Thursday, 2015-01-29

*** openstackgerrit has quit IRC00:21
*** openstackgerrit has joined #openstack-dns00:21
*** ChanServ sets mode: +v openstackgerrit00:21
*** penick has quit IRC00:34
*** openstackgerrit has quit IRC01:05
*** openstackgerrit has joined #openstack-dns01:05
*** ChanServ sets mode: +v openstackgerrit01:05
*** rmoe has quit IRC01:19
*** rmoe has joined #openstack-dns01:35
*** stanzgy has joined #openstack-dns01:40
*** openstackgerrit has quit IRC02:20
*** openstackgerrit has joined #openstack-dns02:21
*** ChanServ sets mode: +v openstackgerrit02:21
*** rjrjr_ has joined #openstack-dns02:33
rjrjr_i broke this down to be even simpler to see the problem - http://paste.openstack.org/show/163481/02:34
rjrjr_anyone have any ideas on why the pythonDNS code is returning an rcode of NOERROR but dig is showing NXDOMAIN?02:35
rjrjr_if someone can run this code locally and tell me if they are seeing NOERROR or NXDOMAIN, that would be very helpful to me.02:36
rjrjrtimsim: REFUSED is not the correct result.02:39
rjrjrtimsim: just read more about this.  REFUSED is a bad code to return since it has another meaning (for example, you get REFUSED on a zone transfer if you don't have the proper TSIG key.)02:54
*** rjrjr_ has quit IRC02:59
*** openstackgerrit has quit IRC03:20
*** openstackgerrit has joined #openstack-dns03:20
*** ChanServ sets mode: +v openstackgerrit03:20
*** richm has quit IRC03:52
*** boris-42 has quit IRC04:13
*** rjrjr_ has joined #openstack-dns04:24
rjrjr_okay, i can replicate the 'dig' behavior in the mdns code and the mdns code behavior in 'dig'.  just not sure how we want to proceed here - http://paste.openstack.org/show/163508/04:25
rjrjr_i'm going to code mdns to look for NXDOMAIN or REFUSED rcodes for now.  but we'll definitely want to look at this more closely.04:26
*** timbyr_ has quit IRC05:00
*** stanzgy has quit IRC05:04
*** timbyr_ has joined #openstack-dns05:13
*** stanzgy has joined #openstack-dns05:17
*** nihilifer has joined #openstack-dns06:10
*** timbyr_ has quit IRC06:10
*** timbyr_ has joined #openstack-dns06:19
*** nihilifer has quit IRC06:56
*** nihilifer has joined #openstack-dns06:58
*** timbyr_ has quit IRC07:58
*** timbyr_ has joined #openstack-dns08:15
*** chlong has quit IRC08:36
*** kodokuu has joined #openstack-dns08:36
*** jordanP has joined #openstack-dns09:10
kodokuuIs it possible to forward request like bind (forwarders) with pdns ?09:15
ahufor the recursor, yes, for authoritative not09:26
kodokuuahu both can co-exist on same machine ?09:29
ahuyes09:30
kodokuubecause i use pdns now but I'll be changing for bind09:30
kodokuumaybe^^09:31
kodokuuok so when pdns can't resolv domain, recursor forward ?09:32
ekarlsoyo09:32
kodokuuHi09:32
kodokuuekarlso Maybe eandersson will connect :)09:38
kodokuuor I create a bug on launchpad ?09:38
ekarlso:P10:09
*** chlong has joined #openstack-dns10:13
*** chlong has quit IRC10:27
*** jordanP has quit IRC10:41
*** chlong has joined #openstack-dns10:44
*** stanzgy has quit IRC10:51
*** untriaged-bot has joined #openstack-dns11:03
untriaged-botUntriaged bugs so far:11:03
untriaged-bothttps://bugs.launchpad.net/designate/+bug/141243111:03
untriaged-bothttps://bugs.launchpad.net/designate/+bug/141302411:03
untriaged-bothttps://bugs.launchpad.net/designate/+bug/128944411:03
untriaged-bothttps://bugs.launchpad.net/designate/+bug/141380611:03
untriaged-bothttps://bugs.launchpad.net/python-designateclient/+bug/141556011:03
