一、需求
线上机器增多,管理/etc/hosts的IP与主机名映射,就成了一个瓶劲,虽然,也可利用批量工具来维护,但相比dns管理,效率会更高点
二、以本机实验环境
IP地址:
1
2
|
10.1.2.214 master 主DNS服务器端
10.1.2.215 slave-one 从DNS服务器端
|
2、我已经搭建好了一个本地DNS服务器,能够实现正向反向解析,那么我们只需要加入一台从DNS服务器即可完成,我们来开始配置主从服务器
3、主DNS服务器上面的额外配置:
/var/named/abc.com.zone
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
|
$TTL 600
@ IN SOA ns.abc.com. admin.abc.com. (
2016021803
2H
10m
3D
1D )
IN NS ns
IN MX 10 mail
ns IN A 10.1.2.214
ns1 IN A 10.1.2.215
mail IN A 10.1.2.214
mail IN A 10.1.2.215
www IN A 10.1.2.214
www IN A 10.1.2.215
vm9 IN A 10.1.2.199
vm1 IN A 10.1.2.191
vm2 IN A 10.1.2.192
vm3 IN A 10.1.2.193
vm4 IN A 10.1.2.194
vm5 IN A 10.1.2.195
|
三、从服务器的配置
1、主DNS服务器的主配置文件/etc/named.conf复制一份到从DNS服务器上
1
|
[root@master named]
#scp /etc/named.conf slave-one:/etc/
|
2、从服务器区域配置文件:/etc/named.rfc1912.zones
1
2
3
4
5
6
7
8
9
10
11
12
|
zone
"abc.com"
IN {
type
slave;
file
"slaves/abc.com.zone"
;
masters { 10.1.2.214; };
allow-transfer { none; };
};
zone
"2.1.10.in-addr.arpa"
IN {
type
slave;
file
"slaves/10.1.2.zone"
;
masters { 10.1.2.214; };
allow-transfer { none; };
};
|
4、检查一下语法正确与否
1
|
#named-checkconf /etc/named.rfc1912.zones
|
5、重启named服务,排错,需根据日志/var/log/message
四、注意事项
1、每更改正向区域解析库文件时,序列号一定要加1
2、打算放在线上环境,我作了区域传送安全机制
<code>allow-transfer { IP; } </code>
五、验证
1、nslookup验证
[root@master named]# nslookup
1
2
3
4
5
6
7
|
> mail.abc.com
Server:10.1.2.214
Address:10.1.2.214
#53
Name:mail.abc.com
Address: 10.1.2.215
Name:mail.abc.com
Address: 10.1.2.214
|
1
2
3
4
5
6
|
> 10.1.2.215
Server:10.1.2.214
Address:10.1.2.214
#53
215.2.1.10.
in
-addr.arpaname = mail.abc.com.
215.2.1.10.
in
-addr.arpaname = www.abc.com.
215.2.1.10.
in
-addr.arpaname = ns1.abc.com.
|
1
2
3
4
5
6
|
> 10.1.2.214
Server:10.1.2.214
Address:10.1.2.214
#53
214.2.1.10.
in
-addr.arpaname = ns.abc.com.
214.2.1.10.
in
-addr.arpaname = mail.abc.com.
214.2.1.10.
in
-addr.arpaname = www.abc.com.
|
2、dig进行测试,-t选项指定类型
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
|
[root@master named]
# dig -t axfr abc.com @127.0.0.1
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.37.rc1.el6_7.6 <<>> -t axfr abc.com @127.0.0.1
;; global options: +cmd
abc.com.600INSOAns.abc.com. admin.abc.com. 2016021803 7200 600 259200 86400
abc.com.600INNSns.abc.com.
abc.com.600INMX10 mail.abc.com.
mail.abc.com.600INA10.1.2.214
mail.abc.com.600INA10.1.2.215
ns.abc.com.600INA10.1.2.214
ns1.abc.com.600INA10.1.2.215
vm1.abc.com.600INA10.1.2.191
vm2.abc.com.600INA10.1.2.192
vm3.abc.com.600INA10.1.2.193
vm4.abc.com.600INA10.1.2.194
vm5.abc.com.600INA10.1.2.195
vm9.abc.com.600INA10.1.2.199
www.abc.com.600INA10.1.2.214
www.abc.com.600INA10.1.2.215
abc.com.600INSOAns.abc.com. admin.abc.com. 2016021803 7200 600 259200 86400
;; Query
time
: 0 msec
;; SERVER: 127.0.0.1
#53(127.0.0.1)
;; WHEN: Wed Mar 16 20:19:22 2016
;; XFR size: 16 records (messages 1, bytes 369)
|
3、去连内网其中一台机器vm3时,一定以.abc.com结尾,连接上后,原来机器主机名还是保持不变的
1
2
3
4
5
6
7
8
9
|
[root@master named]
# ssh vm3.abc.com
The authenticity of host
'vm2.abc.com (10.1.2.192)'
can't be established.
RSA key fingerprint is 8f:b2:be:e9:06:55:47:87:ab:6b:d8:3e:42:a3:72:ed.
Are you sure you want to
continue
connecting (
yes
/no
)?
root@vm3.abc.com's password:
Last login: Fri Mar 11 04:05:07 2016 from 10.1.2.209
[root@vm3 ~]
# ls
[root@vm3 ~]
# hostname
vm3
|
本文转自 zouqingyun 51CTO博客,原文链接:http://blog.51cto.com/zouqingyun/1751912,如需转载请自行联系原作者