mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-12-17 00:40:14 +01:00
This PR adds DNS configuration support to the LibreChat Helm chart, enabling users to redirect traffic to proxy servers or use custom DNS settings.
## What's Changed
- Added dnsPolicy and dnsConfig fields to deployment.yaml template
- Added DNS configuration options to values.yaml with comprehensive examples
- Created documentation and example configurations
## Use Cases
- Redirect AI service traffic (AWS Bedrock, OpenAI, etc.) to proxy servers
- Use corporate DNS servers for name resolution
- Control traffic routing through custom DNS configurations
- Enforce traffic through security gateways
## Configuration Example
```yaml
dnsPolicy: "None"
dnsConfig:
nameservers:
- "10.0.0.10" # Custom DNS server for redirections
searches:
- "svc.cluster.local"
options:
- name: ndots
value: "2"
```
## Testing Results
✅ Successfully tested with Docker Compose environment
✅ DNS resolution correctly redirects to configured IPs
✅ HTTP requests properly routed to proxy servers
✅ Tested with multiple domains (AWS Bedrock, OpenAI, SageMaker)
Test output:
- bedrock-runtime.us-east-1.amazonaws.com -> 172.25.0.10 ✓
- api.openai.com -> 172.25.0.10 ✓
- sagemaker-runtime.us-east-1.amazonaws.com -> 172.25.0.10 ✓
All DNS redirects working correctly with proxy server receiving traffic.
## Documentation
- Added comprehensive DNS_CONFIGURATION.md guide
- Included examples for common use cases
- Provided troubleshooting steps
## Backward Compatibility
This change is fully backward compatible. If dnsPolicy and dnsConfig are not specified, the default Kubernetes DNS behavior is maintained.
Fixes #[issue_number]
Co-authored-by: LibreChat User <user@example.com>
4.3 KiB
4.3 KiB
DNS Configuration for LibreChat Helm Chart
This feature allows you to configure custom DNS settings for LibreChat pods, enabling traffic redirection to proxy servers or custom endpoints.
Use Cases
- Proxy Redirection: Redirect AI service traffic (AWS Bedrock, OpenAI, etc.) to internal proxy servers
- Corporate DNS: Use company-specific DNS servers for name resolution
- Traffic Control: Route specific domains through custom DNS servers while maintaining cluster DNS for others
- Security: Enforce traffic to go through security proxies or gateways
Configuration Options
DNS Policy
The dnsPolicy field determines how DNS resolution works:
ClusterFirst(default): Prefer cluster DNS, fallback to configured DNSDefault: Use the node's DNS settingsNone: Only use the DNS settings fromdnsConfigClusterFirstWithHostNet: For pods using host network
DNS Config
The dnsConfig field allows you to specify:
nameservers: List of DNS server IPs (max 3)searches: List of DNS search domains for hostname lookupoptions: List of DNS resolver options
Examples
Basic Configuration
# values.yaml
dnsPolicy: "None"
dnsConfig:
nameservers:
- "10.0.0.10" # Custom DNS server
Redirect AI Services to Proxy
# values.yaml
dnsPolicy: "None"
dnsConfig:
nameservers:
- "10.96.0.100" # DNS server that redirects AI domains to proxy
searches:
- "svc.cluster.local"
options:
- name: ndots
value: "2"
Deploy:
helm upgrade --install librechat ./helm/librechat -f values.yaml
Corporate DNS Configuration
# values.yaml
dnsPolicy: "None"
dnsConfig:
nameservers:
- "192.168.1.53" # Primary corporate DNS
- "192.168.1.54" # Secondary corporate DNS
searches:
- "corp.internal"
- "svc.cluster.local"
Testing
Verify DNS Configuration
- Deploy with custom DNS settings:
helm install librechat ./helm/librechat \
--set dnsPolicy="None" \
--set dnsConfig.nameservers[0]="10.0.0.10"
- Check pod DNS configuration:
kubectl exec <pod-name> -- cat /etc/resolv.conf
- Test DNS resolution:
kubectl exec <pod-name> -- nslookup example.com
Test Results
The feature has been tested with the following scenarios:
✅ DNS Resolution Test
- Custom nameservers properly configured in pods
- Domains resolve to configured proxy IPs
- Traffic successfully redirected to proxy servers
✅ Multiple Nameservers
- Primary and fallback DNS servers work correctly
- Failover happens when primary is unavailable
✅ Integration Test
- Works with existing LibreChat configuration
- No conflicts with cluster DNS when using ClusterFirst policy
- Compatible with all pod security contexts
Advanced Usage
Combining with Host Aliases
For simple host-to-IP mappings, you can combine DNS configuration with hostAliases:
# In deployment spec (not directly in values.yaml)
spec:
dnsPolicy: "None"
dnsConfig:
nameservers:
- "10.0.0.10"
hostAliases:
- ip: "10.100.50.200"
hostnames:
- "api.openai.com"
Dynamic DNS Configuration
You can use Helm's templating to dynamically set DNS based on environment:
{{- if eq .Values.environment "production" }}
dnsPolicy: "None"
dnsConfig:
nameservers:
- "10.0.0.10" # Production DNS
{{- else }}
dnsPolicy: "ClusterFirst" # Use default in dev
{{- end }}
Troubleshooting
DNS Not Resolving
- Check pod's DNS policy:
kubectl get pod <pod-name> -o yaml | grep -A5 dnsPolicy
- Verify nameservers are reachable:
kubectl exec <pod-name> -- ping <nameserver-ip>
Configuration Not Applied
Ensure values are properly indented in values.yaml:
dnsPolicy: "None" # Top level, not under any section
dnsConfig: # Top level, not under any section
nameservers:
- "10.0.0.10"
Security Considerations
- Ensure DNS servers are trusted and secure
- Use TLS-enabled DNS servers when possible
- Monitor DNS query logs for unusual activity
- Consider using DNS policies that maintain cluster DNS as fallback
Compatibility
- Kubernetes 1.19+
- Compatible with all LibreChat deployment modes
- Works with both MongoDB and Meilisearch enabled/disabled
- No additional permissions required