Azure-docs: Multiple private endpoints and weird removal/rejection behavior

Created on 29 Jun 2020  Â·  4Comments  Â·  Source: MicrosoftDocs/azure-docs

Hi folks,

Imagine you have 1 storage account , 1 vnet with multiple subnets and decided to add 1 private endpoint to that storage account (10.3.1.4 ip , as shown in the picture below):

private endpoint_1

Then, you go to the private DNS zone and check the current A record for the endpoint to make sure that it's pointed to the just created endpoint:

private_endpoint_2

Now you want for some reason to add the second endpoint to the storage account (10.3.1.8 ip):

private_endpoint_3

And again we check the dns zone and notice that the record has been changed to the 10.3.1.8:

private_endpoint_4

Then, you realize that don't need the first endpoint (10.3.1.4;) and have to remove it from the storage account page, so the second endpoint only remains. Surprisingly, the removal or rejection of the first endpoint also clears the dns zone and removes the endpoint A record regardless the fact it's pointed to the second endpoint's IP. Actually, it does not matter which endpoint you delete/reject* and what subnets/vnets they belong to. The behavior would be the same - no A records in the zone*:

image

So, the user is REQUIRED to control manually Azure private DNS zone in case of multiple endpoints. Now I have to add a record set back for the 10.3.1.4 endpoint, for example.

Is it expected behavior? I can't understand the logic behind all this : 1) the record always points to the last added endpoint 2) removal of any configured endpoints clears the DNS zone records for the endpoint. Is it just a way of maintaining a single IP in order to meet this "For a single network using a common DNS server configuration, the recommended practice is to use a single private endpoint for a given private link resource to avoid duplicate entries or conflicts in DNS resolution." ? However, I checked a multiple networks setup and got the same behavior...

I would like to see updated docs on that.

Document Details

⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

Pri2 assigned-to-author private-linsvc product-question triaged

All 4 comments

Thanks for the feedback

According to guidance, using 2 private endpoints on the same network (Vnet) and the same private DNS zone is considered a misconfiguration.

It's generally a bad practice for DNS to use the same domain to resolve to more than a single IP address when not necessary, it could lead to unpredictable behavior on the route traffic will take within the private network leading to potentially some firewall or NSG not allowing an specific path.

Complete details on the guidance is included here:
https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns

@malopMSFT yeah, I see. but it's not clear after reading the docs. It's the main point. There is just a recommendation "For a single network using a common DNS server configuration, the recommended practice is to use a single private endpoint for a given private link resource to avoid duplicate entries or conflicts in DNS resolution". Why can't I just reject (not removal!) endpoint without resetting the entire private zone? Can you please point me out a quote that prohibits "2 endpoints on the same vnet is a misconfiguration"? May be just a short "Important.." section in the docs would resolve any misunderstandings...or even new portal deployment template verification to prevent such configuration

P.S. I fully understand the limits/dns limits and etc..Talking about docs and what portal allows me to create and add..Some consistency is needed (my 2 cents..I might be wrong). Thanks.

It's only a recommendation as we have a few customer's taking different approaches with different DNS servers on the same private network, those have custom handlers for resolution.

The quote is the same, basically DNS is a common area for a given domain.
"A single private DNS zone is required for this configuration. All client connections made from on-premises and peered virtual networks must also use the same private DNS zone."

Got it. Thanks.

Was this page helpful?
0 / 5 - 0 ratings

Related issues

Favna picture Favna  Â·  3Comments

spottedmahn picture spottedmahn  Â·  3Comments

Ponant picture Ponant  Â·  3Comments

bityob picture bityob  Â·  3Comments

behnam89 picture behnam89  Â·  3Comments