*** untriaged-bot has quit IRC11:03
*** kodokuu has quit IRC11:23
*** chlong has quit IRC11:39
*** MentalRay has joined #openstack-dns11:59
*** MentalRay_ has joined #openstack-dns11:59
*** MentalRay has quit IRC12:01
*** MentalRay_ has quit IRC12:01
*** chlong has joined #openstack-dns12:06
*** mwagner_lap has quit IRC12:47
*** boris-42 has joined #openstack-dns13:31
*** kodokuu has joined #openstack-dns13:37
*** jordanP has joined #openstack-dns13:41
openstackgerritEndre Karlson proposed openstack/python-designateclient: Fix if checking on ttl for Create/Update commands  https://review.openstack.org/15125214:07
rjrjrkiall: are you on?14:12
*** mwagner_lap has joined #openstack-dns14:12
*** nkinder has quit IRC14:21
*** rjrjr_ has quit IRC14:23
*** richm has joined #openstack-dns14:33
*** jmcbride has joined #openstack-dns14:42
*** jmcbride has quit IRC14:42
*** jmcbride has joined #openstack-dns14:43
Kiallrjrjr: I am now14:46
kodokuuahu No need recursor for forward, just recursor option with authoritative :)14:49
ahuah, that works too14:49
rjrjrhad problems getting BIND9 to create an NXDOMAIN, but have a solution.14:51
rjrjrhttp://paste.openstack.org/show/163508/14:51
rjrjrif i set the RD flag in MDNS when we send a query message, then BIND9 will respond with an NXDOMAIN, as long as recursion is not turned off.  (it is on by default.)14:52
rjrjrin BIND9 9.7> if you turn of recursion, it responds with a REFUSED if the domain does not exist.14:53
rjrjrunfortunately, REFUSED can be caused by other things besides a domain not existing too.14:54
rjrjrso, looking for direction on how we want to do this.14:54
KiallInteresting.. But, what happens when kodokuu's use cause is on? (Server is auth and recursive)14:54
KiallI can't help but think we need to find a way to do a different check for different nameservers...14:55
rjrjryeah, i put that in the pasteit.14:55
rjrjrif you read through it, at the end, i suggested we might want to move some of this logic to the backend drivers themselves.14:56
KiallAh - I missed that :)14:56
rjrjrthat way, we encapsulate all the backend idiosyncracies in that driver.14:56
KiallSo - Lets say we add a backend method "has_zone" or something.. PM would call that, rather than mDNS.. that can be implemnted as whatever works for the DNS server..  e.g. PowerDNS it might check the database for a $zone-name entry, bind might do an RNDC call etc.. That somewhat falls over with targets vs namservers - but I think it's probably an acceptable tradeoff14:58
rjrjrREFUSED is a horrible response to a missing domain by the way.14:58
rjrjrmdns encapsulates the DNS protocol.14:59
KiallWell, I'm not sure the DNS spec really lays out a proper (i.e. specific) response for that..14:59
Kiallrjrjr: right, I'm saying this doesn't need to use the DNS protocol14:59
*** MentalRay has joined #openstack-dns14:59
*** MentalRay_ has joined #openstack-dns14:59
ahuthe spec is silent on how to deal with 'no such domain at all'15:00
ahuit is best to emulate closely what other servers do15:00
rjrjrthe DNS spec does.  NXDOMAIN.15:00
ahuno it doesn't15:00
ahuNXDOMAIN is is you know about the domain, but not about the specific question15:01
ahuif you just get a question for randomdomain.com about which you know nothing15:01
ahuthe spec is not helpful15:01
ahuNXDOMAIN requires authority15:01
KiallYea - I'm not convinced there's a one size fits all approach to doing this :/15:02
ahuemulate exactly what NSD, Bind and PowerDNS do15:03
ahuis your best bet15:03
ahuwe've varied our strategy over the years15:03
*** paul_glass has joined #openstack-dns15:03
ahuyou can configure it now15:03
*** vinod1 has joined #openstack-dns15:03
*** timsim has joined #openstack-dns15:03
KiallJust for reference.. RFC1035's wording on NXDOMAIN:15:04
Kiall                3               Name Error - Meaningful only for15:04
Kiall                                responses from an authoritative name15:04
Kiall                                server, this code signifies that the15:04
Kiall                                domain name referenced in the query does15:04
