Configuring Azure private DNS entries for NSX Public Cloud Gateway
search cancel

Configuring Azure private DNS entries for NSX Public Cloud Gateway

book

Article ID: 325107

calendar_today

Updated On:

Products

VMware NSX Networking

Issue/Introduction

This article provides information on how to configure Azure private DNS for PCGs prior to VMware NSX-T Data Center 3.1.0.

Starting with VMware NSX-T Data Center 3.1.0, Azure private DNS for PCGs are configured automatically by the product.

Environment

VMware NSX-T Data Center 3.x
VMware NSX-T Data Center

Resolution

Identify the NSX created Azure Resource Group (RG) for the VNET in which the PCGs are created (nsx-gw-<VNET-GUID>-rg) and the corresponding Azure subscription ID.

Create private DNS zone

For every transit VNET:
  1. Search for "Private DNS Zones" in Azure portal and open the "Overview" page.
  2. Click "Add" and fill in the following details:

    a. Select the VNET subscription and resource group identified earlier from the drop-downs.
    b. Enter Name as "vmware.local".
    c. Click on "Review+Create" and review the information, then click "Create".

Create private DNS zone records

For every new PCG deployed in the VNET:
  1. Open the private DNS zone (vmware.local) resource created in the VNET's RG.
  2. Click "Add Record Set" and fill in the following details:

    a. Enter Name as "nsx-gw".
    b. Choose Type as "A".
    c. Enter TTL as "0".
    d. Enter IP address as PCG's (primary, secondary or both) private IP address.
    e. Click "OK" to create the record.

Add Virtual Network Link

For every transit and compute VNET managed by the PCGs in the VNET:
  1. Open the private DNS zone (vmware.local) resource created in the VNET's RG.
  2. Select "Virtual network links" and click "Add" and fill in the following details:

    a. Enter Link name as VNET name.
    b. Select the subscription and the Virtual Network, then click OK.