Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature request: Ability for split DNS w/o DoT nor DoH #1839

Open
samip5 opened this issue Sep 2, 2023 · 3 comments
Open

Feature request: Ability for split DNS w/o DoT nor DoH #1839

samip5 opened this issue Sep 2, 2023 · 3 comments
Labels
Category: DNS 📠 Status: 🔴 Blocked Blocked by another issue or pull request

Comments

@samip5
Copy link

samip5 commented Sep 2, 2023

What's the feature 🧐

I want to be able to say that this specific domain needs to be resolved from Kubernetes DNS server and also set the routing so it can be reached.

Eg. coredns on 10.41.0.10 (default in Kubernetes that it's the .10 address).

Extra information and references

No response

@qdm12
Copy link
Owner

qdm12 commented Sep 15, 2023

That should be done with the new DNS server, see #137 let's keep this opened though

@qdm12 qdm12 added Category: DNS 📠 Status: 🔴 Blocked Blocked by another issue or pull request labels Sep 15, 2023
@bjeanes
Copy link

bjeanes commented Jul 31, 2024

Another use case for my current situation...

I am binding a few LinuxServer.io services to a gluetun instance and using https://github.com/tailscale-dev/docker-mod to embed a Tailscale user-level connection and proxy the service's web UI with tailscale serve.

I can get routing to/from the Tailscale to work fine, including local traversal, by properly setting FIREWALL_OUTBOUND_SUBNETS. However, DNS resolution for other Tailscale hosts (which is desirable in my arrangement) doesn't work because 127.0.0.1:53 just forwards this upstream (i.e. Cloudflare, by default).

It would ideal to be able to influence the unbound config to do something like this:

        private-domain: "ts.net."

forward-zone:
        name: "ts.net."
        forward-addr: 100.100.100.100

I recognise you've got goals to radically change how DNS works in gluetun, but it has been several years on that front. Is there something we could do in the interim, such as an env var like:

DNS_SPLIT_UPSTREAMS=some-root.domain.net/1.2.3.4,ts.net/100.100.100.100

?

@mstaffa
Copy link

mstaffa commented Oct 13, 2024

Would like to bump this.

In Kubernetes in particular it would be helpful to be able to specify the cluster DNS resolver for instances where I want a container with gluetun to be able to resolve other services in the cluster.

I want a container in pod X to be able to connect to the service of pod Y by the service's name, not it's IP address.

@qdm12 if this is accomplished in #137 and PR #1742 could you suggest how to use it? Would be happy to create a PR updating the documentation if so.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Category: DNS 📠 Status: 🔴 Blocked Blocked by another issue or pull request
Projects
None yet
Development

No branches or pull requests

4 participants