fix(dns): spam ttl logs for prepared queries (#21381)

pull/21527/head
Dan Stough 5 months ago committed by GitHub
parent 40ca4ad6d0
commit a251f8ad80
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

@ -0,0 +1,4 @@
```release-note:bug
dns: Fixes a spam log message "Failed to parse TTL for prepared query..."
that was always being logged on each prepared query evaluation.
```

@ -363,11 +363,12 @@ func (f *V1DataFetcher) FetchPreparedQuery(ctx Context, req *QueryPayload) ([]*R
if err == nil {
ttlSec := uint32(ttl / time.Second)
ttlOverride = &ttlSec
} else {
f.logger.Warn("Failed to parse TTL for prepared query , ignoring",
"ttl", out.DNS.TTL,
"prepared_query", req.Name,
)
}
f.logger.Warn("Failed to parse TTL for prepared query , ignoring",
"ttl", out.DNS.TTL,
"prepared_query", req.Name,
)
}
// If we have no nodes, return not found!

Loading…
Cancel
Save