We currently utilize Amazon's Route 53 as a DNS service we will be transitioning to a different primary provider (DynDNS) and have Route53 as a secondary provider; managed and synced by OctoDNS via GitLab repositories and CI jobs.
Establish DynDNS Contract.
Create Route53 user w/ scoped permissions and access tokens for automation.
Create DynDNS user w/ API tokens for automation.
Slurp Route53 zone data into DynDNS using OctoDNS.
Validate DynDNS data in all zones.
Test OctoDNS generated changes for population into DynDNS & Route53.
@briann good catch -- and, something along the same lines with IP addresses may be a good idea.
A single unicast or anycast IP address has similar limits and it may also be good to add some more "A" records for key servers, distributed across different providers.
Something to also keep in mind, though it probably doesn't might matter much, is that distributing nameservices across providers will void the SLA, e.g. with AWS Route 53:
The Service Commitment does not apply to any unavailability, suspension or termination of Amazon Route 53, or any other Amazon Route 53 performance issues: ... (vii) that, with respect to public DNS only, result during a period that you were not using all four virtual name servers (for example, ns123.awsdns.com, ns123.awsdns.net, ns123.awsdns.co.uk and ns123.awsdns.org) assigned to your “hosted zone” - Amazon Route 53 Service Level Agreement
We are running a project with coredns, kubernetes, git + zone files and multiple secondary providers (DNSMadeEasy + BuddyNS). Audit, permissions via git and extendable to every provider that has secondary capabilities. Always happy to talk.
Name Server: NS-705.AWSDNS-24.NETName Server: NS-505.AWSDNS-63.COMName Server: NS-1644.AWSDNS-13.CO.UKName Server: NS-1373.AWSDNS-43.ORGName Server: Name Server: Name Server: Name Server: Name Server: Name Server:
per Gandi.netGandi lets you use your own DNS (up to 10) if you need to.
@briann I was discussing this with @northrup , and decided to remove it from this week's milestone. He mentioned the monthly cost, which... when I put it in the risk assessment scoring on the cost of the action, drops the (risk averted)/(cost of action) ratio way down... to the point that it is not something we should be working on right now compared to other things.
Due to changes in the Risk Assessment I'm marking this as SL3 for now, which means we should get to it in the coming months but it's no longer a priority.
@ernstvn I've already got some work down on this one and have checked it off on the progress, I should be able to knock this out within the coming month with a little here and a little there.
John Northrupmarked the checklist item Slurp Route53 zone data into DynDNS using OctoDNS. as completed
marked the checklist item Slurp Route53 zone data into DynDNS using OctoDNS. as completed
John Northrupmarked the checklist item Validate DynDNS data in all zones. as completed
marked the checklist item Validate DynDNS data in all zones. as completed
John Northrupmarked the checklist item Test OctoDNS generated changes for population into DynDNS & Route53. as completed
marked the checklist item Test OctoDNS generated changes for population into DynDNS & Route53. as completed
John Northrupmarked the checklist item Automate CI job for OctoDNS commits. as completed
marked the checklist item Automate CI job for OctoDNS commits. as completed
The managing project is gitlab-com/gitlab-dns that uses our own Docker image of gitlab/gitlab-dns to push changes.
Right now I have slurped the data from Route53 and loaded the initial yaml files, GitLab CI has pushed the DNS data into DynDNS.
Next step is to balance out the NS records to include both Dyn and Route53 for diversity, making the yaml data authoritative for Route53, and then letting the git repo and MR's do the rest of the work.