Add b.master.delegation-servers.dn42 and update SOA checking logic
This commit is contained in:
parent
a10a5610c7
commit
b5a23d04a8
29
contrib/#dn42promsrv.service#
Normal file
29
contrib/#dn42promsrv.service#
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
##########################################################################
|
||||||
|
# dn42promsrv example systemd service file
|
||||||
|
##########################################################################
|
||||||
|
|
||||||
|
[Unit]
|
||||||
|
Description=DN42 Prometheus Stats Server
|
||||||
|
After=network.target
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
User=promsrv
|
||||||
|
Group=promsrv
|
||||||
|
Type=simple
|
||||||
|
Restart=on-failure
|
||||||
|
# service hardening
|
||||||
|
ProtectSystem=strict
|
||||||
|
NoNewPrivileges=yes
|
||||||
|
ProtectControlGroups=yes
|
||||||
|
PrivateTmp=yes
|
||||||
|
PrivateDevices=yes
|
||||||
|
DevicePolicy=closed
|
||||||
|
MemoryDenyWriteExecute=yes
|
||||||
|
#
|
||||||
|
ExecStart=/usr/local/bin/dn42promsrv
|
||||||
|
|
||||||
|
#########################################################################
|
||||||
|
# end of file
|
46
dns.go
46
dns.go
@ -9,7 +9,7 @@ package main
|
|||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
// "fmt"
|
"fmt"
|
||||||
dns "github.com/miekg/dns"
|
dns "github.com/miekg/dns"
|
||||||
"github.com/prometheus/client_golang/prometheus"
|
"github.com/prometheus/client_golang/prometheus"
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
@ -83,6 +83,8 @@ var dns_servers = []*DNSServer{
|
|||||||
|
|
||||||
// master
|
// master
|
||||||
|
|
||||||
|
&DNSServer{"master", "jrb0001", "b.master.delegation-servers.dn42", 6,
|
||||||
|
"[fd42:180:3de0:30::1]:53", 0},
|
||||||
&DNSServer{"master", "jrb0001", "j.master.delegation-servers.dn42", 6,
|
&DNSServer{"master", "jrb0001", "j.master.delegation-servers.dn42", 6,
|
||||||
"[fd42:180:3de0:10:5054:ff:fe87:ea39]:53", 0},
|
"[fd42:180:3de0:10:5054:ff:fe87:ea39]:53", 0},
|
||||||
|
|
||||||
@ -204,17 +206,13 @@ func (m *DNSMetrics) Collect() {
|
|||||||
|
|
||||||
now := uint64(time.Now().Unix())
|
now := uint64(time.Now().Unix())
|
||||||
|
|
||||||
// add master servers to a list to compare SOA
|
// search the masters for the highest SOA
|
||||||
masters := make([]uint32, 2)
|
var latest_soa uint32 = 0
|
||||||
|
|
||||||
for _, server := range dns_servers {
|
for _, server := range dns_servers {
|
||||||
if server.role == "master" {
|
if server.role == "master" {
|
||||||
masters = append(masters, server.soa)
|
if server.soa > latest_soa {
|
||||||
} else {
|
latest_soa = server.soa
|
||||||
// icky icky icky - manually add yamakaja's server temporarily
|
|
||||||
if server.role == "delegation" &&
|
|
||||||
server.owner == "yamakaja" &&
|
|
||||||
server.ip == 6 {
|
|
||||||
masters = append(masters, server.soa)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -259,22 +257,11 @@ func (m *DNSMetrics) Collect() {
|
|||||||
}).Info("DNS Server high RTT")
|
}).Info("DNS Server high RTT")
|
||||||
}
|
}
|
||||||
|
|
||||||
// check if the SOA matches any defined master SOA
|
// check if the SOA matches the lastest master SOA
|
||||||
|
if r.serial == latest_soa {
|
||||||
// assume not
|
valid = 0
|
||||||
valid = 1
|
} else {
|
||||||
|
valid = 1
|
||||||
// automatically invalid if out of date (older than 25 hours)
|
|
||||||
if (now - uint64(r.serial)) < (3600 * 25) {
|
|
||||||
// otherwise step through each 'master' and
|
|
||||||
// check if the SOA matches somewhere
|
|
||||||
for _, soa := range masters {
|
|
||||||
if r.serial == soa {
|
|
||||||
// match was found
|
|
||||||
valid = 0
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// before setting whether the server is valid, calculate the stime
|
// before setting whether the server is valid, calculate the stime
|
||||||
@ -311,7 +298,9 @@ func (s *DNSServer) Query() *DNSResult {
|
|||||||
msg.RecursionDesired = (s.role == "recursive")
|
msg.RecursionDesired = (s.role == "recursive")
|
||||||
|
|
||||||
// query the dn42 root zone SOA
|
// query the dn42 root zone SOA
|
||||||
msg.Question = []dns.Question{{"dn42.", dns.TypeSOA, dns.ClassINET}}
|
msg.Question = []dns.Question{
|
||||||
|
{"dn42.", dns.TypeSOA, dns.ClassINET},
|
||||||
|
}
|
||||||
|
|
||||||
// add EDNS0 options to also query the service ID (NSID)
|
// add EDNS0 options to also query the service ID (NSID)
|
||||||
// pretty much copied verbatim from the library docs
|
// pretty much copied verbatim from the library docs
|
||||||
@ -333,6 +322,7 @@ func (s *DNSServer) Query() *DNSResult {
|
|||||||
|
|
||||||
// create a new DNS client
|
// create a new DNS client
|
||||||
client := new(dns.Client)
|
client := new(dns.Client)
|
||||||
|
client.Timeout, _ = time.ParseDuration("4s")
|
||||||
|
|
||||||
// and finally query the server
|
// and finally query the server
|
||||||
resp, rtt, err := client.Exchange(msg, s.addr)
|
resp, rtt, err := client.Exchange(msg, s.addr)
|
||||||
@ -346,6 +336,8 @@ func (s *DNSServer) Query() *DNSResult {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fmt.Printf("Resp: %v\n", resp)
|
||||||
|
|
||||||
// was an SOA returned ?
|
// was an SOA returned ?
|
||||||
if soa, ok := resp.Answer[0].(*dns.SOA); !ok {
|
if soa, ok := resp.Answer[0].(*dns.SOA); !ok {
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user