Configuration¶
This chapter describes how to configure the ZoneControl service.
After changing settings, do not forget to restart the service.
Database configuration¶
ZoneControl, by default, uses an SQLite
database located at /var/lib/zonecontrol/zonecontrol.db
. Should
another database be needed, it needs to be configured in
/etc/zonecontrol/settings.py
.
Django offers connectors for many types of database servers, described in its online documentation.
To enable support for databases other than SQLite, the package with the database driver must be installed. These packages are named “zonecontrol-<database>”. The following databases are supported:
Database |
Package-suffix |
Engine in |
---|---|---|
MySQL |
|
django.db.backends.mysql |
Now configure the database in /etc/zonecontrol/settings.py
, set the
ENGINE to the Engine from the table. The rest of the settings are
self-explanatory:
DATABASES = {
'default': {
'ENGINE': '$ENGINE',
'NAME': 'mydatabase',
'USER': 'mydatabaseuser',
'PASSWORD': 'mypassword',
'HOST': '127.0.0.1',
'PORT': '',
}
}
After setting up a new database, it need to be populated with database
tables. Run the following command as the zonecontrol
user:
zonecontrol-manage migrate
Secret configuration¶
The Django web framework relies on a “secret key” for encrypting cookies, password reset tokens and other uses (see the online documentation for more).
This key is generated upon package installation in
/var/lib/zonecontrol/secret_key
.
Should this key not be set or if it is too short, ZoneControl will not start. Generate a new key and add it to the configuration file:
/usr/share/zonecontrol/bin/python3 -c 'import random; import string; print("".join([random.SystemRandom().choice("{}{}{}".format(string.ascii_letters, string.digits, string.punctuation)) for i in range(50)]))' > /var/lib/zonecontrol/secret_key
HTTP Service configuration¶
The Gunicorn HTTP server is configured in the
/etc/zonecontrol/gunicorn_config.py
file. By default, it will listen
for HTTP connections on 127.0.0.1:8083
.
A sane configuration is below:
# Config file for the gunicorn HTTP server
# See: http://docs.gunicorn.org/en/stable/settings.html
import multiprocessing
import os
# This only has an effect if setproctitle is installed.
proc_name = 'zonecontrol'
raw_env = ['DJANGO_SETTINGS_MODULE=project.settings', 'GUNICORN=1']
bind = ['127.0.0.1:8053']
workers = multiprocessing.cpu_count() * 2
threads = 8 # per worker
timeout = 30 # sec
chdir = '/usr/share/zonecontrol'
accesslog = '/var/log/zonecontrol/access.log'
access_log_format = '%(h)s (%({X-Forwarded-For}i)s) %(l)s %(u)s %(t)s "%(r)s" %(s)s %(b)s "%(f)s" "%(a)s"'
errorlog = '/var/log/zonecontrol/error.log'
loglevel = 'info'
# syslog = True
For more settings, please consult the online documentation.
Scheduled Changes Deployment¶
In order to deploy scheduled changes, ZoneControl comes with a small service
called zonecontrol-scheduler.service
. This service reads the
Scheduled Changes from the database and applies them when needed.
Zones List Caching¶
New in version 1.2.0.
ZoneControl can cache the zones-list in redis to speed up calls from the frontend.
Note
Only the list of zones is cached, not the zone contents.
When changes are made, ZoneControl also stores these
mutations in the cache after they have been accepted by PowerDNS. A seperate
service called zonecontrol-cache
loads the list of zones into redis and prunes
the mutations at regular intervals. The zones-list is stored wih an expiry time
so the cache is either empty or recent.
ZoneControl will always attempt to load the zones-list from the cache, if it cannot find the list or caching is explicitly disabled, it will fall back to loading the list from PowerDNS.
Enabling Caching¶
On installations on CentOS, install the zonecontrol-cache
package, this will
also install redis
. For Debian installations, install the redis
package.
Then start and enable both redis and the zonecontrol-cache services:
systemctl enable redis.service
systemctl start redis.service
systemctl enable zonecontrol-cache.service
systemctl start zonecontrol-cache.service
Cache configuration¶
The caching behaviour is controlled by several options in /etc/zonecontrol/settings.py
.
ZONECONTROL_CACHE_ZONES
:Whether or not to cache zones lists (for
zonecontrol-cache
) and to attempt to retrieve them (for ZoneControl), defaultTrue
.ZONECONTROL_CACHE_ZONES_LOCATION
:Connection URL for Redis. By default database 1 on localhost without authentication and encryption. is used. The redis-py documentation describes this URI in detail. Default is
"redis://127.0.0.1:6379/1"
.ZONECONTROL_CACHE_ZONES_PASSWORD
:Password for Redis. Default is
None
(ie: no password). If Redis ACLs are used, the username can be supplied as part of the URI described above.ZONECONTROL_CACHE_ZONES_INTERVAL
:After
zonecontrol-cache
has added a new list to the cache, this setting controls how long it will wait before starting a new retrieval. Default is60
.ZONECONTROL_CACHE_ZONES_EXPIRE_TTL
:How long a zones-list is cached in redis before automatically removed, in seconds. Default is
300
.
