Share via

internal DNS zone for Container Apps is not being injected into my VNet

DT 0 Reputation points
2026-03-12T16:55:04.4+00:00

Hi there, Azure Container Apps Environments deployed with internal ingress are not injecting the required internal DNS zone into the VNet. As a result, no internal FQDNs resolve from any VM inside the same VNet, even though the environment and container apps deploy successfully and show internal ingress endpoints in the portal.

This issue persists across multiple new environments, multiple new subnets with no custom networking.

Would greatly appreciate help here.

Some additional details:

  1. Container Apps Environment created with:
    • Public access disabled
    • VNet integration enabled
    • Internal load balancer assigned (private VIP)
  2. Container App created with:
    • Ingress enabled
    • Traffic limited to Container Apps Environment
    • Internal FQDN generated, e.g.: https://mancont312.internal.bravewater-d9e2aebd.eastus2.azurecontainerapps.io/
  3. From a VM in the same VNet using Azure DNS (168.63.129.16), DNS resolution fails: nslookup internal.eastus2.azurecontainerapps.io → NXDOMAIN The root zone (internal.eastus2.azurecontainerapps.io) does not exist, which indicates the internal DNS zone was never injected into the VNet.
Azure Container Apps
Azure Container Apps

An Azure service that provides a general-purpose, serverless container platform.


1 answer

Sort by: Most helpful
  1. Praveen Kumar Gudipudi 2,275 Reputation points Microsoft External Staff Moderator
    2026-04-06T08:42:54.0866667+00:00

    Hi @DT ,

    Azure Container Apps automatically manages DNS for the default *.azurecontainerapps.io domain. You do not need to manually create a Private DNS zone.

    If VMs in the same VNet cannot resolve the internal FQDN, check:

    • Whether the VNet uses Azure DNS (168.63.129.16) or a custom DNS server.
    • If using custom DNS, ensure queries for *.azurecontainerapps.io are forwarded to 168.63.129.16.
    • Verify that no Private DNS zone exists that overrides azurecontainerapps.io or internal.<region>.azurecontainerapps.io.
    • Ensure NSGs or firewalls allow DNS traffic to 168.63.129.16.

    Please accept as answer and do a Thumbs-up to upvote this response if you are satisfied with the community help. Your upvote will be beneficial for the community users facing similar issues.

     

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.