copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2024-10-31 |
kubernetes, coredns, kubedns, dns |
containers |
{{site.data.keyword.attribute-definition-list}}
{: #cluster_dns}
Each service in your {{site.data.keyword.containerlong}} cluster is assigned a Domain Name System (DNS) name that the cluster DNS provider registers to resolve DNS requests. For more information about DNS for services and pods, see the Kubernetes documentation{: external}. {: shortdesc}
The cluster DNS provider is CoreDNS{: external}, which is a general-purpose, authoritative DNS server that provides a backwards-compatible, but extensible, integration with Kubernetes. Because CoreDNS is a single executable and single process, it has fewer dependencies and moving parts that could experience issues than other cluster DNS providers. The project is also written in the same language as the Kubernetes project, Go
, which helps protect memory. Finally, CoreDNS supports more flexible use cases than other cluster DNS providers because you can create custom DNS entries such as the common setups in the CoreDNS docs{: external}.
{: #dns_autoscale}
By default, CoreDNS includes a deployment to autoscale the CoreDNS pods in response to the number of worker nodes and cores within the cluster. You can fine-tune the CoreDNS autoscaler parameters by editing the CoreDNS autoscaling ConfigMap. For example, if your apps heavily use the cluster DNS provider, you might need to increase the minimum number of CoreDNS pods to support the app. For more information, see the Kubernetes documentation{: external}. {: shortdesc}
Before you begin: Log in to your account. If applicable, target the appropriate resource group. Set the context for your cluster.
-
Verify that the CoreDNS autoscaler deployment is available. In your CLI output, verify that one deployment is AVAILABLE.
kubectl get deployment -n kube-system coredns-autoscaler
{: pre}
Example output
NAME READY UP-TO-DATE AVAILABLE AGE coredns-autoscaler 1/1 1 1 69d
{: screen}
-
Edit the default settings for the CoreDNS autoscaler. Look for the
data.linear
field, which defaults to one CoreDNS pod per 16 worker nodes or 256 cores, with a minimum of two CoreDNS pods regardless of cluster size (preventSinglePointFailure: true
). For more information, see the Kubernetes documentation{: external}.kubectl edit configmap -n kube-system coredns-autoscaler
{: pre}
Example output
apiVersion: v1 data: linear: '{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}' kind: ConfigMap metadata: ...
{: screen}
{: #dns_customize}
You can customize CoreDNS by editing the CoreDNS ConfigMap. For example, you might want to configure stub domains and upstream DNS servers to resolve services that point to external hosts. Additionally, you can configure multiple Corefiles{: external} within the CoreDNS ConfigMap. For more information, see the Kubernetes documentation{: external}. {: shortdesc}
NodeLocal
DNS caching relies on CoreDNS to maintain the cache of DNS resolutions. Keep applicable NodeLocal
DNS cache and CoreDNS configurations such as stub domains the same to maintain DNS resolution consistency.
{: note}
Before you begin: Log in to your account. If applicable, target the appropriate resource group. Set the context for your cluster.
-
Verify that the CoreDNS deployment is available. In your CLI output, verify that one deployment is AVAILABLE.
