Build Private DNS Resolver configurations with forwarding rulesets and endpoints.
Last verified: May 2026
Build Private DNS Resolver configurations with inbound/outbound endpoints and forwarding rulesets.
Required Fields
namelocationvirtualNetworkIdforwardingRulesetsOutput will appear here...Azure DNS Private Resolver enables name resolution between on-premises networks, Azure private DNS zones, and forwarded external domains without deploying custom DNS servers. It consists of inbound endpoints (for on-premises to Azure resolution) and outbound endpoints (for Azure to on-premises resolution) with DNS forwarding rulesets that define which domains are forwarded to which DNS servers. Configuring the resolver requires specifying VNet integration, subnet delegation, endpoint IPs, and ruleset rules. This builder helps you assemble resolver configurations with correct subnet references, forwarding rules, and endpoint settings.
Your team is rolling out a hub-and-spoke topology across 8 spoke VNets that all need to resolve on-prem AD names AND Azure private DNS zones. Without Private Resolver, you'd need 2x redundant Windows DNS VMs in the hub forwarding to on-prem — adding $300/month + patching/HA management. The builder generates a Private Resolver config: 1 inbound endpoint (for on-prem to Azure resolution) + 1 outbound endpoint (for Azure to on-prem) + 1 ruleset forwarding `corp.local` to on-prem AD DNS, linked to all 8 spoke VNets. Total cost ~$288/month, fully managed, no patching required.
Azure DNS Private Resolver costs ~$0.20/hour per endpoint = ~$144/month per inbound or outbound endpoint. For most hub-and-spoke architectures with one inbound + one outbound endpoint, that's $288/month — dramatically cheaper than running 2x redundant Windows DNS VMs (~$300/month + ops time).
Inbound endpoint subnet MUST be delegated to Microsoft.Network/dnsResolvers and contain ONLY DNS resolver resources. Don't put VMs or other resources in that subnet. The delegation requirement is enforced strictly and trying to share the subnet with other resources fails confusingly.
When migrating from custom DNS VMs to Azure DNS Private Resolver, the cutover is the risky step. Test by adding the resolver as an additional DNS server first (so VMs can use either), validate resolution behavior, then remove the old DNS VMs. Skipping the parallel run almost always causes 30+ minutes of DNS-related outage.
The builder constructs Azure DNS Private Resolver configurations: resolver resource (with VNet binding), inbound endpoints (subnet delegation, IP config), outbound endpoints (subnet delegation), forwarding rulesets (with rules for specific domain forwarding to target DNS servers), and ruleset-to-VNet links. Output is generated as az network dns-resolver commands and Terraform azurerm_private_dns_resolver* resources.
Was this tool helpful?
Disclaimer: This tool runs entirely in your browser. No data is sent to our servers. Always verify outputs before using them in production. AWS, Azure, and GCP are trademarks of their respective owners.