This solution, offered by the Open-Source community, will no longer receive contributions from Microsoft. Customers are encouraged to transition to Microsoft Azure Verified Modules for continued support and updates from Microsoft. Please note, this repository is scheduled for decommissioning and will be removed on July 1, 2025.
Describe the bug
We deployed the privatelink.monitor.azure.com private dns zone and attached it to our hub vnets. This caused an issue with resolving dc.services.visualstudio.com from landing zones, as shown by this screenshot:
Apparently, this is a known issue by the azure monitor team (which requires us to attach this private zone to spoke vnets) as shown here:
This is not possible in the contexte of our enterprise-scale deployment.
Indeed, we configured our spoke vnets to use the hub's azure firewall as a dns resolver, which in turn redirects dns requests to dedicated vms in the hub vnet that can resolve on premise networks as well.
Since the vms are using azure custom dns for non-onpremise targets (i.e. 168.63.129.16), we ended up having this dns resolution path on few fqdns (which the dns resolution path includes azure monitor).
As this private link zone is deployable through the module, this will lead to the same incident for those who deploy it.
Describe the bug We deployed the
privatelink.monitor.azure.com
private dns zone and attached it to our hub vnets. This caused an issue with resolvingdc.services.visualstudio.com
from landing zones, as shown by this screenshot:Apparently, this is a known issue by the azure monitor team (which requires us to attach this private zone to spoke vnets) as shown here:
This is not possible in the contexte of our enterprise-scale deployment.
Indeed, we configured our spoke vnets to use the hub's azure firewall as a dns resolver, which in turn redirects dns requests to dedicated vms in the hub vnet that can resolve on premise networks as well.
Since the vms are using azure custom dns for non-onpremise targets (i.e. 168.63.129.16), we ended up having this dns resolution path on few fqdns (which the dns resolution path includes azure monitor).
As this private link zone is deployable through the module, this will lead to the same incident for those who deploy it.