DNS experts:

Section 3.6 of 
https://datatracker.ietf.org/doc/draft-ietf-rtgwg-net2cloud-problem-statement/  
describes the DNS resolution behavior of enterprises' workloads hosted in Cloud 
DCs.

We really appreciate your feedback to this description.

----------
3.6 DNS Practices for Hybrid Workloads
DNS name resolution is essential for on-premises and cloud-based resources. For 
customers with hybrid workloads, which include on-premises and cloud-based 
resources, extra steps are necessary to configure DNS to work seamlessly across 
both environments.
Cloud operators have their own DNS to resolve resources within their Cloud DCs 
and to well-known public domains. Cloud's DNS can be configured to forward 
queries to customer managed authoritative DNS servers hosted on-premises and to 
respond to DNS queries forwarded by on-premises DNS servers.
For enterprises utilizing Cloud services by different cloud operators, it is 
necessary to establish policies and rules on how/where to forward DNS queries. 
When applications in one Cloud need to communicate with applications hosted in 
another Cloud, there could be DNS queries from one Cloud DC being forwarded to 
the enterprises' on-premises DNS, which in turn be forwarded to the DNS service 
in another Cloud. Configuration can be complex depending on the application 
communication patterns.
However, even with carefully managed policies and configurations, collisions 
can still occur. If you use an internal name like .cloud and then want your 
services to be available via or within some other cloud provider which also 
uses .cloud, then collisions might occur. Therefore, it is better to use the 
global domain name even when an organization does not make all its namespace 
globally resolvable. An organization's globally unique DNS can include 
subdomains that cannot be resolved outside certain restricted paths, zones that 
resolve differently based on the origin of the query, and zones that resolve 
the same globally for all queries from any source.
Globally unique names do not equate to globally resolvable names or even global 
names that resolve the same way from every perspective. Globally unique names 
can prevent any possibility of collisions at present or in the future, and they 
make DNSSEC trust manageable. Consider using a registered and fully qualified 
domain name (FQDN) from global DNS as the root for enterprise and other 
internal namespaces.

Thank you very much
Linda Dunbar

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to