kubectl get deployment -n kube-system coredns
{: pre}
Example output
NAME READY UP-TO-DATE AVAILABLE AGE coredns 3/3 3 3 69d
{: screen}
-
Edit the default settings for the CoreDNS ConfigMap. Use a Corefile in the
data
section of the ConfigMap to customize stub domains and upstream DNS servers. For more information, see the Kubernetes documentation{: external}.The CoreDNS
proxy
plug-in is deprecated and replaced with theforward
plug-in. If you update the CoreDNS ConfigMap, make sure to replace allproxy
instances withforward
. {: note}kubectl edit configmap -n kube-system coredns
{: pre}
CoreDNS example output
apiVersion: v1 kind: ConfigMap metadata: name: coredns namespace: kube-system data: Corefile: | import <MyCorefile> .:53 { errors health { lameduck 10s } ready kubernetes cluster.local in-addr.arpa ip6.arpa { pods insecure fallthrough in-addr.arpa ip6.arpa ttl 30 } prometheus :9153 forward . /etc/resolv.conf cache 30 loop reload loadbalance } <MyCorefile>: | abc.com:53 { errors cache 30 loop forward . 1.2.3.4 }
{: screen}
-
Optional: Add custom Corefiles to the CoreDNS ConfigMap. In the following example, include the
import <MyCoreFile>
in thedata.Corefile
section, and fill out thedata.<MyCorefile>
section with your custom Corefile information. For more information, see the Corefile import documentation{: external}.The CoreDNS
proxy
plug-in is deprecated and replaced with theforward
plug-in. If you update the CoreDNS ConfigMap, make sure to replace allproxy
instances withforward
. {: note}kubectl edit configmap -n kube-system coredns
{: pre}
Custom Corefile example output
apiVersion: v1 kind: ConfigMap metadata: name: coredns namespace: kube-system data: Corefile: | import <MyCorefile> .:53 { errors health kubernetes cluster.local in-addr.arpa ip6.arpa { pods insecure upstream 172.16.0.1 fallthrough in-addr.arpa ip6.arpa } prometheus :9153 forward . /etc/resolv.conf cache 30 loop reload loadbalance } <MyCorefile>: | abc.com:53 { errors cache 30 loop forward . 1.2.3.4 }
{: screen}
-
After a few minutes, the CoreDNS pods pick up the ConfigMap changes.
{: #dns_cache}
Set up the NodeLocal
DNS caching agent on select worker nodes for improved cluster DNS performance and availability in your {{site.data.keyword.containerlong_notm}} cluster. For more information, see the Kubernetes docs{: external}.
{: shortdesc}
By default, cluster DNS requests for pods that use a ClusterFirst
DNS policy{: external} are sent to the cluster DNS service. If you enable NodeLocal
DNS caching on a worker node, the cluster DNS requests for these pods that are on the worker node are sent instead to the local DNS cache, which listens on link-local IP address 169.254.20.10. The DNS cache also listens on the cluster IP of the kube-dns
service in the kube-system
namespace.
Do not add the DNS cache label when you already use zone-aware DNS in your cluster. Also, NodeLocal
DNS caching relies on CoreDNS to maintain the cache of DNS resolutions. Keep applicable NodeLocal
DNS cache and CoreDNS configurations such as stub domains the same to maintain DNS resolution consistency.
{: important}
NodeLocal
DNS cache is generally available in clusters that run Kubernetes 1.18 or later, but still disabled by default.
{: preview}
{: #dns_enablecache}
Enable NodeLocal
DNS cache for one or more worker nodes in your Kubernetes cluster.
{: shortdesc}
The following steps update DNS pods that run on particular worker nodes. You can also label the worker pool so that future nodes inherit the label. {: note}
Before you begin, update any DNS egress network policies{: external} that are impacted by this feature, such as policies that rely on pod or namespace selectors for DNS egress.
kubectl get networkpolicy --all-namespaces -o yaml
{: pre}
-
If you customized stub domains and upstream DNS servers for CoreDNS, you must also customize the
NodeLocal
DNS cache with these stub domains and upstream DNS servers. -
List the nodes in your cluster. The
NodeLocal
DNS caching agent pods are part of a daemon set that run on each node.kubectl get nodes
{: pre}
-
Add the
ibm-cloud.kubernetes.io/node-local-dns-enabled=true
label to the worker node. The label starts the DNS caching agent pod on the worker node.-
Add the label to one or more worker nodes.
-
To label all worker nodes in the cluster: Add the label to all existing worker pools.
-
To label an individual worker node:
kubectl label node <node_name> --overwrite "ibm-cloud.kubernetes.io/node-local-dns-enabled=true"
{: pre}
-
-
Verify that the node has the label by checking that the
NODE-LOCAL-DNS-ENABLED
field is set totrue
.kubectl get nodes -L "ibm-cloud.kubernetes.io/node-local-dns-enabled"
{: pre}
Example output
NAME STATUS ROLES AGE VERSION NODE-LOCAL-DNS-ENABLED 10.xxx.xx.xxx Ready,SchedulingDisabled <none> 28h v1.31+IKS true
{: screen}
-
Verify that the DNS caching agent pod is running on the worker node.
kubectl get pods -n kube-system -l k8s-app=node-local-dns -o wide
{: pre}
Example output
NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES node-local-dns-pvnjn 1/1 Running 0 1m 10.xxx.xx.xxx 10.xxx.xx.xxx <none> <none>
{: screen}
-
-
Repeat the previous steps for each worker node to enable DNS caching.
{: #dns_disablecache}
You can disable the NodeLocal
DNS cache for one or more worker nodes.
{: shortdesc}
-
Remove the
ibm-cloud.kubernetes.io/node-local-dns-enabled
label from the worker node. This action terminates the DNS caching agent pod on the worker node.Run the following command to remove the label from all worker nodes in the cluster.
kubectl label node --all --overwrite "ibm-cloud.kubernetes.io/node-local-dns-enabled-"
{: pre}
Run the following command to remove the label from an individual worker node.
kubectl label node <node_name> "ibm-cloud.kubernetes.io/node-local-dns-enabled-"
{: pre}
-
Verify that the label is removed by checking that the
NODE-LOCAL-DNS-ENABLED
field is empty.kubectl get nodes -L "ibm-cloud.kubernetes.io/node-local-dns-enabled"
{: pre}
Example output
NAME STATUS ROLES AGE VERSION NODE-LOCAL-DNS-ENABLED 10.xxx.xx.xxx Ready,SchedulingDisabled <none> 28h v1.31+IKS
{: screen}
-
Verify that the pod is no longer running on the node where DNS cache is disabled. The output shows no pods.
kubectl get pods -n kube-system -l k8s-app=node-local-dns -o wide
{: pre}
Example output
No resources found.
{: screen}
-
-
Repeat the previous steps for each worker node to disable DNS caching.
{: #dns_nodelocal_customize}
You can customize the NodeLocal
DNS cache by editing either of the two configmaps.
{: shortdesc}
node-local-dns
ConfigMap: Customize theNodeLocal
DNS cache configuration.node-local-dns-config
ConfigMap: Extend theNodeLocal
DNS cache configuration by customizing stub domains or upstream DNS servers to resolve services that point to external hosts.
NodeLocal
DNS caching relies on CoreDNS to maintain the cache of DNS resolutions. Keep applicable NodeLocal
DNS cache and CoreDNS configurations such as stub domains the same to maintain DNS resolution consistency.
{: note}
{: #dns_nodelocal_customize_configmap}
Edit the node-local-dns
ConfigMap to customize the NodeLocal
DNS cache configuration.
{: shortdesc}
Before you begin: Log in to your account. If applicable, target the appropriate resource group. Set the context for your cluster.
-
Verify that the
NodeLocal
DNS cache daemon set is available.kubectl get ds -n kube-system node-local-dns
{: pre}
Example output
NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE node-local-dns 4 4 4 4 4 ibm-cloud.kubernetes.io/node-local-dns-enabled=true 82d
{: screen}
-
Edit the default settings or add custom Corefiles to the
NodeLocal
DNS cache ConfigMap. Each Corefile that you import must use thecoredns
path. For more information, see the Kubernetes documentation{: external}.Only a limited set of plug-ins{: external} is supported for the
NodeLocal
DNS cache. {: important}kubectl edit configmap -n kube-system node-local-dns
{: pre}
Example output
apiVersion: v1 kind: ConfigMap metadata: name: node-local-dns namespace: kube-system data: Corefile: | # Add your NodeLocal DNS customizations as import files under ./coredns directory. # Refer to /docs/containers?topic=containers-cluster_dns for details. import ./coredns/<MyCorefile> cluster.local:53 abc.com:53 { errors cache { success 9984 30 denial 9984 5 } reload loop bind 169.254.20.10 172.21.0.10 forward . __PILLAR__CLUSTER__DNS__ { force_tcp } prometheus :9253 health 169.254.20.10:8080 } in-addr.arpa:53 { errors cache 30 reload loop bind 169.254.20.10 172.21.0.10 forward . __PILLAR__CLUSTER__DNS__ { force_tcp } prometheus :9253 } ip6.arpa:53 { errors cache 30 reload loop bind 169.254.20.10 172.21.0.10 forward . __PILLAR__CLUSTER__DNS__ { force_tcp } prometheus :9253 } .:53 { errors cache 30 reload loop bind 169.254.20.10 172.21.0.10 forward . __PILLAR__UPSTREAM__SERVERS__ { force_tcp } prometheus :9253 } <MyCorefile>: | # Add custom corefile content ...
