> 1)If Im not authoritative for any domain, then it is not necessary to declare > any zone ?
Correct > 2)If I dont declare any zone , master and slave configuration are identical > for a dns cache server? The question doesn't make sense. If you don't declare any zone, then you are neither master or slave for any zone. You understand that you have to declare a zone as "type master" to be a master, or "type slave" to be a slave, right? For that matter, if you're a pure "dns cache server", then by definition, you have no zones defined in your config (or perhaps only the root hints), so at that point it doesn't make any sense to talk about master or slave configuration. Perhaps I misunderstood what you described at the outset as a "master / slave dns cache cluster". What is that? I don't recognize the term from any RFC. > 3)Does it have any drawbacks no declaring any zone file in the long term? If you're not authoritative for a zone, then you're dependent on other DNS servers -- either forwarders, if configured to forward, or authoritative nameservers -- for all resolution of names in that zone, and potentially for names in descendant zones as well. For this reason, if you care a lot about performance, availability, and/or security, you'll replicate the data somehow. It doesn't have to be via the traditional master/slave AXFR/IXFR mechanisms -- out-of-band or side-band methods are perfectly acceptable -- but having the data available close to the DNS clients, is ideal. You can't beat getting an answer from authoritative data within a millisecond or a few milliseconds, even when the WAN link hiccups. (The reason that I throw "security" in there is because, generally speaking, it's easier for an evildoer to spoof responses to individual queries flying over the network, than to corrupt a whole AXFR/IXFR stream, or replication mechanisms using cryptographically-secure channels, e.g. rsync-over-ssh or transfers over an OpenVPN tunnel between nodes. But, as with all general statements, a wide array of factors need to be taken into consideration, e.g. the possibility that the copies of the zone files themselves can be compromised on the local server. Your Mileage May Vary). Note that there is a common misconception -- by people who apparently never learned the meaning of the term "stealth slave" -- that replicating zone data to a given nameserver implies that the nameserver *must* be published in the NS records of the zone. This practice does not scale very well when you have many dozens, or hundreds of nameservers. But, above and beyond the RFC mandate for at least 2 (diverse) NS records for any given zone, it is completely *optional* whether a given authoritative-nameserver (note that I purposely didn't use the term "slave" there) for a given zone, gets published in the zone's NS records or not. This is a great tuning and optimization opportunity. Add as many NS records as you need to give you the diversity you need, but not so many that you penalize the general case by steering traffic over high-latency and/or saturated WAN links. More-evolved networks set up Anycast addresses not only for recursive use, but separately for authoritative names ervice too (similar to what is done for root servers and gTLD servers on the public Internet), and this is probably the best solution so far for steering nameserver-to-nameserver query traffic to the "closest" node in any given topology (not that you'll have much need for nameserver-to-nameserver query traffic in a heavily-replicated model anyway). There is also a popular misconception that replicating zone data widely is injurious to information security because it allows malicious actors to easily dump the contents of entire zones. While I appreciate this argument, I think it is best addressed with proper controls on zone transfers (ideally only clients with particular TSIG keys would be able to transfer), rather than sacrificing the performance, availability and other security benefits of having data local to the clients. Restricting replication is a sledgehammer "solution" to the information-disclosure issue. - Kevin -----Original Message----- From: bind-users-boun...@lists.isc.org [mailto:bind-users-boun...@lists.isc.org] On Behalf Of Leandro Sent: Monday, July 06, 2015 3:40 PM To: bind-users@lists.isc.org Subject: setting and monitoring dns cache master / slave pair Hi , guys after reading some documentation about setting my master / slave dns cache cluster, I stil have some doubts. Im setting a master / slave dns cache cluster to provide dns service to internal users on my company having redundancy. Here the questions: 1)If Im not authoritative for any domain, then it is not necessary to declare any zone ? 2)If I dont declare any zone , master and slave configuration are identical for a dns cache server? 3)Does it have any drawbacks no declaring any zone file in the long term? About statistics: Most important parameters to check periodically to confirm proper function and good performace. I would like to write a parser script so I can plot statistics on cacti but can not find any docs about the statistics dump output for ver 9.8.2. So; Following this is what I understand: [root@centos_8664_pri data]# cat named_stats.txt +++ Statistics Dump +++ (1436204330) ++ Incoming Requests ++ 625 QUERY #total incoming request from my allowed clients => shoud be in the graph, can represents server load. ++ Incoming Queries ++ # Incoming queries from my allowed clients divided by RR type 359 A 266 AAAA ++ Outgoing Queries ++ [View: local_network] # Outgoing queries from my server to others dns divided by RRs type. 682 A 15 NS 674 AAAA 98 DS 55 DNSKEY 109 DLV [View: _bind] ++ Name Server Statistics ++ #witch is bind view ? Is it defined by default? 625 IPv4 requests received # Are these queries divided by query type from my server to other servers? 625 responses sent 582 queries resulted in successful answer 621 queries resulted in non authoritative answer 39 queries resulted in nxrrset 4 queries resulted in SERVFAIL 448 queries caused recursion ++ Zone Maintenance Statistics ++ ++ Resolver Statistics ++ [Common] [View: local_network] #again my local_network definition ? 1434 IPv4 queries sent 199 IPv6 queries sent 1373 IPv4 responses received 65 NXDOMAIN received 6 truncated responses received 305 query retries #queries from where to where ? 87 query timeouts # timeouts received by my clients while using my dns ? or by my server while trying to resolve ? 245 IPv4 NS address fetches #all parameters here seems interesting but , not sure what they are. 252 IPv6 NS address fetches 6 IPv4 NS address fetch failed 84 IPv6 NS address fetch failed 721 DNSSEC validation attempted 530 DNSSEC validation succeeded 191 DNSSEC NX validation succeeded 333 queries with RTT 10-100ms 1032 queries with RTT 100-500ms 8 queries with RTT 500-800ms [View: _bind] ++ Cache DB RRsets ++ [View: local_network (Cache: local_network)] 677 A # cache hits ? 152 NS 49 CNAME 135 AAAA 10 DS 77 RRSIG 46 NSEC 8 DNSKEY 92 !AAAA 49 !DS 1 !DLV 51 NXDOMAIN [View: _bind (Cache: _bind)] # Also not sure if it is relevant information. ++ Socket I/O Statistics ++ 1431 UDP/IPv4 sockets opened 200 UDP/IPv6 sockets opened 10 TCP/IPv4 sockets opened 2 TCP/IPv6 sockets opened 1428 UDP/IPv4 sockets closed 199 UDP/IPv6 sockets closed 7 TCP/IPv4 sockets closed 199 UDP/IPv6 socket connect failures 1428 UDP/IPv4 connections established 5 TCP/IPv4 connections established 2 TCP/IPv4 connections accepted 199 UDP/IPv6 send errors ++ Per Zone Query Statistics ++ _______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users _______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users