Is this amount of DNS requests normal? #399
-
Hello, I am using the SDK (1.7.1) on a fleet of devices and see a lot of data usage on them all. I ran tshark (wireshark) on the devices to check the data usage. Almost all data usage seems to come from loads of DNS communication, two queries per second. Is this normal for the IoT SDK? And if not, do you know where I need to look to change this? Best regards, |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 10 replies
-
How much is "a lot of data usage"? |
Beta Was this translation helpful? Give feedback.
-
Solution proposal can be found here: awslabs/aws-c-io#559
ensure default MQTT connections do not perform any unsolicited additional resolution attempts. |
Beta Was this translation helpful? Give feedback.
-
v1.13.0 contains changes to DNS behavior so that all MQTT connections (MQTT5, MQTT311, websockets or direct) override the default DNS resolution frequency in a way that prevents the extra checks. This applies only to the MQTT connection itself; secondary connections made in service of establishing that connection (in particular, http-based credentials providers like cognito, sts, or imds) remain unchanged and will still ping for 30 seconds if used. If credentials provider DNS behavior is problematic for you, we can revisit the overall issue. Absent that, we encourage you to try the new version and verify that it meets your needs/expectations. |
Beta Was this translation helpful? Give feedback.
-
Hello! Reopening this discussion to make it searchable. |
Beta Was this translation helpful? Give feedback.
v1.13.0 contains changes to DNS behavior so that all MQTT connections (MQTT5, MQTT311, websockets or direct) override the default DNS resolution frequency in a way that prevents the extra checks. This applies only to the MQTT connection itself; secondary connections made in service of establishing that connection (in particular, http-based credentials providers like cognito, sts, or imds) remain unchanged and will still ping for 30 seconds if used. If credentials provider DNS behavior is problematic for you, we can revisit the overall issue. Absent that, we encourage you to try the new version and verify that it meets your needs/expectations.