Solved

DNS replicate

Posted on 2002-03-21
3
162 Views
Last Modified: 2013-12-15
Here is a new question about a DNS, how to configure your server to reach an other an do an update of the list file ?
0
Comment
Question by:crichen
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 4

Accepted Solution

by:
MFCRich earned 35 total points
ID: 6887026
If you are talking about a zone transfer you have to configure the server to be a slave for the zone and tell it where the master server for the zone is. The master will probably also have to be configured to allow zone transfers to your new server. There are other ways depending on what implementation of DNS you are using.
0
 
LVL 1

Expert Comment

by:Nick
ID: 6887165
For a cache DNS on 2.4.x kernel:

dig @e.root-servers.net . ns > /path/to/named/your_root.hints-file

Nick
0
 

Author Comment

by:crichen
ID: 6888562
In fact I was speaking about a replication between Master and a slave.But I still do not now how to do it I mean the changes to applie .In witch files, what to edit.???
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

rdate is a Linux command and the network time protocol for immediate date and time setup from another machine. The clocks are synchronized by entering rdate with the -s switch (command without switch just checks the time but does not set anything). …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
Suggested Courses

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question