{: screen}
-
After a few minutes, the
NodeLocal
DNS cache pods pick up the ConfigMap changes.
{: #dns_nodelocal_customize_stub_upstream}
Edit the node-local-dns-config
ConfigMap to extend the NodeLocal
DNS cache configuration such as by customizing stub domains or upstream DNS servers. For more information, see the Kubernetes documentation{: external}.
{: shortdesc}
Before you begin: Log in to your account. If applicable, target the appropriate resource group. Set the context for your cluster.
-
Verify that the
NodeLocal
DNS cache daemon set is available.kubectl get ds -n kube-system node-local-dns
{: pre}
Example output
NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE node-local-dns 4 4 4 4 4 ibm-cloud.kubernetes.io/node-local-dns-enabled=true 82d
{: screen}
-
Confirm that the
NodeLocal
DNS cache has a ConfigMap.-
Determine if the
NodeLocal
DNS cache ConfigMap exists.kubectl get cm -n kube-system node-local-dns-config
{: pre}
Example output if no ConfigMap exists
Error from server (NotFound): ConfigMaps "node-local-dns-config" not found
{: screen}
-
If the ConfigMap does not exist, create a
NodeLocal
DNS cache ConfigMap.kubectl create cm -n kube-system node-local-dns-config
{: pre}
Example output
configmap/node-local-dns-config created
{: screen}
-
-
Edit the
NodeLocal
DNS cache ConfigMap. The ConfigMap uses the KubeDNS syntax to customize stub domains and upstream DNS servers. For more information, see the Kubernetes documentation{: external}.kubectl edit cm -n kube-system node-local-dns-config
{: pre}
Example output
apiVersion: v1 kind: ConfigMap metadata: name: node-local-dns-config namespace: kube-system data: stubDomains: | {"abc.com" : ["1.2.3.4"]}
{: screen}
-
After a few minutes, the
NodeLocal
DNS cache pods pick up the ConfigMap changes.
{: #dns_zone_aware}
Set up zone-aware DNS for improved cluster DNS performance and availability in your multizone {{site.data.keyword.containerlong_notm}} cluster. This setup extends NodeLocal
DNS cache to prefer cluster DNS traffic within the same zone.
{: shortdesc}
By default, your cluster is set up with cluster-wide DNS resources, not zone-aware DNS resources. Even after you set up zone-aware DNS, the cluster-wide DNS resources remain running as a backup DNS. Your zone-aware DNS resources are separate from the cluster-wide DNS, and changing zone-aware DNS does not impact the cluster-wide DNS.
Do not use the DNS cache label when you use zone-aware DNS in your cluster. {: important}
{: #dns_zone_aware_deploy}
Complete the following step to set up zone-aware DNS in your multizone cluster. {: shortdesc}
-
Update any DNS egress network policies{: external} that are impacted by zone-aware DNS, such as policies that rely on pod or namespace selectors for DNS egress. Run the following command to get a list of your network policies.
kubectl get networkpolicy --all-namespaces -o yaml
{: pre}
-
Label the
coredns
ConfigMap in thekube-system
namespace withibm-cloud.kubernetes.io/deploy-zone-aware-dns=true
.kubectl label cm -n kube-system coredns --overwrite "ibm-cloud.kubernetes.io/deploy-zone-aware-dns=true"
{: pre}
-
Refresh the cluster master to deploy the zone-aware DNS resources.
ibmcloud ks cluster master refresh -c <cluster_name_or_ID>
{: pre}
-
Watch for the refresh operation to complete by reviewing the Master Health in the cluster details.
ibmcloud ks cluster get -c <cluster_name_or_ID>
{: pre}
-
If you customized stub domains and upstream DNS servers for CoreDNS, you must also customize the
NodeLocal
DNS cache with these stub domains and upstream DNS servers. -
Set an environment variable for the zones of the cluster.
