-->
Dns Hell: The 7 Deadly Sins

Dns Hell: The 7 Deadly Sins

Dns Hell: The 7 Deadly Sins

http://techgenix.com/dns-performance-best-practices/

It's mutual noesis all roughly the spider web as well as on LANs everywhere that "if DNS ain't happy, ain't nobody happy." It's pretty simple, really. Hard-coding apps to work fixed ip.addrs is bad, since those change. So everything from your users' spider web browsers to mission-critical trace of job organisation applications all must rely on a good for yous as well as performant DNS system. The job is, many organizations' DNS infrastructure is anything but healthy, as well as that leads to miserable functioning for everything. Let's review a duo of DNS concepts first.

GeoDNS

s mutual noesis all roughly the spider web as well as on LANs everywhere that  DNS hell: The 7 deadly sinsGeoDNS is a characteristic inward BIND as well as other DNS services that let's DNS servers laissez passer on dissimilar answers based on the source ip.addr of the request. It industrial plant similar this. Influenza A virus subtype H5N1 zone is laid upwardly with multiple entries for resources, like www.example.com. That website's content is replicated on servers all roughly the world, as well as belike leverages global CDNs that too receive got content replicated on servers all roughly the world. When a enquiry hits DNS for www.example.com or images.example.com, the DNS server that is authoritative for the example.com zone looks at the source ip.addr of the DNS query, determines where that enquiry came from, as well as provides a response that includes ip.addrs that are "local" to the query. It's non a perfect system, as well as oft companies reallocate ip ranges without updating the databases, but overall it industrial plant really well. Here's a practical example.

Say yous are inward France, as well as await upwardly www.example.com, which has an endpoint inward Republic of Austria as well as some other inward the the U.S. of A. The example.com DNS uses GeoDNS. If your DNS enquiry hits the example.com servers from the NAT ip.addr of your run inward France, they volition laissez passer on yous the ip.addr for the Austrian server. But if the French office's DNS servers are configured to frontward to the the U.S. of A. headquarters, as well as thence what the example.com DNS servers encounter equally a enquiry for www comes from the NAT ip.addr of the the U.S. of A. datacenter, thence they respond with the the U.S. of A. server. Instead of a quick xxx millisecond response fourth dimension to your HTTP requests, yous receive got to cross the Atlantic as well as ground with truthful cat videos, as well as belike encounter to a greater extent than similar a 150 millisecond response time. That's bad.

For your network to properly accept payoff of GeoDNS, yous must ensure that for external zones, your users are using a DNS server that is closed to them, as well as that DNS server should live able to brand its ain queries for external zones yesteryear going to root, without having to frontward across your WAN to some other DNS servers inward some other constituent of the world. That non alone saves fourth dimension as well as WAN bandwidth, it ensures that if at that topographic point are local resources, yous teach the ip.addrs that are local to you.

Using root

The anchor of DNS is comprised of thirteen servers, named Influenza A virus subtype H5N1 through M.root-servers.net, that host the source zone. These servers are maintained yesteryear 12 dissimilar organizations as well as are distributed throughout the world. They don't resolve every tape for every zone inward DNS, but they do resolve the authoritative servers for each as well as every domain on the Internet. When your DNS server tin flaming "go to root" then, instead of forwarding to your Internet service provider or to your headquarters, it makes a straight enquiry to 1 of the source servers to notice the authoritative servers for a zone, as well as and thence it queries those authoritative servers to resolve the A, CNAME, MX, as well as other records for that zone. It does accept a petty longer to resolve a domain for the really commencement fourth dimension this way, but your DNS server tin flaming cache the identity of the zone's authoritative servers, as well as the TTL on their records typically lasts for hours or days. As long equally at to the lowest degree the NS records for a domain are already inward cache, yous should encounter resolution for whatever other records consummate inward good nether 50 milliseconds. Records already cached inward your DNS server's retentiveness volition definitely resolve inward nether 25 milliseconds. Since DNS has to receive got a starting point, DNS servers work a file called the "root hints" file that lists the thirteen source servers, as well as their IPv4 as well as IPv6 ip.addrs thence that the DNS service knows where to begin.

Whether you're looking at your remote offices, or your web-filtering provider, or fifty-fifty how yous resolved this website, review your DNS infrastructure today to ensure yous aren't making 1 of these 7 deadly sins:

1. No local DNS

I encounter this almost every unmarried calendar week at 1 client or another. They receive got offices all over the world, with users that complain close ho-hum performance, as well as when nosotros teach to troubleshoot the network, nosotros notice that there's no local DNS server at the office. Even if the best yous tin flaming do is a caching DNS server on the router inward the modest patch office, that's amend than zippo as well as volition help the overall functioning for everyone. DNS resolution should non accept to a greater extent than than 25 milliseconds; 50 tops. If every fourth dimension a user must connect to a printer, a domain controller, a file server, or opened upwardly a spider web page, they receive got to hold back hundreds of milliseconds for the DNS response to come upwardly dorsum from the remote office, as well as thence the user is going to notice that things are "slow." Make for certain that yous receive got local DNS servers inward whatever run that is large plenty to receive got a slice of equipment capable of running DNS.

