I think I might have a DNS loop occurring w/ pihole and Ubiquiti gear. It's been working absolutely fine until recently, but something has changed, and I'm getting some quite substantial rates coming in.
The values high I'm getting are:
pihole-master.home.lan
192.168.50.1
What script are you running that is repeatedly requesting this?
-----tail of pihole.log------
Feb 6 04:38:37 dnsmasq[458]: config insertions.bind is <TXT>
Feb 6 04:38:37 dnsmasq[458]: config evictions.bind is <TXT>
Feb 6 04:38:37 dnsmasq[458]: config hits.bind is <TXT>
Feb 6 04:38:37 dnsmasq[458]: config misses.bind is <TXT>
Feb 6 04:38:37 dnsmasq[458]: config auth.bind is <TXT>
Feb 6 04:38:37 dnsmasq[458]: config servers.bind is <TXT>
Feb 6 04:38:38 dnsmasq[458]: config cachesize.bind is <TXT>
Feb 6 04:38:38 dnsmasq[458]: config insertions.bind is <TXT>
Feb 6 04:38:38 dnsmasq[458]: config evictions.bind is <TXT>
Feb 6 04:38:38 dnsmasq[458]: config hits.bind is <TXT>
Feb 6 04:38:38 dnsmasq[458]: config misses.bind is <TXT>
Feb 6 04:38:38 dnsmasq[458]: config auth.bind is <TXT>
...
Feb 13 18:01:44 dnsmasq[11912]: config servers.bind is <TXT>
Feb 13 18:01:45 dnsmasq[11912]: query[A] PiHole-Master.home.lan from 127.0.0.1
Feb 13 18:01:45 dnsmasq[11912]: /etc/pihole/custom.list PiHole-Master.home.lan is 127.0.0.1
Feb 13 18:01:45 dnsmasq[11912]: query[AAAA] PiHole-Master.home.lan from 127.0.0.1
Feb 13 18:01:45 dnsmasq[11912]: forwarded PiHole-Master.home.lan to 192.168.50.1
Feb 13 18:01:45 dnsmasq[11912]: reply PiHole-Master.home.lan is NODATA-IPv6
Feb 13 18:01:45 dnsmasq[11912]: config cachesize.bind is <TXT>
Feb 13 18:01:45 dnsmasq[11912]: config insertions.bind is <TXT>
Feb 13 18:01:45 dnsmasq[11912]: config evictions.bind is <TXT>
Feb 13 18:01:45 dnsmasq[11912]: config hits.bind is <TXT>
Feb 13 18:01:45 dnsmasq[11912]: config misses.bind is <TXT>
Feb 13 18:01:45 dnsmasq[11912]: config auth.bind is <TXT>
Feb 13 18:01:45 dnsmasq[11912]: config servers.bind is <TXT>
Feb 13 18:01:46 dnsmasq[11912]: config cachesize.bind is <TXT>
Feb 13 18:01:46 dnsmasq[11912]: config insertions.bind is <TXT>
Feb 13 18:01:46 dnsmasq[11912]: config evictions.bind is <TXT>
Feb 13 18:01:46 dnsmasq[11912]: config hits.bind is <TXT>
Feb 13 18:01:46 dnsmasq[11912]: config misses.bind is <TXT>
Feb 13 18:01:46 dnsmasq[11912]: config auth.bind is <TXT>
Feb 13 18:01:46 dnsmasq[11912]: config servers.bind is <TXT>
You're still getting hit for metrics on that server. Are you using a montioring package like Zabbix or an app for Android/iPad/iPhone?
Some process is asking for dnsmasq's metrics every second. Usually that is a monitoring package or something that charts. It's not asking for identification, just the values for DNS resolution. There's no real reason for CHAOS txt records to be queried once a second and I can't think of any standard application that would do that.
It has been a while since I played with Netdata, but I think the one-second frequency is what Netdata would use by default.
Also, the sequence of CHAOS TXT requests does match the one used by Netdata's dnsmasq collector exactly, further supporting those queries would be related to Netdata.
I can't explain why those requests won't fade once you disable Netdata, but please check Netdata's documentation on its dnsmasq collector.
I'll try a full uninstallation of netdata on both VMs, and monitor it for a few hours - thanks!
FYI - there's also a dedicated Pihole collector as well which I admit, I did not configure manually. It was set to autoconfigure values.
If it is indeed the case that Netdata was causing it, at least we'll know the culprit, and if I figure out a way to get it working, I'll write up the resolution.