Kiall                                not exist.15:04
rjrjrthis makes sense.  as long as BIND9 is configured to contact an authoritative server (recursive yes;) then it can respond with a NXDOMAIN.15:05
rjrjrif you turn off recursion, it responds with REFUSED.  which also makes sense.15:06
rjrjrand a NOERROR occurs if you don't ask the server the question properly (no RD) so it can get a response.15:06
KiallBut - That breaks the valid, if ill-advised, use case of the nameserver being both authoritative and recursive..  And.. Isn't guaranteed to be standard cross all nameservers15:06
*** nkinder has joined #openstack-dns15:07
rjrjri'm agreeing with you.  just need to figure out how to get rndc to give us what we want.15:07
Kiallbrb15:08
jbrattonyou can use rndc reload domain, it will give different response codes depending on if it knows about a zone15:08
rjrjrahu: appreciate the insight.15:11
rjrjrjbratton: i will look into that.15:11
jbrattonit's what I used for some code I wrote.. it's probably not the best way, but it is consistent15:11
rjrjrKiall: can you tackle the powerDNS solution?  we are going to fail gated without a BIND9 and powerDNS solution...15:12
rjrjrhmmm....15:12
rjrjr'rndc reload' has a huge caveat - https://kb.isc.org/article/AA-00640/0/Should-I-use-rndc-reconfig-or-rndc-reload-when-changing-my-nameserver-configuration-files.html15:13
rjrjrrackspace is not going to like that.15:13
jbrattonwell, I happen to run the nameservers for Rackspace :)15:13
jbrattonas long as you do rndc reload domainname, it's okay15:14
jbrattonbut yeah, just an rndc reload by itself is very bad15:14
rjrjrare you okay with a frequent (and this could be frequent) 'rdnc reload <domain>'15:14
Kialllol @ "<rjrjr> rackspace is not going to like that."15:14
jbrattonhow frequent are we talking about?15:14
jbrattonI don't *think* it would be a problem, but it would be interesting to lab it out15:15
Kiallall domains created (or is it changed?) in the last N hours every N minutes.... reload seems like it'll be too heavy15:15
KiallBUT - It's probably an acceptable interim check15:15
jbrattonif it was created, I wouldn't have a problem with that.. but for changed, that could get very noisy15:16
jbrattonbut of course, everyone has their own use case15:16
rjrjri'm still thinking we shouldn't abandon NXDOMAIN option.15:16
jbrattonmaybe NXDOMAIN | REFUSED?15:17
timsimIf you check for either NXDOMAIN or REFUSED maybe?15:17
timsimlol15:17
rjrjri currently have that in the code.15:17
jbrattontimsim: don't try to take credit for my ideas!15:17
timsim:P15:17
rjrjrbut, you can create a REFUSED for other valid reasons too.15:17
Kiallactually - That's not a terrible idea? ahu what are the possible pdns returns for a query against a domain it doesn't host?15:17
jbrattonyou can also do that with NXDOMAIN unfortunately15:17
rjrjrwhich have nothing to do with whether or not a domain exists.15:17
*** nihilifer has quit IRC15:18
rjrjrfor example, you have allow-query { <tsig-key>;}; and the supplied TSIGkey is incorrect.15:18
jbrattonmaybe this is something where you just have to document how you intend it to be used, and if someone does some crazy BIND config, it's not supported15:18
rjrjri thought we were going to add TSIGkey support at some point, which is why i brought it up.15:19
KiallWe could always inspect BIND's memory for the zone name ;)15:19
jbrattonhaha15:19
rjrjrBIND does offer a complex way of inducing NXDOMAIN on a response.15:20
jbrattonto add a zone, are you using rndc addzone?15:20
rjrjrlet me find the relevant documentation.  just a second.15:20
jbrattonbecause if you use rndc addzone, it generates a .nzf file in the running directory for BIND listing every zone it knows about15:20
jbrattonand you could just search that file15:20
timsimjbratton: yep15:20
jbrattonthen I'd just search the file15:21
rjrjrhttp://ftp.isc.org/isc/dnsrpz/isc-tn-2010-1.txt15:21
timsimrjrjr: In that case, isn't failure acceptable? If you can't get at a server because of a bad tsigkey, all of your requests will fail.15:21
rjrjrtimsim: i'm looking for a domain that doesn't exist, not one that fails.15:21
timsimRight, but if you have a bad TSIG key, you won't be able to do anything, so does it really matter? You won't be able to add/delete maybe even update zones?15:23
rjrjri understand.15:24
rjrjrthinking...15:24
*** jmcbride has quit IRC15:25
rjrjri believe if we get a REFUSED, PM should attempt to do nothing.15:25
rjrjrin that case.15:25
rjrjrif we get a NXDOMAIN, pool manager should act appropriately.15:25
rjrjrwhat you are suggesting is if we get a REFUSED, we attempt to do something.   that logic does not seem correct.15:26
rjrjror maybe we don't care, attempt to do something, and it just fails...15:27
timsimIf the only other case for getting a REFUSED is we have a bad TSIG key, than anything you're going to try and do is going to fail anyway, and you can act appropriately. But if you're not managing an authoritative bind9 server, you're always going to get refused, even when the zone doens't exist and you want to do something about that?15:27
rjrjrthere are other ways to get a REFUSED i'm sure.  that was just off the top of my head.15:28
rjrjrbut, in the end, they all mean that the request could not be performed because it was REFUSED.15:29
timsimI suppose, but it seems like we should try to do the needful thing anyway, and if it fails, we can act appropriately.15:29
rjrjrthe code currently checks for NXDOMAIN and REFUSED.  i'll leave that for now then.15:32
rjrjrquestion: do we want a domain and records that are ACTIVE to transition to an ERROR state?15:41
rjrjrperiodic sync runs, it finds a problem, can the state regress?15:41
timsimI think so, yeah.15:42
timsimYour other option is just try to fix the problem one time, and if that fails, you have to wait until the next periodic sync to find it again. I guess you could pop a Pool Manager cache item for it that hopefully gets looked at during Periodic recovery and is hidden from the user, but eh. Seems cleaner to reflect the true status of the zone.15:43
rjrjrokay, that is going to be a problem for another bug in either case.   periodic sync needs some work, but i don't want to address all this in the current patch.15:43
rjrjrthis patch is already turning out to be bigger than originally planned/thought.15:44
timsimCould you basically stop where you are, and add another patch to address some of the more periodic sync centered stuff?15:48
vinod1Kiall: I had a question on your add pretty_tox wrapper - https://review.openstack.org/#/c/149831/15:51
KiallSure15:51
vinod1When the tests pass I see {0} designate.tests.test_utils.TestUtils.test_load_schema [0.043505s] ... ok15:51
vinod1Is the leading {0} supposed to be replaced with something else?15:51
KiallNo - it's the worker # .. if you have 4 CPU cores, you split the test suite  in 4 and run 1 per core..15:52
KiallSo, each test will be prefixed with a 0 - 315:52
vinod1ah - ok makes sense15:52
*** betsy has joined #openstack-dns15:53
* Kiall hates security patches -_-15:53
*** jmcbride has joined #openstack-dns16:09
*** jmcbride has joined #openstack-dns16:09
timsimrjrjr: Take a look at my question on https://review.openstack.org/#/c/149428/ when you have a chance.16:21
timsimSomething I'm noticing as I work my way through this list of 90's one hit wonders. They're all those songs that have a specific purpose, they've carved out a place in this world. MMMBop, Macarena, Jump Around, Ice Ice Baby, What Is Love, What's Up? I love it.16:25