ZONES=$(kubectl get nodes --no-headers --ignore-not-found=true -o jsonpath='{range .items[*]}{.metadata.labels.topology\.kubernetes\.io/zone}{"\n"}{end}' | uniq)
{: pre}
-
Start the CoreDNS and CoreDNS autoscaler pods in all zones.
for ZONE in ${ZONES}; do kubectl scale deployment -n kube-system "coredns-autoscaler-${ZONE}" --replicas=1 done
{: pre}
-
Verify that the CoreDNS and CoreDNS autoscaler pods are running in all zones.
for ZONE in ${ZONES}; do kubectl get pods -n kube-system -l "k8s-app=coredns-autoscaler-${ZONE}" -o wide kubectl get pods -n kube-system -l "k8s-app=coredns-${ZONE}" -o wide done
{: pre}
-
Start the
NodeLocal
DNS cache pods on all workers nodes.kubectl label nodes --all --overwrite "ibm-cloud.kubernetes.io/zone-aware-dns-enabled=true"
{: pre}
-
Verify that the
NodeLocal
DNS cache pods are running on all workers nodes.for ZONE in ${ZONES}; do kubectl get pods -n kube-system -l "k8s-app=node-local-dns-${ZONE}" -o wide done
{: pre}
-
Label your worker pools so that future worker nodes inherit the
ibm-cloud.kubernetes.io/zone-aware-dns-enabled=true
label.
{: #dns_zone_aware_delete}
To remove zone-aware DNS, you must first disable zone-aware DNS in each zone of your multizone cluster. Then, delete the zone-aware DNS resources. {: shortdesc}
-
Remove the
ibm-cloud.kubernetes.io/zone-aware-dns-enabled=true
label from your worker pools. -
Set an environment variable for the zones in the cluster.
ZONES=$(kubectl get nodes --no-headers --ignore-not-found=true -o jsonpath='{range .items[*]}{.metadata.labels.topology\.kubernetes\.io/zone}{"\n"}{end}' | uniq)
{: pre}
-
Stop the
NodeLocal
DNS cache pods on all worker nodes.kubectl label nodes --all --overwrite "ibm-cloud.kubernetes.io/zone-aware-dns-enabled-"
{: pre}
-
Stop the CoreDNS autoscaler pods in all zones.
for ZONE in ${ZONES}; do kubectl scale deployment -n kube-system "coredns-autoscaler-${ZONE}" --replicas=0 done
{: pre}
-
Verify that the CoreDNS autoscaler pods are no longer running in all zones.
for ZONE in ${ZONES}; do kubectl get pods -n kube-system -l "k8s-app=coredns-autoscaler-${ZONE}" done
{: pre}
-
Stop the CoreDNS pods in all zones.
for ZONE in ${ZONES}; do kubectl scale deployment -n kube-system "coredns-${ZONE}" --replicas=0 done
{: pre}
-
Remove the
ibm-cloud.kubernetes.io/deploy-zone-aware-dns=true
label from thecoredns
ConfigMap in thekube-system
namespace.kubectl label cm -n kube-system coredns --overwrite "ibm-cloud.kubernetes.io/deploy-zone-aware-dns-"
{: pre}
-
Refresh the cluster master to the delete zone-aware DNS resources.
ibmcloud ks cluster master refresh --cluster <cluster-name-or-id>
{: pre}
-
Watch for the refresh operation to complete by reviewing the Master Health in the cluster details.
ibmcloud ks cluster get -c <cluster_name_or_ID>
{: pre}