Configuration ============= This chapter describes how to configure the ZoneControl service. After changing settings, do not forget to restart the service. Database configuration ---------------------- ZoneControl, by default, uses an `SQLite `__ database located at ``/var/lib/zonecontrol/zonecontrol.db``. Should another database be needed, it needs to be configured in ``/etc/zonecontrol/settings.py``. Django offers connectors for many types of database servers, described in its `online documentation `__. To enable support for databases other than SQLite, the package with the database driver must be installed. These packages are named "zonecontrol-". The following databases are supported: +------------+-----------------+-------------------------------+ | Database | Package-suffix | Engine in ``DATABASES`` | +============+=================+===============================+ | MySQL | ``mysql`` | django.db.backends.mysql | +------------+-----------------+-------------------------------+ .. todo | PostgreSQL | ``psql`` | django.db.backends.postgresql | +------------+-----------------+-------------------------------+ Now configure the database in ``/etc/zonecontrol/settings.py``, set the ENGINE to the Engine from the table. The rest of the settings are self-explanatory: .. code:: python DATABASES = { 'default': { 'ENGINE': '$ENGINE', 'NAME': 'mydatabase', 'USER': 'mydatabaseuser', 'PASSWORD': 'mypassword', 'HOST': '127.0.0.1', 'PORT': '', } } After setting up a new database, it need to be populated with database tables. Run the following command as the ``zonecontrol`` user:: zonecontrol-manage migrate Secret configuration -------------------- The Django web framework relies on a “secret key” for encrypting cookies, password reset tokens and other uses (see the `online documentation `__ for more). This key is generated upon package installation in ``/var/lib/zonecontrol/secret_key``. Should this key not be set or if it is too short, ZoneControl will not start. Generate a new key and add it to the configuration file: .. code:: shell /usr/share/zonecontrol/bin/python3 -c 'import random; import string; print("".join([random.SystemRandom().choice("{}{}{}".format(string.ascii_letters, string.digits, string.punctuation)) for i in range(50)]))' > /var/lib/zonecontrol/secret_key HTTP Service configuration -------------------------- The Gunicorn HTTP server is configured in the ``/etc/zonecontrol/gunicorn_config.py`` file. By default, it will listen for HTTP connections on ``127.0.0.1:8083``. A sane configuration is below: .. code:: python # Config file for the gunicorn HTTP server # See: http://docs.gunicorn.org/en/stable/settings.html import multiprocessing import os # This only has an effect if setproctitle is installed. proc_name = 'zonecontrol' raw_env = ['DJANGO_SETTINGS_MODULE=project.settings', 'GUNICORN=1'] bind = ['127.0.0.1:8053'] workers = multiprocessing.cpu_count() * 2 threads = 8 # per worker timeout = 30 # sec chdir = '/usr/share/zonecontrol' accesslog = '/var/log/zonecontrol/access.log' access_log_format = '%(h)s (%({X-Forwarded-For}i)s) %(l)s %(u)s %(t)s "%(r)s" %(s)s %(b)s "%(f)s" "%(a)s"' errorlog = '/var/log/zonecontrol/error.log' loglevel = 'info' # syslog = True For more settings, please consult the `online documentation `__. Scheduled Changes Deployment ---------------------------- In order to deploy scheduled changes, ZoneControl comes with a small service called ``zonecontrol-scheduler.service``. This service reads the :ref:`entities-scheduled-changes` from the database and applies them when needed. .. _zones-list-caching: Zones List Caching ------------------ .. versionadded:: 1.2.0 ZoneControl can cache the zones-list in `redis `__ to speed up calls from the frontend. .. note:: Only the list of zones is cached, not the zone contents. When changes are made, ZoneControl also stores these mutations in the cache after they have been accepted by PowerDNS. A seperate service called ``zonecontrol-cache`` loads the list of zones into redis and prunes the mutations at regular intervals. The zones-list is stored wih an expiry time so the cache is either empty or recent. ZoneControl will always attempt to load the zones-list from the cache, if it cannot find the list *or* caching is explicitly disabled, it will fall back to loading the list from PowerDNS. Enabling Caching ^^^^^^^^^^^^^^^^ On installations on CentOS, install the ``zonecontrol-cache`` package, this will also install ``redis``. For Debian installations, install the ``redis`` package. Then start and enable both redis and the zonecontrol-cache services:: systemctl enable redis.service systemctl start redis.service systemctl enable zonecontrol-cache.service systemctl start zonecontrol-cache.service Cache configuration ^^^^^^^^^^^^^^^^^^^ The caching behaviour is controlled by several options in ``/etc/zonecontrol/settings.py``. :``ZONECONTROL_CACHE_ZONES``: Whether or not to cache zones lists (for ``zonecontrol-cache``) and to attempt to retrieve them (for ZoneControl), default ``True``. :``ZONECONTROL_CACHE_ZONES_LOCATION``: Connection URL for Redis. By default database 1 on localhost without authentication and encryption. is used. The `redis-py documentation `__ describes this URI in detail. Default is ``"redis://127.0.0.1:6379/1"``. :``ZONECONTROL_CACHE_ZONES_PASSWORD``: Password for Redis. Default is ``None`` (ie: no password). If Redis ACLs are used, the username can be supplied as