Please enter search query.
Search <book_title>...
InfoScale™ Cluster Server 9.0 Bundled Agents Reference Guide - Solaris
Last Published:
2025-04-14
Product(s):
InfoScale & Storage Foundation (9.0)
Platform: Solaris
- Introducing bundled agents
- Storage agents
- DiskGroup agent
- DiskGroupSnap agent
- Notes for DiskGroupSnap agent
- Sample configurations for DiskGroupSnap agent
- Disk agent
- Volume agent
- VolumeSet agent
- Sample configurations for VolumeSet agent
- Mount agent
- Sample configurations for Mount agent
- Zpool agent
- VMwareDisks agent
- SFCache agent
- Network agents
- About the network agents
- IP agent
- NIC agent
- About the IPMultiNICB and MultiNICB agents
- IPMultiNICB agent
- Sample configurations for IPMultiNICB agent
- MultiNICB agent
- Sample configurations for MultiNICB agent
- DNS agent
- Agent notes for DNS agent
- About using the VCS DNS agent on UNIX with a secure Windows DNS server
- Sample configurations for DNS agent
- File share agents
- NFS agent
- NFSRestart agent
- Share agent
- About the Samba agents
- NetBios agent
- Service and application agents
- AlternateIO agent
- Apache HTTP server agent
- Application agent
- Notes for Application agent
- Sample configurations for Application agent
- CoordPoint agent
- LDom agent
- Dependencies
- Process agent
- Usage notes for Process agent
- Sample configurations for Process agent
- ProcessOnOnly agent
- Project agent
- RestServer agent
- Zone agent
- Infrastructure and support agents
- Testing agents
- Replication agents
Setting up secure updates using TSIG keys for BIND 9 for DNS agent
In the following example, the domain is example.com.
To use secure updates using TSIG keys, perform the following steps at the DNS server:
- Run the dnssec-keygen command with the HMAC-MD5 option to generate a pair of files that contain the TSIG key:
# dnssec-keygen -a HMAC-MD5 -b 128 -n HOST example.com.
- Open the example.com.+157+00000.key file. After you run the cat command, the contents of the file resembles:
# cat example.com.+157+00000.key example.com. IN KEY 512 3 157 +Cdjlkef9ZTSeixERZ433Q==
- Copy the shared secret (the TSIG key), which looks like:
+Cdjlkef9ZTSeixERZ433Q==
- Configure the DNS server to only allow TSIG updates using the generated key. Open the named.conf file and add these lines.
key example.com. { algorithm hmac-md5; secret "+Cdjlkef9ZTSeixERZ433Q=="; };
Where +Cdjlkef9ZTSeixERZ433Q== is the key.
- In the named.conf file, edit the appropriate zone section and add the allow- updates sub-statement to reference the key:
allow-update { key example.com. ; } ;
- Save and restart the named process.
- Place the files containing the keys on each of the nodes that are listed in your group's SystemList. The DNS agent uses this key to update the name server.
Copy both the private and public key files on to the node. A good location is in the /var/tsig/ directory.
- Set the TSIGKeyFile attribute for the DNS resource to specify the file containing the private key.
DNS www ( Domain = "example.com" ResRecord = {www = north} TSIGKeyFile = "/var/tsig/example.com.+157+00000.private" )