O'Reilly logo

Concise Guide to DNS and BIND, The by Nicolai Langfeldt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Resource Use

In secure, reliability-focused environments you usually want to be able to predict the resource usage of the software used. Controlling, or at least knowing things about, typical resource usage helps keep the service stable because it has enough resources to run. It also keeps other services stable because there are still resources for them to run, and it can help prevent denial of service attacks based on exhausting limited resources. In addition, limiting how many resources one specific service can use helps prevent the other services from being taken out as a result of the attempts to take out BIND.

BIND manages a cache that, potentially, can use up all the memory on the machine on which it runs. Given a high enough query rate, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required