bind配置高可用

本文详细描述了如何在Linux系统中配置BINDDNS服务器,包括设置主服务器和从服务器,管理区域文件(如jin.com域),以及使用named-checkconf和named-checkzone工具进行配置检查。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

bind从192.168.126

[root@localhost yum.repos.d]#  yum -y install bind bind-utils

[root@slavenamed slaves]# which named-checkconf

/usr/sbin/named-checkconf

[root@localhost yum.repos.d]# rpm -qf `which named-checkconf`

bind-9.16.23-14.el9.x86_64

bind从192.168.8.126

[root@slavenamed slaves]# cat /etc/named.conf

//

// named.conf

//

// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS

// server as a caching only nameserver (as a localhost DNS resolver only).

//

// See /usr/share/doc/bind*/sample/ for example named configuration files.

//

options {

listen-on port 53 { 127.0.0.1; 192.168.8.126; };

listen-on-v6 port 53 { ::1; };

directory "/var/named";

dump-file "/var/named/data/cache_dump.db";

statistics-file "/var/named/data/named_stats.txt";

memstatistics-file "/var/named/data/named_mem_stats.txt";

secroots-file "/var/named/data/named.secroots";

recursing-file "/var/named/data/named.recursing";

allow-query     { localhost; 192.168.8.0/24; };  #限制客户端的查询

/*

 - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.

 - If you are building a RECURSIVE (caching) DNS server, you need to enable

   recursion.

 - If your recursive DNS server has a public IP address, you MUST enable access

   control to limit queries to your legitimate users. Failing to do so will

   cause your server to become part of large scale DNS amplification

   attacks. Implementing BCP38 within your network would greatly

   reduce such attack surface

*/

recursion yes;

dnssec-validation yes;

managed-keys-directory "/var/named/dynamic";

geoip-directory "/usr/share/GeoIP";

pid-file "/run/named/named.pid";

session-keyfile "/run/named/session.key";

/* https://fedoraproject.org/wiki/Changes/CryptoPolicy */

include "/etc/crypto-policies/back-ends/bind.config";

};

logging {

        channel default_debug {

                file "data/named.run";

                severity dynamic;

        };

};

zone "." IN {

type hint;

file "named.ca";

};

include "/etc/named.rfc1912.zones";

include "/etc/named.root.key";

#zone "jin.com" IN {

 #       type master;

  #      file "jin.com.zone";  

#};

zone "jin.com" IN {          #配置bind高可用

type slave;

file "slaves/jin.com.zone";

masters {  192.168.8.118; };

masterfile-format text;

};

检查区域配置文件

[root@masternamed named]# named-checkzone jin.com jin.com.zone

检查配置文件

[root@masternamed named]# named-checkconf /etc/named.conf

(2)部署bind master

bind主192.168.8.118

[root@localhost yum.repos.d]#  yum -y install bind bind-utils

[root@masternamed named]# pwd

/var/named

[root@masternamed named]# touch jin.com.zone

[root@masternamed named]# chown -R named. jin.com.zone

[root@masternamed named]# cat jin.com.zone

$TTL 7200

jin.com. IN SOA jin.com. admin.jin.com. (

2024012302

1H

10M

1W

1D )

jin.com. IN NS ns1.jin.com.

jin.com. IN NS ns2.jin.com.

ns1.jin.com. IN A 192.168.8.118

ns2.jin.com. IN A 192.168.8.126

www.jin.com. IN A 192.168.8.118

www.jin.com. IN A 192.168.8.126

ftp.jin.com. IN A 192.168.8.5

ftp.jin.com. IN A 192.168.8.6

[root@masternamed named]# cat /etc/named.conf

//

// named.conf

//

// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS

// server as a caching only nameserver (as a localhost DNS resolver only).

//

// See /usr/share/doc/bind*/sample/ for example named configuration files.

//

options {

listen-on port 53 { 127.0.0.1; 192.168.8.118;};

listen-on-v6 port 53 { ::1; };

directory "/var/named";

dump-file "/var/named/data/cache_dump.db";

statistics-file "/var/named/data/named_stats.txt";

memstatistics-file "/var/named/data/named_mem_stats.txt";

secroots-file "/var/named/data/named.secroots";

recursing-file "/var/named/data/named.recursing";

allow-query     { localhost; 192.168.8.0/24; };

/*

 - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.

 - If you are building a RECURSIVE (caching) DNS server, you need to enable

   recursion.

 - If your recursive DNS server has a public IP address, you MUST enable access

   control to limit queries to your legitimate users. Failing to do so will

   cause your server to become part of large scale DNS amplification

   attacks. Implementing BCP38 within your network would greatly

   reduce such attack surface

*/

recursion yes;

dnssec-validation yes;

managed-keys-directory "/var/named/dynamic";

geoip-directory "/usr/share/GeoIP";

pid-file "/run/named/named.pid";

session-keyfile "/run/named/session.key";

/* https://fedoraproject.org/wiki/Changes/CryptoPolicy */

include "/etc/crypto-policies/back-ends/bind.config";

};

logging {

        channel default_debug {

                file "data/named.run";

                severity dynamic;

        };

};

zone "." IN {

type hint;

file "named.ca";

};

include "/etc/named.rfc1912.zones";

include "/etc/named.root.key";

#zone "jin.com" IN {

# type master;

# file "jin.com.zone";

#};

zone "jin.com" IN {

type master;

file "jin.com.zone";       #配置bind主的配置

also-notify { 192.168.8.126;};

allow-transfer {  192.168.8.126;};

allow-update { none; };

notify yes;

};

修改bind主的区域配置文件

[root@masternamed named]# cat jin.com.zone

$TTL 7200

jin.com. IN SOA jin.com. admin.jin.com. (

2024012303 

1H

10M

1W

1D )

jin.com. IN NS ns1.jin.com.

jin.com. IN NS ns2.jin.com.

ns1.jin.com. IN A 192.168.8.118

ns2.jin.com. IN A 192.168.8.126

www.jin.com. IN A 192.168.8.118

www.jin.com. IN A 192.168.8.126

ftp.jin.com. IN A 192.168.8.5

ftp.jin.com. IN A 192.168.8.6

ftp.jin.com. IN A 192.168.8.7

重启服务

[root@masternamed named]# systemctl restart named

查看bind从slaves

[root@slavenamed slaves]# cat jin.com.zone

$ORIGIN .

$TTL 7200 ; 2 hours

jin.com IN SOA jin.com. admin.jin.com. (

2024012303 ; serial

3600       ; refresh (1 hour)

600        ; retry (10 minutes)

604800     ; expire (1 week)

86400      ; minimum (1 day)

)

NS ns1.jin.com.

NS ns2.jin.com.

$ORIGIN jin.com.

ftp A 192.168.8.5

A 192.168.8.6

A 192.168.8.7

ns1 A 192.168.8.118

ns2 A 192.168.8.126

www A 192.168.8.118

A 192.168.8.126

[root@slavenamed slaves]# pwd

/var/named/slaves

### 关于 UniApp 框架推荐资源与教程 #### 1. **Uniapp 官方文档** 官方文档是最权威的学习资料之一,涵盖了从基础概念到高级特性的全方位讲解。对于初学者来说,这是了解 UniApp 架构技术细节的最佳起点[^3]。 #### 2. **《Uniapp 从入门到精通:案例分析与最佳实践》** 该文章提供了系统的知识体系,帮助开发者掌握 Uniapp 的基础知识、实际应用以及开发过程中的最佳实践方法。它不仅适合新手快速上手,也能够为有经验的开发者提供深入的技术指导[^1]。 #### 3. **ThorUI-uniapp 开源项目教程** 这是一个专注于 UI 组件库设计实现的教学材料,基于 ThorUI 提供了一系列实用的功能模块。通过学习此开源项目的具体实现方式,可以更好地理解如何高效构建美观且一致的应用界面[^2]。 #### 4. **跨平台开发利器:UniApp 全面解析与实践指南** 这篇文章按照章节形式详细阐述了 UniApp 的各个方面,包括但不限于其工作原理、技术栈介绍、开发环境配置等内容,并附带丰富的实例演示来辅助说明理论知识点。 以下是几个重要的主题摘选: - **核心特性解析**:解释了跨端运行机制、底层架构组成及其主要功能特点。 - **开发实践指南**:给出了具体的页面编写样例代码,展示了不同设备间 API 调用的方法论。 - **性能优化建议**:针对启动时间缩短、图形绘制效率提升等方面提出了可行策略。 ```javascript // 示例代码片段展示条件编译语法 export default { methods: { showPlatform() { console.log(process.env.UNI_PLATFORM); // 输出当前平台名称 #ifdef APP-PLUS console.log('Running on App'); #endif #ifdef H5 console.log('Running on Web'); #endif } } } ``` #### 5. **其他补充资源** 除了上述提到的内容外,还有许多在线课程视频可供选择,比如 Bilibili 上的一些免费系列讲座;另外 GitHub GitCode 平台上也有不少优质的社区贡献作品值得借鉴研究。 --- ###
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值