Solved

DNS failover

Posted on 2014-12-16
3
100 Views
Last Modified: 2014-12-19
I am thinking to use this service
http://www.dnsmadeeasy.com/services/dns-failover-system-monitoring/
There it says

"How Quickly Will My IP Change?
This is dependent on the TTL of your record as well as cache on local resolving name servers of querying clients who accessed your IP recently. Records that use DNS Failover should have a short TTL between 180-300 seconds. This will minimize the amount of time the record caches in resolving name servers decreasing the amount of time it takes for your new IP to populate when an outage occurs. Clients who have not accessed your IP recently will reach the new IP instantly thanks to DNS Made Easy’s instant IP updates. Clients who accessed the IP before the change was made will have about a 10 minute wait until the cache expires on the resolving name server and the new IP is populated."


But here says that
http://en.wikipedia.org/wiki/Time_to_live
"Newer DNS methods that are part of a DR (Disaster Recovery) system may have some records deliberately set extremely low on TTL. For example a 300 second TTL would help key records expire in 5 minutes to help ensure these records are flushed quickly worldwide. This gives administrators the ability to edit and update records in a timely manner. TTL values are "per record" and setting this value on specific records is sometimes honored automatically by all standard DNS systems worldwide. However a problem persists in that many caching DNS nameservers set their own TTLs regardless of the authoritative records, so it cannot be guaranteed that all downstream DNS servers have the new records after the TTL has expired."

My question is even with dnsmadeeasy the user will see a down site for hours. Is that right?
0
Comment
Question by:myyis
  • 2
3 Comments
 
LVL 35

Expert Comment

by:Kimputer
ID: 40502759
No, you didn't read correctly. It's clearly stated, the worst case scenario is this: "Clients who accessed the IP before the change was made will have about a 10 minute wait until the cache expires on the resolving name server and the new IP is populated".
If you have everything in order (2 seperate servers on different backbones), it's about 10 minutes max.
0
 

Author Comment

by:myyis
ID: 40502791
But wiki says

"However a problem persists in that many caching DNS nameservers set their own TTLs regardless of the authoritative records"

If they set their own TTL's let's say 14400 they will see the server down for 4 hrs? No?
0
 
LVL 35

Accepted Solution

by:
Kimputer earned 500 total points
ID: 40502804
I have not seen many of these caching DNS servers yet, but yes, if a users has this type  DNS server, it could be 4 hours downtime for that user. If you're so worried about that, maybe invest in a higher SLA with the ISP or server farm.
0

Featured Post

Webinar: Aligning, Automating, Winning

Join Dan Russo, Senior Manager of Operations Intelligence, for an in-depth discussion on how Dealertrack, leading provider of integrated digital solutions for the automotive industry, transformed their DevOps processes to increase collaboration and move with greater velocity.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
MacBook wifi issues 6 44
Device browser and/or dns client cache update through web page 7 26
domian network access 5 20
Public DNS  Vs BGP 20 21
One of the most often confused topics in the area DNS is the idea of GLUE records. Specifically, what they are, when they are needed, when they are provided, and how they are created. First, WHAT IS GLUE? To understand GLUE, you must first under…
There have been a lot of times when we have seen the need to enter a large number of DNS entries in a forward lookup zone. The standard procedure would be to launch the DNS Manager console, create the Zone and start adding new hosts using the New…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question