Private Endpoints and DNS in Azure

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 มิ.ย. 2024
  • Private Endpoints in Azure provide a secure way to access resources over the private, internal network. But the options for configuring DNS for Private Endpoints is not as straight forward. This video goes over the options available for DNS with Private Endpoints. We start by crating a storage account with a Private Endpoint, the review the default DNS configuration. We look at The WireServer and how it can be used with a Conditional Forwarder as well as using Forward Lookup Zones for name resolution.
    00:00 - Start
    01:08 - Create a Private Endpoint
    03:48 - View DNS
    05:24 - WireServer
    06:31 - Conditional Forwarder
    10:59 - Forward Lookup Zones
    Links:
    Zero to Hero with Azure Virtual Desktop
    www.udemy.com/course/zero-to-...
    Hybrid Identity with Windows AD and Azure AD
    www.udemy.com/course/hybrid-i...
    Two Azure IP Addresses You Should Know
    • Two Azure IP Addresses...
    Blog Post
    www.ciraltos.com/private-endp...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 58

  • @makeitcloudy
    @makeitcloudy 2 ปีที่แล้ว +2

    Brilliant, thank you for making it available in udemy and here ! Amazing stuff

  • @y.e.2103
    @y.e.2103 ปีที่แล้ว +2

    One of the best explanations about private Links and DNS I have seen. Thanks

  • @dinakhaled96
    @dinakhaled96 ปีที่แล้ว +1

    thanks alot Travis! you made everything clear, can`t thank you enough! Please keep this great explanation for all storage topics

  • @nealpan
    @nealpan ปีที่แล้ว

    Awesome, keep up the good work! Looking forward to seeing more contents on Azure Networking aspects. Thank you!

  • @islamtoghuj
    @islamtoghuj ปีที่แล้ว +1

    Your explanations are short and precise. Thank you.

  • @allenbythesea
    @allenbythesea 6 หลายเดือนก่อน

    Really like these videos. Very straightforward and I don't have to sit through a bunch of information that doesn't matter.

  • @billcashkanov9428
    @billcashkanov9428 9 หลายเดือนก่อน

    Thank you Travis. I struggled with this for a while, you made it happen! Thanks

  • @jingbing8943
    @jingbing8943 ปีที่แล้ว +1

    fantastic, we have struggled for a while!!!

  • @TheJacMos
    @TheJacMos 6 หลายเดือนก่อน

    Wow, another amazing video. To the point, 100% accurate. Well done!

  • @hanifaz
    @hanifaz ปีที่แล้ว

    What a great video! thank you. There was always that confusion about DNS setup with Private Endpoints.

  • @lionelmasoane391
    @lionelmasoane391 ปีที่แล้ว

    your Azure videos are so informative. I couldn't help myself to be your Channel subscriber.

  • @johnthompson3530
    @johnthompson3530 2 ปีที่แล้ว

    Thanks Travis. Brilliant video, which explained things perfectly.

  • @manuelignacio6772
    @manuelignacio6772 ปีที่แล้ว

    Perfect explanation! Thank you so much! Amazing job, best wishes for you!

  • @scottclark1913
    @scottclark1913 ปีที่แล้ว +7

    It would be amazing if you did a video on how to use todays Azure Private DNS Revolvers along with DNS forwarding rulesets to access private link endpoints from on prem via VPN.

  • @alemelo8636
    @alemelo8636 2 ปีที่แล้ว +1

    Tip: To complete this, set a Firewall rule outbound to private link internal ip/port. Finally, use psping to test this. Works for me!!!

  • @johnozarchuk2128
    @johnozarchuk2128 ปีที่แล้ว

    Saved the day today when I was in a pinch. Thanks sir!

  • @alangzzl
    @alangzzl 2 ปีที่แล้ว +1

    Thank you, excelent explanation!

  • @parveenverma3645
    @parveenverma3645 ปีที่แล้ว

    Great video and clear explanation 👌

  • @jingbing8943
    @jingbing8943 ปีที่แล้ว +1

    Amazing Stuff!!!

  • @raydavis3697
    @raydavis3697 6 หลายเดือนก่อน

    Good Video Travis.

  • @ExpertInvisible
    @ExpertInvisible 2 ปีที่แล้ว

    Excellent. Very useful video.

  • @netdevilzzz
    @netdevilzzz 2 หลายเดือนก่อน

    Travis made things easy!

  • @praveentalluri7911
    @praveentalluri7911 6 หลายเดือนก่อน

    Brilliant,Thanks for making this video

  • @Gonzalo_Cloud
    @Gonzalo_Cloud ปีที่แล้ว

    Perfectly explained. Thanks

    • @Ciraltos
      @Ciraltos  ปีที่แล้ว

      Glad it was helpful!

  • @betoemihtevas
    @betoemihtevas 7 หลายเดือนก่อน

    amazing video thanks this help me a lot with labs and understanding.

    • @Ciraltos
      @Ciraltos  7 หลายเดือนก่อน

      Glad it helped!

  • @dongxue3909
    @dongxue3909 ปีที่แล้ว

    Very nice. Thank you!

  • @christianibiri
    @christianibiri 2 ปีที่แล้ว

    thank you! great explanation :)

    • @Ciraltos
      @Ciraltos  2 ปีที่แล้ว

      Glad it was helpful!

  • @AadamW
    @AadamW 2 ปีที่แล้ว

    Thanks, keep it up.

  • @mrindia2574
    @mrindia2574 3 หลายเดือนก่อน

    Thanks a lot

  • @HellBoysummer
    @HellBoysummer หลายเดือนก่อน

    Hey Travis. Great video. I watch all your videos. I have a question. If you want a GLOBAL DNS (for on premise and azure network using the same DNS SERVER). The best aproach would be the FORWARD LOOKUP ZONES. Right?
    Thank you.

