Skip to content

Files

Latest commit

915ef0c · Jun 3, 2022

History

History
133 lines (92 loc) · 7.61 KB

dns-private-resolver-overview.md

File metadata and controls

133 lines (92 loc) · 7.61 KB
title description services ms.custom author ms.service ms.topic ms.date ms.author
What is Azure DNS Private Resolver?
In this article, get started with an overview of the Azure DNS Private Resolver service.
dns
references_regions
greg-lindsay
dns
overview
06/02/2022
greglin

What is Azure DNS Private Resolver?

Azure DNS Private Resolver is a new service that enables you to query Azure DNS private zones from an on-premises environment and vice versa without deploying VM based DNS servers.

Important

Azure DNS Private Resolver is currently in public preview.

How does it work?

Azure DNS Private Resolver requires an Azure Virtual Network. When you create an Azure DNS Private Resolver inside a virtual network, one or more inbound endpoints are established that can be used as the destination for DNS queries. The resolver's outbound endpoint processes DNS queries based on a DNS forwarding ruleset that you configure. DNS queries that are initiated in networks linked to a ruleset can be sent to other DNS servers.

The DNS query process when using an Azure DNS Private Resolver is summarized below:

  1. A client in a virtual network issues a DNS query.
  2. If the DNS servers for this virtual network are specified as custom, then the query is forwarded to the specified IP addresses.
  3. If Default (Azure-provided) DNS servers are configured in the virtual network, and there are Private DNS zones linked to the same virtual network, these zones are consulted.
  4. If the query doesn't match a Private DNS zone linked to the virtual network, then Virtual network links for DNS forwarding rulesets are consulted.
  5. If no ruleset links are present, then Azure DNS is used to resolve the query.
  6. If ruleset links are present, the DNS forwarding rules are evaluated.
  7. If a suffix match is found, the query is forwarded to the specified address.
  8. If multiple matches are present, the longest suffix is used.
  9. If no match is found, no DNS forwarding occurs and Azure DNS is used to resolve the query.

The architecture for Azure DNS Private Resolver is summarized in the following figure. DNS resolution between Azure virtual networks and on-premises networks requires Azure ExpressRoute or a VPN.

Azure DNS Private Resolver architecture

Figure 1: Azure DNS Private Resolver architecture

For more information about creating a private DNS resolver, see:

Azure DNS Private Resolver benefits

Azure DNS Private Resolver provides the following benefits:

  • Fully managed: Built-in high availability, zone redundancy.
  • Cost reduction: Reduce operating costs and run at a fraction of the price of traditional IaaS solutions.
  • Private access to your Private DNS Zones: Conditionally forward to and from on-premises.
  • Scalability: High performance per endpoint.
  • DevOps Friendly: Build your pipelines with Terraform, ARM, or Bicep.

Regional availability

Azure DNS Private Resolver is available in the following regions:

  • Australia East
  • UK South
  • North Europe
  • South Central US
  • West US 3
  • East US
  • North Central US
  • Central US EUAP
  • East US 2 EUAP
  • West Central US
  • East US 2
  • West Europe

DNS resolver endpoints

Inbound endpoints

An inbound endpoint enables name resolution from on-premises or other private locations via an IP address that is part of your private virtual network address space. This endpoint requires a subnet in the VNet where it’s provisioned. The subnet can only be delegated to Microsoft.Network/dnsResolvers and can't be used for other services. DNS queries received by the inbound endpoint will ingress to Azure. You can resolve names in scenarios where you have Private DNS Zones, including VMs that are using auto registration, or Private Link enabled services.

Outbound endpoints

An outbound endpoint enables conditional forwarding name resolution from Azure to on-premises, other cloud providers, or external DNS servers. This endpoint requires a dedicated subnet in the VNet where it’s provisioned, with no other service running in the subnet, and can only be delegated to Microsoft.Network/dnsResolvers. DNS queries sent to the outbound endpoint will egress from Azure.

Virtual network links

Virtual network links enable name resolution for virtual networks that are linked to an outbound endpoint with a DNS forwarding ruleset. This is a 1:1 relationship.

DNS forwarding rulesets

A DNS forwarding ruleset is a group of DNS forwarding rules (up to 1,000) that can be applied to one or more outbound endpoints, or linked to one or more virtual networks. This is a 1:N relationship.

DNS forwarding rules

A DNS forwarding rule includes one or more target DNS servers that will be used for conditional forwarding, and is represented by:

  • A domain name,
  • A target IP address,
  • A target Port and Protocol (UDP or TCP).

Restrictions:

Virtual network restrictions

The following restrictions hold with respect to virtual networks:

  • A DNS resolver can only reference a virtual network in the same region as the DNS resolver.
  • A virtual network can't be shared between multiple DNS resolvers. A single virtual network can only be referenced by a single DNS resolver.

Subnet restrictions

Subnets used for DNS resolver have the following limitations:

  • A subnet must be a minimum of /28 address space or a maximum of /24 address space.
  • A subnet can't be shared between multiple DNS resolver endpoints. A single subnet can only be used by a single DNS resolver endpoint.
  • All IP configurations for a DNS resolver inbound endpoint must reference the same subnet. Spanning multiple subnets in the IP configuration for a single DNS resolver inbound endpoint is not allowed.
  • The subnet used for a DNS resolver inbound endpoint must be within the virtual network referenced by the parent DNS resolver.

Outbound endpoint restrictions

Outbound endpoints have the following limitations:

  • An outbound endpoint can't be deleted unless the DNS forwarding ruleset and the virtual network links under it are deleted.

Ruleset restrictions

  • Rulesets can have no more than 25 rules in Public Preview.
  • Rulesets can't be linked across different subscriptions in Public Preview.

Other restrictions

  • IPv6 enabled subnets aren't supported in Public Preview.

Next steps