Managing Azure DNS at Scale: From DNS Forwarders to Private DNS Resolver
5 min read

Introduction
DNS is a foundational service in any cloud architecture, but it becomes significantly more complex in hybrid environments. As organizations expand into Azure with hub-spoke networks, private endpoints, and on-premises integration, DNS design must evolve to handle scale, reliability, and maintainability.
This article walks through that evolution:
Traditional DNS forwarders and their limitations
Azure DNS Private Resolver
Inbound and outbound endpoints
DNS forwarding rulesets
Distributed vs centralized DNS architectures
Real-world hybrid resolution scenarios
The Traditional Approach: DNS Forwarders
In early Azure architectures, hybrid DNS resolution was typically achieved using custom DNS forwarder virtual machines.
Typical setup
On-premises DNS servers forward queries to DNS VMs in Azure
Azure VNets are configured to use these custom DNS servers
Conditional forwarding is manually configured
Challenges at Scale
This approach introduces several operational and architectural issues:
Operational overhead
DNS VMs require patching, monitoring, and backup
High availability must be designed and maintained
Scalability limitations
DNS traffic grows with workloads
Scaling requires manual intervention
Reliability concerns
DNS becomes dependent on VM availability
Misconfiguration can disrupt name resolution across environments
Complex hybrid resolution
- Managing Azure Private DNS zones alongside on-premises zones becomes difficult
These challenges led to the need for a managed, cloud-native solution.
Azure DNS Private Resolver
Azure DNS Private Resolver is a fully managed service that provides native DNS resolution between Azure and on-premises environments without requiring DNS VMs.
It enables:
On-premises systems to resolve Azure private DNS zones
Azure resources to resolve on-premises domains
Centralized DNS forwarding logic
This service integrates directly with Azure networking and removes the need for infrastructure management.
Core Components
Inbound Endpoint
An inbound endpoint allows DNS queries from external networks (such as on-premises) to enter Azure.
Key characteristics:
Receives DNS queries from on-premises DNS servers
Resolves Azure Private DNS zones and private endpoints
Deployed in a dedicated subnet
Purpose:
Enable on-premises systems to resolve Azure-hosted private resources.
Outbound Endpoint
An outbound endpoint allows Azure resources to resolve external domains, such as those hosted on-premises.
Key characteristics:
Sends DNS queries out of Azure
Works with DNS forwarding rulesets
Enables conditional forwarding
Purpose:
Enable Azure workloads to resolve on-premises DNS zones.
DNS Forwarding Rulesets
A DNS forwarding ruleset defines how DNS queries should be routed.
Each rule includes:
Domain name (e.g.,
corp.local)Target DNS server IP address
Rulesets can be:
Linked to multiple VNets
Centrally managed
Used to control DNS behavior at scale
This eliminates the need to configure DNS settings individually on each VNet.
DNS Architecture Patterns
Distributed DNS Architecture
In this model:
Azure VNets use the default Azure DNS service
A Private Resolver is deployed in a hub VNet
A forwarding ruleset is linked to spoke VNets
Flow:
A VM in a spoke VNet sends a DNS query
Azure DNS attempts to resolve it
If no match is found, the ruleset is evaluated
Matching queries are forwarded via the outbound endpoint
Key advantage:
Minimal configuration in spoke VNets and high scalability.

Centralized DNS Architecture
In this model:
VNets are configured to use a custom DNS server (inbound endpoint IP)
All DNS queries are sent to the hub
Flow:
A VM sends a DNS query
Query is directed to the inbound endpoint
Resolver processes the request using:
Private DNS zones
Forwarding rules
External resolution
Key advantage:
Centralized control and consistent DNS behavior.

Building a Scalable and Secure DNS Architecture with vWAN Hub
For enterprise-scale environments, especially those using Virtual WAN (vWAN), DNS design should align with centralized connectivity and security principles.

Recommended Design
Deploy a dedicated VNet for DNS
Host:
Private DNS Resolver
Inbound endpoint subnet
Outbound endpoint subnet
Connect this DNS VNet to the vWAN hub
Ensure connectivity to:
On-premises networks
Spoke VNets
Shared services
How it works
On-premises DNS forwards queries to inbound endpoint via vWAN hub
Azure VNets use rulesets linked to the resolver
Outbound endpoint routes DNS queries back to on-premises when required
Key Benefits
Scalability
DNS is decoupled into a dedicated VNet
Can support multiple regions and VNets
Security
Traffic flows through secured vWAN hub
Enables inspection and policy enforcement
Centralized control
- Single DNS control plane for entire environment
Separation of concerns
- DNS is isolated from application VNets
This model is particularly effective in large enterprises adopting hub-and-spoke with vWAN as the global transit hub.
Real-World Scenarios
Scenario 1: On-Premises VM Accessing Azure Storage via Private Endpoint
On-prem VM queries:
mystorageaccount.privatelink.blob.core.windows.netOn-prem DNS forwards to inbound endpoint
Private Resolver resolves using Azure Private DNS zone
Returns private IP
Traffic flows over private connectivity
Scenario 2: Azure VM Resolving On-Premises Application
Azure VM queries:
app.corp.localAzure DNS checks local zones (no match)
Ruleset forwards request via outbound endpoint
On-prem DNS resolves
Response returned to Azure VM
References
Azure DNS Private Resolver Architecture
https://learn.microsoft.com/en-us/azure/dns/private-resolver-architectureAzure DNS Private Resolver Overview and Design
https://learn.microsoft.com/en-us/azure/architecture/networking/architecture/azure-dns-private-resolverAzure DNS Management at Scale
https://www.youtube.com/watch?v=nVONXtEmZa8