coredns/plugin/route53
Miek Gieben be1ac9fed4
plugins: remove upstream [ADDRESS] from docs (#2772)
Various plugins still had this documented, the setup functions still
allow it (which is fine), but update the docs that this arguments isn't
there any more.

Signed-off-by: Miek Gieben <miek@miek.nl>
2019-04-08 16:45:29 +01:00
..
log_test.go Clean up tests logging (#1979) 2018-07-19 16:23:06 +01:00
OWNERS Add @dilyevsky to reviewers. (#2094) 2018-09-13 15:22:57 -07:00
README.md plugins: remove upstream [ADDRESS] from docs (#2772) 2019-04-08 16:45:29 +01:00
route53.go [plugin/route53]: Do not return NXDOMAIN where it should be NODATA. (#2734) 2019-03-31 10:12:33 -07:00
route53_test.go Run gofmt -w -s on codebase (#2773) 2019-04-08 11:13:46 +01:00
setup.go Default to upstream to self (#2436) 2019-01-13 16:54:49 +00:00
setup_test.go refactor tests to remove duplicate code (#2602) 2019-02-23 09:02:58 -08:00

route53

Name

route53 - enables serving zone data from AWS route53.

Description

The route53 plugin is useful for serving zones from resource record sets in AWS route53. This plugin supports all Amazon Route 53 records (https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/ResourceRecordTypes.html). The route53 plugin can be used when coredns is deployed on AWS or elsewhere.

Syntax

route53 [ZONE:HOSTED_ZONE_ID...] {
    [aws_access_key AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY]
    upstream
    credentials PROFILE [FILENAME]
    fallthrough [ZONES...]
}
  • ZONE the name of the domain to be accessed. When there are multiple zones with overlapping domains (private vs. public hosted zone), CoreDNS does the lookup in the given order here. Therefore, for a non-existing resource record, SOA response will be from the rightmost zone.

  • HOSTED_ZONE_ID the ID of the hosted zone that contains the resource record sets to be accessed.

  • AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY the AWS access key ID and secret access key to be used when query AWS (optional). If they are not provided, then coredns tries to access AWS credentials the same way as AWS CLI, e.g., environmental variables, AWS credentials file, instance profile credentials, etc.

  • upstreamis used for resolving services that point to external hosts (eg. used to resolve CNAMEs). CoreDNS will resolve against itself.

  • credentials is used for reading the credential file and setting the profile name for a given zone.

  • PROFILE AWS account profile name. Defaults to default.

  • FILENAME AWS credentials filename. Defaults to ~/.aws/credentials are used.

  • fallthrough If zone matches and no record can be generated, pass request to the next plugin. If [ZONES...] is omitted, then fallthrough happens for all zones for which the plugin is authoritative. If specific zones are listed (for example in-addr.arpa and ip6.arpa), then only queries for those zones will be subject to fallthrough.

  • ZONES zones it should be authoritative for. If empty, the zones from the configuration block

Examples

Enable route53 with implicit AWS credentials and an upstream:

. {
	route53 example.org.:Z1Z2Z3Z4DZ5Z6Z7 {
	  upstream
	}
    forward . 10.0.0.1
}

Enable route53 with explicit AWS credentials:

. {
    route53 example.org.:Z1Z2Z3Z4DZ5Z6Z7 {
      aws_access_key AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY
    }
}

Enable route53 with fallthrough:

. {
    route53 example.org.:Z1Z2Z3Z4DZ5Z6Z7 example.gov.:Z654321543245 {
      fallthrough example.gov.
    }
}

Enable route53 with multiple hosted zones with the same domain:

. {
    route53 example.org.:Z1Z2Z3Z4DZ5Z6Z7 example.org.:Z93A52145678156
}