Updated documentation as requested by @preetapan

This commit is contained in:
Pierre Souchay 2018-03-08 18:02:40 +01:00
parent 419bf29041
commit 57310a6446
1 changed files with 11 additions and 3 deletions

View File

@ -949,10 +949,18 @@ Consul will not enable TLS for the HTTP API unless the `https` port has been ass
* <a name="udp_answer_limit"></a><a href="#udp_answer_limit">`udp_answer_limit`</a> - Limit the number of
resource records contained in the answer section of a UDP-based DNS
response. When answering a question, Consul will use the complete list of
response. Since this parameters is applied only for DNS queries of 512 bytes (without support of EDNS or
TCP, this setting is now replaced by <a href="#a_record_limit">`a_record_limit`</a> if randomization of
A/AAAA records is needed.
Its only usage is to limit the size of response of legacy DNS queries (not TCP, not EDNS), so you should
probably not use it.
* <a name="a_record_limit"></a><a href="#a_record_limit">`a_record_limit`</a> - Limit the number of
resource records contained in the answser section of a A, AAAA or ANY DNS response (both TCP and UDP).
When answering a question, Consul will use the complete list of
matching hosts, shuffle the list randomly, and then limit the number of
answers to `udp_answer_limit` (default `3`). In environments where
[RFC 3484 Section 6](https://tools.ietf.org/html/rfc3484#section-6) Rule 9
answers to `a_record_limit` (default: no limit). This limit does not apply to SRV records.
In environments where [RFC 3484 Section 6](https://tools.ietf.org/html/rfc3484#section-6) Rule 9
is implemented and enforced (i.e. DNS answers are always sorted and
therefore never random), clients may need to set this value to `1` to
preserve the expected randomized distribution behavior (note: