Hide Forgot
The issue was response header coming from dns server end is more than 512 bits. The dns was configured over 512 bits, but according to following pull-request, cluster(CoreDNS) should compress header if it is more than 512 bits We think it should be solved with https://github.com/coredns/coredns/pull/2225/commits but it is not enough. The issue was solved modifying the dns server.
(In reply to David Hernández Fernández from comment #2) > The issue was response header coming from dns server end is more than 512 > bits. The dns was configured over 512 bits, but according to following > pull-request, cluster(CoreDNS) should compress header if it is more than 512 > bits > > We think it should be solved with > https://github.com/coredns/coredns/pull/2225/commits but it is not enough. > The issue was solved modifying the dns server. Would it be possible to get the exact configuration (bind? zone file?) from the upstream resolver setup - this would save us a lot of time. Also, what exactly was changed in the dns server that this issue no longer occurs?
Hi, we don't have access this configuration, but I know what they did. They configured the record with a lot of ips, because they would like to make a load balancer round robin through dns server. So when we query this fqdn, the result came over 512 bytes and the coredns can't handle this answer. After this, the company responsible for this DNS Server changed the record with few ips and the result came 475 bytes and CoreDNS can handle with the new result.
verified with 4.8.0-0.nightly-2021-04-25-195440 and passed. $ oc -n openshift-dns get cm/dns-default -oyaml apiVersion: v1 data: Corefile: | # test foo.bar:5353 { forward . 192.168.11.11 errors bufsize 1232 } .:5353 { bufsize 1232 errors health { lameduck 20s } <---snip---> kind: ConfigMap
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.8.2 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:2438