-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Query: SRV Service Discovery improperly parsing IP / Port combination. #752
Comments
Yea I remember such issue mentioned in some slack topic. Basically some providers adds This means that the SRV lookup returns Now is the question... Since this is fully valid domain, lookup for This lookup after SRV is in Thanos done by gRPC itself so we don't see if gRPC client tries to do lookup for One common thing is that SRV logic for Thanos could do SRV lookup and then A lookup for each target. This might fix your case if only |
Correct it appears to do that. ;; ANSWER SECTION: |
Most likely golang DNS resolvers is not able to do that? Not sure right now. I would suggest adding some debug code for our DNS provider to resolver is explicitly and see result. Are you familiar with Go? (: Otherwise we can help for such debug branch. |
I am not familiar with Go, I can give it a stab at some point but would definitely welcome the help! |
I had a look in to this and I think the A lookup after SRV lookup is the way to go. I raised #865, https://github.com/mjd95/thanos/tree/do-a-lookups-after-srv-lookups is the branch if you want to try it out. |
v0.2.1
thanos, version 0.2.1 (branch: HEAD, revision: 30e7cbd)
build user: root@79ffcf51ff9b
build date: 20181227-15:44:56
go version: go1.11.4
What happened
When parsing SRV records the query node comes out with an IP with a dot suffix.
What you expected to happen
When using the IP addresses directly as static endpoints the connection is made correctly. I expect this behavior to be consistent between SRV lookups and static peering.
How to reproduce it (as minimally and precisely as possible):
Unsure how to reproduce. The DNS is registered within Route53 and I have not seen any other issues or comments regarding this problem.
Full logs to relevant components
See above
Anything else we need to know
OS: Amazon Linux 2
The text was updated successfully, but these errors were encountered: