Update pillar-with-views.example

Add some more comments for explanation.
This commit is contained in:
crux-capacitor 2018-11-16 11:09:02 -05:00 committed by GitHub
parent 3151899e06
commit bc48510abc
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -1,18 +1,19 @@
bind: bind:
configured_acls: # We have an internal ACL restricted to our configured_acls: # We have an internal ACL restricted to our
internal: # private IP ranges. internal: # private IP range.
- 127.0.0.0/8 # In this case, an ACL for external isn't needed - 10.0.0.0/8 # In this case, an ACL for external isn't needed
- 10.0.0.0/8 # as that view will be matched by 'any'. # as that view will be matched by 'any'.
# Notice that there is no 'configured_zones' at this indentation level. # Notice that there is no 'configured_zones' at this indentation level.
# That is because when you are using views, the bind service forces all zones to be served via a view. # That is because when you are using views, the bind service forces all zones to be served via a view.
# #
# Also note - any other zones defined in any other conf files will either need to be commented out, or # Also note - any other zones defined in any other conf files will either need to be commented out, or
# also served via a view using a file include. If you have other zones being served outside of a view, bind will # also served via a view using a file include. If you have other zones being served outside of a view, bind will
# fail to start. # fail to start and give you an error message indicating this. You will likely find these externally-defined zones
# in /etc/named.conf and /etc/named.conf.local
configured_views: configured_views:
external: external: # A view called 'external' to match anything except the 'internal' ACL.
match_clients: match_clients:
- any # This will match anything, including the public internet. - any # This will match anything, including the public internet.
configured_zones: configured_zones:
@ -25,7 +26,7 @@ bind:
notify: False notify: False
dnssec: False dnssec: False
internal: internal: # The 'internal' view that is restricted to the 'internal' ACL.
match_clients: match_clients:
- internal # This will match only our ACL named 'internal'. - internal # This will match only our ACL named 'internal'.
configured_zones: configured_zones:
@ -39,7 +40,7 @@ bind:
dnssec: False dnssec: False
available_zones: available_zones:
external.mydomain.com: # Beginning of the external zone definition. external.mydomain.com: # Beginning of the 'external' zone definition.
file: external.mydomain.com.txt # The file in which to save this zone's record set - matches the file file: external.mydomain.com.txt # The file in which to save this zone's record set - matches the file
# specified in the 'external' view. # specified in the 'external' view.
@ -67,7 +68,7 @@ bind:
login: portal.mydomain.com. login: portal.mydomain.com.
dashboard: www.mydomain.com. dashboard: www.mydomain.com.
internal.mydomain.com: # Beginning of the internal zone definition. internal.mydomain.com: # Beginning of the 'internal' zone definition.
file: internal.mydomain.com.txt # The file in which to save this zone's record set - matches the file file: internal.mydomain.com.txt # The file in which to save this zone's record set - matches the file
# specified in the 'internal' view. # specified in the 'internal' view.
@ -83,8 +84,8 @@ bind:
ttl: 8600 # Optional. Not set by default ttl: 8600 # Optional. Not set by default
records: # Records for the zone, grouped by type records: # Records for the zone, grouped by type
A: A:
portal: 10.0.0.10 portal: 10.0.0.10 # Here we serve all private IPs as opposed to the public IPs
gateway: 10.0.0.11 gateway: 10.0.0.11 # in the external zone.
directory: 10.0.0.12 directory: 10.0.0.12
ns1: 10.0.0.13 ns1: 10.0.0.13
www: 10.0.0.14 www: 10.0.0.14