🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-104 Domain 4
Domain 4 — Module 5 of 5 100%
23 of 27 overall

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery
Domain 4: Implement and Manage Virtual Networking Premium ⏱ ~14 min read

Azure DNS & Load Balancers

Every web app needs a domain name, and every production workload needs to handle traffic across multiple servers. Learn how Azure DNS hosts your zones and how Azure Load Balancer distributes traffic at Layer 4.

What is Azure DNS?

☕ Simple explanation

Azure DNS is like a phone directory for the internet — hosted inside Azure.

When someone types “contoso.com” in a browser, DNS translates that name into an IP address. Azure DNS lets you host your domain’s phone directory (DNS zone) on Microsoft’s global network of name servers. You manage records (A records, CNAME records, MX records) from the Azure portal, CLI, or PowerShell.

Azure DNS also offers private DNS zones — a phone directory that only works inside your VNets. Perfect for name resolution between VMs without exposing names to the internet.

Azure DNS is a hosting service for DNS domains that provides name resolution using Microsoft’s global infrastructure. It supports both public DNS zones (internet-facing) and private DNS zones (VNet-internal resolution). Azure DNS uses anycast networking — queries are answered by the closest name server for low latency.

Azure DNS does NOT provide domain registration. You purchase a domain from a registrar and point its NS records to Azure DNS name servers. Azure DNS supports standard record types (A, AAAA, CNAME, MX, TXT, NS, SOA, SRV, CAA) plus alias records that can reference Azure resources directly.

DNS record types

Record TypePurposeExample
AMaps name to IPv4 addresswww -> 20.53.1.100
AAAAMaps name to IPv6 addresswww -> 2001:db8::1
CNAMEMaps name to another name (alias)blog -> contoso.azurewebsites.net
MXMail exchange servercontoso.com -> mail.contoso.com
TXTText data (SPF, DKIM, verification)v=spf1 include:spf.protection.outlook.com
NSName servers for the zonens1-01.azure-dns.com
SOAStart of authority (zone metadata)Auto-created with zone
AliasPoints to an Azure resource directlywww -> Azure Load Balancer or CDN endpoint

Alias records

Alias records are Azure DNS-specific and solve a critical problem: CNAME records don’t work at the zone apex (e.g., contoso.com — only sub-domains like www.contoso.com). Alias records can point the zone apex to Azure resources like Load Balancer, Traffic Manager, CDN, or a public IP.

💡 Exam tip: Alias records at zone apex

Standard CNAME records cannot be created at the zone apex (e.g., contoso.com). If you need the root domain to point to an Azure Load Balancer or Traffic Manager profile, use an alias record. Alias records automatically update if the target resource’s IP changes — no manual DNS updates needed.

Private DNS zones

Private DNS zones provide name resolution within VNets — no internet exposure.

How it works:

  1. Create a private DNS zone (e.g., contoso.internal)
  2. Link it to one or more VNets
  3. Enable auto-registration to automatically create DNS records for VMs in linked VNets
  4. VMs can now resolve each other by name (e.g., webserver1.contoso.internal)
Real-world: TechCorp's internal DNS

TechCorp Solutions creates a private DNS zone “techcorp.internal” linked to their production VNet with auto-registration enabled. When Alex creates a VM called “db-server-01”, it automatically gets a DNS record: db-server-01.techcorp.internal pointing to its private IP. Other VMs in the VNet can now connect to the database using the name instead of the IP. No DNS server to manage.

Azure Load Balancer

☕ Simple explanation

A load balancer is like a restaurant host — distributing incoming customers (traffic) across available tables (servers) so no single table gets overwhelmed.

Azure Load Balancer works at Layer 4 (TCP/UDP). It doesn’t inspect the content of traffic — it just forwards packets to backend servers based on IP and port. You configure health probes so the load balancer knows which servers are healthy and only sends traffic to those.

Azure Load Balancer operates at Layer 4 (transport layer) of the OSI model, distributing inbound flows across backend pool members using a 5-tuple hash (source IP, source port, destination IP, destination port, protocol). It supports both public (internet-facing) and internal (private) configurations.

Key components: frontend IP configuration, backend pool, health probes, load balancing rules, and inbound NAT rules. The Standard SKU supports availability zones, outbound rules, and HA ports.

Public vs Internal Load Balancer

Public LB faces the internet; Internal LB stays private
FeaturePublic Load BalancerInternal Load Balancer
Frontend IPPublic IP addressPrivate IP from a VNet subnet
Traffic sourceInternet clientsResources within VNet or via VPN/ExpressRoute
Use caseWeb apps, APIs facing the internetMulti-tier apps (web tier to app tier)
Backend poolVMs, VMSS in any VNetVMs, VMSS in the same VNet

Load Balancer SKUs

Standard SKU is required for production — Basic is being retired
FeatureBasic SKUStandard SKU
Availability zonesNot supportedZone-redundant and zonal
Backend pool sizeUp to 300 instancesUp to 1000 instances
Health probesTCP, HTTPTCP, HTTP, HTTPS
SLANo SLA99.99% SLA
SecurityOpen by defaultClosed by default (NSG required)
Outbound rulesImplicit outboundExplicit outbound rules or NAT Gateway
HA PortsNot supportedSupported (internal LB only)
💡 Exam tip: Standard LB is zone-redundant

Standard Load Balancer is zone-redundant by default — it survives an entire availability zone failure. Basic Load Balancer does NOT support availability zones and has no SLA. Standard LB is also closed by default — backends won’t receive traffic until you configure an NSG allowing it. This catches many people off guard.

Health probes

Health probes determine which backend instances are healthy and can receive traffic:

Probe TypeProtocolHow It Works
TCPTCPAttempts a TCP connection to the specified port
HTTPHTTPSends an HTTP GET and expects a 200 OK response
HTTPSHTTPSSame as HTTP but over TLS (Standard SKU only)

If a backend fails the health probe, the load balancer stops sending traffic to it until it becomes healthy again.

Troubleshooting load balancing

Common issues and how to diagnose them:

SymptomLikely CauseHow to Check
No traffic reaching backendsHealth probe failing on all backendsCheck probe configuration, backend app health
Uneven traffic distributionSession persistence (source IP affinity) enabledReview load balancing rule settings
Timeout errorsNSG blocking health probe or trafficCheck NSG on backend subnet and NIC
Intermittent failuresSome backends unhealthyCheck health probe status in Load Balancer metrics
Real-world: CloudFirst Labs debugs a load balancer

CloudFirst Labs deployed a Standard Load Balancer with three web servers. After deployment, no traffic was reaching the backends. Alex checked the health probe status — all backends showed “unhealthy.”

Root cause: The health probe was configured for HTTP on port 80, but the web app listens on port 8080. Alex updated the health probe port and backends immediately became healthy. He also realised he’d forgotten to add an NSG rule allowing the health probe traffic — Standard LB requires explicit NSG rules.

Question

Can you create a CNAME record at the zone apex (e.g., contoso.com) in Azure DNS?

Click or press Enter to reveal answer

Answer

No. CNAME records cannot be created at the zone apex — only on sub-domains. To point the zone apex to an Azure resource (Load Balancer, Traffic Manager, CDN), use an alias record instead. Alias records also auto-update when the target resource's IP changes.

Click to flip back

Question

What is the difference between a public and internal Azure Load Balancer?

Click or press Enter to reveal answer

Answer

A public Load Balancer has a public IP frontend and distributes internet traffic to backends. An internal Load Balancer has a private IP frontend and distributes traffic within a VNet (e.g., from web tier to app tier). Both use the same health probes and rules.

Click to flip back

Question

What happens when all backend pool members fail the health probe?

Click or press Enter to reveal answer

Answer

The load balancer has no healthy backends to send traffic to. New connections fail (timeout or connection refused). The load balancer continues probing and will resume sending traffic once backends become healthy again. This is why health probe configuration is critical.

Click to flip back

Knowledge check

Knowledge Check

TechCorp Solutions wants contoso.com (zone apex) to resolve to their Azure Load Balancer. Alex tries to create a CNAME record but Azure DNS won't allow it. What should he use instead?

Knowledge Check

CloudFirst Labs deploys a Standard Load Balancer. The backends are healthy but internet traffic isn't reaching them. What is the most likely issue?

Knowledge Check

Meridian Financial needs name resolution between VMs in their VNet without exposing any DNS records to the internet. What should Alex configure?

🎬 Video coming soon

← Previous

Azure Bastion, Service & Private Endpoints

Next →

Azure Monitor: Metrics & Logs

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.