Solved

Linux round Robin DNS

Posted on 2007-11-29
3
1,025 Views
Last Modified: 2010-05-18
I am confused on Linux DNS Round Robin.

If I have a hostname with several different ips , this seems to work correctly as each time I ping I get a different ip to that same hostname. My guess is that the ttl is set very low for this to work. ( I did not build this)

My confusion is probalby that I am thinkng to windows on this . However, if I do the same setup in Wndows. the client resovler cache will cache the first ip it resolves and then use that until cahce times out. So, this kind of defeats the notion of round robin DNS. I can turn the client cache off but now that increases traffic to DNS server. Also will ignore TTL , unless you play with registry...

Does Linux not have a client resolver and that is why this is not an issue????
0
Comment
Question by:andrew_89
3 Comments
 
LVL 13

Accepted Solution

by:
WizRd-Linux earned 500 total points
ID: 20379829
linux does it is called nscd.  Check if the service is started, however I believe that nscd adheres to the TTL on DNS records.
0
 
LVL 40

Expert Comment

by:omarfarid
ID: 20380195
Hi,

WizRd-Linux is correct in that linux has nscd process that caches dns resolutions.

One thing I want to say about dns round robin. The dns server always reply to quires with a list of IPs for the domain name, but it rotate it thus it is round robin. The client receives the list and mostly use the first ip in the list and continue to use that ip address until ttl expires or the ip does not response.

0
 
LVL 1

Author Comment

by:andrew_89
ID: 20381195
om so this is not the saem behaviour as windows client DNS cache. AS even when ttl expires the client will consult the cache first and will not go query a DNS server. This causes it to use the same ip and is not true DNS round robin.

Unless of course you disable the client cache.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I've written instructions for one router type, but this principle may be useful for others of the same brand and even other brands of router. Problem: I had an issue especially with mobile devices that refused to use DNS information supplied via…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question