DNS Analytics
The DNS Analytics tab provides deeper insights into DNS query patterns, trends, and statistics. Perform advanced analysis of DNS behavior, identify patterns, and optimize your DNS infrastructure based on detailed data.
Overview
While DNS Metrics provides real-time performance monitoring, DNS Analytics offers detailed historical analysis and pattern recognition. Use these insights to understand query behavior, detect anomalies, and make informed optimization decisions.
Getting Started
Accessing DNS Analytics
- Navigate to Monitoring from the main sidebar
- Click the DNS Analytics tab
- Analytics load automatically with historical data
Dashboard Components
The DNS Analytics tab displays:
- Query pattern analysis
- Query type distribution
- Recursive vs. non-recursive queries
- DNSSEC status and metrics
- Historical trend charts
- Detailed statistics tables
Analytics Overview
Query Pattern Analysis
Time-Series Trends in DNS Queries
Shows how DNS query volume changes over time:
Chart Types:
- Line chart: Overall query volume trends
- Area chart: Stacked query types over time
- Bar chart: Daily/hourly query distribution
What to Look For:
- Daily patterns (peaks and valleys)
- Weekly cycles
- Seasonal trends
- Sudden spikes or drops
- Correlation with events
Example Patterns:
- Daily: Peak during business hours, low at night
- Weekly: High weekdays, lower weekends
- Seasonal: Summer higher, winter lower
- Event-Based: Spikes around product launches
Query Type Distribution
Breakdown of Different DNS Record Types
Shows which DNS records are most frequently queried:
Common Record Types:
| Type | Purpose | Expected % |
|---|---|---|
| A Records | IPv4 addresses | 85-95% |
| AAAA Records | IPv6 addresses | 5-15% |
| CNAME Records | Aliases | 0-5% |
| MX Records | Mail servers | 0-1% |
| TXT Records | Text data (SPF, DKIM) | 0-1% |
| SRV Records | Service records | 0-1% |
| Other | Other types | < 1% |
Analyzing Distribution:
Normal Distribution:
- A records dominant (85%+)
- Small percentage of AAAA
- Few other types
Unusual Distribution:
- Unexpected record types appearing
- AAAA records very low (< 1%)
- Excessive MX queries
- Unknown record types
What It Indicates:
- IPv6 adoption levels
- Email infrastructure queries
- Application query patterns
- Potential misconfiguration
Recursive vs. Non-Recursive Queries
Query Behavior Patterns
Recursive Queries:
- Client asks resolver to find full answer
- Resolver asks authority servers
- More resource-intensive
- Client doesn't query authority directly
Non-Recursive Queries:
- Client asks for specific cached answer
- Resolver returns what it has
- Less resource-intensive
- Faster response possible
Analyzing Your Traffic:
Expected Pattern:
- Mostly recursive from clients
- Mix of recursive/non-recursive from resolvers
- Very few non-recursive from origin
Warning Signs:
- Excessive non-recursive queries
- Unusual recursive patterns
- Queries from unexpected sources
- Potential DNS amplification attacks
DNSSEC Status
DNS Security Extensions Monitoring
DNSSEC provides cryptographic authentication for DNS:
Status Indicators:
- ✅ Enabled & Valid: DNSSEC properly configured
- ⚠️ Enabled & Warning: DNSSEC enabled but issues detected
- ❌ Disabled: DNSSEC not implemented
- ⚠️ Invalid: DNSSEC validation failing
Metrics Tracked:
-
DNSSEC Validation Rate
- Percentage of queries successfully validated
- Target: 100%
- Issues indicate misconfiguration
-
DNSSEC Failures
- Failed validation attempts
- Should be zero
- Indicates potential attacks or configuration errors
-
DNSSEC Coverage
- Percentage of zones signed
- Incomplete coverage creates vulnerabilities
- Target: 100% of critical zones
-
Key Rotation Status
- DNSSEC key age
- Rotation frequency
- Expiration tracking
Optimization Tips:
- Implement DNSSEC for all zones
- Monitor validation success rate
- Schedule regular key rotation
- Update zone files before expiration
Advanced Analysis
Pattern Recognition
Identifying Trends in Query Behavior
Steps:
- Review the query pattern chart
- Identify recurring patterns
- Note time-based variations
- Document anomalies
Common Patterns:
Time-Based Patterns:
- Business hours: 2-3x more queries
- Weekend: 30-40% reduction
- Midnight to 5am: Lowest volume
- Holidays: Significant drops
Event-Based Patterns:
- Marketing campaign: +50% spike
- Product launch: Sustained increase
- Maintenance window: Temporary drop
- Security incident: Sudden change
Anomaly Detection
Spotting Unusual Query Behavior
Red Flags:
- Sudden spike > 200% of normal
- Unexpected query types appearing
- New geographic sources
- Recursive query increase
- Failed DNSSEC validations
Investigation Steps:
- Identify exact time of anomaly
- Review query sources
- Check application changes
- Analyze query types
- Review security logs
Common Causes:
- Application misconfiguration
- DNS caching issues
- Cache poisoning attempts
- Distributed DoS attack
- Misconfigured client
Comparison Analysis
Comparing Time Periods
How to Compare:
- Select two date ranges
- Overlay charts
- Calculate percentage changes
- Identify differences
Metrics to Compare:
- Total query volume
- Query type distribution
- Peak times
- DNSSEC validation rate
- Response times
Example Analysis:
- Week over week: Identify weekly patterns
- Month over month: Track growth trends
- Year over year: Seasonal changes
- Before/after: Impact measurement
Using Analytics for Optimization
Identify Peak DNS Query Times
Purpose: Plan maintenance and capacity
Steps:
- Review query pattern chart
- Identify consistent peak times
- Note duration of peaks
- Calculate peak load
Uses:
- Schedule maintenance during low periods
- Plan capacity expansion
- Time software updates
- Allocate resources
Example:
- Peak: 2-4 PM daily
- Maintain: 11 PM to 3 AM
- Capacity needed: 3x average during peak
Understand Query Patterns
Purpose: Optimize caching and TTL
Analysis:
- Review query type distribution
- Identify most queried records
- Check query frequency
- Analyze client behavior
Optimization:
- Increase TTL for frequently queried records
- Implement caching for common queries
- Pre-fetch popular records
- Load balance based on query patterns
Monitor for Unusual Behavior
Purpose: Detect attacks and misconfiguration
Watch For:
- Query patterns changing suddenly
- New record types appearing
- Query volume spikes
- Geographic anomalies
- Failed DNSSEC validations
Response:
- Alert on anomalies
- Investigate causes
- Block malicious queries
- Update security rules
Track DNSSEC Effectiveness
Purpose: Ensure DNS security
Metrics:
- Validation success rate (target: 100%)
- Failed validations (target: 0)
- Key expiration dates
- Zone coverage percentage
Actions:
- Schedule key rotation in advance
- Update expiring keys before deadline
- Fix validation failures immediately
- Implement DNSSEC for all zones
Common Scenarios
Scenario 1: Investigate Query Spike
Situation: DNS queries suddenly increase
Analysis:
- Check query pattern chart
- Identify spike timing
- Review query type distribution
- Check geographic distribution
- Review recursive vs. non-recursive split
Root Causes:
- Cache expiration (TTL expired)
- Client misconfiguration
- Application change
- Increased traffic
- DNS amplification attack
Resolution:
- Verify spike is legitimate
- Increase TTL if appropriate
- Review client configuration
- Monitor for attacks
Scenario 2: Optimize Query Volume
Situation: Reducing DNS load and costs
Analysis:
- Review query pattern chart
- Identify peak periods
- Check most queried records
- Analyze query types
Optimization Steps:
- Increase TTL for stable records
- Implement caching at application level
- Reduce record complexity
- Batch queries where possible
Expected Results:
- 20-40% reduction in queries
- Faster response times
- Lower DNS costs
Scenario 3: Monitor DNSSEC Status
Situation: Ensuring DNS security
Analysis:
- Check DNSSEC status indicator
- Review validation success rate
- Monitor key expiration dates
- Track failed validations
Actions:
- Schedule key rotation
- Monitor expiration dates (30 days before)
- Fix validation failures
- Implement DNSSEC gradually if not done
Scenario 4: Detect Anomalous Patterns
Situation: Security threat detection
Analysis:
- Review historical patterns
- Compare current to baseline
- Identify deviations
- Analyze query sources
Red Flags:
- 300%+ spike in specific query type
- Queries from unusual locations
- Non-recursive to origin servers
- Failed DNSSEC on valid zones
Response:
- Enable enhanced logging
- Review detailed query logs
- Block suspicious sources
- Alert security team
Best Practices
Daily Analysis
- ✅ Review query pattern chart
- ✅ Check for anomalies
- ✅ Monitor DNSSEC status
- ✅ Note any unusual activity
Weekly Review
- ✅ Compare week-over-week changes
- ✅ Analyze query type trends
- ✅ Review peak times
- ✅ Plan optimizations
Monthly Deep Dive
- ✅ Month-over-month comparison
- ✅ Trend analysis
- ✅ Capacity planning
- ✅ DNSSEC audit
Quarterly Planning
- ✅ Review annual trends
- ✅ Identify seasonal patterns
- ✅ Plan infrastructure changes
- ✅ Update optimization strategy
Troubleshooting
Analytics Not Displaying
Problem: Dashboard shows no data
Solutions:
- Ensure application has DNS activity
- Wait for historical data collection
- Check date range selection
- Verify DNS configuration
- Refresh dashboard
Patterns Unclear
Problem: Can't identify clear patterns
Solutions:
- Expand date range (at least 7 days)
- Compare multiple time periods
- Check for external events
- Filter by specific record type
- Contact support
DNSSEC Issues
Problem: DNSSEC validation failing
Solutions:
- Verify DNSSEC keys are valid
- Check key expiration dates
- Review zone configuration
- Test with validation tools
- Contact DNS provider
Limits & Considerations
| Item | Limit |
|---|---|
| Historical Data | Last 30-90 days |
| Granularity | Hourly/Daily aggregation |
| Pattern Detection | Requires 7+ days data |
| Export Capability | CSV, JSON formats |
| Real-time Updates | 15-30 minute delay |
| Query Types Tracked | All standard types |
Related Documentation
- Monitoring Overview - Overview of all monitoring
- DNS Metrics - Real-time DNS performance
- HTTP Traffic - HTTP traffic analysis
- Uptime Monitoring - Application availability
- Alerts - Set up anomaly alerts