https://github.com/bodgit/puppet-unbound
Puppet Module for managing Unbound
https://github.com/bodgit/puppet-unbound
dns puppet unbound
Last synced: about 2 months ago
JSON representation
Puppet Module for managing Unbound
- Host: GitHub
- URL: https://github.com/bodgit/puppet-unbound
- Owner: bodgit
- License: apache-2.0
- Created: 2016-07-24T19:31:47.000Z (almost 9 years ago)
- Default Branch: master
- Last Pushed: 2019-05-19T14:21:27.000Z (about 6 years ago)
- Last Synced: 2025-04-30T20:33:14.769Z (about 2 months ago)
- Topics: dns, puppet, unbound
- Language: Puppet
- Homepage: https://forge.puppet.com/bodgit/unbound
- Size: 164 KB
- Stars: 0
- Watchers: 2
- Forks: 2
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
Awesome Lists containing this project
README
# unbound
Tested with Travis CI
[](https://travis-ci.org/bodgit/puppet-unbound)
[](https://coveralls.io/github/bodgit/puppet-unbound?branch=master)
[](https://forge.puppetlabs.com/bodgit/unbound)
[](https://gemnasium.com/bodgit/puppet-unbound)#### Table of Contents
1. [Description](#description)
2. [Setup - The basics of getting started with unbound](#setup)
* [Beginning with unbound](#beginning-with-unbound)
3. [Usage - Configuration options and additional functionality](#usage)
4. [Reference - An under-the-hood peek at what the module is doing and how](#reference)
5. [Limitations - OS compatibility, etc.](#limitations)
6. [Development - Guide for contributing to the module](#development)## Description
This module manages Unbound.
RHEL/CentOS and OpenBSD are supported using Puppet 4.6.0 or later.
## Setup
### Beginning with unbound
In the simplest case, configure Unbound listening on all interfaces:
```puppet
include ::unbound
```## Usage
Update the above example to specify the forwarders to use and allow access
from the local network, also restrict outbound ports used to avoid anything
below 32768 and above 65000:```puppet
class { '::unbound':
access_control => [
["${::network}/${netmask_to_masklen($::netmask)}", 'allow'],
["${::network6}/${netmask_to_masklen($::netmask6)}", 'allow'],
],
outgoing_port => [
['avoid', 0, 32767],
['avoid', 65001, 65535],
],
}::unbound::forward { '.':
forward_addr => [
'8.8.8.8',
'8.8.4.4',
'2001:4860:4860::8844',
'2001:4860:4860::8888',
],
}
```Configure NSD listening on the primary interface as a slave for a single
zone protected with a given TSIG key and configure Unbound listening on
the loopback interface only with a stub zone pointing to NSD:```puppet
class { '::nsd':
ip_address => [
$::ipaddress,
$::ipaddress6,
],
}::nsd::key { 'example.':
algorithm => 'hmac-sha256',
secret => '6z+8iKRIQrwN43TFfO/Rf2NHzpHIFVi6PsJ7dDESclc=',
}::nsd::zone { 'example.com.':
allow_notify => [
['192.0.2.1', 'example.'],
],
request_xfr => [
['AXFR', '192.0.2.1', 'example.'],
],
}class { '::unbound':
interface => [
$::ipaddress_lo,
$::ipaddress6_lo,
],
}::unbound::stub { 'example.com.':
stub_addr => [
$::ipaddress,
$::ipaddress6,
],
}
```If NSD is not required then local data can be used instead:
```puppet
class { '::unbound':
interface => [
$::ipaddress_lo,
$::ipaddress6_lo,
],
local_zone => [
['example.com.', 'static'],
],
local_data => [
{
'name' => 'example.com.'
'ttl' => 86400,
'class' => 'IN',
'type' => 'NS',
'hostname' => 'ns1.example.com.',
},
{
'name' => 'example.com.'
'ttl' => 86400,
'class' => 'IN',
'type' => 'SOA',
'primary' => 'ns1.example.com.',
'email' => 'hostmaster.example.com.',
'serial' => 1,
'refresh' => 10800,
'retry' => 15,
'expire' => 604800,
'negative' => 10800,
},
{
'name' => 'ns1.example.com.',
'ttl' => 86400,
'class' => 'IN',
'type' => 'A',
'ip' => '192.0.2.1',
},
],
}
```## Reference
The reference documentation is generated with
[puppet-strings](https://github.com/puppetlabs/puppet-strings) and the latest
version of the documentation is hosted at
[https://bodgit.github.io/puppet-unbound/](https://bodgit.github.io/puppet-unbound/).## Limitations
This module has been built on and tested against Puppet 4.6.0 and higher.
The module has been tested on:
* RedHat Enterprise Linux 6/7
* OpenBSD 6.0/6.1## Development
The module has both [rspec-puppet](http://rspec-puppet.com) and
[beaker-rspec](https://github.com/puppetlabs/beaker-rspec) tests. Run them
with:```
$ bundle exec rake test
$ PUPPET_INSTALL_TYPE=agent PUPPET_INSTALL_VERSION=x.y.z bundle exec rake beaker:
```Please log issues or pull requests at
[github](https://github.com/bodgit/puppet-unbound).