Replies: 4 comments 1 reply
-
Hi @wolfspyre, actually the 'official' way for declaring non-octet delegations is to declare a bunch of octet-delegated zones (except for the RFC2317 case, which is, as you know, an entirely different beast. And no, I haven't forgotten about it, there just were other priorities such as NetBox 3.4 :-)). Almost everything about IPv4 is a pain, and non-octet delegations are no exception to this rule. If I have to do it I usually create a small CSV or JSON file with all the zones I need and import it - that works pretty quickly (in most cases, see below) and doesn't hurt nearly as much as clicking through the UI several (potentialy many) times. Or you can hope that someone(TM) finds the time to implement something like the mechanism that can be found in other places in NetBox, where you can, for example, define network interfaces by using a syntax like BUT (here comes the catch): It can be quite slow to do bulk creations like that. That is currently a design issue with the way new As for the reference to the less specific containers (a.k.a. 'subdomains', or, more strictly speaking, 'more specific zones' as there might be the exotic case of a zone between And the good news is: The commit mentioned above makes that enhancement pretty easy and fast to implement. Provided I find the time ... currently customers are threatening me with financial clubs to do different things instead, but that will not last forever :-) |
Beta Was this translation helpful? Give feedback.
-
ohai @peteeckel !! Firstly: FRAKKIN THANK YOU Seriously, I don't EVER intend to seem unappreciative, or be more annoying than I am intrinsically :) Secondly: Yeah, I was figuring that creating the octet-bounded-subnets was the right call; but as it isn't clearly articulated anywhere, I wanted to make sure that I wasn't missing some cleverly nuanced naming "standard" which allowed one to more elegantly encompass sub octet-bounded-address-space in a single container-construct. RE: extrapolating and magically creating / populating arpa-sub-zones Can the existing Netbox IPAM RIR/Aggregate/Prefix logic / tooling / scaffolding be leveraged? or is it not the right tool for the job here? I think it might be semi-not-crazy to have this be a configurable-at-a-netbox-instance-wide behavior... (perhaps overridable at a per-cidrblock/arpazone declaration level?) I'd imagine different use cases are likely to be organization specific, That would allow one to have a something like:
|
Beta Was this translation helpful? Give feedback.
-
Hi @wolfspyre! I wouldn't call your contributions annoying, I find them, though not always feasible in their full scale, very inspiring and a lot of things on my ever-growing agenda are derived from them - so don't stop annoying, please! :-) The idea if somehow linking IPAM structures such as prefixes etc. to DNS data is something I've been mulling over for a while now. There are, however (as usual) some obstacles to a generic solution - and I always try to find a generic solution when it comes to integrating it into any general-purpose tool, as you now. NetBox provides some means that one can use for less-generic cases. However, the relation between IPAM data and DNS data is really something that seems obvious. Some issues that make it non-trivial:
OK, enough of the whimsical 'why this is a very stupid idea and will never ever work, boohoo'-lament. What can we do? For the time being, and actually right now with the current release, the solution is (as in many cases) 'custom scripts'. You can quite easily create a custom script 'Create Reverse Zones' for IPAM prefixes that does almost what you want. Given the fact that this is a) not an everyday task and b) tedious, scripting seems to be a good option to me. That script would work along the lines of
Some parameters for the script are required: The view (may be null) for the zones to create, the name servers (may be an empty list, though providing them is easier), And, by the way, another item on my agenda: Optional per-view default NS/SOA_MNAME/SOA_RNAME for new zones. Sigh ... thanks! As for your example (by the way, I really love your host names!) ... quick question: How do you get your (and the rest of the world's) DNS resolvers to look up names in |
Beta Was this translation helpful? Give feedback.
-
Hi @wolfspyre, it's been a while :-) RFC2317 support has finally arrived, not here in the morgue of the early NetBox DNS plugin, though. Have a look at NetBox DNS 0.22.1. Today's release has RFC2317 support and should be fairly usable right now. |
Beta Was this translation helpful? Give feedback.
-
so.... declaring of reverse zones is a little wonky...
Netbox DNS, right now, works fantastically for /8 /16 and /24 scoped reverse zones.
If you declare the reverse zones:
10.in-addr.arpa
(/8 boundary)1.10.in-addr.arpa
(/16 boundary)1.128.10.in-addr.arpa
(/24 boundary)254.10.in-addr.arpa
(/16 boundary)and add A records for:
foo.example.com
-> 10.128.1.1bacon.example.com
-> 10.128.200.1bar.example.com
-> 10.1.1.1baz.example.com
-> 10.254.1.1foo.example.com gets an entry in the 1.128.10.in-addr.arpa zone.
bar.example.com gets an entry in the 1.10.in-addr.arpa zone.
baz.example.com gets an entry in the 254.10.in-addr.arpa zone.
bacon.example.com gets an entry in the 10.in-addr.arpa zone.
with, for example, a /23, I think the pattern of declaring the adjacent /24 reverse zone makes sense....
ie
10.100.0/23 = ( 10.100.0/24 10.100.1/24 ... or 1.100.10.in-addr.arpa and 0.100.10.in-addr.arpa)
but what to do about, for example:
172.16/12
doing that by obvious bounds would require declaring 16 /16 arpa zones:
Which is totally doable....
a bit of a pain, but.... doable...
I wanted to ask what one aught do, because when looking at the LEAST SPECIFIC reverse zone (10.in-addr.arpa) .... it contains any fall-through records which don't fit into any existing smaller-subnet containers (reverse zones declared).... However there's no obvious reference or awareness of the smaller subcontainers.... IE: no NS records pointing to the other zone(s), or links to 'child reverse zones'... IE no way of indicating that there are reverse-zones-of-greater-specificity within this dns "view" (or also lacking a view)
This leads me to believe that I'm doing something wrong in that the 'parent prefix reverse zone' doesn't seem to have awareness of the child-prefix reverse zones... an I figured it'd prolly be better to ask how to model this relationship, rather than just assuming I understood how it was supposed to be done... :)
Beta Was this translation helpful? Give feedback.
All reactions