此概览页面介绍了如何在 Google Distributed Cloud (GDC) 空气隔离环境中通过 Cloud DNS 管理 DNS 记录。Cloud DNS 提供了一种高度可靠且可伸缩的 DNS 记录管理方式。了解 Cloud DNS 在 GDC 中的运作方式,包括公开 DNS 区域和专用 DNS 区域之间的区别。
本页面的目标受众是负责组织的网络管理和 DNS 管理的平台管理员和应用运维人员。本页面假定您对基本的网络和 DNS 概念有基本的了解。
Cloud DNS 在经过网闸隔离的 GDC 中的工作方式
GDC 网闸隔离 Cloud DNS 可提供高度可靠且可伸缩的解决方案,让您轻松管理 DNS 记录。Cloud DNS 包含 DNSSEC(DNS 安全扩展),可为 DNS 记录添加加密签名,以验证其真实性并防止在传输过程中遭到篡改,从而确保记录来自权威服务器。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[],[],null,["# About DNS zones and records\n\n| **Preview:** This is a Preview feature that is available as-is and is not recommended for production environments. Google provides no Service-Level agreements (SLA) or technical support commitments for Preview features. For more information, see GDC's [feature stages](/distributed-cloud/hosted/docs/latest/gdch/resources/feature-stages).\n\nThis overview page explains how you can manage DNS records using\nCloud DNS in\nGoogle Distributed Cloud (GDC) air-gapped. Cloud DNS provides a\nhighly-reliable, scalable way to manage DNS records. Learn how Cloud DNS works in GDC, including the distinctions between\npublic and private DNS zones.\n\nThe intended audience for this page is platform administrators and application operators\nresponsible for network administration and managing DNS for their organization.\nThis page assumes you have a basic understanding of essential networking and DNS\nconcepts.\n\nHow Cloud DNS works for GDC air-gapped\n--------------------------------------\n\nGDC air-gapped Cloud DNS delivers a highly\nreliable and scalable solution for effortlessly managing DNS records.\nCloud DNS includes DNSSEC (DNS Security Extensions), which adds\ncryptographic signatures to DNS records to verify their authenticity and\nprevent tampering during transit, ensuring the record originates from the\nauthoritative server.\n\nBenefits of Cloud DNS for GDC air-gapped\n----------------------------------------\n\nCloud DNS provides you with the following benefits:\n\n- **Simplicity:** Use a [Kubernetes-based API](#api-for-dns) to perform DNS administration.\n- **Security:** Enable robust security through features like DNSSEC across single or multiple zones.\n\nZone types for Cloud DNS\n------------------------\n\nA DNS zone is a specific portion of the DNS namespace\nthat you are responsible for.\nGDC offers two types of managed DNS zones:\n\n- **Public DNS zones:** These zones are visible and accessible from anywhere in your network. Public zones are used for services that you want to be reachable by users outside of your GDC.\n- **Private DNS zones:** These zones are only accessible from within your default customer Virtual Private Cloud (VPC) in GDC. Private zones are ideal for internal services and applications that must not be exposed to the external network.\n\nCreate DNS records within zones\n-------------------------------\n\nWithin a DNS zone, you create DNS records. Each record associates a domain name\nor subdomain with a specific value, such as an IP address, another domain name,\nor text information. Different types of DNS records serve different purposes, such as directing traffic, defining mail servers, and verifying ownership. You can configure the following record types:\n\n- **Address (A) record:** maps a domain name to one or more IPv4 addresses. This record is the most fundamental record type for pointing a domain to a server.\n- **Canonical Name (CNAME) record:** creates an alias of one domain name to another canonical (authoritative) domain name. This record type is useful for redirecting traffic or simplifying DNS management.\n- **Text (TXT) record:** lets you associate arbitrary text with a domain name. These records are often used for verification purposes or to store information like Sender Policy Framework (SPF) records for email authentication.\n- **Pointer (PTR) record:** maps an IP address back to a domain name, also known as reverse DNS lookup. This record is often used for email server reputation and logging analysis.\n- **Mail Exchanger (MX) record:** specifies the mail servers responsible for accepting email for a domain. This is essential for setting up email services.\n\nThe\n[ResourceRecordSet API](/distributed-cloud/hosted/docs/latest/gdch/apis/service/networking/v1/global-networking-v1#resourcerecordset)\nin GDC lets you create and manage DNS records within a DNS zone. This API lets\nyou specify the details of a set of identical DNS records that share the same\nname, type, and TTL (Time-To-Live).\n\nUse the Kubernetes API for DNS operations\n-----------------------------------------\n\nYou can use the Kubernetes API in GDC to create DNS zones and create DNS\nrecords. This API lets you define the state of your DNS zones, including their\nname, description, and visibility. The API provides the following:\n\n- **DNS zone creation and management:** Define and configure DNS zones such as domain name, description, public or private visibility.\n- **Zone listing:** List all managed DNS zones.\n- **Distributed deployment and replication:** Replicate DNS zones across GDC air-gapped zones for high availability and global distribution.\n- **Status monitoring:** Track overall zone health, deployment progress, and individual replica status.\n\nFor the full reference documentation for the DNS zones in\nGDC, see\n[ManagedDNSZone](/distributed-cloud/hosted/docs/latest/gdch/apis/service/networking/v1/global-networking-v1#manageddnszone).\n\nWhat's next\n-----------\n\n- [Prepare IAM permissions](/distributed-cloud/hosted/docs/latest/gdch/platform/pa-user/dns/dns-permissions)"]]