What device are you using ?
If it is a device with 16Mb storage, 7.14 can be a ‘challenge’ depending on your config.
Side note:
If you do not want to use dns cache at all, you may also want to change this
/ip dns set allow-remote-requests=yes
Set to no.
From Help pages
allow-remote-requests (yes | no; Default: no)
Specifies whether to allow router usage as a DNS cache for remote clients. Otherwise, only the router itself will use DNS configuration.
Yes they introduced a bug where when making a DNS request that can’t be added to the DNS cache, it thinks the cache is full when the TTL is just actually 0 (the only way to disable the cache).
It has nothing to do with my 423.0 MiB available on device especially when the log outputs to memory as reported.
It has nothing to do with allowing external requests to the DNS server.
Hello,
I had the same issue and solved it by setting a firewall rule to block outside requests on port 53 UDP, The MK DNS server was acting as a public DNS server.
Your failure: As usual, in this cases, either you configured the firewall badly, or thinking you were the smartest you deleted the default rules that prevent this (and other things) from happening.
If my memory serves me right, the default settings for the MK firewall do not include a rule to block UDP traffic on port 53.
My sole oversight was not executing the correct takeover of the router. This was amid a sequence of transitions, starting with a change in the main provider. The former provider assigned IPs via DHCP, but then we switched to a provider that used PPPoE, and the existing rule was set for WAN1. Initially, this was fine, but after the transition to the new PPPoE provider, the rule ceased to apply, which went unnoticed until internet connection issues began to surface.
If my memory serves me well default firewall blocks ALL incoming traffic which did not earlier originate from the inside of your network.
Without exception (apart from ICMP).
In the end in possible conclusion: this issue might not be a bug just a misconfiguration of the firewall where some “default” rules were deleted or any other rule in “sign of pride”