*** kodokuu has quit IRC16:30
*** untriaged-bot has joined #openstack-dns17:03
untriaged-botUntriaged bugs so far:17:03
untriaged-bothttps://bugs.launchpad.net/designate/+bug/141243117:03
untriaged-bothttps://bugs.launchpad.net/designate/+bug/141302417:03
untriaged-bothttps://bugs.launchpad.net/designate/+bug/128944417:03
untriaged-bothttps://bugs.launchpad.net/designate/+bug/141380617:03
untriaged-bothttps://bugs.launchpad.net/python-designateclient/+bug/141556017:03
*** untriaged-bot has quit IRC17:03
*** vinod2 has joined #openstack-dns17:07
*** rmoe has quit IRC17:08
*** vinod1 has quit IRC17:09
*** jmcbride has quit IRC17:11
*** jmcbride has joined #openstack-dns17:13
*** penick has joined #openstack-dns17:24
*** MentalRay has quit IRC17:25
*** MentalRay_ has quit IRC17:25
*** rmoe has joined #openstack-dns17:34
*** jordanP has quit IRC17:37
*** MentalRay_ has joined #openstack-dns17:37
*** MentalRay has joined #openstack-dns17:37
*** penick has quit IRC18:02
*** vinod2 has quit IRC18:02
*** timbyr_ has quit IRC18:06
*** timbyr_ has joined #openstack-dns18:08
*** MentalRay has quit IRC18:23
*** MentalRay_ has quit IRC18:23
*** jmcbride has quit IRC18:39
*** jmcbride has joined #openstack-dns18:40
*** openstackgerrit has quit IRC18:50
*** openstackgerrit has joined #openstack-dns18:51
*** ChanServ sets mode: +v openstackgerrit18:51
*** mwagner_lap has quit IRC18:53
*** penick has joined #openstack-dns19:05
*** nkinder has quit IRC19:10
openstackgerritKiall Mac Innes proposed openstack/designate: WIP: Add Healthcheck middleware  https://review.openstack.org/15135819:32
*** rmoe_ has joined #openstack-dns19:51
*** mikal_ has joined #openstack-dns19:55
*** rmoe has quit IRC19:56
*** mikal has quit IRC19:56
*** jmcbride has quit IRC20:00
*** openstackgerrit has quit IRC20:04
*** openstackgerrit has joined #openstack-dns20:04
*** ChanServ sets mode: +v openstackgerrit20:04
*** jmcbride has joined #openstack-dns20:07
*** jmcbride has quit IRC20:10
*** mwagner_lap has joined #openstack-dns20:21
*** penick has quit IRC20:26
*** jmcbride has joined #openstack-dns20:34
*** jmcbride has quit IRC20:35
*** jmcbride has joined #openstack-dns20:35
*** jmcbride has quit IRC20:36
*** jmcbride1 has joined #openstack-dns20:36
*** penick has joined #openstack-dns20:42
*** jmcbride1 has quit IRC20:47
*** penick has quit IRC20:51
*** vinod1 has joined #openstack-dns20:52
*** jmcbride has joined #openstack-dns20:52
*** jmcbride has quit IRC20:56
*** penick has joined #openstack-dns20:59
*** penick has quit IRC21:06
*** jmcbride has joined #openstack-dns21:16
*** penick has joined #openstack-dns21:20
*** penick has quit IRC21:21
*** jmcbride has quit IRC21:22
*** jmcbride has joined #openstack-dns21:22
*** mwagner_lap has quit IRC21:24
*** jmcbride has quit IRC21:39
*** jmcbride has joined #openstack-dns21:45
*** penick has joined #openstack-dns21:54
*** nkinder has joined #openstack-dns21:55
*** chlong has quit IRC22:08
*** vinod1 has quit IRC22:23
*** penick has quit IRC22:37
*** penick has joined #openstack-dns22:39
*** paul_glass has quit IRC22:40
*** crc32 has joined #openstack-dns22:51
*** openstackgerrit has quit IRC22:51
*** openstackgerrit has joined #openstack-dns22:51
*** ChanServ sets mode: +v openstackgerrit22:51
*** timsim has quit IRC23:02
*** crc32 has quit IRC23:24
*** vinod1 has joined #openstack-dns23:25
*** vinod1 has quit IRC23:25
*** vinod1 has joined #openstack-dns23:25
*** crc32 has joined #openstack-dns23:27
*** vinod2 has joined #openstack-dns23:35
*** vinod1 has quit IRC23:39
*** vinod2 has quit IRC23:39
*** vinod1 has joined #openstack-dns23:39
*** jmcbride has quit IRC23:49
*** chlong has joined #openstack-dns23:53

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!