ansible-collection-famedly-dns/roles/powerdns
2023-12-13 12:29:48 +01:00
..
defaults update(powerdns): bump version to 4.8.3 2023-12-13 12:29:48 +01:00
files feat(powerdns): add ansible role for deploying powerdns in a container 2022-01-23 14:26:15 +01:00
handlers chore(powerdns): fix lints 2023-10-06 13:30:42 +02:00
tasks fix(powerdns): correct handler name 2023-10-25 16:35:26 +02:00
templates feat(powerdns): add ansible role for deploying powerdns in a container 2022-01-23 14:26:15 +01:00
vars feat(powerdns): add ansible role for deploying powerdns in a container 2022-01-23 14:26:15 +01:00
README.md chore(docs): fix spelling mistakes in READMEs 2022-02-21 10:03:48 +01:00

famedly.dns.powerdns ansible collection

Overview

Configuration

Most configuration options from PowerDNSs' Authoritative Server Settings are available by setting powerdns_config_$option, where $option is written in snake_case.

Dynamic record types

ALIAS records

To enable ALIAS records (think: CNAME but allowed at zone apex), set the following configuration options:

# This turns on ALIAS processing, otherwise `NODATA` is returned for the record
powerdns_config_expand_alias: true
# Configure the DNS server to query for the content of the ALIAS record,
# if this is not set, ALIAS records will not be available
powerdns_config_resolver: 9.9.9.9:53
# If using DNSSEC without live-signing, the primary will query the content
# and sign it before sending it in the AXFR
powerdns_config_outgoing_axfr_expand_alias: true

For more operational instructions on ALIAS records, see PowerDNSs' documentation on ALIAS records

DNAME records

Not enabled per default, set powerdns_config_dname_processing: true.

LUA records

To enable LUA records, set powerdns_config_enable_lua_records to true or 'shared'.

Automating DNSSEC Delegation Trust Maintenance (RFC7344)

RFC7344 specifies how to automatically publish DNS Key signing keys (KSKs) using DNS itself.

To enable this behaviour, configure the following:

powerdns_config_default_publish_cdnskey: 1
powerdns_config_default_publish_cds: 1,2,4
# sha1, sha256, sha384 as per http://www.iana.org/assignments/ds-rr-types/ds-rr-types.xhtml#ds-rr-types-1

It is also possible to configure this per-zone, allowing to control the used signing algorithms for each zone. Set the zone metadata accordingly:

PUBLISH-CDNSKEY: 1 # true
PUBLISH-CDS: 1,2 # sha1, sha256

Updating the role