Type | Name | Content |
---|---|---|
A | ns1.example.com | <IPv4> |
Tenant custom nameservers (TCNS) allow you to define tenant-level custom nameservers and use them for different accounts within a Cloudflare tenant .
TCNS are organized in different sets (ns_set
) and TCNS names can be provided by any domain, even if the domain does not exist as a zone in Cloudflare.
For instance, if the TCNS are ns1.example.com
and ns2.vanity.org
, the domains example.com
and vanity.org
are not required to be zones in Cloudflare.
For this configuration to be possible, a few conditions apply:
ns_name
), and each name cannot belong to more than one set. For example, if ns1.example.com
is part of ns_set 1
it cannot be part of ns_set 2
or vice versa.ns_set
) than their parent, child, or any other zone in their direct hierarchy tree.If you are an account owner and your account is part of a tenant that has custom nameservers, do the following:
ns_type
and ns_set
.To make these TCNS the default namerservers for all new zones added to your account from now on, use the endpoint Update DNS Settings for an Account. Within the zone_defaults
object, set the following:
To remove TCNS and their associated DNS records from a zone, use a PUT command.
If you are not using Cloudflare Registrar, also remove the TCNS at your domain’s registrar.
If you are a tenant owner and you want to make TCNS available for accounts within your tenant, do the following:
ns_name
and ns_set
, and create TCNS in your tenant by using the following POST command:Add the account custom nameservers and IP addresses to your domain’s registrar as glue (A and AAAA) records ↗
If the domain or domains that are used for the tenant custom nameservers do not exist within the same account, you must create the A/AAAA
records on the configured nameserver names (for example, ns1.example.com
) at the authoritative DNS provider.
Type | Name | Content |
---|---|---|
A | ns1.example.com | <IPv4> |
To get a list of all TCNS names in your tenant account, use the following API request: