0

I would appreciate any help with the proper set up of On-premises workloads using a DNS forwarder in Azure. I've followed the link below and have it works for my on-prem network to connect to the resources that have private end points int the VNET in Azure. What does not work is if we try to connect to other resources that have private end points but we want to connect to through their public endpoints.

Example: We have a resource secnetwork1.blob.core.windows.net that we have a private endpoint for and our on-prem DNS server forwards traffic to a VPN linked VNET. Everything works fine, we get the expected 10.X.X.X address returned instead of the public address. We want to connect to a different someothercompanies.blob.core.windows that is not part of our network. When our on-prem resources look for that they get the following response from a nslookup:

nslookup someothercompanies.blob.core.windows.net 
Server:     168.63.129.16
Address:    168.63.129.16#53
Non-authoritative answer:
someothercompanies.blob.core.windows.net    canonical name = someothercompanies.privatelink.blob.core.windows.net.
** server can't find someothercompanies.privatelink.blob.core.windows.net: NXDOMAIN
Link: https://learn.microsoft.com/en-us/azure/private-link/private-endpoint-dns#on-premises-workloads-using-a-dns-forwarder

It is my thought that even though we have a private end point with a private link set up and a DNS forwarder we should still be able to talk to other companies blobs that are open to the internet, even if that company has a private endpoint and private link set up for its own internal use. Imagine we are getting data from a 3rd party company and that company delivers it via a blob that they have an internal private endpoint and private link setup to access internally for their own use. My guess is that our DNS forwards are not set up correct.

Lastly I've set up a github repo that mocks up this issue using terraform here: https://github.com/westridgegroup/wrg-terraform-networking

Steve Fibich
  • 314
  • 1
  • 2
  • 7

1 Answers1

0

Once reading this statement on MS website I believe what I was trying to accomplish is impossible. "Private networks already using the private DNS zone for a given type, can only connect to public resources if they don't have any private endpoint connections, otherwise a corresponding DNS configuration is required on the private DNS zone in order to complete the DNS resolution sequence."

MS Link: https://learn.microsoft.com/en-us/azure/private-link/private-endpoint-dns#azure-services-dns-zone-configuration

Steve Fibich
  • 314
  • 1
  • 2
  • 7