  • @ventin75
    @ventin75 ปีที่แล้ว

    Would love to see a video on how to use private endpoint to do backup of Azure vm

  • @Southpaw07
    @Southpaw07 ปีที่แล้ว +3

    Thanks Travis. i am curious if azure dns private resolver would work in a similar scenario where on-premises AD/clients require resolution to private endpoints in azure?

    • @Ciraltos
      @Ciraltos  ปีที่แล้ว +1

      I believe so and have that on a short list for an upcoming video. One thing to note that I found after initial research is that a private resolvers are more expensive then a small VM.

  • @zackbouz8891
    @zackbouz8891 ปีที่แล้ว

    Thanks!

    • @Ciraltos
      @Ciraltos  ปีที่แล้ว

      Thank you! Be sure to check out the recent videos on DNS Private Resolver.

  • @beeblay21
    @beeblay21 4 หลายเดือนก่อน +1

    Do you have a video dealing with P2S VPN accessing a Azure File Share? I'm in a situation where I just need the individual Windows clients connecting to an AFS via Azure P2S VPN. I have the File Share and P2S VPN setup (Thanks for your video on P2S), but I'm confused what I need in order to facilitate client access to the share over the VPN. I assume I need to spin up a DNS server in Azure and have the VPN configured to use that as it's dns server?

  • @SRizvi-pl5wg
    @SRizvi-pl5wg ปีที่แล้ว

    Travis, Is there any kind of script or tool we can add these FQDN without adding these maul process? what about Terraform and BICEP ?

  • @SRizvi-pl5wg
    @SRizvi-pl5wg ปีที่แล้ว

    As always Travis your doing a great jobs by clearing confusions around on perm and az dns connectivity. Keep up the great work!
    How about the Az Traffic Manger can we integrate to private link or no?

  • @nowfal3920
    @nowfal3920 ปีที่แล้ว

    at 9:30, why is it that the second vnet is unable to resolve the file endpoint url? if not private dns zone, the public dns zone should be able to resolve the end point url to the public ip address, right?

  • @sebastienroux1669
    @sebastienroux1669 2 ปีที่แล้ว +1

    Hey, the problem you mention around 10:00, would it still be a problem if the two Vnets were peered ?

    • @chaozkreator
      @chaozkreator 2 ปีที่แล้ว +1

      +1 on this question. If the VNETs are peered, it would make sense for them to be able to have a route to the private endpoints.

  • @mahadsaid7786
    @mahadsaid7786 2 ปีที่แล้ว

    Does the customer DNS DC have to be in the VNET as the PEP?

  • @aftabahmad5824
    @aftabahmad5824 5 หลายเดือนก่อน

    Great, I have only one question. Can we make conditional forwarding in Windows 10/11? If it cannot be done then Azure VPN Client is useless in Windows 10/11.

  • @LyubomirDimitrovSilverbackbg
    @LyubomirDimitrovSilverbackbg ปีที่แล้ว

    What if we have multiple Virtual Machines, who need to access one storage account, using a private endpoint?
    How will you configure the Private DNS zone, when multiple Private End Points are connecting different Virtual networks to a single Azure Service (e.g. Azure SQL Server)?
    The private DNS explicitly warns us to not integrate multiple endpoints connecting to the same Service.

  • @provenmethods4u
    @provenmethods4u 9 หลายเดือนก่อน

    Great video anyone? Y when our users connect to azure VPN it connects to AD sites instead of Azure DC?

  • @ncvman
    @ncvman 2 ปีที่แล้ว

    Using a conditional forward to wire server doesn’t really make sense to use. Great video.

  • @lk-777-me
    @lk-777-me ปีที่แล้ว

    DC on premises with S2S VPN is much more challenging.

  • @packraftprasant3619
    @packraftprasant3619 3 วันที่ผ่านมา

    How can I integrate DNS proxy if I am using AD integrated DNS with proxy which points to the AD DNS hosted on the cloud. Will it cause the loop>

  • @amelkalidas3463
    @amelkalidas3463 2 ปีที่แล้ว

    Hi Traviz, I have 20+ subscription to manage and i would like to setup something to monitor the drain mode status of the Session host in the hostpoool in each subscription. Could you point out some setups ?

  • @bobbysega3839
    @bobbysega3839 11 หลายเดือนก่อน

    You seem to have missed out the obvious solution to this which is Private DNS Zones. This gets around the issue with Conditional Forwarders not being able to resolve Private Endpoints in other vNETs.
    Manually creating records for FWD Lookup zones isn't a feasible solution.

  • @theitpro4688
    @theitpro4688 10 วันที่ผ่านมา

    please d

  • @rn9085
    @rn9085 2 ปีที่แล้ว +2

    So this means I need to create multiple Forward Lookup Zones on my DNS?
    - privatelink.blob.core.windows.net
    - privatelink.file.core.windows.net
    - privatelink.queue.windows.net
    ......

    • @DylanBerry
      @DylanBerry ปีที่แล้ว

      Is that the case? I am trying to find a definitive answer.

    • @rn9085
      @rn9085 ปีที่แล้ว

      @@DylanBerry Yeah unfortunately it is. What is even worth, that some of these zones change and MS also adds new ones.

    • @mcdonamw
      @mcdonamw ปีที่แล้ว +1

      Yes. This is extremely annoying. Every resource type seems to have its own domain zone as well so we're ending up with an untold number of *manually configured* conditional forwarders on our DNS servers.
      Also, since these forwarders are set for the domain used for public endpoints, we're now adding failure points in our dns system. Where we'd be querying Azure public/highly available DNS servers, we're now forcing all this resolution to a private VM we must maintain in the vnet (even to resolve public endpoints for other companies hosting in Azure as well).