Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tool: update kapinger to make random dns queries #1061

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

alexcastilio
Copy link
Contributor

Description

Update kapinger to make random dns queries

Related Issue

If this pull request is related to any issue, please mention it here. Additionally, make sure that the issue is assigned to you before submitting this pull request.

Checklist

  • I have read the contributing documentation.
  • I signed and signed-off the commits (git commit -S -s ...). See this documentation on signing commits.
  • I have correctly attributed the author(s) of the code.
  • I have tested the changes locally.
  • I have followed the project's style guidelines.
  • I have updated the documentation, if necessary.
  • I have added tests, if applicable.

Screenshots (if applicable) or Testing Completed

Please add any relevant screenshots or GIFs to showcase the changes made.

Additional Notes

Add any additional notes or context about the pull request here.


Please refer to the CONTRIBUTING.md file for more information on how to contribute to this project.

@MikeZappa87
Copy link

What is the intention of this PR? This looks like it issues DNS queries for 'random' domain names? What is the scale? 1, 10, 100, 1000, 10000? After these queries are executed what is the consumer? Are we measuring something? This sounds like the consumer doesn't have a great means of testing.

hack/tools/kapinger/clients/dns.go Outdated Show resolved Hide resolved
@alexcastilio
Copy link
Contributor Author

What is the intention of this PR? This looks like it issues DNS queries for 'random' domain names? What is the scale? 1, 10, 100, 1000, 10000? After these queries are executed what is the consumer? Are we measuring something? This sounds like the consumer doesn't have a great means of testing.

The idea is to generate random DNS queries. This will be used to scale test retina which will be generating metrics for traffic on the cluster (both these DNS queries and other traffic generated). This was requested as part of #1040

@timraymond
Copy link
Member

@MikeZappa87 pursuant to our earlier concerns about the external DNS traffic this might generate, it looks like .test is configured to black hole requests. The SOA record lists localhost as the resolver for .test:

; <<>> DiG 9.18.28 <<>> @4.2.2.2 test SOA
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52782
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;test.                          IN      SOA

;; ANSWER SECTION:
test.                   10800   IN      SOA     localhost. nobody.invalid. 1 3600 1200 604800 10800

;; Query time: 10 msec
;; SERVER: 4.2.2.2#53(4.2.2.2) (UDP)
;; WHEN: Mon Nov 25 15:17:24 EST 2024
;; MSG SIZE  rcvd: 92

@MikeZappa87
Copy link

What is the intention of this PR? This looks like it issues DNS queries for 'random' domain names? What is the scale? 1, 10, 100, 1000, 10000? After these queries are executed what is the consumer? Are we measuring something? This sounds like the consumer doesn't have a great means of testing.

The idea is to generate random DNS queries. This will be used to scale test retina which will be generating metrics for traffic on the cluster (both these DNS queries and other traffic generated). This was requested as part of #1040

The concern is that this could be hitting DNS servers that we don't own nor do we have an agreement to do this. It probably makes more sense to stand up a DNS server we control to do this or come up with a design change to test retina without doing this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants