mirror of
https://github.com/kubernetes-sigs/external-dns.git
synced 2025-08-05 09:06:58 +02:00
docs: upgrade mkdocs and fix warnings
This commit is contained in:
parent
e608c9e9d1
commit
3773411a5a
@ -206,7 +206,7 @@ The following tutorials are provided:
|
||||
* [UltraDNS](docs/tutorials/ultradns.md)
|
||||
* [GoDaddy](docs/tutorials/godaddy.md)
|
||||
* [Gandi](docs/tutorials/gandi.md)
|
||||
* [SafeDNS](docs/tutorials/UKFast_SafeDNS.md)
|
||||
* [SafeDNS](docs/tutorials/ANS_Group_SafeDNS.md)
|
||||
* [IBM Cloud](docs/tutorials/ibmcloud.md)
|
||||
* [Nodes as source](docs/tutorials/nodes.md)
|
||||
* [TencentCloud](docs/tutorials/tencentcloud.md)
|
||||
@ -278,7 +278,7 @@ Now you can experiment and watch how ExternalDNS makes sure that your DNS record
|
||||
* Add another Service to create more DNS records.
|
||||
* Remove Services to clean up your managed zone.
|
||||
|
||||
The [tutorials](docs/tutorials) section contains examples, including Ingress resources, and shows you how to set up ExternalDNS in different environments such as other cloud providers and alternative Ingress controllers.
|
||||
The **tutorials** section contains examples, including Ingress resources, and shows you how to set up ExternalDNS in different environments such as other cloud providers and alternative Ingress controllers.
|
||||
|
||||
# Note
|
||||
|
||||
|
@ -29,17 +29,17 @@ make build.push IMAGE=your-registry/external-dns
|
||||
|
||||
# Design
|
||||
|
||||
ExternalDNS's sources of DNS records live in package [source](../../source). They implement the `Source` interface that has a single method `Endpoints` which returns the represented source's objects converted to `Endpoints`. Endpoints are just a tuple of DNS name and target where target can be an IP or another hostname.
|
||||
ExternalDNS's sources of DNS records live in package [source](https://github.com/kubernetes-sigs/external-dns/tree/master/source). They implement the `Source` interface that has a single method `Endpoints` which returns the represented source's objects converted to `Endpoints`. Endpoints are just a tuple of DNS name and target where target can be an IP or another hostname.
|
||||
|
||||
For example, the `ServiceSource` returns all Services converted to `Endpoints` where the hostname is the value of the `external-dns.alpha.kubernetes.io/hostname` annotation and the target is the IP of the load balancer or where the hostname is the value of the `external-dns.alpha.kubernetes.io/internal-hostname` annotation and the target is the IP of the service ClusterIP.
|
||||
|
||||
This list of endpoints is passed to the [Plan](../../plan) which determines the difference between the current DNS records and the desired list of `Endpoints`.
|
||||
This list of endpoints is passed to the [Plan](https://github.com/kubernetes-sigs/external-dns/tree/master/plan) which determines the difference between the current DNS records and the desired list of `Endpoints`.
|
||||
|
||||
Once the difference has been figured out the list of intended changes is passed to a `Registry` which live in the [registry](../../registry) package. The registry is a wrapper and access point to DNS provider. Registry implements the ownership concept by marking owned records and filtering out records not owned by ExternalDNS before passing them to DNS provider.
|
||||
Once the difference has been figured out the list of intended changes is passed to a `Registry` which live in the [registry](https://github.com/kubernetes-sigs/external-dns/tree/master/registry) package. The registry is a wrapper and access point to DNS provider. Registry implements the ownership concept by marking owned records and filtering out records not owned by ExternalDNS before passing them to DNS provider.
|
||||
|
||||
The [provider](../../provider) is the adapter to the DNS provider, e.g. Google Cloud DNS. It implements two methods: `ApplyChanges` to apply a set of changes filtered by `Registry` and `Records` to retrieve the current list of records from the DNS provider.
|
||||
The [provider](https://github.com/kubernetes-sigs/external-dns/tree/master/provider) is the adapter to the DNS provider, e.g. Google Cloud DNS. It implements two methods: `ApplyChanges` to apply a set of changes filtered by `Registry` and `Records` to retrieve the current list of records from the DNS provider.
|
||||
|
||||
The orchestration between the different components is controlled by the [controller](../../controller).
|
||||
The orchestration between the different components is controlled by the [controller](https://github.com/kubernetes-sigs/external-dns/tree/master/controller).
|
||||
|
||||
You can pick which `Source` and `Provider` to use at runtime via the `--source` and `--provider` flags, respectively.
|
||||
|
||||
|
@ -331,7 +331,7 @@ registry.k8s.io/external-dns/external-dns
|
||||
|
||||
As tags, you use the external-dns release of choice(i.e. `v0.7.6`). A `latest` tag is not provided in the container registry.
|
||||
|
||||
If you wish to build your own image, you can use the provided [.ko.yaml](../.ko.yaml) as a starting point.
