Skip to content

On-prem systems can't resolve cloud names and vice versa

Route 53 Resolver, Azure Private DNS Resolver, and Cloud DNS managed zones with inbound/outbound forwarders are the right layer. Every cloud has it, naming differs.

Try this first

  1. 1AWS: Route 53 Resolver with inbound endpoint (on-prem -> AWS), outbound endpoint (AWS -> on-prem) plus forwarding rules per domain.
  2. 2Azure: Azure Private DNS Resolver with inbound and outbound endpoints. Combine with Private DNS zones for cloud services.
  3. 3GCP: Cloud DNS Inbound DNS forwarding for on-prem -> GCP, Outbound forwarding via Cloud DNS managed zone forwarding rules.
  4. 4Configure over your VPN or Direct Connect / ExpressRoute / Interconnect, not over public internet. DNS over public internet is a security mistake.
  5. 5Test bidirectional: nslookup from on-prem to cloud resource and the other way. Don't forget reverse lookup if you want SSH by name.

When to bring us in

For a hybrid setup with multiple on-prem locations, conditional forwarding and split-DNS, this really is a network-architect job. Half-done is worse than undone here.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.