Lines Matching +full:num +full:- +full:addresses

1 .TH "unbound-control" "8" "Feb 10, 2022" "NLnet Labs" "unbound 1.15.0"
3 .\" unbound-control.8 -- unbound remote control manual
11 .B unbound\-control,
12 .B unbound\-control\-setup
13 \- Unbound remote server control utility.
15 .B unbound\-control
16 .RB [ \-hq ]
17 .RB [ \-c
19 .RB [ \-s
23 .B Unbound\-control
30 .B \-h
33 .B \-c \fIcfgfile
37 .B \-s \fIserver[@port]
41 .B \-q
49 with the config file specified using \fI\-c\fR or the default config file.
69 controlled using the \fBstatistics\-cumulative\fR config statement.
81 Add new local zone with name and type. Like \fBlocal\-zone\fR config statement.
89 Add new local data, the given resource record. Like \fBlocal\-data\fR
102 Add local zones read from stdin of unbound\-control. Input is read per line,
106 Remove local zones read from stdin of unbound\-control. Input is one name per
110 Add local data RRs read from stdin of unbound\-control. Input is one RR per
114 Remove local data RRs read from stdin of unbound\-control. Input is one name per
147 with serve\-expired enabled, it'll serve that information but schedule a
157 iterator last-resort lookup failures from the rrset cache.
192 The values that work are: statistics\-interval, statistics\-cumulative,
193 do\-not\-query\-localhost, harden\-short\-bufsize, harden\-large\-queries,
194 harden\-glue, harden\-dnssec\-stripped, harden\-below\-nxdomain,
195 harden\-referral\-path, prefetch, prefetch\-key, log\-queries,
196 hide\-identity, hide\-version, identity, version, val\-log\-level,
197 val\-log\-squelch, ignore\-cd\-flag, add\-holddown, del\-holddown,
198 keep\-missing, tcp\-upstream, ssl\-upstream, max\-udp\-size, ratelimit,
199 ip\-ratelimit, cache\-max\-ttl, cache\-min\-ttl, cache\-max\-negative\-ttl.
220 List the zones with domain\-insecure.
229 Add a \fBdomain\-insecure\fR for the given zone, like the statement in unbound.conf.
234 Removes domain\-insecure for the given zone.
238 \fIdomain\-insecure\fR for the zone (so it can resolve insecurely if you have
240 The addr can be IP4, IP6 or nameserver names, like \fIforward-zone\fR config
245 \fIdomain\-insecure\fR for the zone.
249 \fIdomain\-insecure\fR for the zone. With +p the stub zone is set to prime,
251 names, like the \fIstub-zone\fR config in unbound.conf.
255 \fIdomain\-insecure\fR for the zone.
262 Without arguments the current list of addresses used to forward all queries
263 to is printed. On startup this is from the forward\-zone "." configuration.
267 are used. This can be used to avoid to avoid buggy or non\-DNSSEC supporting
270 If one or more IPv4 or IPv6 addresses are given, those are then used to forward
271 queries to. The addresses must be separated with spaces. With '@port' the
286 List the ip addresses that are ratelimited. Printed one per line with current
299 you set Unbound to validate with for-upstream yes and that can be cleared
337 The unbound\-control program exits with status code 1 on error, 0 on success.
339 The setup requires a self\-signed certificate and private keys for both
340 the server and client. The script \fIunbound\-control\-setup\fR generates
341 these in the default run directory, or with \-d in another directory.
343 who can use unbound\-control, by default owner and group but not all users.
347 sudo \-u unbound unbound\-control\-setup
353 After running the script as root, turn on \fBcontrol\-enable\fR in
358 .I threadX.num.queries
361 .I threadX.num.queries_ip_ratelimited
364 .I threadX.num.cachehits
367 .I threadX.num.cachemiss
370 .I threadX.num.dnscrypt.crypted
373 .I threadX.num.dnscrypt.cert
376 .I threadX.num.dnscrypt.cleartext
380 .I threadX.num.dnscrypt.malformed
383 .I threadX.num.prefetch
390 .I threadX.num.expired
393 .I threadX.num.recursivereplies
394 …to queries that needed recursive processing. Could be smaller than threadX.num.cachemiss if due to…
427 the time of the request. This helps you spot if the incoming\-num\-tcp
430 .I total.num.queries
433 .I total.num.cachehits
436 .I total.num.cachemiss
439 .I total.num.dnscrypt.crypted
442 .I total.num.dnscrypt.cert
445 .I total.num.dnscrypt.cleartext
448 .I total.num.dnscrypt.malformed
451 .I total.num.prefetch
454 .I total.num.expired
457 .I total.num.recursivereplies
528 .I num.query.type.A
533 .I num.query.type.other
534 Number of queries with query types 256\-65535.
536 .I num.query.class.IN
540 num.query.class.other is printed for classes 256\-65535.
542 .I num.query.opcode.QUERY
546 .I num.query.tcp
549 .I num.query.tcpout
553 .I num.query.tls
555 These are also counted in num.query.tcp, because TLS uses TCP.
557 .I num.query.tls.resume
561 .I num.query.https
563 These are also counted in num.query.tcp and num.query.tls, because HTTPS
566 .I num.query.ipv6
569 .I num.query.flags.RD
575 .I num.query.edns.present
578 .I num.query.edns.DO
580 These queries are also included in the num.query.edns.present number.
582 .I num.query.ratelimited
586 .I num.query.dnscrypt.shared_secret.cachemiss
590 .I num.query.dnscrypt.replay
594 .I num.answer.rcode.NXDOMAIN
598 .I num.answer.rcode.nodata
602 These queries are also included in the num.answer.rcode.NOERROR number.
605 .I num.answer.secure
611 .I num.answer.bogus
615 .I num.rrset.bogus
637 The number of items in the infra cache. These are IP addresses with their
657 .I num.query.authzone.up
658 The number of queries answered from auth\-zone data, upstream queries.
662 .I num.query.authzone.down
663 The number of queries for downstream answered from auth\-zone data.
667 .I num.query.aggressive.NOERROR
672 .I num.query.aggressive.NXDOMAIN
677 .I num.query.subnet
680 .I num.query.subnet_cache
685 .I num.rpz.action.<rpz_action>
687 Possible actions are: nxdomain, nodata, passthru, drop, tcp\-only, local\-data,
688 disabled, and cname\-override.
696 self\-signed certificates (unbound_server.pem and unbound_control.pem).