Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Be more strict when snooping DNS over TCP traffic #1897

Merged
merged 1 commit into from
Sep 27, 2016

Conversation

2opremio
Copy link
Contributor

Getting non-DNS traffic on TCP port 53 was causing the parser to flood the logs with errors (it happened in Weave Cloud, Prometheus is incorrectly sending http requests).

This makes DNS traffic identification a bit more robust and strict, enforcing our relaxation of only considering self-contained TCP segments.

@2opremio 2opremio force-pushed the stricter-dns-over-tcp-snooping branch 2 times, most recently from f9da295 to fdef4ca Compare September 27, 2016 12:44
@2opremio 2opremio force-pushed the stricter-dns-over-tcp-snooping branch from fdef4ca to 45a9367 Compare September 27, 2016 12:48
@rade
Copy link
Member

rade commented Sep 27, 2016

LGTM

@rade rade assigned 2opremio and unassigned rade Sep 27, 2016
@2opremio 2opremio merged commit 6ed79a7 into master Sep 27, 2016
@2opremio 2opremio deleted the stricter-dns-over-tcp-snooping branch September 27, 2016 19:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants