Cover Azure DNS, internal versus public load balancers, health probes, and troubleshooting patterns relevant to AZ-104.
AZ-104 networking questions often end with one of two root causes: the name does not resolve where you think it should, or the load-balancing path is not healthy. That is why Azure DNS and load balancing appear together in the official outline.
Azure DNS handles name resolution. Azure Load Balancer handles Layer 4 traffic distribution for internal or public scenarios. Those are different jobs. If the question is about hostnames, records, or private name resolution, think DNS first. If it is about frontend IPs, backend pools, probes, or rule behavior, think load balancing.
The current study guide is very direct here:
This page is meant to cover that full set. Private endpoint name resolution shows up heavily in 4.2 Secure Private Access, while this page focuses on the DNS and load-balancer decisions that administrators keep making in live environments.
Azure Load Balancer is the main AZ-104 load-balancing service in scope. Application Gateway and Front Door are useful broader Azure services, but they solve different Layer 7 or edge-routing problems. Do not let those products distract you from the simpler load-balancer choices this exam usually cares about.
| Need | Strongest first fit | Why |
|---|---|---|
| Public internet name resolution for your domain | Azure DNS public zone | Azure hosts the authoritative public records |
| Private name resolution inside Azure networks | Azure DNS private zone | Keeps private names and IPs inside linked VNets |
| Private endpoint name resolution | Private DNS zone plus the correct zone link | The record and the VNet link both matter |
Azure DNS does not send the traffic anywhere. It only tells the client which IP or endpoint to use. Many candidates mix up “the app is down” with “DNS is pointing to the wrong place,” and AZ-104 deliberately exploits that confusion.
| Choice | Best fit | What to remember |
|---|---|---|
| Public load balancer | Internet-facing TCP or UDP entry point | The frontend is public, but the backend still needs correct probes, rules, and security |
| Internal load balancer | Private traffic inside Azure or connected networks | The frontend uses a private IP inside the VNet design |
The exam does not usually want a long product tour. It wants you to choose the right frontend exposure model and then reason about probe health and backend reachability.
| Symptom | Check first | Why |
|---|---|---|
| Name resolves to the wrong IP | Azure DNS record path | Bad resolution breaks traffic before probes or rules matter |
| Backend looks down behind a load balancer | Health probe settings | Probe failure often removes the backend from service |
| Internal-only workload exposed too broadly | Frontend type | The difference between internal and public load balancers is operationally critical |
| Private endpoint traffic still goes public | Private DNS records | Name resolution must target the private IP |
| Component | Role |
|---|---|
| Frontend IP | The address clients target |
| Backend pool | The instances that receive traffic |
| Rule | The mapping between frontend traffic and backend delivery |
| Health probe | The test Azure uses to decide whether a backend should receive traffic |
If the backend is healthy in theory but receives no traffic in practice, the probe is often the first place to look.
Public DNS answers public names. Private DNS answers private names inside the networks that are linked to the zone. Private endpoint designs often fail because the private zone exists but is not linked correctly, or because the expected record does not map the service name to the private IP. That is why DNS mistakes can look like application or firewall failures.
flowchart LR
C["Client"] --> D["Azure DNS lookup"]
D --> F["Load balancer frontend IP"]
F --> P["Health probe evaluation"]
P --> B["Healthy backend pool member"]
If the client never gets the right IP, the problem is upstream in DNS. If the client gets the IP but traffic still fails, the next checks are usually the frontend type, backend pool membership, probe, rule, and the backend’s own reachability.
This is the operational shape Azure administrators need to recognize, even if the exam phrases it in portal language:
1# Create a public DNS zone and add an A record
2az network dns zone create -g net-rg -n corp.example.com
3az network dns record-set a create -g net-rg -z corp.example.com -n app --ttl 300
4az network dns record-set a add-record -g net-rg -z corp.example.com -n app -a 20.30.40.50
5
6# Create a standard public load balancer with a frontend and backend pool
7az network lb create \
8 -g net-rg \
9 -n app-lb \
10 --sku Standard \
11 --public-ip-address app-lb-pip \
12 --frontend-ip-name app-fe \
13 --backend-pool-name web-pool
14
15# Add a health probe and load-balancing rule
16az network lb probe create \
17 -g net-rg \
18 --lb-name app-lb \
19 -n http-probe \
20 --protocol Http \
21 --port 80 \
22 --path /
23
24az network lb rule create \
25 -g net-rg \
26 --lb-name app-lb \
27 -n web-rule \
28 --protocol Tcp \
29 --frontend-ip app-fe \
30 --frontend-port 80 \
31 --backend-pool-name web-pool \
32 --backend-port 80 \
33 --probe http-probe
What to notice:
When Azure Load Balancer questions get noisy, use a fixed order:
That sequence is simple, but it prevents a common AZ-104 failure mode: debugging the backend application before proving that DNS and the load-balancer path are even pointing at it.
Move next into Monitoring & Recovery, where these network and compute choices start surfacing in logs, alerts, and failover plans.