coredns/plugin/route53
Miek Gieben 5735292406
Do Compress only when need in request.Scrub (#1760)
* Remove Compress by default

Set Compress = true in Scrub only when the message doesn not fit the
advertized buffer. Doing compression is expensive, so try to avoid it.

Master vs this branch
pkg: github.com/coredns/coredns/plugin/cache
BenchmarkCacheResponse-2   	   50000	     24774 ns/op

pkg: github.com/coredns/coredns/plugin/cache
BenchmarkCacheResponse-2   	  100000	     21960 ns/op

* and make it compile
2018-05-01 21:04:06 +01:00
..
OWNERS Add OWNERS file (#1486) 2018-02-08 10:55:51 +00:00
README.md return an error for multiple use of some plugins (#1559) 2018-02-28 18:16:05 -08:00
route53.go Do Compress only when need in request.Scrub (#1760) 2018-05-01 21:04:06 +01:00
route53_test.go all: fix plugin import ordering (#1717) 2018-04-22 08:34:35 +01:00
setup.go Add route53 plugin (#1390) 2018-01-15 09:59:29 -08:00
setup_test.go Add route53 plugin (#1390) 2018-01-15 09:59:29 -08:00

route53

Name

route53 - enables serving zone data from AWS route53.

Description

The route53 plugin is useful for serving zones from resource record sets in AWS route53. This plugin only supports A and AAAA records. The route53 plugin can be used when coredns is deployed on AWS.

Syntax

route53 [ZONE:HOSTED_ZONE_ID...] {
    [aws_access_key AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY]
}
  • ZONE the name of the domain to be accessed.
  • HOSTED_ZONE_ID the ID of the hosted zone that contains the resource record sets to be accessed.
  • AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY the AWS access key ID and secret access key to be used when query AWS (optional). If they are not provided, then coredns tries to access AWS credentials the same way as AWS CLI, e.g., environmental variables, AWS credentials file, instance profile credentials, etc.

Examples

Enable route53, with implicit aws credentials:

. {
    route53 example.org.:Z1Z2Z3Z4DZ5Z6Z7
}

Enable route53, with explicit aws credentials:

. {
    route53 example.org.:Z1Z2Z3Z4DZ5Z6Z7 {
      aws_access_key AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY
  }
}