Automatically update a local or remote hosts file with Docker container hostnames.
If you have a LAN with your router using dnsmasq for local DNS you may find yourself frequently updating a hosts file as you add or remove Docker containers. The currently available options for automating this typically require you to put Docker containers in a subdomain (e.g. *.docker.local) and/or, if you want to keep the containers in the top level domain (e.g. *.local), installing a full-fledged name server on the router and syncing it with the same in a container on the Docker host.
Docker Dnsmasq Updater allows hostnames to be added or removed automatically without added complexity or resource demands on the router. It can be run as a standalone script or in a container, it only needs access to the Docker socket and SSH access to the router (or any device providing local DNS with a hosts file).
This script has been built with an AsusWRT-Merlin/Entware router in mind, but should work with any device running dnsmasq or using a hosts file.
- Runs on the Docker host OR in a container OR anywhere (in manager mode)
- On load, scans all running containers for a
dnsmasq.updater.enable
label - Optionally, on load, scans a specified Docker network for running containers
- After loading, monitors the Docker socket for containers starting/stopping and optionally connecting/disconnecting to a specified Docker network
- Finds any hostnames for containers meeting criteria
- Writes a hosts file
- Restarts a dnsmasq daemon
image | tags |
---|---|
standalone/manager | script, latest, <version>, <version>-script |
agent | agent, <version>-agent |
standalone/manager with dnsmasq | server, <version>-server |
The default latest
tag and the script
tag point to the standalone/manager
script. Agent images will be tagged agent
.
The server
tag provides the standalone/manager script with dnsmasq
installed and configured in the container, ready to serve DNS requests for
Docker hostnames directly.
Tags may be prefixed with <version>-
to get a specific version, or just use a
version number by itself to get <version>-script
.
Note
After upgrading the Nuitka version, binary builds are currently larger than the un-compiled images. There's also an issue building gunicorn (which is used as the API backend in the manager image) that I've not bothered investigating.
As a result, for the time being at least, I've discontinued the binary
builds.
The build system remains capable of building them, and I may begin doing so
again at some point. But not today.
The main latest
, <version>
, script
, agent
, and server
tags should
automatically provide images compatible with amd64
, arm
/armv7
,
armhf
/armv6
, arm64
, 386
,ppc64le
and s390x
platforms. Tags for
specific single-architecture images are no longer being pushed to Docker Hub.
Note
I'm only able to test on amd64
, armv7
and arm64
. The images currently
work on these architectures. I assume they work on other architectures as
well, but can't guarantee it..
docker run -d \
--name dnsmasq-updater \
-v /var/run/docker.sock:/var/run/docker.sock \
moonbuggy2000/dnsmasq-updater
If you're using a config file instead of environment variables (see
below) you'll need to persist it with -v <host path>:/app/conf/dnsmasq_updater.conf
. If you're using an SSH key for
authentication you can persist and use the /app/keys/ folder.
Images tagged with server
have dnsmasq installed and Docker Dnsmasq
Updater configured to update it. These provide a working DNS server out of the
box, populated with hostnames of Docker containers that match the Updater's
configured criteria.
The server
images contain the standalone/manager version of Docker Dnsmasq
Updater and inherit its configuration options, with some
additional options
for dnsmasq. A minimal configuration looks like this:
version: '3.7'
services:
dmu-server:
image: moonbuggy2000/dnsmasq-updater:server
hostname: dmu-dns-server
environment:
- DMU_DOMAIN=docker # optional, this is the default
- DMU_IP=<frontend_IP>
- DMU_NETWORK=traefik # optional
- DMU_LABELS_FROM=traefik # optional
volumes:
- /var/run/docker.sock:/var/run/docker.sock
ports:
- 53:53/tcp
- 53:53/udp
networks: # optional
- traefik
networks: # optional
traefik:
external: true
This compose file assumes there's a pre-existing Traefik network, but any
network can be used. If using container labels to select which containers get
hostnames updated, DMU_NETWORK
and the network configuration can be omitted
entirely.
To customize dnsmasq's configuration, persist and use /etc/dnsmasq.d/ for extra *.conf files. Don't edit /etc/dnsmasq.conf directly, the init system writes to it during startup, so changes may be overwritten.
version: '3.7'
services:
dnsmasq-updater:
image: moonbuggy2000/dnsmasq-updater:script
hostname: dmu
deploy:
mode: replicated
replicas: 1
placement:
constraints:
# use a label to choose a specific Swarm node for the manager
# this ensures the volume for /app/keys will be present
- node.labels.dnsmasq-updater.manager == true
environment:
- DMU_DEBUG=false
- DMU_MODE=manager
- DMU_DOMAIN=swarm
- DMU_IP=<frontend_IP>
- DMU_KEY=/app/keys/id_rsa
- DMU_LOGIN=<login>
- DMU_PREPEND_WWW=true # optional
- DMU_HOSTS_FILE=/opt/etc/hosts.swarm
- DMU_SERVER=<dnsmasq_server_IP>
- DMU_API_PORT=8080
- DMU_API_KEY=<api_key>
volumes:
- dnsmasq-updater_keys:/app/keys
networks:
- traefik
dnsmasq-updater-agent:
image: moonbuggy2000/dnsmasq-updater:agent
deploy:
mode: global
environment:
- DMU_DEBUG=false # optional
- DMU_NETWORK=traefik # optional
- DMU_API_SERVER=dmu
- DMU_API_PORT=8080
- DMU_API_KEY=<api_key>
- DMU_LABELS_FROM=traefik # optional
volumes:
- /var/run/docker.sock:/var/run/docker.sock
networks:
- traefik
# test a single indirectly exposed container behind a traefik frontend
whoami-frontend:
image: traefik/whoami:latest
hostname: whoami-frontend
deploy:
mode: replicated
replicas: 1
labels:
- traefik.enable=true
- traefik.http.routers.whoami-frontend.rule=Host(`whoami-frontend.swarm`)
- traefik.http.routers.whoami-frontend.entryPoints=http,https
- traefik.http.services.whoami-frontend.loadbalancer.server.port=80
labels:
- dnsmasq.updater.enable=true # can be omitted, we're on DMU_NETWORK
- dnsmasq.updater.host=whoami-frontend.swarm # can be omitted, set by 'hostname' and traefik
- dnsmasq.updater.ip=<frontend_IP> # can be omitted, it's the DMU_IP default
networks:
- traefik
# assuming nothing at the dnsmasq end precludes it, test round-robin DNS for
# a globally deployed and directly exposed service
whoami-global:
image: traefik/whoami:latest
hostname: whoami-global
deploy:
mode: global
ports:
- 8888:80
labels:
- dnsmasq.updater.enable=true
- dnsmasq.updater.host=whoami-global.swarm # can be omitted, set by 'hostname'
- dnsmasq.updater.ip=host # override the default with node's IP
volumes:
dnsmasq-updater_keys:
name: dnsmasq-updater_keys
networks:
traefik:
external: true
This compose file assumes there's a pre-existing Traefik service and network, but only the whoami-frontend test service has Traefik-specific configuration. This service should be modified as necessary if testing behind other frontends.
Docker Dnsmasq Updater itself isn't dependant on Traefik (or any particular frontend) to run, but it's assumed there will be an ingress controller of some sort in a Swarm environment, to route traffic on the default IP to indirectly exposed services on individual nodes.
Since, in this case, the Agents are all connecting to the traefik network to monitor it for activity, it's convenient to stick the manager on this network as well and use it for API communication.
The manager's DMU_IP
default IP should point to a frontend/reverse proxy,
Traefik or otherwise. It's possible to override the default IP on a per-service
basis with with a dnsmasq.updater.ip
label on individual services.
To meet the manager's constraints, the dnsmasq-updater.manager
label will need
to be applied to the chosen node:
docker node update --label-add dnsmasq-updater.manager=true <node>
See below for a detailed description of available environment variables.
The Agent should be allowed to restart freely since, by design, it will exit upon encountering a variety of otherwise non-fatal errors. This is a simple way to trigger a fresh initialisation and ensure the manager has the full picture if it's restarted or communications are interrupted for whatever reason.
Almost all the command line parameters (see Usage) can be set with environment variables.
DMU_MODE
- operation mode (accepts: standalone, manager; default: standalone)DMU_HOSTS_LOCATION
- location of hosts file (accepts: local, remote; default: remote)DMU_IP
- default IP for the DNS recordsDMU_DOMAIN
- domain/zone for the DNS records (default: docker)DMU_DOCKER_SOCKET
- path to the docker socket (default: unix://var/run/docker.sock)DMU_NETWORK
- Docker network to monitor, defaults to none/disabledDMU_SERVER
- dnsmasq server addressDMU_PORT
- dnsmasq server SSH port (default: 22)DMU_LOGIN
- dnsmasq server login nameDMU_PASSWORD
- password for the login name or, if a key is specified, decryption of the keyDMU_KEY
- full path to SSH key fileDMU_HOSTS_FILE
- full path to the hosts file to update on the dnsmasq serverDMU_RESTART_CMD
- command to execute to restart/update dnsmasq (default service restart_dnsmasq)DMU_DELAY
- delay (in seconds) before writing remote hosts file (default: 10)DMU_API_ADDRESS
- address for API to listen on (default: 0.0.0.0)DMU_API_PORT
- port for API to listen on (default: 8080)DMU_API_KEY
- API access keyDMU_LABELS_FROM
- add hostnames from labels set by other services (standalone only, accepts: traefik, none; default: traefik)DMU_PREPEND_WWW
- add www subdomains to all hostnames (default: False)DMU_DEBUG
- set True to enable debug log outputTZ
- set timezone
DMU_DOCKER_SOCKET
- path to the docker socket (default: unix://var/run/docker.sock)DMU_NETWORK
- Docker network to monitor (default: none/disabled)DMU_API_SERVER
- API server addressDMU_API_PORT
- port the API is listening on (default: 8080)DMU_API_KEY
- API access keyDMU_API_RETRY
- delay (in seconds) before retrying failed connection (default: 10)DMU_API_CHECK
- delay (in seconds) between checking the API server status (default: 60)DMU_CLEAN_ON_EXIT
- delete this device's hosts from the API when the Agent shuts down (default: True)DMU_LABELS_FROM
- add hostnames from labels set by other services (accepts: traefik, none; default: traefik)DMU_DEBUG
- set True to enable debug log outputTZ
- set timezone
As well as inheriting the environment variables from the Standalone/Manager image (see above), there's some extra for dnsmasq:
DNS_SERVERS
- a space separated list of upstream DNS servers (default: 1.1.1.1 8.8.8.8)DNS_LOG_QUERIES
- set True to enable DNS query log outputDNS_DEBUG
- set True to enable dnsmasq debug log output
Some environment variables are pre-configured in the DNS Server image and
shouldn't be set or changed: DMU_HOSTS_LOCATION
, DMU_HOSTS_FILE
,
DMU_RESTART_CMD
The TZ
parameter is only used to set timestamps on log messages.
Docker Dnsmasq Updater won't track changes other software (i.e dnsmasq) might
make to the hosts file. Thus, to avoid conflicts, it's best to give Docker
Dnsmasq Updater it's own hosts file to use and either specify it as an
additional hosts file to dnsmasq (with the -addn-hosts <file>
argument, or
in dnsmasq.conf), or merge it into the main hosts file by some other mechanism.
If your dnsmasq server is a router with external storage attached it makes sense to keep the hosts file the updater generates there, to minimize writes to the router's onboard storage.
If you're using a key instead of a password you'll need to add the appropriate public key to ~/.ssh/authorized_keys on the router (possibly via the router's webUI rather than the shell).
As an example, if you're using AsusWRT-Merlin/Entware, you can easily configure the router to include this external file by writing to /opt/etc/hosts.docker and adding the following to /jffs/scripts/hosts.postconf:
# for remote hosts updates
if [ -f /opt/etc/hosts.docker ]; then
cat "/opt/etc/hosts.docker" >> "$CONFIG"
fi
This will add the host definitions in hosts.docker to /etc/hosts, which is convenient if we want all host definitions in a single file for easy reference.
Alternatively, the addn-hosts
method can be implemented through
/jffs/configs/dnsmasq.conf.add:
addn-hosts=/opt/etc/hosts.docker
This will result in dnsmasq reading the hosts.docker file directly.
In either case, as dnsmasq may start before /opt is mounted, dnsmasq should be restarted in /jffs/scripts/post-mount, to ensure container name resolution functions after a router reboot:
if [ -d "$1/entware" ] ; then
ln -nsf $1/entware /tmp/opt
service restart_dnsmasq
fi
Relevant configuration parameters for Docker Dnsmasq Updater in this scenario
would be --remote_file /opt/etc/hosts.docker --restart_cmd 'service restart_dnsmasq'
.
If pkill is available on the dnsmasq server, it may be better to send a
SIGHUP to trigger dnsamsq to clear the cache and re-read the hosts file(s)
without restarting. In this scenario the default restart command would be
overridden with --restart_cmd 'pkill -HUP dnsmasq'
.
However, if you're incorporating the hosts.docker file through an init system
(as in the hosts.postconf method in the example above), sending a SIGHUP to
dnsmasq will bypass that init system and thus won't incorporate changes in the
file. A restart through the init system (i.e.
--restart_cmd 'service restart_dnsmasq
) is required in this case.
A SIGHUP would be viable if using addn-hosts
to let dnsmasq read the file
directly.
To configure Docker Dnsmasq Updater for an individual container there are three labels that can be set:
dnsmasq.updater.enable
- set this to "true"dnsmasq.updater.host
- set this to the hostname(s) you want to usednsmasq.updater.ip
- override the default IP setting (Agent only)
dnsmasq.updater.host
can be a single hostname or a space-separated list.
The updater will also add hostname
and any extra_hosts
attributes set for a
container, so dnsmasq.updater.host
isn't strictly necessary if hostnames are
set as you want them for a container elsewhere.
If you choose to monitor a user-defined Docker network then
dnsmasq.updater.enable
isn't strictly necessary either. The updater assumes
any container connecting to the monitored network is a container that you want
working DNS for.
dnsmasq.updater.ip
can be an IP address or the string host
. Setting this to
host
allows for directly exposed containers, using the Swarm node's IP address
(based on the device's hostname, as seen in the output from docker info
under
Name
, which must must be resolvable). Leave dnsmasq.updater.ip
unset to use
the manager's default IP.
Any defined extra_hosts
will be given the IP from that definition.
If DMU_LABELS_FROM=traefik
is set, Docker Dnsmasq Updater will pull Traefik
hostnames set on containers via the traefik.http.routers.<router>.rule=Host(`<hostname>`)
label, including multiple hostnames specified in the
Host(`<hostname1>`) || Host(`<hostname2>`)
form.
For the time being, this is enabled by default in images (but not in the script). At some future point this will be disabled by default in both cases.
As all containers joining a monitored network are considered valid, if you
monitor a user-defined network that Traefik uses you don't need to set any
dnsmasq.updater.*
labels at all, it gets what it needs from the network and
Traefik labels.
This scenario provides the easiest/laziest configuration route, with no specific Docker Dnsmasq Updater configuration required on containers.
The --prepend_www
functionality was added primarily for robustness. Sometimes
people add www.
to URLs for no good reason, then don't know what to make of
the ensuing DNS lookup error messages in their browser.
To resolve this without having to add www.*
hostnames to every container
manually, we can create the DNS records globally with --prepend_www
and then
redirect to the non-www domain in a reverse proxy.
In Traefik this can be done with a router and a middleware added to the dynamic configuration:
http:
routers:
redirect-www:
# match any host starting with 'www.'
rule: "HostRegexp(`{host:www.+}`)"
# use a low priority to allow overrides on specific containers
priority: 1
entryPoints:
- web
- websecure
middlewares: strip-www@file
service: noop@internal
middlewares:
strip-www:
redirectRegex:
regex: "^(https?)://www\\.(.*)"
replacement: "$1://$2"
permanent: true
The container may fail to start on some ARM devices with this error:
Fatal Python error: pyinit_main: can't initialize time
Python runtime state: core initialized
PermissionError: [Errno 1] Operation not permitted
This is caused by a bug in libseccomp
and can be resolved by either updating libseccomp on the Docker host (to at
least 2.4.x) or running the container with --security-opt seccomp=unconfined
set in the docker run
command.
On a Debian-based host (e.g. Armbian) it may be necessary to add the backports repo for apt to find the newest version.
GitHub: https://github.com/moonbuggy/docker-dnsmasq-updater
Docker Hub: https://hub.docker.com/r/moonbuggy2000/dnsmasq-updater
Pre-built Python musl wheels: https://github.com/moonbuggy/docker-python-musl-wheels