Chapter 4. Install and Configure Bind9
These steps install Bind9, and then configure integration with DNSaaS.
4.1. Basic BIND Installation Copy linkLink copied to clipboard!
1. Installed the BIND packages:
# yum install bind bind-utils
2. Configure named to listen for incoming connections:
# cp /etc/named.conf /etc/named.conf.orig
# sed -i -e "s/listen-on port.*/listen-on port 53 { 127.0.0.1; 192.168.100.20; };/" /etc/named.conf
4.2. Configure BIND Copy linkLink copied to clipboard!
1. Write to /etc/rndc.key:
# rndc-confgen -a
2. Add the following before options
# sed -i '/^options.*/i \
include "/etc/rndc.key"; \
controls { \
inet 127.0.0.1 allow { localhost; } keys { "rndc-key"; }; \
};' /etc/named.conf
3. Remove a few existing options you will rewrite later:
# sed -i '/allow-query.*/d' /etc/named.conf
# sed -i '/recursion.*/d' /etc/named.conf
4. Add the following after options:
# sed -i '/^options.*/a \
allow-new-zones yes; \
allow-query { any; }; \
recursion no;' /etc/named.conf
5. Create the rndc configuration. For the Compute node, the rndc configuration must point to the DNS server. For example:
# cat << EOF > /etc/rndc.conf
include "/etc/rndc.key";
options {
default-key "rndc-key";
default-server 192.168.100.20;
default-port 953;
};
EOF
6. Review the named configuration:
# named-checkconf /etc/named.conf
7. Correct the file permissions:
# setsebool -P named_write_master_zones on
# chmod g+w /var/named
# chown named:named /etc/rndc.conf
# chown named:named /etc/rndc.key
# chmod 600 /etc/rndc.key
8. Enable and start the named service:
# systemctl enable named
# systemctl start named
9. Validate named and rndc:
# dig @localhost localhost
# rndc status
4.3. Configure the DNSaaS Pool Target for BIND Copy linkLink copied to clipboard!
1. Overwrite the previous PowerDNS pool target configuration:
# openstack-config --set /etc/designate/designate.conf pool_target:$target_id type bind9
# openstack-config --set /etc/designate/designate.conf pool_target:$target_id options "rndc_host: 192.168.100.20, rndc_port: 953, rndc_config_file: /etc/rndc.conf, rndc_key_file: /etc/rndc.key"
# openstack-config --set /etc/designate/designate.conf pool_target:$target_id masters 192.168.100.20:5354
2. Restart DNSaaS to apply your pool changes:
# systemctl restart designate-api
# systemctl restart designate-central
# systemctl restart designate-mdns
# systemctl restart designate-pool-manager
# systemctl restart designate-sink
4.4. Test BIND Copy linkLink copied to clipboard!
1. Perform the diagnostic commands below:
# netstat -tap | grep named
# netstat -tulpn | grep 53
# dig @192.168.100.20
2. Check the DNSaaS Logs for errors. Ignore errors in Sink for now, as you have not modified its configuration.
# cd /var/log/designate
# tail api.log
# tail central.log
# tail mdns.log
# tail pool-manager.log
# tail sink.log
4.5. Test DNSaaS integration with BIND9 Copy linkLink copied to clipboard!
1. Create an entry for your server:
# designate server-create --name $(hostname).
2. Verify your DNS server record was previously created:
# designate server-list
3. Create a domain (don’t forget the . at the end of the --name option)
# designate domain-list
# designate domain-create --name example.com. --email root@example.com
# DOMAINID=$(designate domain-list | grep example.com | awk '{print $2}')
When creating a domain from designate against BIND, it is basically running a command similiar to this:
# rndc -s 192.168.122.41 -p 953 -c /etc/rndc.conf -k /etc/rndc.key addzone example.com '{ type slave; masters { 192.168.122.41 port 5354; }; file "slave.example.com.ff532e15-55a9-4966-8f1e-b3eddb2891ba"; };'
4. Create a record and test lookup (don’t forget the . at the end of the --name option)
# designate record-create --name server1.example.com. --type A --data 1.2.3.4 $DOMAINID
# dig +short -p 53 @192.168.100.20 server1.example.com A
4.6. Configure auto-generation of DNS records (nova fixed and neutron floating) Copy linkLink copied to clipboard!
1. Modify the DNSaaS configuration for the example domain. This will overwrite the PowerDNS configuration:
# openstack-config --set /etc/designate/designate.conf handler:nova_fixed domain_id $DOMAINID
# openstack-config --set /etc/designate/designate.conf handler:neutron_floatingip domain_id $DOMAINID
# systemctl restart designate-api
# systemctl restart designate-central
# systemctl restart designate-mdns
# systemctl restart designate-pool-manager
# systemctl restart designate-sink
2. Test OpenStack Compute (nova) record creation:
This follows the same procedure as previously done with PowerDNS:
# glance image-list
# neutron net-list
# nova boot testserver --flavor m1.tiny --image cirros-0.3.4-x86_64 --key-name yourkey --security-groups default --nic net-id=<Private Net ID>
3. Check the Sink log:
Once the instance is up, you should see a create_record entry, if it has picked up the notification correctly:
# tail /var/log/designate/sink.log
Check in BIND
# dig +short @192.168.100.20 testserver.example.com
If this doesn’t work, you can also check the files in /var/named.
4.7. Test OpenStack Networking floating IP record creation Copy linkLink copied to clipboard!
1. Perform the diagnostic commands below (replace pubnet1 with a name appropriate for your environment):
# FLOATINGIP=$(neutron floatingip-create pubnet1 | grep floating_ip_address | awk '{print $4}')
# nova add-floating-ip testserver $FLOATINGIP
# DNSRESULT=$(echo $FLOATINGIP |sed 's/\./-/g').example.com
# dig +short @192.168.100.20 $DNSRESULT
2. You should see a create_record event in the log file:
# tail /var/log/designate/sink.log
4.8. Cleanup OpenStack Networking and Compute DNS entries Copy linkLink copied to clipboard!
1. Remove the test floating IP created previously:
# nova remove-floating-ip testserver $FLOATINGIP
2. You should see a delete_record event in the log file:
# tail /var/log/designate/sink.log
And the record should now be removed.
3. Remove the testserver created previously:
# designate record-list $DOMAINID
# nova delete testserver
You should see another delete_record entry in the log file:
# tail /var/log/designate/sink.log