Skip to content

Az.DnsResolver with peered vnets in a separate tenant #20158

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
dingmeng-xue opened this issue Nov 17, 2022 Discussed in #20098 · 3 comments
Open

Az.DnsResolver with peered vnets in a separate tenant #20158

dingmeng-xue opened this issue Nov 17, 2022 Discussed in #20098 · 3 comments
Labels
customer-reported Network - DNS question The issue doesn't require a change to the product in order to be resolved. Most issues start as that Service Attention This issue is responsible by Azure service team.

Comments

@dingmeng-xue
Copy link
Member

Discussed in #20098

Originally posted by AnikaAaron November 13, 2022
I was checking out the Az.DnsResolver PowerShell command "New-AzDnsForwardingRulesetVirtualNetworkLink" (and in the portal) and was noticing that I'm unable to create a virtual network link to a peered vnet that is a separate tenant. The peering has been up, and P2S vpn traffic flows. Created the rule set, but the subscriptions only show in the portal for a singular tenant. When attempting to pass the vnet resource ID (like when creating the initial cross tenant vnet peering) the PowerShell command fails with a permission issue "however the current tenant
'XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXX' is not authorized to access linked subscription".
Is cross tenant dns not available at this time?

@dingmeng-xue dingmeng-xue added Network - DNS question The issue doesn't require a change to the product in order to be resolved. Most issues start as that customer-reported CXP Attention [Deprecated] The Azure CXP Support Team is responsible for this issue. labels Nov 17, 2022
@ghost
Copy link

ghost commented Nov 17, 2022

Thank you for your feedback. This has been routed to the support team for assistance.

@tspearconquest
Copy link

We are also interested in this as we have 2 isolated tenants and need to manage DNS for both from a single tenant.

@PramodValavala-MSFT PramodValavala-MSFT added Service Attention This issue is responsible by Azure service team. and removed CXP Attention [Deprecated] The Azure CXP Support Team is responsible for this issue. labels Sep 28, 2023
@microsoft-github-policy-service
Copy link
Contributor

Thanks for the feedback! We are routing this to the appropriate team for follow-up. cc @dnssuppgithub.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
customer-reported Network - DNS question The issue doesn't require a change to the product in order to be resolved. Most issues start as that Service Attention This issue is responsible by Azure service team.
Projects
None yet
Development

No branches or pull requests

3 participants