The Berkeley Internet Name Domain (BIND) implements an Internet domain
name server. BIND is the most widely-used name server software on the
Internet, and is supported by the Internet Software Consortium, www.isc.org.
This charm provides BIND9 as a backend for integration with OpenStack
Designate, providing DNSaaS in an OpenStack cloud.
This charm provides a bind server to store DNS records generated by designate.
The designate-bind charm relies on the designate charm.
juju deploy designate-bind juju deploy designate juju add-relation designate designate-bind
Recursion and forwarders
By default, this charm only resolves names in zones managed by
Designate. You can optionally enable recursion or forwarders to resolve
names outside of Designate, such as google.com or archive.ubuntu.com.
Recursion and forwarders should be enabled with extra care. You should
also enable ACLs with allowed_nets and/or allowed_recursion_nets.
Otherwise, the DNS server may be open for anyone which could be used for
some attacks as an open resolver.
For example, when you want to allow DNS clients in local networks only,
and use 188.8.131.52 and 184.108.40.206 as upstream DNS servers, You can set charm
juju config designate-bind allowed_nets='10.0.0.0/8;172.16.0.0/12;192.168.0.0/16' juju config designate-bind forwarders='220.127.116.11;18.104.22.168'
Or if you want to use BIND9 set up by the charm as a full-service resolver, set the following options for example:
juju config designate-bind allowed_nets='10.0.0.0/8;172.16.0.0/12;192.168.0.0/16' juju config designate-bind recursion=true
Network Space support
This charm supports the use of Juju Network Spaces, allowing the charm
to be bound to network space configurations managed directly by Juju.
This is only supported with Juju 2.0 and above.
A network space to be used for communication with Designate can be
specified by "dns-backend" binding.
Extra binding can be specified with "dns-frontend" binding for an
additional network space to bind DNS server for clients outside of the
To use this feature, use the --bind option when deploying the charm:
juju deploy designate-bind --bind "default-space dns-frontend=public-space dns-backend=internal-space"
alternatively these can also be provided as part of a juju native
designate-bind: charm: cs:designate-bind num_units: 1 bindings: '': default-space dns-frontend: public-space dns-backend: internal-space
NOTE: Spaces must be configured in the underlying provider prior to
attempting to use them.
Please report bugs on Launchpad.
For general questions please refer to the OpenStack Charm Guide.
- (string) String containing a list of allowed networks of hosts for DNS queries, separated by semicolons: e.g., "10.0.0.0/8;172.16.0.0/12;192.168.0.0/16". The option is equivalent to "allow-query" in BIND9. If not specified, the default is to allow queries from all hosts.
- (string) String containing a list of allowed networks of hosts for recursive queries through the designate-bind servers, spearated by semicolons: e.g., "10.0.0.0/8;172.16.0.0/12;192.168.0.0/16". The option is equivalent to "allow-recursion" in BIND9. If allowed_recursion_nets is not set then allowed_nets is used if set, otherwise any will be set to allow recursive queries from all hosts.
- (boolean) Enable debug logging
- (boolean) Whether or not to disable DNSSEC validation. This may be helpful in a situation that upstream DNS servers do not support DNSSEC, and BIND9 reports "Unable to fetch DNSKEY". For production deployments, it's encouraged to keep DNSSEC enabled.
- (string) String containing a list of forwarders, separated by semicolons: e.g., "22.214.171.124;126.96.36.199". As non-empty forwarders option implies recursion, recursive queries will be enabled regardless of the value set in the recursion option. When using this option, ACLs should be used with allowed_nets and/or allowed_recursion_nets to prevent it from being a open resolver.
- (boolean) Whether or not to enable recursive queries with BIND9 itself to be installed by the charm. The option is equivalent to "recursion" in BIND9. When using this option, ACLs should be used with allowed_nets and/or allowed_recursion_nets to prevent it from being a open resolver.
- (string) TLS CA to use to communicate with other components in a deployment. . __NOTE__: This configuration option will take precedence over any certificates received over the ``certificates`` relation.
- (string) TLS certificate to install and use for any listening services. . __NOTE__: This configuration option will take precedence over any certificates received over the ``certificates`` relation.
- (string) TLS key to use with certificate specified as ``ssl_cert``. . __NOTE__: This configuration option will take precedence over any certificates received over the ``certificates`` relation.
- (boolean) Openstack mostly defaults to using public endpoints for internal communication between services. If set to True this option will configure services to use internal endpoints where possible.
- (boolean) Setting this to True will allow supporting services to log to syslog.
- (boolean) Enable verbose logging