公司有測試需求,當連接一個網絡后自動會進入產品的測試環境,所以搭建了一個DNS解析服務,來完成此需求。
參考:http://blog.chinaunix.net/uid-30149335-id-5069146.html 找了個教程參考了一下,然后根據自己需求更改
一、安裝BIND
yum install -y bind cp /etc/named.conf /etc/named.conf.bak >/etc/named.conf vim /etc/named.conf
加入如下配置:
options {
    directory "/var/named";
};
zone "." IN  {
    type hint;
    file "named.ca";
};
zone "localhost" IN {
    type master;
    file "localhost.zone";
};
zone "0.0.127.in-addr.arpa" IN {
    type master;
    file "named.local";
};
 
         chown named /etc/named.conf #如果屬組是named可以不改 cd /var/named/ dig -t NS . > named.ca
vim localhost.zone //加入
@                   IN      SOA     localhost.  admin.localhost.     (
                                                                        2013081601
                                                                        1H
                                                                        10M
                                                                        7D
                                                                        1D
                                                                           )
@                   IN          NS          localhost.
localhost.          IN          A           127.0.0.1
 
         vim named.local //加入
$TTL 86400
@                    IN      SOA     localhost.  admin.localhost.      (
                                                                        2013081601
                                                                        1H
                                                                        10M
                                                                        7D
                                                                        1D
                                                                        )
@                    IN          NS          localhost.
1                    IN          PTR         localhost
 
          rndc-confgen -r /dev/urandom -a // 這一步是生成 rndc.key, 如果沒有這個key namd 是啟動不了的 ####話說我也沒測試到底能不能啟動。。。
檢測配置是否有問題: named-checkconf
netstat -lnp |grep named // 查看一下named進程是否監聽了53端口
/etc/init.d/named start #看看能不能起來,沒起來的話根據報錯去解決,起來的話就能正常解析了
二、增加一個域名(zone) 備:這就是我的需求,需要把產品的域名解析到我們的測試機上,增加一個域名解析
vim /etc/named.conf ##請根據自己的域名及IP更改
zone "hotel.test.com" IN {
    type master;
    file "hotel.test.com.lan";
};
zone "10.168.192.in-addr.arpa" IN {
    type master;
    file "10.168.192.db";
};
 
        cd /var/named/
vi hotel.test.com
$TTL    86400
@        IN    SOA   ns.hotel.test.com. root.hotel.test.com. (
               2007041501   ;Serial
               3600         ;Refresh
               1800         ;Retry
               604800       ;Expire
               86400        ;Minimum TTL
)
               IN    NS     ns.hotel.test.com.
               IN    A       192.168.10.10
               IN    MX 10   ns.hotel.test.com.
 
ns             IN    A       192.168.10.10
 
        vi 10.168.192.db
$TTL    86400
@       IN    SOA  ns.hotel.test.com. root.hotel.test.com. (
              2007041501     ;Serial
              3600           ;Refresh
              1800           ;Retry
              604800         ;Expire
              86400          ;Minimum TTL
)
              IN        NS    ns.hotel.test.com.
 
              IN        PTR   hotel.test.com.
              IN        A     255.255.255.0
 
17            IN        PTR   ns.hotel.test.com.
 
        
把本機DNS改成自己的,然后dig測試一下
[root@TBJ named]# dig hotel.test.com ; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6_8.3 <<>> hotel.test.com ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34986 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1 ;; QUESTION SECTION: ;hotel.test.com. IN A ;; ANSWER SECTION: hotel.test.com. 86400 IN A 192.168.10.10 ;; AUTHORITY SECTION: hotel.test.com. 86400 IN NS ns.hotel.test.com. ;; ADDITIONAL SECTION: ns.hotel.test.com. 86400 IN A 192.168.10.10 ;; Query time: 0 msec ;; SERVER: 115.182.63.152#53(115.182.63.152) ;; WHEN: Thu Feb 9 17:44:51 2017
完事。
