Solved

whats the difference between named.conf and named.custom

Posted on 2006-06-09
4
366 Views
Last Modified: 2010-03-17
Recently i was working on a DNS server and i noticed that i was getting some errors on the named.conf (had the same configuration with the named.custom"

what is the main differences of these two files ?

0
Comment
Question by:c_hockland
  • 3
4 Comments
 
LVL 14

Expert Comment

by:pablouruguay
ID: 16873809
extract of named.conf original is only for add some specific commands to don't touch the named.conf


# Include other things into the configuration file, things that
# automatic configuration tools that modify this file might make
# a mess of:  (Though, if you don't use such tools, you can do
# all the configuration within this file.)

include "/etc/named.custom";
0
 
LVL 14

Expert Comment

by:pablouruguay
ID: 16873814
and

## named.custom

# These are extra configuration options in a separate file, one
# that'll be left alone by other programs that might modify the
# "named.conf" file:
0
 

Author Comment

by:c_hockland
ID: 16873891
arghh.....
didnt quite catch that...can u please explain little bit more ?

thanks in advance
0
 
LVL 14

Accepted Solution

by:
pablouruguay earned 250 total points
ID: 16873923
many time named.conf is too big to touch or to find same domains. or many times you need to modify constantly the named.conf. for this cases bind add a file to be the quick modify named.custom and you can modify at your pleasure without touch the named.conf

named.custom use it in many cases that you dont want to touch the original named.conf. and don't affect journalling
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
CPU#7 stuck for 22s! 4 313
Help instaling linux on vmware 36 88
Linux : can't create transaction lock error 1 77
Linux on a Dell PowerEdge 720 3 143
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question