coredns/plugin/dnstap
Guangming Wang eb59e79207 plugin: cleanup code based on staticcheck warnings (#3302)
TrimPrefix re-assign to former variable

Signed-off-by: Guangming Wang <guangming.wang@daocloud.io>
2019-09-25 13:23:43 +01:00
..
dnstapio fix: delete unused var and const (#3294) 2019-09-24 07:06:37 +01:00
msg presubmit: check for uppercase (#1774) 2018-05-07 23:47:25 +02:00
taprw presubmit: check for uppercase (#1774) 2018-05-07 23:47:25 +02:00
test Support logging to dnstap in forward plugin (#2703) 2019-03-23 09:45:20 +00:00
context_test.go Fix context passing (#2681) 2019-03-13 18:08:33 +00:00
gocontext.go Fix context passing (#2681) 2019-03-13 18:08:33 +00:00
handler.go Fix context passing (#2681) 2019-03-13 18:08:33 +00:00
handler_test.go presubmit: Check errorf as well (#1845) 2018-06-02 11:48:39 -07:00
log_test.go Clean up tests logging (#1979) 2018-07-19 16:23:06 +01:00
OWNERS Add OWNERS file (#1486) 2018-02-08 10:55:51 +00:00
README.md Making README consistent with other plugins' READMEs (#3251) 2019-09-08 08:25:58 +01:00
setup.go plugin: cleanup code based on staticcheck warnings (#3302) 2019-09-25 13:23:43 +01:00
setup_test.go Update Caddy to 1.0.1, and update import path (#2961) 2019-07-03 09:04:47 +08:00

dnstap

Name

dnstap - enables logging to dnstap.

Description

dnstap is a flexible, structured binary log format for DNS software; see http://dnstap.info. With this plugin you make CoreDNS output dnstap logging.

Note that there is an internal buffer, so expect at least 13 requests before the server sends its dnstap messages to the socket.

Syntax

dnstap SOCKET [full]
  • SOCKET is the socket path supplied to the dnstap command line tool.
  • full to include the wire-format DNS message.

Examples

Log information about client requests and responses to /tmp/dnstap.sock.

dnstap /tmp/dnstap.sock

Log information including the wire-format DNS message about client requests and responses to /tmp/dnstap.sock.

dnstap unix:///tmp/dnstap.sock full

Log to a remote endpoint.

dnstap tcp://127.0.0.1:6000 full

Command Line Tool

Dnstap has a command line tool that can be used to inspect the logging. The tool can be found at Github: https://github.com/dnstap/golang-dnstap. It's written in Go.

The following command listens on the given socket and decodes messages to stdout.

$ dnstap -u /tmp/dnstap.sock

The following command listens on the given socket and saves message payloads to a binary dnstap-format log file.

$ dnstap -u /tmp/dnstap.sock -w /tmp/test.dnstap

Listen for dnstap messages on port 6000.

$ dnstap -l 127.0.0.1:6000

Using Dnstap in your plugin

import (
    "github.com/coredns/coredns/plugin/dnstap"
    "github.com/coredns/coredns/plugin/dnstap/msg"
)

func (h Dnstap) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (int, error) {
    // log client query to Dnstap
    if t := dnstap.TapperFromContext(ctx); t != nil {
        b := msg.New().Time(time.Now()).Addr(w.RemoteAddr())
        if t.Pack() {
            b.Msg(r)
        }
        if m, err := b.ToClientQuery(); err == nil {
            t.TapMessage(m)
        }
    }

    // ...
}

See Also

dnstap.info.