Type | Name | Content |
---|---|---|
A | ns1.example.com | <IPv4> |
Tenant custom nameservers (TCNS) allow you to define tenant-level custom nameservers and use them for different accounts within a Cloudflare tenant .
TCNS are organized in different sets (ns_set
) and TCNS names can be provided by any domain, even if the domain does not exist as a zone in Cloudflare.
For instance, if the TCNS are ns1.example.com
and ns2.vanity.org
, the domains example.com
and vanity.org
are not required to be zones in Cloudflare.
For this configuration to be possible, a few conditions apply:
ns_name
), and each name cannot belong to more than one set. For example, if ns1.example.com
is part of ns_set 1
it cannot be part of ns_set 2
or vice versa.ns_set
) than their parent, child, or any other zone in their direct hierarchy tree.If you are an account owner and your account is part of a tenant that has custom nameservers, do the following:
ns_type
and ns_set
.To make these TCNS the default namerservers for all new zones added to your account from now on, use the Update Account endpoint and set the value of default_nameservers
to custom.tenant
.
To remove TCNS and their associated DNS records from a zone, use a PUT command.
If you are not using Cloudflare Registrar, also remove the TCNS at your domain’s registrar.
If you are a tenant owner and you want to make TCNS available for accounts within your tenant, do the following:
ns_name
and ns_set
, and create TCNS in your tenant by using the following POST command:Add the account custom nameservers and IP addresses to your domain’s registrar as glue (A and AAAA) records ↗
If the domain or domains that are used for the tenant custom nameservers do not exist within the same account, you must create the A/AAAA
records on the configured nameserver names (for example, ns1.example.com
) at the authoritative DNS provider.
Type | Name | Content |
---|---|---|
A | ns1.example.com | <IPv4> |
To get a list of all TCNS names in your tenant account, use the following API request: