNS zone. The conditional forwarder should point to the DNS forwarder deployed in Azure, so DNS queries for private endpoints are correctly resolved.
The resolution is made by a private DNS zone linked to a virtual network:
Azure Private Resolver for on-premises workloads
For on-premises workloads to resolve the FQDN of a private endpoint, use Azure Private Resolver to resolve the Azure service public DNS zone in Azure. Azure Private Resolver is an Azure managed service that can resolve DNS queries without the need for a virtual machine acting as a DNS forwarder.
The following scenario is for an on-premises network configured to use an Azure Private Resolver. The private resolver forwards the request for the private endpoint to Azure DNS.
Note
This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: Azure services DNS zone values.
The following resources are required for a proper configuration:
On-premises network
Virtual network connected to on-premises
Private DNS zones privatelink.database.windows.net with type A record
Private endpoint information (FQDN record name and private IP address)
The following diagram illustrates the DNS resolution sequence from an on-premises network. The configuration uses a Private Resolver deployed in Azure. The resolution is made by a private DNS zone linked to a virtual network:
Azure Private Resolver with on-premises DNS forwarder
This configuration can be extended for an on-premises network that already has a DNS solution in place.
The on-premises DNS solution is configured to forward DNS traffic to Azure DNS via a conditional forwarder. The conditional forwarder references the Private Resolver deployed in Azure.
Note
This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: Azure services DNS zone values
To configure properly, you need the following resources:
On-premises network with a custom DNS solution in place
Virtual network connected to on-premises
Private DNS zones privatelink.database.windows.net with type A record
Private endpoint information (FQDN record name and private IP address)
The following diagram illustrates the DNS resolution from an on-premises network. DNS resolution is conditionally forwarded to Azure. The resolution is made by a private DNS zone linked to a virtual network.
Important
The conditional forwarding must be made to the recommended public DNS zone forwarder. For example: database.windows.net
instead of privatelink.database.windows.net.
Azure Private Resolver for virtual network and on-premises workloads
For workloads accessing a private endpoint from virtual and on-premises networks, use Azure Private Resolver to resolve the Azure service public DNS zone deployed in Azure.
The following scenario is for an on-premises network with virtual networks in Azure. Both networks access the private endpoint located in a shared hub network.
The private resolver is responsible for resolving all the DNS queries via the Azure-provided DNS service 168.63.129.16.
Important
A single private DNS zone is required for this configuration. All client connections made from on-premises and peered virtual networks must also use the same private DNS zone.
Note
This scenario uses the Azure SQL Database-recommended private DNS zone. For other services, you can adjust the model using the following reference: Azure services DNS zone configuration.
To configure properly, you need the following resources:
On-premises network
Virtual network connected to on-premises
Azure Private Resolver
Private DNS zones privatelink.database.windows.net with type A record
Private endpoint information (FQDN record name and private IP address)
The following diagram shows the DNS resolution for both networks, on-premises and virtual networks. The resolution is using Azure Private Resolver.
The resolution is made by a private DNS zone linked to a virtual network:
Private DNS zone group
If you choose to integrate your private endpoint with a private DNS zone, a private DNS zone group is also created. The DNS zone group has a strong association between the private DNS zone and the private endpoint. It helps with managing the private DNS zone records when there's an update on the private endpoint. For example, when you add or remove regions, the private DNS zone is automatically updated with the correct number of records.
Previously, the DNS records for the private endpoint were created via scripting (retrieving certain information about the private endpoint and then adding it on the DNS zone). With the DNS zone group, there's no need to write any extra CLI/PowerShell lines for every DNS zone. Also, when you delete the private endpoint, all the DNS records within the DNS zone group are deleted.
In a hub-and-spoke topology, a common scenario allows the creation of private DNS zones only once in the hub. This setup permits the spokes to register to it, instead of creating different zones in each spoke.
Note
- Each DNS zone group can support up to five DNS zones.
- Adding multiple DNS zone groups to a single Private Endpoint isn't supported.
- Delete and update operations for DNS records can be seen performed by Azure Traffic Manager and DNS. This is a normal platform operation necessary for managing your DNS Records.