2. Configuring forwarding to the principal office

This is a mutual job alongside larger companies, peculiarly those with global scope. They configure DNS servers inward each of their regions, but as well as thence configure those DNS servers to frontward to DNS servers inward the headquarters or primary datacenter. As to a greater extent than as well as to a greater extent than SaaS providers as well as major websites deploy distributed endpoints as well as work global CDNs to render amend functioning for users, the bigger a error this is. Bad egress decisions tin flaming brand this fifty-fifty worse -- encounter below for to a greater extent than on that.

3. Using your ISPs DNS

s mutual noesis all roughly the spider web as well as on LANs everywhere that  DNS hell: The 7 deadly sinsOkay, thence you're changing the forwarding of your DNS servers inward the run non to frontward to the headquarters DNS servers on the other side of the ocean. That's good. So instead, you're forwarding them to your Internet service provider because that's better. Only it really oft is not. The ip.addrs your Internet service provider gives yous may really good NOT live inward the same portion equally yous are, or they themselves may live configured to frontward to some other region. The alone fourth dimension I'd experience comfortable using an ISP's DNS servers is for home, as well as I don't fifty-fifty do that at home! If yous are absolutely for certain that your ISP's DNS servers are local to you, as well as they don't frontward to whatever remote servers, as well as thence this is okay, but monitor your response times, as well as consider only letting your local DNS servers teach to source themselves.

4. Using populace DNS

So instead of using your ISP's DNS, yous determine to work 1 of the populace DNS services provided yesteryear Google, or OpenDNS, FreeDNS, your antimalware vendor, or 1 of the Tier 1 ISPs similar Level3 or Hurricane Electric. Unfortunately, the same job tin flaming arise here. Often, those publicly listed ip.addrs are non inward the same portion equally you, thence yous in 1 trial to a greater extent than current of air upwardly resolving names to ip.addrs that are non local to you. Again, I'd recommend yous allow your local DNS servers teach to source themselves rather than dealing with forwarding.

5. Not updating source hints

You may receive got read this upwardly to now, as well as are feeling pretty proficient close things because yous don't frontward to remote servers, as well as yous do allow your local servers to teach to root. That's great! But when was the final fourth dimension yous updated your source hints file? Anyone? Anyone? Bueller? The named.root file maintained yesteryear the Internic was final updated on 2016-10-20. They don't update it often, but when they do, it's critical that all DNS admins using source hints update their local source hints file on all their DNS servers with the latest information. If yous haven't done that inward the yesteryear few months, teach to Internic and check out the updated file.

6. Resolution out 1 path, egress out another

Here's a huge (dare I nation yuuuge) job I encounter with customers all the time. They receive got local Internet egress but they receive got DNS forwarding laid upwardly to remote servers, or they receive got dedicated paths to SaaS or PaaS resources inward 1 location, but non another. Overriding all the inward a higher identify close local DNS, yous require to ensure your DNS resolution goes out the same path equally your Internet traffic. If yous are splitting that path thence that some Internet egress is local (direct or through a proxy) but other Internet egress is out a dedicated circuit to an external provider, yous may receive got to configure conditional forwarding to ensure that DNS resolution as well as routing run out the same egress for remote resources. Otherwise yous mightiness notice that yous resolve a local endpoint, but road your traffic halfway across the footing earlier it tin flaming move out of your network, to receive got to brand the trip dorsum to the local resource, as well as and thence dorsum again.

7. Remote proxies

There are several proxy solutions on the marketplace that render proxies "in the cloud" or inward the service provider's datacenters. If yous are using 1 of these, yous must brand for certain that the service provider is non alone offering yous proxy nodes local to you, but that they are non making the same DNS mistakes with forwarding equally above. I receive got seen fourth dimension as well as in 1 trial to a greater extent than where a client is using a cloud proxy as well as trying to access a SaaS service inward their portion as well as having actually bad performance. When nosotros piece of work with the SaaS provider to diagnose the connections from the proxy, nosotros determine that the proxy itself is connecting to endpoints on the other side of the planet instead of to locally hosted resources, as well as it comes downward to the proxy nodes' DNS forwarding to upstream servers inward some other region.

Practically every unmarried connexion made from 1 host to some other starts with a DNS query. More as well as to a greater extent than service providers as well as CDNs are moving to a GeoDNS approach to help distribute resources globally as well as render customers with the best possible response. DNS admins receive got to do their constituent to ensure that clients teach fast, as well as appropriate, responses to their queries. Take the fourth dimension to review your DNS infrastructure to live for certain yous aren't committing 1 of the 7 deadly sins.


Blogger
Disqus
Pilih Sistem Komentar

No comments

Advertiser