dnstap is a flexible, structured binary log format for DNS software: http://dnstap.info. With this plugin you make CoreDNS output dnstap logging.
Note that there is an internal buffer, so expect at least 13 requests before the server sends its dnstap messages to the socket.
dnstap SOCKET [full]
- SOCKET is the socket path supplied to the dnstap command line tool.
fullto include the wire-format DNS message.
Log information about client requests and responses to /tmp/dnstap.sock.
Log information including the wire-format DNS message about client requests and responses to /tmp/dnstap.sock.
dnstap unix:///tmp/dnstap.sock full
Log to a remote endpoint.
dnstap tcp://127.0.0.1:6000 full
Command Line Tool
Dnstap has a command line tool that can be used to inspect the logging. The tool can be found at Github: https://github.com/dnstap/golang-dnstap. It’s written in Go.
The following command listens on the given socket and decodes messages to stdout.
% dnstap -u /tmp/dnstap.sock
The following command listens on the given socket and saves message payloads to a binary dnstap-format log file.
% dnstap -u /tmp/dnstap.sock -w /tmp/test.dnstap
Listen for dnstap messages on port 6000.
% dnstap -l 127.0.0.1:6000