After changing the settings, restart zonecontrol-cache.service
.
Zones Overview DNSSEC Retrieval¶
New in version 1.2.0.
By default, the PowerDNS API includes the dnssec
field when the list of zones
is retrieved. Generating this field takes 5 queries to the database per zone in
the list. When the database is slow, has high latency or the list of zones is
huge, this can severely impact the performance of the zones overview in the ZoneControl
frontend.
PowerDNS Authoritative Server 4.2.1 introduced the possiblity to request the
zones-list without dnssec information. ZoneControl takea advantage of this
API feature by default. To have ZoneControl request DNSSEC information from
PowerDNS, set ZONECONTROL_ZONE_OVERVIEW_DNSSEC
to True
in
/etc/zonecontrol/settings.py
.
The downside of this feature is the loss of the “DNSSEC” column on the overview page of ZoneControl.
Restriction of Zone Kinds¶
New in version 1.1.0.
Operators might want to limit the kind of zones that can be created through
ZoneControl. This can be done using the ZONECONTROL_ALLOW_ZONE_KINDS
list
in /etc/zonecontrol/settings.py
.
By default, all kinds are allowed. To only allow Native zones:
from project.zonecontrol import ZONE_KIND_NATIVE
ZONECONTROL_ALLOW_ZONE_ACTIONS = [ZONE_KIND_NATIVE]
Note: while in the UI for the user the Master & Slave kinds have been renamed to Primary & Secondary, this is not the case for the config settings. One should still use ZONE_KIND_MASTER
and ZONE_KIND_SLAVE
for restricting zone kinds.
Advanced DNSSEC¶
New in version 1.1.0.
When a user has the “Advanced DNSSEC” permissions, they can manipulate single DNSSEC keys for zones. The ZoneControl configuration can limit the DNSSEC algorithms that are allowed to be created. There are two settings related to this.
ZONECONTROL_ADVANCED_DNSSEC_ALGORITHMS
:This is the list of algorithms that is shown in the selection box and that are allowed when keys are created through the ZoneControl API. By default, these are
[DNSSEC_ALGO_ECDSA256, DNSSEC_ALGO_ECDSA384, DNSSEC_ALGO_ED25519]
.ZONECONTROL_ADVANCED_DNSSEC_DEFAULT_ALGORITHM
:This is the algorithm that is set in the Advanced DNSSEC views’ selection box by default. This algorithm must be in the
ZONECONTROL_ADVANCED_DNSSEC_ALGORITHMS
list and isDNSSEC_ALGO_ECDSA256
by default.
Default NSEC3PARAM¶
New in version 1.4.2.
The default NSEC3PARAM
is set to 1 0 0 -
in /etc/zonecontrol/settings.py
and can be changed there. These parameters are recommended by
RFC9276.
Automatic PTR Creation¶
New in version 1.1.0.
ZoneControl can create PTR records for A and AAAA records that are created or
modified. This can be disabled in the configuration by setting ZONECONTROL_ALLOW_AUTOMATIC_PTR
to False
in /etc/zonecontrol/settings.py
.
Zone Actions¶
New in version 1.1.0.
Users with permissions to access zones can force actions like queuing NOTIFY
messages to secondaries or (re-)retrieving a secondary zone. The allowed actions are
specified in ZONECONTROL_ALLOW_ZONE_ACTIONS
. By default this is set to
[ZONE_ACTION_NOTIFY, ZONE_ACTION_AXFR_RETRIEVE]
.
Prometheus Metrics¶
New in version 1.5.1.
Prometheus metrics will be exported on the /metrics
URL path. This is
the default path for Prometheus so just pointing your Prometheus
configuration at the host:port
target should be enough.
The metrics are disabled by default and can be enabled by setting
ZONECONTROL_METRICS_ENABLED
to True
in /etc/zonecontrol/settings.py
.
The metric for the number of zones (zonecontrol_zones
) is only available
when the caching of zones is enabled. See Zones List Caching.
Catalog Zone Support¶
New in version 1.6.0.
Note: Catalog zone support in ZoneControl will only work for PowerDNS Authoritative Server v4.9 and higher versions.
Support for Catalog Zones
is disabled by default (see the note above) and can be enabled by setting
ZONECONTROL_CATALOG_ZONE_SUPPORT
to True
in
/etc/zonecontrol/settings.py
.
When viewing a catalog zone there will be a new section where zones can be added and removed from the catalog.
Audit Logging to Standard Out or File¶
New in version 1.6.0.
Audit logging can be echoed to standard out or a file by setting ZONECONTROL_AUDITLOG_STDOUT
to True
in /etc/zonecontrol/settings.py
. It is disabled by default.
These audit log lines are in JSON format but it is also possible to have plain text output; this is done by setting ZONECONTROL_JSON_LOGGING
to False
in the same settings file.
(The ZONECONTROL_JSON_LOGGING
setting only applies to the audit logging at the moment, but it is the intention to do all ZoneControl logging in JSON format in some future ZoneControl major release at which point this setting will apply to all logging.)