DNS sharing planning considerations
Before you configure DNS sharing for VPE gateways, make sure that you review the following considerations.
VPC Hub considerations
Review the following planning considerations for the hub VPC:
- It's important to ensure you establish connectivity between the hub VPC and DNS-shared VPCs. IBM Cloud does not manage or validate connectivity.
- You can designate a VPC as a hub when you create a VPC, or any time after it's created. When you designate a VPC as a hub, it cannot have any DNS resolution bindings.
- You can create more than one hub VPC in an account, as long as you don't have overlapping DNS-shared VPCs.
- You can't delete the hub VPC if it has DNS resolution bindings to DNS-shared VPCs.
- You can only initiate the creation of a DNS resolution binding from a DNS-shared VPC.
- Only an authorized user can delete the DNS resolution binding from a hub VPC and a DNS-shared VPC. To delete the DNS resolution binding from a hub VPC, the user must be assigned the
is.vpc.dns-resolution-binding.deleteandis.vpc.dns-resolution-binding.disconnectIAM actions. You can assign the user with theDNSBindingConnectoraccess policy and Administrator or Editor platform roles.
Limitations when configuring DNS sharing for VPE gateways
Review the following limitations before you configure DNS sharing for VPE gateways:
- The DNS hub VPC and DNS-shared VPCs must be in the same region. There is no support for DNS-shared VPCs in a remote region.
- VPEs on the DNS hub VPC are always shared with their associated DNS-shared VPCs. You must configure all VPEs on the DNS hub with
allow_dns_resolutionenabled before the VPC can be enabled as a DNS hub. - IBM Cloud does not manage or control on-prem DNS servers; customers must ensure on-prem servers point to the hub or spoke custom resolver as needed.
- When the hub VPC has DNS resolution bindings to DNS-shared VPCs, you cannot disable it as a DNS hub or delete the VPC.
- A DNS-shared VPC can only be associated to a single hub.
- Zone affinity is not supported for a custom resolver when it has multiple addresses. One custom resolver address always becomes the primary DNS address for all availability zones for this VPC.
- You cannot disable or delete the custom resolver on the DNS hub VPC as long as it is in use.
- Timing requirement for binding operations: creating, deleting, enabling, or disabling DNS resolution bindings, including endpoint gateway binding changes, might fail if the operation completes in under 5 minutes. To avoid failure, ensure these operations take longer than 6 minutes.
- If you remove and recreate the same VPE on any combination of hub or DNS-shared VPCs within a span of 5 minutes, the creation of the VPE might fail.
Local-access VPE planning considerations
Select availability
When deploying local-access VPEs in a DNS-shared VPC:
- Configure DNS sharing before you create a local-access endpoint gateway. If you already have DNS sharing configured, no changes or migration are required to begin using a local-access endpoint gateway.
- Verify the service supports VPE. Currently, only Cloud Object Storage is supported.
- Ensure that a VPE in the hub VPC exists for the service before creating a local-access VPE in the DNS-shared VPC.
- Check that the DNS-shared VPC has a DNS resolution binding to the hub.
- Each local-access VPE can be created with specific resource bindings, which must be unique across the overall topology.
- Each DNS-shared VPC can contain only one local-access VPE per resource within the service endpoint.
- Ensure resource bindings for the DNS-shared VPC VPE are configured on the target service.
- Traffic for a resource (for example, an Object Storage bucket) bound to the local-access VPE is routed directly between the shared VPC and resource, bypassing the DNS hub VPC.
- The hub-VPC VPE is required to remain in place as long as any local-access VPEs exist for the same service endpoint.
- If
allow_dns_resolution_bindingis disabled on a VPE, DNS records are not propagated between the hub and DNS-shared VPCs. - Make sure to update your CBR and security group rules to allow traffic from the appropriate DNS-shared VPC.
VPE mode and resource-binding rules
Select availability
This section outlines the different VPE modes and the rules for resource binding across various VPC configurations. Each VPE type has specific requirements regarding the VPE mode and whether resource binding is allowed. Understanding these rules is critical to ensuring proper network architecture and compliance with DNS-sharing policies. The following rules clarify which modes are permissible for each VPE type and the conditions under which resource bindings can be applied.
Note: A “standalone VPC VPE” is a VPE in a VPC that is not part of the DNS hub and shared VPC topology.
- Hub VPC VPE
- Hub VPC VPE should always be
primarymode only;per_resource_bindinganddisabledmodes are not allowed. - A hub-VPC VPE must exist for the service before creating any local-access VPE in a DNS-shared VPC.
- The hub-VPC VPE is required to remain in place as long as any local-access VPEs exist for the same service endpoint.
- Hub VPC VPE should always be
- Standalone VPC VPE
- Standalone VPC VPE can have
disabledas the mode and have resource bindings. - Standalone VPC VPE can have
primaryas the mode and no resource bindings. - Standalone VPC VPE can have
per_resource_bindingas the mode and resource binding allowed.
- Standalone VPC VPE can have
- DNS-shared VPC VPE
- DNS-shared VPC VPE can have
primaryas the mode and no resource bindings. - DNS-shared VPC VPE can have
disabledas the mode and still have resource bindings. - DNS-shared VPC VPE can have
per_resource_bindingas the mode and resource binding allowed.
- DNS-shared VPC VPE can have