coredns/plugin/dnstap
Yong Tang a34d564c07 Remove trailing whitespace as otherwise make check fails (#3515)
This PR removes trailing whitespace as otherwise `make check` fails

This PR fixes 3513

Signed-off-by: Yong Tang <yong.tang.github@outlook.com>
2019-12-07 15:47:18 +00:00
..
dnstapio Remove trailing whitespace as otherwise make check fails (#3515) 2019-12-07 15:47:18 +00:00
msg presubmit: check for uppercase (#1774) 2018-05-07 23:47:25 +02:00
taprw presubmit: check for uppercase (#1774) 2018-05-07 23:47:25 +02:00
test Support logging to dnstap in forward plugin (#2703) 2019-03-23 09:45:20 +00:00
context_test.go Fix context passing (#2681) 2019-03-13 18:08:33 +00:00
gocontext.go Fix context passing (#2681) 2019-03-13 18:08:33 +00:00
handler.go Run gostaticheck (#3325) 2019-10-01 07:41:29 +01:00
handler_test.go presubmit: Check errorf as well (#1845) 2018-06-02 11:48:39 -07:00
log_test.go Clean up tests logging (#1979) 2018-07-19 16:23:06 +01:00
README.md Making README consistent with other plugins' READMEs (#3251) 2019-09-08 08:25:58 +01:00
setup.go Run gostaticheck (#3325) 2019-10-01 07:41:29 +01:00
setup_test.go plugins: calling Dispenser itself is a mistake (#3323) 2019-09-28 10:41:12 +01:00

dnstap

Name

dnstap - enables logging to dnstap.

Description

dnstap is a flexible, structured binary log format for DNS software; see http://dnstap.info. With this plugin you make CoreDNS output dnstap logging.

Note that there is an internal buffer, so expect at least 13 requests before the server sends its dnstap messages to the socket.

Syntax

dnstap SOCKET [full]
  • SOCKET is the socket path supplied to the dnstap command line tool.
  • full to include the wire-format DNS message.

Examples

Log information about client requests and responses to /tmp/dnstap.sock.

dnstap /tmp/dnstap.sock

Log information including the wire-format DNS message about client requests and responses to /tmp/dnstap.sock.

dnstap unix:///tmp/dnstap.sock full

Log to a remote endpoint.

dnstap tcp://127.0.0.1:6000 full

Command Line Tool

Dnstap has a command line tool that can be used to inspect the logging. The tool can be found at Github: https://github.com/dnstap/golang-dnstap. It's written in Go.

The following command listens on the given socket and decodes messages to stdout.

$ dnstap -u /tmp/dnstap.sock

The following command listens on the given socket and saves message payloads to a binary dnstap-format log file.

$ dnstap -u /tmp/dnstap.sock -w /tmp/test.dnstap

Listen for dnstap messages on port 6000.

$ dnstap -l 127.0.0.1:6000

Using Dnstap in your plugin

import (
    "github.com/coredns/coredns/plugin/dnstap"
    "github.com/coredns/coredns/plugin/dnstap/msg"
)

func (h Dnstap) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (int, error) {
    // log client query to Dnstap
    if t := dnstap.TapperFromContext(ctx); t != nil {
        b := msg.New().Time(time.Now()).Addr(w.RemoteAddr())
        if t.Pack() {
            b.Msg(r)
        }
        if m, err := b.ToClientQuery(); err == nil {
            t.TapMessage(m)
        }
    }

    // ...
}

See Also

dnstap.info.