侧边栏壁纸
博主头像
技术博客 博主等级

行动起来,活在当下

  • 累计撰写 19 篇文章
  • 累计创建 1 个标签
  • 累计收到 0 条评论

目 录CONTENT

文章目录

k8s 通过coredns绑定域名,实现集群级别劫持

Administrator
2025-09-19 / 0 评论 / 0 点赞 / 1 阅读 / 0 字

通过编辑coredns configmap

apiVersion: v1
data:
  Corefile: |
    .:53 {
        errors
        health {
            lameduck 15s
        }
        template IN A *.google.com {
            answer "{{ .Name }} 60 IN A 183.60.xx.xx"
        }
        template IN A google.com {
            answer "{{ .Name }} 60 IN A 183.60.xx.xx"
        }
        template IN A *.googleapis.com {
            answer "{{ .Name }} 60 IN A 183.60.xx.xx"
        }
        template IN A googleapis.com {
            answer "{{ .Name }} 60 IN A 183.60.xx.xx"
        }
        ready
        kubernetes cluster.local in-addr.arpa ip6.arpa {
            pods verified
            ttl 30
            fallthrough in-addr.arpa ip6.arpa
        }
        prometheus :9153
        forward . /etc/resolv.conf {
            prefer_udp
        }
        cache 30
        log
        loop
        reload
        loadbalance
    }
kind: ConfigMap
metadata:
  name: coredns
  namespace: kube-system

重启coredns

kubectl -n kube-system rollout restart deployment coredns

随便找个容器ping下,成功解析到指定的ip上

0

评论区