본문으로 건너뛰기

DNS Query Logs Integration

Overview

DNS query logs provide visibility into domain resolution activity across your network. KYRA MDR collects DNS logs for detecting DNS tunneling, DGA domains, C2 communications, and data exfiltration. Supports BIND, Microsoft DNS, Unbound, and Pi-hole.

Prerequisites

  • A KYRA MDR Collector installed and running
  • DNS server with query logging capability
  • Network connectivity from the DNS server to the collector
  • Sufficient storage for DNS log volume

Configuration

Configure DNS query logging:

For BIND (named):

named.conf
logging {
channel kyra-mdr {
syslog local6;
severity info;
print-time yes;
};
category queries { kyra-mdr; };
};

For Unbound:

server:
log-queries: yes
log-replies: yes
use-syslog: yes

Forward via rsyslog:

/etc/rsyslog.d/dns.conf
local6.* @@<collector-ip>:514

Collected Log Types

Log TypeDescriptionSecurity Use
QueriesDNS query requestsDomain monitoring, DGA detection
ResponsesDNS response dataDNS spoofing detection
NXDOMAINNon-existent domain responsesDGA and typosquat detection
Zone TransfersAXFR/IXFR eventsUnauthorized zone access
DNSSECValidation success and failureDNS integrity monitoring
RecursiveRecursive resolution eventsDNS abuse detection

Troubleshooting

No query logs: DNS query logging is often disabled by default. Verify it is explicitly enabled.

High volume: DNS query logging can generate millions of events per day. Consider filtering by query type.

Syslog forwarding: Verify the facility (e.g., local6) is not filtered out in rsyslog configuration.

Contact kyra@seekerslab.com for support.