-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CRD unable to create DNSEndpoint of record types other than A or CNAME #1647
Comments
I can confirm this behavior, have seen it before for TXT. |
/assign @ytsarev |
@ytsarev are you able to take a look at that given that you are assigned? |
@Raffo yes, i have it in the pipeline |
It's not yet working solution but important foundation for further full support. * Separate external-dns-route53 deployment which exclusively handles route53 updates * CoreDNS service type LoadBalancer which exposes 53/udp with Network Load Balancer without the need of special upd config of Nginx Ingress controller also avoiding 53/udp exposure on each of the worker nodes as in on-prem scenario * K8gb configuration options for route53 enablement and associated depresolver modifications * Helper makefile targets to ease the testing of temporary k8gb images in AWS * Creation of DNSEndpoint CRD with NS record as a start of automated Zone delegation configuration in Route53 * Associated tests Unfortunately external-dns currently does not pick up NS records which are described as CRD. We will have to fix kubernetes-sigs/external-dns#1647 upstream to proceed further with the implementation
(Possibly reopen? I think the |
/reopen |
@seanmalloy: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Is there any update regarding this issue? |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
Since this valid-looking ticket is going stale I'll link some relevant context here.. It was written down that external-dns was originally supposed to be specifically for A and CNAME: #1923 (comment) The #1813 PR that accidentally closed this issue actually broke people on upgrade because of conflict with existing NS records. It became clear that external-dns isn't ready for diverse-recordtype ownership. That's what started the project scope discussion above. From my point of view, either the CRD source needs new documentation stating the allowed Record Types, OR external-dns needs to grow support for more record-types somehow. The latter seems to be a bit tricky 😄 Currently, the example CRD in this repository implies it can manage any record: recordType:
description: RecordType type of record, e.g. CNAME, A, SRV, TXT etc (I personally wanted A/AAAA, MX, TXT, SSHFP, etc and ended up writing/running my own external-dns-like controller [1] to do everything I originally wanted from external-dns. I know this isn't reasonable for many, so seeing a conclusion here would still be 💯 ) |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What happened:
Applied the following DNSEndpoint resource:
This results in no resource created. Even in debug mode, there is no object even mentioned.
As soon as I
kubectl edit dnsendpoint examplednsrecord
to change it fromTXT
toCNAME
I see the following output.What you expected to happen:
It is expected that the
DNSEndpoint
should be able to create all record types. The comments in the source code specifically list SRV and TXT records. My initially attempts were a MX record which also failed.Attempting to use the
providerSpecific
options to create the exact record also did not work.How to reproduce it (as minimally and precisely as possible):
Apply the YAML I provided at the start of this issue and change the
dnsName
to be a valid zone that external-dns is managing.All my tests have been using AWS. Uncertain if this is an issue with other providers.
Anything else we need to know?:
Environment:
external-dns --version
): 0.7.2preferCNAME
enabled.sync
.The text was updated successfully, but these errors were encountered: