<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On 29 September 2016 at 15:07, Tim Daneliuk <span dir="ltr"><<a href="mailto:tundra@tundraware.com" target="_blank">tundra@tundraware.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class=""><br>
<br>
</span>No, not really. It's for a private cloud microservices system we're<br>
thinking through. We already run most/many of the various service<br>
backends in user space so that the app devs and support folks can control<br>
their own universe without having to constantly invoke someone with sudo<br>
or root or firecall permissions. Because of very strict audit and<br>
regulatory constraints, there is zero chance they'll ever get root/sudo<br>
access to the DNS config, so running our private DNS just for this<br>
subset of private client/cloud users may make sense.<br><br></blockquote><div>I suppose you could leave yourself an unprivileged config file... have them put you in group 'dns' or something, and make all the configs and zone files writable by that group. At least that way all you need your sysadmins for is to issue the 'rndc reconfig' command. </div></div><br></div></div>