CoreDNS is a DNS server that provides domain name resolution for Kubernetes clusters through a chain add-on.
CoreDNS is an open-source software and has been a part of CNCF. It provides a means for cloud services to discover each other in cloud-native deployments. Each of the plugins chained by CoreDNS provides a particular DNS function. You can integrate CoreDNS with only the plugins you need to make it fast, efficient, and flexible. When used in a Kubernetes cluster, CoreDNS can automatically discover services in the cluster and provide domain name resolution for these services. By working with DNS server, CoreDNS can resolve external domain names for workloads in a cluster.
This add-on is installed by default during cluster creation.
Kubernetes backs CoreDNS as the official default DNS for all clusters going forward.
CoreDNS official website: https://coredns.io/
Open source community: https://github.com/coredns/coredns
To run CoreDNS properly or upgrade CoreDNS in a cluster, ensure the number of available nodes in the cluster is greater than or equal to the number of CoreDNS instances and all CoreDNS instances are running. Otherwise, the add-on will malfunction or the upgrade will fail.
This add-on has been installed by default. If it is uninstalled due to some reasons, you can reinstall it by performing the following steps:
Parameter |
Description |
---|---|
Pods |
Number of pods for the add-on. High availability is not possible with a single pod. If an error occurs on the node where the add-on instance runs, the add-on will fail. |
Containers |
Queries per second (QPS) of the CoreDNS add-on is positively correlated with the CPU consumption. If the number of nodes or containers in the cluster grows, the CoreDNS pods will bear heavier workloads. Adjust the number of the CoreDNS pods and their CPU and memory quotas based on the cluster scale. For details, see Table 2. |
Parameter |
Description |
---|---|
Stub Domain |
A domain name server for a custom domain name. The format is a key-value pair. The key is a domain name suffix, and the value is one or more DNS IP addresses, for example, acme.local -- 1.2.3.4,6.7.8.9. For details, see Configuring the Stub Domain for CoreDNS. |
Advance Config |
Example of advanced configurations: { "annotations": {}, "parameterSyncStrategy": "ensureConsistent", "servers": [ { "plugins": [ { "name": "bind", "parameters": "{$POD_IP}" }, { "name": "cache", "parameters": 30 }, { "name": "errors" }, { "name": "health", "parameters": "{$POD_IP}:8080" }, { "name": "ready", "parameters": "{$POD_IP}:8081" }, { "configBlock": "pods insecure\nfallthrough in-addr.arpa ip6.arpa", "name": "kubernetes", "parameters": "cluster.local in-addr.arpa ip6.arpa" }, { "name": "loadbalance", "parameters": "round_robin" }, { "name": "prometheus", "parameters": "{$POD_IP}:9153" }, { "configBlock": "policy random", "name": "forward", "parameters": ". /etc/resolv.conf" }, { "name": "reload" } ], "port": 5353, "zones": [ { "zone": "." } ] } ], "upstream_nameservers": ["8.8.8.8", "8.8.4.4"] } |
Plugin Name |
Description |
---|---|
bind |
Host IP address listened by CoreDNS. Retain the default value {$POD_IP}. For details, see bind. |
cache |
Enables DNS cache. For details, see cache. |
errors |
Errors are logged to stdout. For details, see errors. |
health |
Health check for CoreDNS. {$POD_IP}:8080 is listened to. Retain the default setting. Otherwise, the CoreDNS health check will fail and the add-on will restart repeatedly. For details, see health. |
ready |
Whether the backend server is ready to receive traffic. {$POD_IP}:8081 is listened to. If the backend server is not ready, CoreDNS will suspend DNS resolution until the backend server is ready. For details, see ready. |
kubernetes |
CoreDNS Kubernetes plugin, which provides the service parsing capability in a cluster. For details, see kubernetes. |
loadbalance |
Round-robin DNS load balancer that randomizes the order of A, AAAA, and MX records in an answer. For details, see loadbalance. |
prometheus |
API for obtaining CoreDNS metrics. {$POD_IP}:9153 is listened to in the default zone. Retain the default setting. Otherwise, Prometheus cannot collect CoreDNS metrics. For details, see Prometheus. |
forward |
Forwards any queries that are not within the cluster domain of Kubernetes to predefined resolvers (/etc/resolv.conf). For details, see forward. |
reload |
Automatically reloads modified Corefiles. After you modify a ConfigMap, wait for two minutes for the modification to take effect. For details, see reload. |
log |
Enables CoreDNS logging. For details, see log. Example: { "name": "log" } |
template |
A quick response template, where AAAA indicates an IPv6 request. If NXDOMAIN is returned in an rcode response, no IPv6 resolution result is returned. For details, see template. Example: { "configBlock": "rcode NXDOMAIN", "name": "template", "parameters": "ANY AAAA" } |
Parameter |
Description |
---|---|
Multi AZ |
|
Node Affinity |
|
Toleration |
Using both taints and tolerations allows (not forcibly) the add-on Deployment to be scheduled to a node with the matching taints, and controls the Deployment eviction policies after the node where the Deployment is located is tainted. The add-on adds the default tolerance policy for the node.kubernetes.io/not-ready and node.kubernetes.io/unreachable taints, respectively. The tolerance time window is 60s. For details, see Configuring Tolerance Policies. |
Component |
Description |
Resource Type |
---|---|---|
CoreDNS |
DNS server for clusters |
Deployment |
DNS policies can be configured for each pod. Kubernetes supports DNS policies Default, ClusterFirst, ClusterFirstWithHostNet, and None. For details, see DNS for Services and Pods. These policies are specified in the dnsPolicy field in the pod-specific.
Routing
Without stub domain configurations: Any query that does not match the configured cluster domain suffix, such as www.kubernetes.io, is forwarded to the upstream DNS server inherited from the node.
With stub domain configurations: If stub domains and upstream DNS servers are configured, DNS queries are routed according to the following flow:
Add-on Version |
Supported Cluster Version |
New Feature |
Community Version |
---|---|---|---|
1.29.4 |
v1.21 v1.23 v1.25 v1.27 v1.28 v1.29 |
CCE clusters 1.29 are supported. |
|
1.28.7 |
v1.21 v1.23 v1.25 v1.27 v1.28 |
Supported hot module replacement. Rolling upgrade is not required. |
|
1.28.5 |
v1.21 v1.23 v1.25 v1.27 v1.28 |
Fixed some issues. |
|
1.28.4 |
v1.21 v1.23 v1.25 v1.27 v1.28 |
CCE clusters 1.28 are supported. |
|
1.27.4 |
v1.19 v1.21 v1.23 v1.25 v1.27 |
None |
|
1.25.11 |
v1.19 v1.21 v1.23 v1.25 |
|
|
1.25.1 |
v1.19 v1.21 v1.23 v1.25 |
CCE clusters 1.25 are supported. |
|
1.23.3 |
v1.15 v1.17 v1.19 v1.21 v1.23 |
Regular upgrade of add-on dependencies |
|
1.23.1 |
v1.15 v1.17 v1.19 v1.21 v1.23 |
CCE clusters 1.23 are supported. |
|
1.17.15 |
v1.15 v1.17 v1.19 v1.21 |
CCE clusters 1.21 are supported. |
|
1.17.9 |
v1.15 v1.17 v1.19 |
Regular upgrade of add-on dependencies |
|
1.17.4 |
v1.17 v1.19 |
CCE clusters 1.19 are supported. |