DNS Analytics
DNS Analytics#
The DNS Analytics tab provides deeper insights into DNS query patterns, trends, and statistics. Perform advanced analysis of DNS behavior, identify patterns, and optimize your DNS infrastructure based on detailed data.
Overview#
While DNS Metrics provides real-time performance monitoring, DNS Analytics offers detailed historical analysis and pattern recognition. Use these insights to understand query behavior, detect anomalies, and make informed optimization decisions.
Getting Started#
Accessing DNS Analytics#
- Navigate to Monitoring from the main sidebar
- Click the DNS Analytics tab
- Analytics load automatically with historical data
Dashboard Components#
The DNS Analytics tab displays:
- Query pattern analysis
- Query type distribution
- Recursive vs. non-recursive queries
- DNSSEC status and metrics
- Historical trend charts
- Detailed statistics tables
Analytics Overview#
Query Pattern Analysis#
Time-Series Trends in DNS Queries
Shows how DNS query volume changes over time:
Chart Types:
- Line chart: Overall query volume trends
- Area chart: Stacked query types over time
- Bar chart: Daily/hourly query distribution
What to Look For:
- Daily patterns (peaks and valleys)
- Weekly cycles
- Seasonal trends
- Sudden spikes or drops
- Correlation with events
Example Patterns:
- Daily: Peak during business hours, low at night
- Weekly: High weekdays, lower weekends
- Seasonal: Summer higher, winter lower
- Event-Based: Spikes around product launches
Query Type Distribution#
Breakdown of Different DNS Record Types
Shows which DNS records are most frequently queried:
Common Record Types:
| Type | Purpose | Expected % |
|---|---|---|
| A Records | IPv4 addresses | 85-95% |
| AAAA Records | IPv6 addresses | 5-15% |
| CNAME Records | Aliases | 0-5% |
| MX Records | Mail servers | 0-1% |
| TXT Records | Text data (SPF, DKIM) | 0-1% |
| SRV Records | Service records | 0-1% |
| Other | Other types | < 1% |
Analyzing Distribution:
Normal Distribution:
- A records dominant (85%+)
- Small percentage of AAAA
- Few other types
Unusual Distribution:
- Unexpected record types appearing
- AAAA records very low (< 1%)
- Excessive MX queries
- Unknown record types
What It Indicates:
- IPv6 adoption levels
- Email infrastructure queries
- Application query patterns
- Potential misconfiguration
Recursive vs. Non-Recursive Queries#
Query Behavior Patterns
Recursive Queries:
- Client asks resolver to find full answer
- Resolver asks authority servers
- More resource-intensive
- Client doesn't query authority directly
Non-Recursive Queries:
- Client asks for specific cached answer
- Resolver returns what it has
- Less resource-intensive
- Faster response possible
Analyzing Your Traffic:
Expected Pattern:
- Mostly recursive from clients
- Mix of recursive/non-recursive from resolvers
- Very few non-recursive from origin
Warning Signs:
- Excessive non-recursive queries
- Unusual recursive patterns
- Queries from unexpected sources
- Potential DNS amplification attacks
DNSSEC Status#
DNS Security Extensions Monitoring
DNSSEC provides cryptographic authentication for DNS:
Status Indicators:
- โ Enabled & Valid: DNSSEC properly configured
- โ ๏ธ Enabled & Warning: DNSSEC enabled but issues detected
- โ Disabled: DNSSEC not implemented
- โ ๏ธ Invalid: DNSSEC validation failing
Metrics Tracked:
DNSSEC Validation Rate
- Percentage of queries successfully validated
- Target: 100%
- Issues indicate misconfiguration
DNSSEC Failures
- Failed validation attempts
- Should be zero
- Indicates potential attacks or configuration errors
DNSSEC Coverage
- Percentage of zones signed
- Incomplete coverage creates vulnerabilities
- Target: 100% of critical zones
Key Rotation Status
- DNSSEC key age
- Rotation frequency
- Expiration tracking
Optimization Tips:
- Implement DNSSEC for all zones
- Monitor validation success rate
- Schedule regular key rotation
- Update zone files before expiration
Advanced Analysis#
Pattern Recognition#
Identifying Trends in Query Behavior
Steps:
- Review the query pattern chart
- Identify recurring patterns
- Note time-based variations
- Document anomalies
Common Patterns:
Time-Based Patterns:
- Business hours: 2-3x more queries
- Weekend: 30-40% reduction
- Midnight to 5am: Lowest volume
- Holidays: Significant drops
Event-Based Patterns:
- Marketing campaign: +50% spike
- Product launch: Sustained increase
- Maintenance window: Temporary drop
- Security incident: Sudden change
Anomaly Detection#
Spotting Unusual Query Behavior
Red Flags:
- Sudden spike > 200% of normal
- Unexpected query types appearing
- New geographic sources
- Recursive query increase
- Failed DNSSEC validations
Investigation Steps:
- Identify exact time of anomaly
- Review query sources
- Check application changes
- Analyze query types
- Review security logs
Common Causes:
- Application misconfiguration
- DNS caching issues
- Cache poisoning attempts
- Distributed DoS attack
- Misconfigured client
Comparison Analysis#
Comparing Time Periods
How to Compare:
- Select two date ranges
- Overlay charts
- Calculate percentage changes
- Identify differences
Metrics to Compare:
- Total query volume
- Query type distribution
- Peak times
- DNSSEC validation rate
- Response times
Example Analysis:
- Week over week: Identify weekly patterns
- Month over month: Track growth trends
- Year over year: Seasonal changes
- Before/after: Impact measurement
Using Analytics for Optimization#
Identify Peak DNS Query Times#
Purpose: Plan maintenance and capacity
Steps:
- Review query pattern chart
- Identify consistent peak times
- Note duration of peaks
- Calculate peak load
Uses:
- Schedule maintenance during low periods
- Plan capacity expansion
- Time software updates
- Allocate resources
Example:
- Peak: 2-4 PM daily
- Maintain: 11 PM to 3 AM
- Capacity needed: 3x average during peak
Understand Query Patterns#
Purpose: Optimize caching and TTL
Analysis:
- Review query type distribution
- Identify most queried records
- Check query frequency
- Analyze client behavior
Optimization:
- Increase TTL for frequently queried records
- Implement caching for common queries
- Pre-fetch popular records
- Load balance based on query patterns
Monitor for Unusual Behavior#
Purpose: Detect attacks and misconfiguration
Watch For:
- Query patterns changing suddenly
- New record types appearing
- Query volume spikes
- Geographic anomalies
- Failed DNSSEC validations
Response:
- Alert on anomalies
- Investigate causes
- Block malicious queries
- Update security rules
Track DNSSEC Effectiveness#
Purpose: Ensure DNS security
Metrics:
- Validation success rate (target: 100%)
- Failed validations (target: 0)
- Key expiration dates
- Zone coverage percentage
Actions:
- Schedule key rotation in advance
- Update expiring keys before deadline
- Fix validation failures immediately
- Implement DNSSEC for all zones
Common Scenarios#
Scenario 1: Investigate Query Spike#
Situation: DNS queries suddenly increase
Analysis:
- Check query pattern chart
- Identify spike timing
- Review query type distribution
- Check geographic distribution
- Review recursive vs. non-recursive split
Root Causes:
- Cache expiration (TTL expired)
- Client misconfiguration
- Application change
- Increased traffic
- DNS amplification attack
Resolution:
- Verify spike is legitimate
- Increase TTL if appropriate
- Review client configuration
- Monitor for attacks
Scenario 2: Optimize Query Volume#
Situation: Reducing DNS load and costs
Analysis:
- Review query pattern chart
- Identify peak periods
- Check most queried records
- Analyze query types
Optimization Steps:
- Increase TTL for stable records
- Implement caching at application level
- Reduce record complexity
- Batch queries where possible
Expected Results:
- 20-40% reduction in queries
- Faster response times
- Lower DNS costs
Scenario 3: Monitor DNSSEC Status#
Situation: Ensuring DNS security
Analysis:
- Check DNSSEC status indicator
- Review validation success rate
- Monitor key expiration dates
- Track failed validations
Actions:
- Schedule key rotation
- Monitor expiration dates (30 days before)
- Fix validation failures
- Implement DNSSEC gradually if not done
Scenario 4: Detect Anomalous Patterns#
Situation: Security threat detection
Analysis:
- Review historical patterns
- Compare current to baseline
- Identify deviations
- Analyze query sources
Red Flags:
- 300%+ spike in specific query type
- Queries from unusual locations
- Non-recursive to origin servers
- Failed DNSSEC on valid zones
Response:
- Enable enhanced logging
- Review detailed query logs
- Block suspicious sources
- Alert security team
Best Practices#
Daily Analysis#
- โ Review query pattern chart
- โ Check for anomalies
- โ Monitor DNSSEC status
- โ Note any unusual activity
Weekly Review#
- โ Compare week-over-week changes
- โ Analyze query type trends
- โ Review peak times
- โ Plan optimizations
Monthly Deep Dive#
- โ Month-over-month comparison
- โ Trend analysis
- โ Capacity planning
- โ DNSSEC audit
Quarterly Planning#
- โ Review annual trends
- โ Identify seasonal patterns
- โ Plan infrastructure changes
- โ Update optimization strategy
Troubleshooting#
Analytics Not Displaying#
Problem: Dashboard shows no data
Solutions:
- Ensure application has DNS activity
- Wait for historical data collection
- Check date range selection
- Verify DNS configuration
- Refresh dashboard
Patterns Unclear#
Problem: Can't identify clear patterns
Solutions:
- Expand date range (at least 7 days)
- Compare multiple time periods
- Check for external events
- Filter by specific record type
- Contact support
DNSSEC Issues#
Problem: DNSSEC validation failing
Solutions:
- Verify DNSSEC keys are valid
- Check key expiration dates
- Review zone configuration
- Test with validation tools
- Contact DNS provider
Limits & Considerations#
| Item | Limit |
|---|---|
| Historical Data | Last 30-90 days |
| Granularity | Hourly/Daily aggregation |
| Pattern Detection | Requires 7+ days data |
| Export Capability | CSV, JSON formats |
| Real-time Updates | 15-30 minute delay |
| Query Types Tracked | All standard types |
Related Documentation#
- Monitoring Overview - Overview of all monitoring
- DNS Metrics - Real-time DNS performance
- HTTP Traffic - HTTP traffic analysis
- Uptime Monitoring - Application availability
- Alerts - Set up anomaly alerts