part of the URI described above. :``ZONECONTROL_CACHE_ZONES_INTERVAL``: After ``zonecontrol-cache`` has added a new list to the cache, this setting controls how long it will wait before starting a new retrieval. Default is ``60``. :``ZONECONTROL_CACHE_ZONES_EXPIRE_TTL``: How long a zones-list is cached in redis before automatically removed, in seconds. Default is ``300``. After changing the settings, restart ``zonecontrol-cache.service``. Zones Overview DNSSEC Retrieval ------------------------------- .. versionadded:: 1.2.0 By default, the PowerDNS API includes the ``dnssec`` field when the list of zones is retrieved. Generating this field takes 5 queries to the database per zone in the list. When the database is slow, has high latency or the list of zones is huge, this can severely impact the performance of the zones overview in the ZoneControl frontend. PowerDNS Authoritative Server 4.2.1 introduced the possiblity to request the zones-list *without* dnssec information. ZoneControl takea advantage of this API feature by default. To have ZoneControl request DNSSEC information from PowerDNS, set ``ZONECONTROL_ZONE_OVERVIEW_DNSSEC`` to ``True`` in ``/etc/zonecontrol/settings.py``. The downside of this feature is the loss of the "DNSSEC" column on the overview page of ZoneControl. Restriction of Zone Kinds ------------------------- .. versionadded:: 1.1.0 Operators might want to limit the kind of zones that can be created through ZoneControl. This can be done using the ``ZONECONTROL_ALLOW_ZONE_KINDS`` list in ``/etc/zonecontrol/settings.py``. By default, all kinds are allowed. To only allow Native zones: .. code-block:: python from project.zonecontrol import ZONE_KIND_NATIVE ZONECONTROL_ALLOW_ZONE_ACTIONS = [ZONE_KIND_NATIVE] Note: while in the UI for the user the Master & Slave kinds have been renamed to Primary & Secondary, this is not the case for the config settings. One should still use ``ZONE_KIND_MASTER`` and ``ZONE_KIND_SLAVE`` for restricting zone kinds. Advanced DNSSEC --------------- .. versionadded:: 1.1.0 When a user has the :ref:`"Advanced DNSSEC" ` permissions, they can manipulate single DNSSEC keys for zones. The ZoneControl configuration can limit the DNSSEC algorithms that are allowed to be created. There are two settings related to this. :``ZONECONTROL_ADVANCED_DNSSEC_ALGORITHMS``: This is the list of algorithms that is shown in the selection box and that are allowed when keys are created through the ZoneControl API. By default, these are ``[DNSSEC_ALGO_ECDSA256, DNSSEC_ALGO_ECDSA384, DNSSEC_ALGO_ED25519]``. :``ZONECONTROL_ADVANCED_DNSSEC_DEFAULT_ALGORITHM``: This is the algorithm that is set in the Advanced DNSSEC views' selection box by default. This algorithm **must** be in the ``ZONECONTROL_ADVANCED_DNSSEC_ALGORITHMS`` list and is ``DNSSEC_ALGO_ECDSA256`` by default. Default NSEC3PARAM ------------------ .. versionadded:: 1.4.2 The default ``NSEC3PARAM`` is set to ``1 0 0 -`` in ``/etc/zonecontrol/settings.py`` and can be changed there. These parameters are recommended by `RFC9276 `__. Automatic PTR Creation ---------------------- .. versionadded:: 1.1.0 ZoneControl can create PTR records for A and AAAA records that are created or modified. This can be disabled in the configuration by setting ``ZONECONTROL_ALLOW_AUTOMATIC_PTR`` to ``False`` in ``/etc/zonecontrol/settings.py``. Zone Actions ------------ .. versionadded:: 1.1.0 Users with permissions to access zones can force actions like queuing NOTIFY messages to secondaries or (re-)retrieving a secondary zone. The allowed actions are specified in ``ZONECONTROL_ALLOW_ZONE_ACTIONS``. By default this is set to ``[ZONE_ACTION_NOTIFY, ZONE_ACTION_AXFR_RETRIEVE]``. Prometheus Metrics ------------------ .. versionadded:: 1.5.1 Prometheus metrics will be exported on the ``/metrics`` URL path. This is the default path for Prometheus so just pointing your Prometheus configuration at the ``host:port`` target should be enough. The metrics are disabled by default and can be enabled by setting ``ZONECONTROL_METRICS_ENABLED`` to ``True`` in ``/etc/zonecontrol/settings.py``. The metric for the number of zones (``zonecontrol_zones``) is only available when the caching of zones is enabled. See :ref:`zones-list-caching`. Catalog Zone Support -------------------- .. versionadded:: 1.6.0 *Note: Catalog zone support in ZoneControl will only work for PowerDNS Authoritative Server v4.9 and higher versions.* Support for `Catalog Zones `__ is disabled by default (see the note above) and can be enabled by setting ``ZONECONTROL_CATALOG_ZONE_SUPPORT`` to ``True`` in ``/etc/zonecontrol/settings.py``. When viewing a catalog zone there will be a new section where zones can be added and removed from the catalog. Audit Logging to Standard Out or File ------------------------------------- .. versionadded:: 1.6.0 Audit logging can be echoed to standard out or a file by setting ``ZONECONTROL_AUDITLOG_STDOUT`` to ``True`` in ``/etc/zonecontrol/settings.py``. It is disabled by default. These audit log lines are in JSON format but it is also possible to have plain text output; this is done by setting ``ZONECONTROL_JSON_LOGGING`` to ``False`` in the same settings file. (The ``ZONECONTROL_JSON_LOGGING`` setting only applies to the audit logging at the moment, but it is the intention to do all ZoneControl logging in JSON format in some future ZoneControl major release at which point this setting will apply to all logging.)