|
||||
If you wish to build your own image, you can use the provided [.ko.yaml](https://github.com/kubernetes-sigs/external-dns/blob/master/.ko.yaml) as a starting point.
|
||||
|
||||
### Which architectures are supported?
|
||||
|
||||
|
@ -7,3 +7,5 @@ cp CONTRIBUTING.md code-of-conduct.md ./docs/
|
||||
cp LICENSE ./docs/LICENSE.md
|
||||
|
||||
cp README.md ./docs/index.md
|
||||
|
||||
sed -i -e 's#docs/##g' ./docs/index.md
|
||||
|
@ -1,5 +1,5 @@
|
||||
mkdocs-git-revision-date-localized-plugin == 1.0.0
|
||||
mkdocs == 1.3.0
|
||||
mkdocs-material == 8.2.8
|
||||
mkdocs-literate-nav == 0.4.0
|
||||
mike == 1.1.2
|
||||
mkdocs-git-revision-date-localized-plugin == 1.2.4
|
||||
mkdocs == 1.5.3
|
||||
mkdocs-material == 9.5.17
|
||||
mkdocs-literate-nav == 0.6.1
|
||||
mike == 2.0.0
|
||||
|
@ -870,7 +870,7 @@ Note: ExternalDNS does not support creating healthchecks, and assumes that `<hea
|
||||
|
||||
When creating ALIAS type records in Route53 it is required that external-dns be aware of the canonical hosted zone in which
|
||||
the specified hostname is created. External-dns is able to automatically identify the canonical hosted zone for many
|
||||
hostnames based upon known hostname suffixes which are defined in [aws.go](../../provider/aws/aws.go). If a hostname
|
||||
hostnames based upon known hostname suffixes which are defined in [aws.go](https://github.com/kubernetes-sigs/external-dns/blob/master/provider/aws/aws.go#L65). If a hostname
|
||||
does not have a known suffix then the suffix can be added into `aws.go` or the [target-hosted-zone annotation](#target-hosted-zone)
|
||||
can be used to manually define the ID of the canonical hosted zone.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
# Creating MX record with CRD source
|
||||
|
||||
You can create and manage MX records with the help of [CRD source](/docs/contributing/crd-source.md)
|
||||
You can create and manage MX records with the help of [CRD source](../contributing/crd-source.md)
|
||||
and `DNSEndpoint` CRD. Currently, this feature is only supported by `aws`, `azure`, and `google` providers.
|
||||
|
||||
In order to start managing MX records you need to set the `--managed-record-types MX` flag.
|
||||
|
@ -1,6 +1,6 @@
|
||||
# Creating NS record with CRD source
|
||||
|
||||
You can create NS records with the help of [CRD source](/docs/contributing/crd-source.md)
|
||||
You can create NS records with the help of [CRD source](../contributing/crd-source.md)
|
||||
and `DNSEndpoint` CRD.
|
||||
|
||||
Consider the following example
|
||||
|
@ -43,7 +43,7 @@ Custom annotations can be used to influence DNS record creation and updates. Pro
|
||||
|
||||
## Provider registry
|
||||
|
||||
To simplify the discovery of providers, we will accept pull requests that will add links to providers in the [README](../../README.md) file. This list will only serve the purpose of simplifying finding providers and will not constitute an official endorsement of any of the externally implemented providers unless otherwise stated.
|
||||
To simplify the discovery of providers, we will accept pull requests that will add links to providers in this documentation. This list will only serve the purpose of simplifying finding providers and will not constitute an official endorsement of any of the externally implemented providers unless otherwise stated.
|
||||
|
||||
## Run an ExternalDNS in-tree provider as a webhook.
|
||||
|
||||
|
7
external-dns.code-workspace
Normal file
7
external-dns.code-workspace
Normal file
@ -0,0 +1,7 @@
|
||||
{
|
||||
"folders": [
|
||||
{
|
||||
"path": "."
|
||||
}
|
||||
]
|
||||
}
|
@ -28,6 +28,7 @@ nav:
|
||||
- Advanced Topics:
|
||||
- Initial Design: initial-design.md
|
||||
- TTL: ttl.md
|
||||
- MultiTarget: proposal/multi-target.md
|
||||
- Contributing:
|
||||
- Kubernetes Contributions: CONTRIBUTING.md
|
||||
- Release: release.md
|
||||
@ -71,8 +72,8 @@ markdown_extensions:
|
||||
- pymdownx.caret
|
||||
- pymdownx.details
|
||||
- pymdownx.emoji:
|
||||
emoji_index: !!python/name:materialx.emoji.twemoji
|
||||
emoji_generator: !!python/name:materialx.emoji.to_svg
|
||||
emoji_index: !!python/name:material.extensions.emoji.twemoji
|
||||
emoji_generator: !!python/name:material.extensions.emoji.to_svg
|
||||
- pymdownx.highlight:
|
||||
use_pygments: true
|
||||
anchor_linenums: true
|
||||
|
Loading…
Reference in New Issue
Block a user