Skip to content

Commit e7319ee

Browse files
rajansandeepk8s-ci-robot
authored andcommitted
Add CoreDNS details to the customize DNS doc (#10228)
* Add CoreDNS details to the customize DNS doc Rewrite the document to include more details about CoreDNS, since it's now the default from v1.12 * Address comments * Improve doc wording * Fix link * Update dns-custom-nameservers.md * Update dns-custom-nameservers.md
1 parent ae83bb4 commit e7319ee

File tree

1 file changed

+139
-33
lines changed

1 file changed

+139
-33
lines changed

content/en/docs/tasks/administer-cluster/dns-custom-nameservers.md

+139-33
Original file line numberDiff line numberDiff line change
@@ -28,28 +28,19 @@ DNS is a built-in Kubernetes service launched automatically
2828
using the addon manager
2929
[cluster add-on](http://releases.k8s.io/{{< param "githubbranch" >}}/cluster/addons/README.md).
3030

31-
The running DNS Pod holds 3 containers:
31+
As of Kubernetes v1.12, CoreDNS is the recommended DNS Server, replacing kube-dns. However, kube-dns may still be installed by
32+
default with certain Kubernetes installer tools. Refer to the documentation provided by your installer to know which DNS server is installed by default.
3233

33-
- "`kubedns`": watches the Kubernetes master for changes
34-
in Services and Endpoints, and maintains in-memory lookup structures to serve
35-
DNS requests.
36-
- "`dnsmasq`": adds DNS caching to improve performance.
37-
- "`sidecar`": provides a single health check endpoint
38-
to perform healthchecks for `dnsmasq` and `kubedns`.
3934

40-
The DNS Pod is exposed as a Kubernetes Service with a static IP.
41-
The kubelet passes DNS to each container with the `--cluster-dns=<dns-service-ip>`
42-
flag.
35+
The CoreDNS Deployment is exposed as a Kubernetes Service with a static IP.
36+
Both the CoreDNS and kube-dns Service are named `kube-dns` in the `metadata.name` field. This is done so that there is greater interoperability with workloads that relied on the legacy `kube-dns` Service name to resolve addresses internal to the cluster. It abstracts away the implementation detail of which DNS provider is running behind that common endpoint.
37+
The kubelet passes DNS to each container with the `--cluster-dns=<dns-service-ip>` flag.
4338

4439
DNS names also need domains. You configure the local domain in the kubelet
4540
with the flag `--cluster-domain=<default-local-domain>`.
4641

47-
The Kubernetes cluster DNS server is based on the
48-
[SkyDNS](https://github.com/skynetservices/skydns) library. It supports forward
49-
lookups (A records), service lookups (SRV records), and reverse IP address
50-
lookups (PTR records).
51-
52-
## Inheriting DNS from the node
42+
The DNS server supports forward lookups (A records), port lookups (SRV records), reverse IP address lookups (PTR records),
43+
and more. For more information see [DNS for Services and Pods] (/docs/concepts/services-networking/dns-pod-service/).
5344

5445
When running a Pod, kubelet prepends the cluster DNS server and searches
5546
paths to the node's DNS settings. If the node is able to resolve DNS names
@@ -61,7 +52,130 @@ use the kubelet's `--resolv-conf` flag. Set this flag to "" to prevent Pods fro
6152
inheriting DNS. Set it to a valid file path to specify a file other than
6253
`/etc/resolv.conf` for DNS inheritance.
6354

64-
## Configure stub-domain and upstream DNS servers
55+
## CoreDNS
56+
57+
CoreDNS is a general-purpose authoritative DNS server that can serve as cluster DNS, complying with the [dns specifications]
58+
(https://github.com/kubernetes/dns/blob/master/docs/specification.md).
59+
60+
### CoreDNS ConfigMap options
61+
62+
CoreDNS is a DNS server that is modular and pluggable, and each plugin adds new functionality to CoreDNS.
63+
This can be configured by maintaining a [Corefile](https://coredns.io/2017/07/23/corefile-explained/), which is the CoreDNS
64+
configuration file. A cluster administrator can modify the ConfigMap for the CoreDNS Corefile to change how service discovery works.
65+
66+
In Kubernetes, CoreDNS is installed with the following default Corefile configuration.
67+
68+
```yaml
69+
apiVersion: v1
70+
kind: ConfigMap
71+
metadata:
72+
name: coredns
73+
namespace: kube-system
74+
Corefile: |
75+
.:53 {
76+
errors
77+
health
78+
kubernetes cluster.local in-addr.arpa ip6.arpa {
79+
pods insecure
80+
upstream
81+
fallthrough in-addr.arpa ip6.arpa
82+
}
83+
prometheus :9153
84+
proxy . /etc/resolv.conf
85+
cache 30
86+
loop
87+
reload
88+
loadbalance
89+
}
90+
```
91+
The Corefile configuration includes the following [plugins](https://coredns.io/plugins/) of CoreDNS:
92+
93+
* [errors](https://coredns.io/plugins/errors/): Errors are logged to stdout.
94+
* [health](https://coredns.io/plugins/health/): Health of CoreDNS is reported to http://localhost:8080/health.
95+
* [kubernetes](https://coredns.io/plugins/kubernetes/): CoreDNS will reply to DNS queries based on IP of the services and pods of Kubernetes. You can find more details [here](https://coredns.io/plugins/kubernetes/).
96+
97+
> The `pods insecure` option is provided for backward compatibility with kube-dns. You can use the `pod verified` option, which returns an A record only if there exists a pod in same namespace with matching IP. The `pods disabled` option can be used if you don't use pod records.
98+
99+
> `Upstream` is used for resolving services that point to external hosts (External Services).
100+
101+
* [prometheus](https://coredns.io/plugins/prometheus/): Metrics of CoreDNS are available at http://localhost:9153/metrics in [Prometheus](https://prometheus.io/) format.
102+
* [proxy](https://coredns.io/plugins/proxy/): Any queries that are not within the cluster domain of Kubernetes will be forwarded to predefined resolvers (/etc/resolv.conf).
103+
* [cache](https://coredns.io/plugins/cache/): This enables a frontend cache.
104+
* [loop](https://coredns.io/plugins/loop/): Detects simple forwarding loops and halts the CoreDNS process if a loop is found.
105+
* [reload](https://coredns.io/plugins/reload): Allows automatic reload of a changed Corefile.
106+
* [loadbalance](https://coredns.io/plugins/loadbalance): This is a round-robin DNS loadbalancer by randomizing the order of A, AAAA, and MX records in the answer.
107+
108+
We can modify the default behavior by modifying this configmap.
109+
110+
### Configuration of Stub-domain and upstream nameserver using CoreDNS
111+
112+
CoreDNS has the ability to configure stubdomains and upstream nameservers using the [proxy plugin](https://coredns.io/plugins/proxy/).
113+
114+
#### Example
115+
If a cluster operator has a [Consul](https://www.consul.io/) domain server located at 10.150.0.1, and all Consul names have the suffix .consul.local. To configure it in CoreDNS, the cluster administrator creates the following stanza in the CoreDNS ConfigMap.
116+
117+
```
118+
consul.local:53 {
119+
errors
120+
cache 30
121+
proxy . 10.150.0.1
122+
}
123+
```
124+
125+
To explicitly force all non-cluster DNS lookups to go through a specific nameserver at 172.16.0.1, point the `proxy` and `upstream` to the nameserver instead of `/etc/resolv.conf`
126+
127+
```
128+
proxy . 172.16.0.1
129+
```
130+
```
131+
upstream 172.16.0.1
132+
```
133+
134+
So, the final ConfigMap along with the default `Corefile` configuration will look like:
135+
136+
```yaml
137+
apiVersion: v1
138+
kind: ConfigMap
139+
metadata:
140+
name: coredns
141+
namespace: kube-system
142+
Corefile: |
143+
.:53 {
144+
errors
145+
health
146+
kubernetes cluster.local in-addr.arpa ip6.arpa {
147+
pods insecure
148+
upstream 172.16.0.1
149+
fallthrough in-addr.arpa ip6.arpa
150+
}
151+
prometheus :9153
152+
proxy . 172.16.0.1
153+
cache 30
154+
loop
155+
reload
156+
loadbalance
157+
}
158+
consul.local:53 {
159+
errors
160+
cache 30
161+
proxy . 10.150.0.1
162+
}
163+
```
164+
In Kubernetes version 1.10 and later, kubeadm supports automatic translation of the CoreDNS ConfigMap from the kube-dns ConfigMap.
165+
166+
## Kube-dns
167+
168+
Kube-dns is now available as a optional DNS server since CoreDNS is now the default.
169+
The running DNS Pod holds 3 containers:
170+
171+
- "`kubedns`": watches the Kubernetes master for changes
172+
in Services and Endpoints, and maintains in-memory lookup structures to serve
173+
DNS requests.
174+
- "`dnsmasq`": adds DNS caching to improve performance.
175+
- "`sidecar`": provides a single health check endpoint
176+
to perform healthchecks for `dnsmasq` and `kubedns`.
177+
178+
### Configure stub-domain and upstream DNS servers
65179

66180
Cluster administrators can specify custom stub domains and upstream nameservers
67181
by providing a ConfigMap for kube-dns (`kube-system:kube-dns`).
@@ -102,7 +216,7 @@ details about the configuration option format.
102216
103217
{{% capture discussion %}}
104218
105-
### Effects on Pods
219+
#### Effects on Pods
106220
107221
Custom upstream nameservers and stub domains do not affect Pods with a
108222
`dnsPolicy` set to "`Default`" or "`None`".
@@ -136,7 +250,7 @@ DNS queries are routed according to the following flow:
136250

137251
![DNS lookup flow](/docs/tasks/administer-cluster/dns-custom-nameservers/dns.png)
138252

139-
## ConfigMap options
253+
### ConfigMap options
140254

141255
Options for the kube-dns `kube-system:kube-dns` ConfigMap:
142256

@@ -145,9 +259,9 @@ Options for the kube-dns `kube-system:kube-dns` ConfigMap:
145259
| `stubDomains` (optional) | A JSON map using a DNS suffix key such as “acme.local”, and a value consisting of a JSON array of DNS IPs. | The target nameserver can itself be a Kubernetes Service. For instance, you can run your own copy of dnsmasq to export custom DNS names into the ClusterDNS namespace. |
146260
| `upstreamNameservers` (optional) | A JSON array of DNS IPs. | If specified, the values replace the nameservers taken by default from the node’s `/etc/resolv.conf`. Limits: a maximum of three upstream nameservers can be specified. |
147261

148-
### Examples
262+
#### Examples
149263

150-
#### Example: Stub domain
264+
##### Example: Stub domain
151265

152266
In this example, the user has a Consul DNS service discovery system they want to
153267
integrate with kube-dns. The consul domain server is located at 10.150.0.1, and
@@ -169,7 +283,7 @@ Note that the cluster administrator does not want to override the node’s
169283
upstream nameservers, so they did not specify the optional
170284
`upstreamNameservers` field.
171285

172-
#### Example: Upstream nameserver
286+
##### Example: Upstream nameserver
173287

174288
In this example the cluster administrator wants to explicitly force all
175289
non-cluster DNS lookups to go through their own nameserver at 172.16.0.1.
@@ -189,17 +303,9 @@ data:
189303

190304
{{% /capture %}}
191305

192-
## Configuring CoreDNS {#config-coredns}
193-
194-
You can configure [CoreDNS](https://coredns.io/) as a service discovery.
195-
196-
CoreDNS is available as an option in Kubernetes starting with version 1.9.
197-
It is currently a [GA feature](https://github.com/kubernetes/community/blob/master/keps/sig-network/0010-20180314-coredns-GA-proposal.md) and is on course to be [the default](https://github.com/kubernetes/community/blob/master/keps/sig-network/0012-20180518-coredns-default-proposal.md), replacing kube-dns.
198-
199-
200-
## CoreDNS ConfigMap options
306+
## CoreDNS configuration equivalent to kube-dns
201307

202-
CoreDNS chains plugins and can be configured by maintaining a Corefile with the ConfigMap. CoreDNS supports all the functionalities and more that is provided by kube-dns.
308+
CoreDNS supports all the functionalities and more that is provided by kube-dns.
203309
A ConfigMap created for kube-dns to support `StubDomains`and `upstreamNameservers` translates to the `proxy` plugin in CoreDNS.
204310
Similarly, the `Federation` plugin translates to the `federation` plugin in CoreDNS.
205311

@@ -276,8 +382,8 @@ In Kubernetes version 1.10 and later, kubeadm supports automatic translation of
276382

277383
## Migration to CoreDNS
278384

279-
A number of tools support the installation of CoreDNS instead of kube-dns.
280385
To migrate from kube-dns to CoreDNS, [a detailed blog](https://coredns.io/2018/05/21/migration-from-kube-dns-to-coredns/) is available to help users adapt CoreDNS in place of kube-dns.
386+
A cluster administrator can also migrate using [the deploy script](https://github.com/coredns/deployment/blob/master/kubernetes/deploy.sh), which will also help you translate the kube-dns configmap to the equivalent CoreDNS one.
281387

282388
## What's next
283389
- [Debugging DNS Resolution](/docs/tasks/administer-cluster/dns-debugging-resolution/).

0 commit comments

Comments
 (0)