Hub-and-spoke private DNS zone linking#305
Merged
johnstairs merged 3 commits intomainfrom Mar 31, 2026
Merged
Conversation
hansenms
approved these changes
Mar 31, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR adds support for hub-and-spoke VNet topologies when using private networking, and switches AKS private clusters to use a custom private DNS zone with a user-assigned managed identity.
Note there is a breaking change in this PR and existing AKS clusters using private networking will need to be deleted in order to upgrade.
Hub-and-spoke DNS VNet links
A new
cloud.additionalDnsVnetLinksconfiguration field allows users to specify additional VNets that should be linked to all Tyger-managed private DNS zones. This is essential for hub-and-spoke network architectures where a DNS resolver in the hub VNet needs to resolve Tyger's private endpoint addresses.Key behaviors:
privateNetworkingistrue, and that entries have the required fields.AKS custom private DNS zone
Previously, AKS private clusters used
PrivateDNSZone: "system", which places the DNS zone in the node resource group (MC_*) where Tyger cannot manage VNet links. This PR switches to a custom private DNS zone approach:<envName><hash>.privatelink.<region>.azmk8s.io(where<hash>is 8 hex chars from SHA-256 of subscription/resourceGroup/clusterName) to avoid cross-environment collisions.tyger-aksuser-assigned managed identity with Private DNS Zone Contributor and Network Contributor roles, which AKS requires to manage records in a custom DNS zone.PrivateDNSZone: "system"cannot be migrated; an error directs users to delete and recreate.Organization uninstall cleanup
deleteOrgPrivateLinkResourceshandles cleanup of per-organization private link resources duringtyger cloud uninstall:Documentation
Expanded the private networking section of the cloud installation guide with: