You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add CoreDNS details to the customize DNS doc (#10228)
* Add CoreDNS details to the customize DNS doc
Rewrite the document to include more details about CoreDNS, since it's now the default from v1.12
* Address comments
* Improve doc wording
* Fix link
* Update dns-custom-nameservers.md
* Update dns-custom-nameservers.md
As of Kubernetes v1.12, CoreDNS is the recommended DNS Server, replacing kube-dns. However, kube-dns may still be installed by
32
+
default with certain Kubernetes installer tools. Refer to the documentation provided by your installer to know which DNS server is installed by default.
32
33
33
-
- "`kubedns`": watches the Kubernetes master for changes
34
-
in Services and Endpoints, and maintains in-memory lookup structures to serve
35
-
DNS requests.
36
-
- "`dnsmasq`": adds DNS caching to improve performance.
37
-
- "`sidecar`": provides a single health check endpoint
38
-
to perform healthchecks for `dnsmasq` and `kubedns`.
39
34
40
-
The DNS Pod is exposed as a Kubernetes Service with a static IP.
41
-
The kubelet passes DNS to each container with the `--cluster-dns=<dns-service-ip>`
42
-
flag.
35
+
The CoreDNS Deployment is exposed as a Kubernetes Service with a static IP.
36
+
Both the CoreDNS and kube-dns Service are named `kube-dns` in the `metadata.name` field. This is done so that there is greater interoperability with workloads that relied on the legacy `kube-dns` Service name to resolve addresses internal to the cluster. It abstracts away the implementation detail of which DNS provider is running behind that common endpoint.
37
+
The kubelet passes DNS to each container with the `--cluster-dns=<dns-service-ip>`flag.
43
38
44
39
DNS names also need domains. You configure the local domain in the kubelet
45
40
with the flag `--cluster-domain=<default-local-domain>`.
46
41
47
-
The Kubernetes cluster DNS server is based on the
48
-
[SkyDNS](https://github.com/skynetservices/skydns) library. It supports forward
49
-
lookups (A records), service lookups (SRV records), and reverse IP address
50
-
lookups (PTR records).
51
-
52
-
## Inheriting DNS from the node
42
+
The DNS server supports forward lookups (A records), port lookups (SRV records), reverse IP address lookups (PTR records),
43
+
and more. For more information see [DNS for Services and Pods] (/docs/concepts/services-networking/dns-pod-service/).
53
44
54
45
When running a Pod, kubelet prepends the cluster DNS server and searches
55
46
paths to the node's DNS settings. If the node is able to resolve DNS names
@@ -61,7 +52,130 @@ use the kubelet's `--resolv-conf` flag. Set this flag to "" to prevent Pods fro
61
52
inheriting DNS. Set it to a valid file path to specify a file other than
62
53
`/etc/resolv.conf` for DNS inheritance.
63
54
64
-
## Configure stub-domain and upstream DNS servers
55
+
## CoreDNS
56
+
57
+
CoreDNS is a general-purpose authoritative DNS server that can serve as cluster DNS, complying with the [dns specifications]
CoreDNS is a DNS server that is modular and pluggable, and each plugin adds new functionality to CoreDNS.
63
+
This can be configured by maintaining a [Corefile](https://coredns.io/2017/07/23/corefile-explained/), which is the CoreDNS
64
+
configuration file. A cluster administrator can modify the ConfigMap for the CoreDNS Corefile to change how service discovery works.
65
+
66
+
In Kubernetes, CoreDNS is installed with the following default Corefile configuration.
67
+
68
+
```yaml
69
+
apiVersion: v1
70
+
kind: ConfigMap
71
+
metadata:
72
+
name: coredns
73
+
namespace: kube-system
74
+
Corefile: |
75
+
.:53 {
76
+
errors
77
+
health
78
+
kubernetes cluster.local in-addr.arpa ip6.arpa {
79
+
pods insecure
80
+
upstream
81
+
fallthrough in-addr.arpa ip6.arpa
82
+
}
83
+
prometheus :9153
84
+
proxy . /etc/resolv.conf
85
+
cache 30
86
+
loop
87
+
reload
88
+
loadbalance
89
+
}
90
+
```
91
+
The Corefile configuration includes the following [plugins](https://coredns.io/plugins/) of CoreDNS:
92
+
93
+
* [errors](https://coredns.io/plugins/errors/): Errors are logged to stdout.
94
+
* [health](https://coredns.io/plugins/health/): Health of CoreDNS is reported to http://localhost:8080/health.
95
+
* [kubernetes](https://coredns.io/plugins/kubernetes/): CoreDNS will reply to DNS queries based on IP of the services and pods of Kubernetes. You can find more details [here](https://coredns.io/plugins/kubernetes/).
96
+
97
+
> The `pods insecure` option is provided for backward compatibility with kube-dns. You can use the `pod verified` option, which returns an A record only if there exists a pod in same namespace with matching IP. The `pods disabled` option can be used if you don't use pod records.
98
+
99
+
> `Upstream` is used for resolving services that point to external hosts (External Services).
100
+
101
+
* [prometheus](https://coredns.io/plugins/prometheus/): Metrics of CoreDNS are available at http://localhost:9153/metrics in [Prometheus](https://prometheus.io/) format.
102
+
* [proxy](https://coredns.io/plugins/proxy/): Any queries that are not within the cluster domain of Kubernetes will be forwarded to predefined resolvers (/etc/resolv.conf).
103
+
* [cache](https://coredns.io/plugins/cache/): This enables a frontend cache.
104
+
* [loop](https://coredns.io/plugins/loop/): Detects simple forwarding loops and halts the CoreDNS process if a loop is found.
105
+
* [reload](https://coredns.io/plugins/reload): Allows automatic reload of a changed Corefile.
106
+
* [loadbalance](https://coredns.io/plugins/loadbalance): This is a round-robin DNS loadbalancer by randomizing the order of A, AAAA, and MX records in the answer.
107
+
108
+
We can modify the default behavior by modifying this configmap.
109
+
110
+
### Configuration of Stub-domain and upstream nameserver using CoreDNS
111
+
112
+
CoreDNS has the ability to configure stubdomains and upstream nameservers using the [proxy plugin](https://coredns.io/plugins/proxy/).
113
+
114
+
#### Example
115
+
If a cluster operator has a [Consul](https://www.consul.io/) domain server located at 10.150.0.1, and all Consul names have the suffix .consul.local. To configure it in CoreDNS, the cluster administrator creates the following stanza in the CoreDNS ConfigMap.
116
+
117
+
```
118
+
consul.local:53 {
119
+
errors
120
+
cache 30
121
+
proxy . 10.150.0.1
122
+
}
123
+
```
124
+
125
+
To explicitly force all non-cluster DNS lookups to go through a specific nameserver at 172.16.0.1, point the `proxy` and `upstream` to the nameserver instead of `/etc/resolv.conf`
126
+
127
+
```
128
+
proxy . 172.16.0.1
129
+
```
130
+
```
131
+
upstream 172.16.0.1
132
+
```
133
+
134
+
So, the final ConfigMap along with the default `Corefile` configuration will look like:
135
+
136
+
```yaml
137
+
apiVersion: v1
138
+
kind: ConfigMap
139
+
metadata:
140
+
name: coredns
141
+
namespace: kube-system
142
+
Corefile: |
143
+
.:53 {
144
+
errors
145
+
health
146
+
kubernetes cluster.local in-addr.arpa ip6.arpa {
147
+
pods insecure
148
+
upstream 172.16.0.1
149
+
fallthrough in-addr.arpa ip6.arpa
150
+
}
151
+
prometheus :9153
152
+
proxy . 172.16.0.1
153
+
cache 30
154
+
loop
155
+
reload
156
+
loadbalance
157
+
}
158
+
consul.local:53 {
159
+
errors
160
+
cache 30
161
+
proxy . 10.150.0.1
162
+
}
163
+
```
164
+
In Kubernetes version 1.10 and later, kubeadm supports automatic translation of the CoreDNS ConfigMap from the kube-dns ConfigMap.
165
+
166
+
## Kube-dns
167
+
168
+
Kube-dns is now available as a optional DNS server since CoreDNS is now the default.
169
+
The running DNS Pod holds 3 containers:
170
+
171
+
- "`kubedns`": watches the Kubernetes master for changes
172
+
in Services and Endpoints, and maintains in-memory lookup structures to serve
173
+
DNS requests.
174
+
- "`dnsmasq`": adds DNS caching to improve performance.
175
+
- "`sidecar`": provides a single health check endpoint
176
+
to perform healthchecks for `dnsmasq` and `kubedns`.
177
+
178
+
### Configure stub-domain and upstream DNS servers
65
179
66
180
Cluster administrators can specify custom stub domains and upstream nameservers
67
181
by providing a ConfigMap for kube-dns (`kube-system:kube-dns`).
@@ -102,7 +216,7 @@ details about the configuration option format.
102
216
103
217
{{% capture discussion %}}
104
218
105
-
### Effects on Pods
219
+
#### Effects on Pods
106
220
107
221
Custom upstream nameservers and stub domains do not affect Pods with a
108
222
`dnsPolicy` set to "`Default`" or "`None`".
@@ -136,7 +250,7 @@ DNS queries are routed according to the following flow:
Options for the kube-dns `kube-system:kube-dns` ConfigMap:
142
256
@@ -145,9 +259,9 @@ Options for the kube-dns `kube-system:kube-dns` ConfigMap:
145
259
| `stubDomains` (optional) | A JSON map using a DNS suffix key such as “acme.local”, and a value consisting of a JSON array of DNS IPs. | The target nameserver can itself be a Kubernetes Service. For instance, you can run your own copy of dnsmasq to export custom DNS names into the ClusterDNS namespace. |
146
260
| `upstreamNameservers` (optional) | A JSON array of DNS IPs. | If specified, the values replace the nameservers taken by default from the node’s `/etc/resolv.conf`. Limits: a maximum of three upstream nameservers can be specified. |
147
261
148
-
### Examples
262
+
#### Examples
149
263
150
-
#### Example: Stub domain
264
+
##### Example: Stub domain
151
265
152
266
In this example, the user has a Consul DNS service discovery system they want to
153
267
integrate with kube-dns. The consul domain server is located at 10.150.0.1, and
@@ -169,7 +283,7 @@ Note that the cluster administrator does not want to override the node’s
169
283
upstream nameservers, so they did not specify the optional
170
284
`upstreamNameservers`field.
171
285
172
-
#### Example: Upstream nameserver
286
+
##### Example: Upstream nameserver
173
287
174
288
In this example the cluster administrator wants to explicitly force all
175
289
non-cluster DNS lookups to go through their own nameserver at 172.16.0.1.
@@ -189,17 +303,9 @@ data:
189
303
190
304
{{% /capture %}}
191
305
192
-
## Configuring CoreDNS {#config-coredns}
193
-
194
-
You can configure [CoreDNS](https://coredns.io/) as a service discovery.
195
-
196
-
CoreDNS is available as an option in Kubernetes starting with version 1.9.
197
-
It is currently a [GA feature](https://github.com/kubernetes/community/blob/master/keps/sig-network/0010-20180314-coredns-GA-proposal.md) and is on course to be [the default](https://github.com/kubernetes/community/blob/master/keps/sig-network/0012-20180518-coredns-default-proposal.md), replacing kube-dns.
198
-
199
-
200
-
## CoreDNS ConfigMap options
306
+
## CoreDNS configuration equivalent to kube-dns
201
307
202
-
CoreDNS chains plugins and can be configured by maintaining a Corefile with the ConfigMap. CoreDNS supports all the functionalities and more that is provided by kube-dns.
308
+
CoreDNS supports all the functionalities and more that is provided by kube-dns.
203
309
A ConfigMap created for kube-dns to support `StubDomains`and `upstreamNameservers` translates to the `proxy` plugin in CoreDNS.
204
310
Similarly, the `Federation` plugin translates to the `federation` plugin in CoreDNS.
205
311
@@ -276,8 +382,8 @@ In Kubernetes version 1.10 and later, kubeadm supports automatic translation of
276
382
277
383
## Migration to CoreDNS
278
384
279
-
A number of tools support the installation of CoreDNS instead of kube-dns.
280
385
To migrate from kube-dns to CoreDNS, [a detailed blog](https://coredns.io/2018/05/21/migration-from-kube-dns-to-coredns/) is available to help users adapt CoreDNS in place of kube-dns.
386
+
A cluster administrator can also migrate using [the deploy script](https://github.com/coredns/deployment/blob/master/kubernetes/deploy.sh), which will also help you translate the kube-dns configmap to the equivalent CoreDNS one.
281
387
282
388
## What's next
283
389
- [Debugging DNS Resolution](/docs/tasks/administer-cluster/dns-debugging-resolution/).
0 commit comments