nsd[202429]: info: zone foo.bar serial [NUMBER HERE] is updated to [NUMBER
HERE]
there is so much obfuscation here, that IMO it's impossible to assist you.
Honestly, now, you're even obfuscating SOA serial numbers?! Obfuscation taken
to a completely new level.
Seems to me the primary is configured correctly as far as notify
messages go. Presumably, the address from which the notify is sent is
different, or perhaps the key doesn't match.
It is probably easiest to use something like ldns-notify to test what
the exact issue is. At least, that's the route I'd take. Don't think
you need to test with actual zone updates, just sent a notify and NSD
will figure out there's no new information once it passes the acl.
nsd[202429]: info: zone foo.bar serial [NUMBER HERE] is updated to [NUMBER
HERE]
there is so much obfuscation here, that IMO it’s impossible to assist you.
Honestly, now, you’re even obfuscating SOA serial numbers?! Obfuscation taken
to a completely new level.
-JP
Hi JP
I’m sorry
Consider something like that:
nsd[255715]: [2022-07-01 12:28:51.766] nsd[255715]: info: zone foo.bar serial 53 is updated to 54
Thanks
Hi Alexander,
Seems to me the primary is configured correctly as far as notify
messages go. Presumably, the address from which the notify is sent is
different, or perhaps the key doesn’t match.
It is probably easiest to use something like ldns-notify to test what
the exact issue is. At least, that’s the route I’d take. Don’t think
you need to test with actual zone updates, just sent a notify and NSD
will figure out there’s no new information once it passes the acl.