Questo contenuto non è disponibile nella lingua selezionata.

Chapter 9. Updating DNS records when using external DNS


Keep your IdM DNS records up to date when using an external DNS server by using the nsupdate utility or the external DNS GUI. After topology changes, update the DNS records that external servers need to discover IdM services.

9.1. Prerequisites

  • Your IdM deployment uses an external DNS server rather than integrated DNS.
  • The bind-utils package is installed on the system running nsupdate.

9.2. Updating external DNS records using nsupdate

Generate a DNS records file for use with the nsupdate utility to update external DNS records after topology changes in your IdM deployment. You can also add the command to a script to automate the process.

Procedure

  • To generate a file with the DNS records for nsupdate, use the `ipa dns-update-system-records --dry-run command with the --out option. The --out option specifies the path of the file to generate:

    $ ipa dns-update-system-records --dry-run --out dns_records_file.nsupdate
     IPA DNS records:
       _kerberos-master._tcp.example.com. 86400 IN SRV 0 100 88 ipa.example.com.
       _kerberos-master._udp.example.com. 86400 IN SRV 0 100 88 ipa.example.com.
    [... output truncated ...]

    The generated file contains the required DNS records in the format accepted by the nsupdate utility.

    For example:

    $ cat dns_records_file.nsupdate
    zone example.com.
    server 192.0.2.1
    ; IPA DNS records
    update delete _kerberos-master._tcp.example.com. SRV
    update add _kerberos-master._tcp.example.com. 86400 IN SRV 0 100 88 ipa.example.com.
    [... output truncated ...]

    The generated records rely on:

    • Automatic detection of the zone in which the records are to be updated.
    • Automatic detection of the zone’s authoritative server.

      If you are using an atypical DNS setup or if zone delegations are missing, nsupdate might not be able to find the right zone and server. In this case, add the following options to the beginning of the generated file:

    • server: specify the server name or port of the authoritative DNS server to which nsupdate sends the records.
    • zone: specify the name of the zone where nsupdate places the records.

9.3. Sending an nsupdate request secured using TSIG

Send an nsupdate request secured with Transaction Signature (TSIG) to update external DNS records using a shared secret key.

Prerequisites

  • Your DNS server must be configured for TSIG.
  • Both the DNS server and its client must have the shared key.

Procedure

  • Run the nsupdate command and provide the shared secret using one of these options:

    • -k to provide the TSIG authentication key:

      $ nsupdate -k tsig_key.file dns_records_file.nsupdate
    • -y to generate a signature from the name of the key and from the Base64-encoded shared secret:

      $ nsupdate -y algorithm:keyname:secret dns_records_file.nsupdate

9.4. Sending an nsupdate request secured using GSS-TSIG

Send an nsupdate request secured with GSS-TSIG to update external DNS records using Kerberos-based authentication instead of a static shared key.

Prerequisites

  • Your DNS server must be configured for GSS-TSIG.
Note

This procedure assumes that Kerberos V5 protocol is used as the technology for GSS-API.

Procedure

  1. Authenticate with a principal allowed to update the records:

    $ kinit principal_allowed_to_update_records@REALM
  2. Run nsupdate with the -g option to enable the GSS-TSIG mode:

    $ nsupdate -g dns_records_file.nsupdate

9.5. Updating external DNS records with GUI

Update external DNS records using the external DNS GUI to reflect topology changes in your IdM deployment.

Procedure

  1. Display the records that you must update:

    $ ipa dns-update-system-records --dry-run
     IPA DNS records:
       _kerberos-master._tcp.example.com. 86400 IN SRV 0 100 88 ipa.example.com.
       _kerberos-master._udp.example.com. 86400 IN SRV 0 100 88 ipa.example.com.
    [... output truncated ...]
  2. Use the external DNS GUI to update the records.
Red Hat logoGithubredditYoutubeTwitter

Formazione

Prova, acquista e vendi

Community

Informazioni sulla documentazione di Red Hat

Aiutiamo gli utenti Red Hat a innovarsi e raggiungere i propri obiettivi con i nostri prodotti e servizi grazie a contenuti di cui possono fidarsi. Esplora i nostri ultimi aggiornamenti.

Rendiamo l’open source più inclusivo

Red Hat si impegna a sostituire il linguaggio problematico nel codice, nella documentazione e nelle proprietà web. Per maggiori dettagli, visita il Blog di Red Hat.

Informazioni su Red Hat

Forniamo soluzioni consolidate che rendono più semplice per le aziende lavorare su piattaforme e ambienti diversi, dal datacenter centrale all'edge della rete.

Theme

© 2026 Red Hat
Torna in cima