you got response with BUGs on jira and temp fix is there...
so, yes
On 15 December 2014 at 13:49, Indra Pramana wrote:
>
> Hi Andrija,
>
> Yes, it's on a shared network with public IP in advanced zone. So far I
> don't see similar issues on my VPC's VRs, but it could be because the IP is
> not kn
Hi Andrija,
Yes, it's on a shared network with public IP in advanced zone. So far I
don't see similar issues on my VPC's VRs, but it could be because the IP is
not known, unlike the VR on a shared network which will automatically use
the second IP on the subnet after the gateway (e.g. x.x.x.2).
I
Please look at the comments for CLOUDSTACK-5494 and CLOUDSTACK-6432 on JIRA.
Maybe it helps.
-Wei
2014-12-15 13:13 GMT+01:00 Indra Pramana :
> Dear all,
>
> We are using CloudStack 4.2.0 with KVM hypervisors.
>
> Is there a way to prevent our virtual routers (VRs) to be targeted by DNS
> amplifi
Please refer the following ticket, It will help
https://issues.apache.org/jira/browse/CLOUDSTACK-5494
Thanks,
jayapal
On 15-Dec-2014, at 5:52 PM, Andrija Panic wrote:
> Indra, did you observe this on Shared Network - I had same issue with
> Shared Network (public IPs) in Advanced Zone.
>
> I
Indra, did you observe this on Shared Network - I had same issue with
Shared Network (public IPs) in Advanced Zone.
I think VR for VPC is NOT a problem...
On 15 December 2014 at 13:13, Indra Pramana wrote:
>
> Dear all,
>
> We are using CloudStack 4.2.0 with KVM hypervisors.
>
> Is there a way t
Dear all,
We are using CloudStack 4.2.0 with KVM hypervisors.
Is there a way to prevent our virtual routers (VRs) to be targeted by DNS
amplification attack? It seems that the DNS services on dnsmasq running on
the VRs are by default recursive, causing it to easily be targeted for DNS
amplificati