View on GitHub

dss

InterUSS Platform's implementation of the ASTM DSS concept for RID and flight coordination.

Setup DNS

This page describes the options and steps required to setup DNS for a DSS deployment.

Terraform managed

If your DNS zone is managed on the same account, it is possible to instruct terraform to create and manage it with the rest of the infrastructure.

Manual setup

If DNS entries are managed manually, set them up manually using the following steps:

  1. Retrieve IP addresses and expected hostnames: terraform output Example of expected output:
    crdb_addresses = [
        {
            "address" = "34.65.15.23"
            "expected_dns" = "0.interuss.example.com"
        },
        {
            "address" = "34.65.146.56"
            "expected_dns" = "1.interuss.example.com"
        },
        {
            "address" = "34.65.191.145"
            "expected_dns" = "2.interuss.example.com"
        },
    ]
    gateway_address = {
        "address" = "35.186.236.146"
        "expected_dns" = "dss.interuss.example.com"  
        "certificate_validation_dns" = [
         {
           "managed_by_terraform" = false
           "name" = "_6e246283563dcf58e7ed.interuss.example.com."
           "records" = [
              "_6e246283563dcf58e7ed.xxxxx.acm-validations.aws.",
           ]
           "type" = "CNAME"
         },
        ]
    }
    
  2. Create the following DNS A entries to point to the static ips:
    • crdb_addresses[*].expected_dns
    • gateway_address.expected_dns
  3. Create the entries for SSL certificate validation according to the information provided in gateway_address.certificate_validation_dns.