DNS-collector
NOTE: The code before version 1.x is considered beta quality and is subject to breaking changes.
DNS-collector
acts as a passive high speed ingestor, aggregator and analyzer for your DNS traffic, written in Golang. The DNS traffic can be collected and aggregated from simultaneously sources like DNStap streams, network interface or log files and relays it to multiple other listeners with some transformations on it (traffic filtering, user privacy, ...) and DNS protocol conversions (to plain text, json, and more... ).
Additionally, DNS-collector also support
Overview:
Collectors:
- Listen for logging traffic with streaming network protocols
- Live capture on a network interface
- Read text or binary files as input
Loggers:
- Local storage of your DNS logs in plain
Text
, Json
, Pcap
or Dnstap
formats:
- Provide metrics and API
- Send to remote host with generic transport protocol
- Send to various sinks
- Send to security tools
Transformers:
Get Started
Download the latest release
binary and start the DNS-collector with the provided configuration file. The default configuration listens on tcp/6000
for a DNSTap stream and DNS logs are printed on standard output.
./go-dnscollector -config config.yml
If you prefer run it from docker, follow this guide.
Configuration
The configuration of DNS-collector is done through a file named config.yml
. When the DNS-collector starts, it will look for the config.yml from the current working directory.
See the full configuration guide for more details.
Examples:
You will find below some examples of configuration to manage your DNS logs.
-
Capture DNS traffic from incoming DNSTap streams
-
Capture DNS traffic from PowerDNS products
-
Observe your DNS traffic from logs
-
Apply some transformations
-
Capture DNS traffic from FRSTRM/dnstap files
-
Capture DNS traffic from PCAP files
-
Capture DNS traffic from Mikrotik device
Contributing
See the development guide for more information on how to build it yourself.
How to userguides: