An Azure service that enables hosting Domain Name System (DNS) domains in Azure.
Hello **Usman Rasheed
**It seems you want all your on-premises users connected via VPN to automatically resolve your private Databricks workspace endpoint, without having to update DNS settings on each PC. Azure DNS Private Resolver is a strong solution for this scenario. Here’s a high-level overview and responses to your specific questions:
Can Azure Private DNS Resolver be used so that all on-premises users connected through VPN can automatically resolve the private Azure Databricks endpoint?
Yes, you can deploy a DNS Private Resolver in Azure, typically within a “hub” VNet. Set up an inbound endpoint and configure your on-premises DNS servers to forward queries for the Databricks private link domain (privatelink.azuredatabricks.net) to this endpoint.
When on-premises clients request .azuredatabricks.net, your central DNS forwards those queries to the Resolver’s inbound IP, which returns the private IP address assigned by the Databricks private endpoint.
Is it possible to achieve this without changing DNS settings on each client machine?
Absolutely. End users should keep using the corporate DNS server IPs provided through DHCP or group policy. Only your central on-prem DNS requires a conditional forwarder for the Databricks private-link zone pointing to the Azure Resolver inbound endpoint. There’s no need for hosts file changes or DNS adjustments on individual PCs.
What is the recommended Azure architecture for this setup?
You can deploy the Azure private DNS resolver in the Azure Hub VNET and set up an inbound IP for the resolver. If you are using a custom DNS server in the private DNS resolver VNET, you need to configure a simple forwarder pointing to the Azure DNS IP (168.63.129.16). If you are using Azure DNS, no modifications are needed. The same applies to the private endpoint VNET (Spoke VNET); if you use a custom DNS server, you should set up a forwarder, either for both or at the VNET level, as required.
All VNETs must be linked to the private DNS zone, as this is mandatory. Once everything is configured in Azure, you need to set up a conditional forwarder on your on-prem DNS server machine, pointing to the Azure DNS resolver inbound IP. When you access the Databricks URL, the first request will go to the private DNS resolver and then route to your Databricks environment.
Check the document for more understanding: https://github.com/msrini-MSFT/Troubleshooting-Private-Link-DNS-Scenarios?tab=readme-ov-file#scenario-2---if-your-source-machine-is-deployed-on-premises-other-cloud
Do I only need to configure forwarding on the central on-premises DNS server so that all users inherit the configuration automatically?
Yes, if you are using a site-to-site setup, all users connect to the same network with the same DNS server. On the DNS server machine, you can configure a conditional forwarder that points to the private DNS resolver's inbound IP.
On-prem DNS → Conditional forwarder for privatelink.azuredatabricks.net → Azure Resolver inbound IP(s). Clients just use your on-prem DNS as usual.
If Azure Private DNS Resolver is the correct solution, how should the inbound endpoint, outbound endpoint, and DNS forwarding rules be configured for private access to Azure Databricks?
- Once you configure the DNS resolver, it will assign an inbound IP. You can then set up a conditional forwarder on the on-premises DNS server. For example, configure the on-prem DNS conditional forwarder for *.privatelink.azuredatabricks.net to point to inbound IPs.
- Outbound Endpoint (this is optional unless Azure VMs need to resolve on-premises names): Set it up in the “outbound” subnet and link a DNS forwarding ruleset that directs on-premises domains or other suffixes to your on-prem DNS IPs.
- Link your Hub VNet outbound endpoint to the ruleset so that Azure-originated queries for on-premises names are directed outbound. Also, ensure the Private DNS zone for Databricks is attached to the Hub VNet so the Resolver can respond to those queries.
Check the below public documents for more understanding:
Create an Azure DNS Private Resolver using the Azure portal
Azure DNS Private Resolver endpoints and rulesets
Azure Private Endpoint private DNS zone values
I hope the above answer helps you! Please let us know if you have any further questions.
Please don't forget to "upvote" where the information provided will help you, this can be beneficial to other members of the community