infoblox_nios:dns
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_nios:dns [2025/05/19 08:12] – [DNS Tombstone] bstafford | infoblox_nios:dns [2025/12/18 11:00] (current) – [External DNS] bstafford | ||
|---|---|---|---|
| Line 94: | Line 94: | ||
| The zone-maintenance phase of NIOS's OneDB' | The zone-maintenance phase of NIOS's OneDB' | ||
| ===== MS DNS ===== | ===== MS DNS ===== | ||
| - | When migrating from Microsoft to NIOS, ensure you migrate the forrestdnszones and domaindnszone" | + | When migrating from Microsoft to NIOS, ensure you migrate the forrestdnszones and domaindnszone |
| ===== Anycast ===== | ===== Anycast ===== | ||
| Remember, for Anycast, you need to setup the Anycast IP on the member, then edit the member' | Remember, for Anycast, you need to setup the Anycast IP on the member, then edit the member' | ||
| + | |||
| + | |||
| + | The default values | ||
| + | |||
| + | Consider using 4 seconds for Keepalive and 16 seconds for Hold Timer as the industry recommendation for faster convergence (e.g. in data centres and high-performance networks) is between 3-10 for keep alive and hold timer between 9-30 (3x of keep alive). | ||
| + | |||
| + | The higher values are usually kept in consideration for stable, low-bandwidth or high-latency networks (usually for long-distance peerings). | ||
| + | |||
| + | |||
| Line 110: | Line 120: | ||
| < | < | ||
| < | < | ||
| + | < | ||
| + | < | ||
| + | < | ||
| + | |||
| Query logs will show the Anycast IP the query was aimed at | Query logs will show the Anycast IP the query was aimed at | ||
| The following has 192.168.77.53 as the Anycast IP and 192.167.1.4 is the client IP. | The following has 192.168.77.53 as the Anycast IP and 192.167.1.4 is the client IP. | ||
| Line 125: | Line 139: | ||
| Don't put a second anycast IP on all the same Anycast servers. E.g. Say you had two DNS servers in AMER, two in EMEA, and two in APAC. You would put one Anycast IP on the first server in every GEO and a second Anycast IP on the second server in every GEO. Make sure that the two Anycast IP addresses cannot be summerised in teh same route internally. Exactly how far appart the two IP's should be depends on how far you summarise the routes internally. | Don't put a second anycast IP on all the same Anycast servers. E.g. Say you had two DNS servers in AMER, two in EMEA, and two in APAC. You would put one Anycast IP on the first server in every GEO and a second Anycast IP on the second server in every GEO. Make sure that the two Anycast IP addresses cannot be summerised in teh same route internally. Exactly how far appart the two IP's should be depends on how far you summarise the routes internally. | ||
| - | If you have one anycast IP and want to use a secondary IP that is non-anycast as backup, make sure that the secondary IP is NEVER in the same DC as the endpoint' | + | If you have one anycast IP and want to use a secondary IP that is non-anycast as backup, make sure that the secondary IP is NEVER in the same DC as the endpoint' |
| + | Some notes on restart times: | ||
| + | * With NIOS 8.6.x BIND waited 5 seconds for idle tasks to disappear and 20 seconds for active task before it forces a restart | ||
| + | * With NIOS 9.0.x BIND does a graceful restart and doesn’t quit until all references have been released. | ||
| + | * This results in a much longer restart of named | ||
| + | * But, Starting with NIOS 9.0.3-CHF3 and later, we can change the behavior of BIND to match the NIOS 8.6.x behavior: | ||
| + | * You will need to SSH to the Grid and login with your credentials | ||
| + | * You will enter the NIOS CLI where you can execute the following command: | ||
| + | * set named_max_exit_wait 5 | ||
| + | * With this configuration change the BIND restart behavior has changed and new named restarts will be faster to avoid the long dns restart and the long DNS service disruption | ||
| + | * Note: look for the message "all zones loaded" | ||
| + | | ||
| + | | ||
| ===== LAN2 ===== | ===== LAN2 ===== | ||
| To get a NIOS appliance to receive DNS queries on LAN1 but then send queries (i.e. recursion) on LAN2 (e.g. in a bridged DMZ where LAN1 = internal network and LAN2 = external network), then under the member properties in Grid go to General > Basic and toggle "Send queries from" LAN2 interface. And "Send notify messages and zone transfer requests from" LAN2 interface. | To get a NIOS appliance to receive DNS queries on LAN1 but then send queries (i.e. recursion) on LAN2 (e.g. in a bridged DMZ where LAN1 = internal network and LAN2 = external network), then under the member properties in Grid go to General > Basic and toggle "Send queries from" LAN2 interface. And "Send notify messages and zone transfer requests from" LAN2 interface. | ||
| Line 133: | Line 159: | ||
| ISP's might implement this to help mitigate (i.e. continue with cache responses in case of massive Authoritative failure) the end user impact of incidents such as the [[https:// | ISP's might implement this to help mitigate (i.e. continue with cache responses in case of massive Authoritative failure) the end user impact of incidents such as the [[https:// | ||
| + | |||
| + | ===== TCP Client Limit ===== | ||
| + | TCP DNS is "more expensive" | ||
| + | |||
| + | Max number of TCP DNS clients is 1,000 by default and this is enough for a lot of organizations. 25k is the max you can set it to. | ||
| + | |||
| + | You may need to change quota for TCP clients in two parts (assuming NIOS 9) | ||
| + | - adjusting the named_tcp_clients_limit | ||
| + | - ensure that there are enough sockets available. By default (again, NIOS 9), the number of sockets is 21,000 and thus your adjustment will be in range. Unfortunately, | ||
| + | |||
| + | |||
| ===== External DNS ===== | ===== External DNS ===== | ||
| - | To hide private IP of LAN1 interface when NIOS is externally facing, | + | To hide private IP of LAN1 interface when NIOS is externally facing |
| - | Data Management-> | + | Data Management-> |
| - | Click on " | + | In the appropriate View, click on " |
| Or you can make the NIOS entries in the Name Server Group to be " | Or you can make the NIOS entries in the Name Server Group to be " | ||
| + | |||
| + | |||
| + | Remember, if you have a third party DNS transferring from your NIOS external DNS servers, if the Grid Primary goes offline, the Grid Secondary will still get updated (via Grid Transfer). Enable Grid secondaries to notify external secondaries. | ||
| + | |||
| + | Data Management > DNS > Grid DNS Properties > General > Advanced > | ||
| + | * [[https:// | ||
| + | * Notify Delay: Specify the number of seconds that the Grid secondary servers delays sending notification messages to the external secondaries. The default is five seconds. | ||
| + | |||
| + | " | ||
| ===== DNS Views ===== | ===== DNS Views ===== | ||
| Multiple views on a member, fine. Looping/ | Multiple views on a member, fine. Looping/ | ||
| ===== Alias ===== | ===== Alias ===== | ||
| Remember, when putting an alias record on an authoritative DNS server (i.e. CNAME for APEX of domain), the DNS server will need to be able to resolve the place it is pointing to. This does not mean you have to enable recursion on the DNS server but the server itself will need to resolve the name. (e.g. management layer) | Remember, when putting an alias record on an authoritative DNS server (i.e. CNAME for APEX of domain), the DNS server will need to be able to resolve the place it is pointing to. This does not mean you have to enable recursion on the DNS server but the server itself will need to resolve the name. (e.g. management layer) | ||
| + | ===== ACL ===== | ||
| + | Access Control List. If you have response logging enabled and a query comes in that gets rejected because of an ACL, you will get a log of the " | ||
| ===== GSS-TSIG===== | ===== GSS-TSIG===== | ||
| When you have multiple AD domains in a Forest, you need to delegate the underscore zones and then enable GSS-TSIG updates at each delegated zone. This is exactly the same way it works in MSFT DNS. You CAN, but should NOT, enable GSS-TSIG on the " | When you have multiple AD domains in a Forest, you need to delegate the underscore zones and then enable GSS-TSIG updates at each delegated zone. This is exactly the same way it works in MSFT DNS. You CAN, but should NOT, enable GSS-TSIG on the " | ||
| Line 183: | Line 231: | ||
| If you need to increase, do so 1k at a time. | If you need to increase, do so 1k at a time. | ||
| + | |||
| + | [[https:// | ||
| + | Recursion client quota as printed in syslog | ||
| + | < | ||
| + | Recursion client quota: used/ | ||
| + | |||
| + | |||
| + | / | ||
| + | / | ||
| + | |||
| + | |||
| + | |||
| + | |||
| [[https:// | [[https:// | ||
infoblox_nios/dns.1747642336.txt.gz · Last modified: by bstafford
