Commit Graph

136 Commits

Author SHA1 Message Date
Corey O'Brien
3a62d4eaea Fix --aws-api-retries 2019-08-22 08:35:00 -04:00
Kubernetes Prow Robot
32043f29ac
Merge pull request #1102 from xunpan/config-prefix
add option for coredns to specify prefix name
2019-07-31 02:40:24 -07:00
Kubernetes Prow Robot
eb54263256
Merge pull request #1084 from jonasrmichel/feature/contour-ingressroute
Add source implementation for Heptio Contour IngressRoute
2019-07-30 08:54:51 -07:00
Kubernetes Prow Robot
4421b019d5
Merge pull request #1103 from linki/prefer-cname
Allow to force usage of CNAME over ALIAS
2019-07-26 04:19:59 -07:00
xunpan
b73f67793a
Merge branch 'master' into config-prefix 2019-07-22 22:36:25 +08:00
Jason-ZW
f685704fcc Add rancher dns(RDNS) provider 2019-07-19 19:40:00 +08:00
Martin Linkhorst
4dce600a2b feat(aws): allow to force usage of CNAME over ALIAS 2019-07-17 14:46:32 +02:00
xunpan
984e7de398 add option for coredns to specify prefix name 2019-07-17 02:47:23 -04:00
Jonas Michel
aa551ac704 Add Contour IngressRoute source implementation 2019-07-04 20:06:24 -05:00
Dave Grizzanti
656ec36532 add domain filter for vinyl 2019-07-01 15:34:26 -04:00
Dave Grizzanti
5b28d7f7f3 Add VinylDNS as a provider 2019-06-27 11:07:21 -04:00
Curtis Mattoon
111ad4f72f Add tests for DomainFilter.IsConfigured 2019-05-22 12:19:26 -04:00
Kubernetes Prow Robot
6b07f97eb2
Merge pull request #953 from dsbrng25b/infoblox-max-results
Add --infoblox-max-results setting
2019-05-19 03:35:11 -07:00
Dave Grizzanti
ef88346b9b Rebase for go modules 2019-05-10 11:38:54 -04:00
Dave Grizzanti
81a3fde458 Removing changes to main 2019-05-10 11:34:57 -04:00
Dave Grizzanti
b529a92d5b Add Cloud Foundry routes as a source 2019-05-10 11:34:57 -04:00
Reinier Schoof
3323229ae0 Merge branch 'master' of github.com:kubernetes-incubator/external-dns into transipSupport 2019-05-07 13:23:47 +02:00
Reinier Schoof
a2b07c1383 added TransIP provider 2019-04-28 14:42:07 +02:00
mburtless
4fdeef3f2f Add flags for configuring custom NS1 endpoint and ignoring SSL verification for PrivateDNS support 2019-04-26 10:47:17 -04:00
mburtless
3d46e95f65 Add boilerplate to ns1 provider and tests and simplfy code for inititializing provider 2019-04-22 11:43:38 -04:00
mburtless
bff09c20c9 Initial Skeleton From NS1 Provider
This needs unit tests and a full integration test.

Pushing this as an initial checkpoint.
2019-04-22 11:43:38 -04:00
David Schneider
1a721ac5ce Add --infoblox-max-results setting
The number of objects returned by the infoblox api is limited to 1000 objects
(see https://ipam.illinois.edu/wapidoc). If there are more then 1000 objects
the API returns an error. By setting max-results one can raise the limit.
2019-03-31 18:36:02 +02:00
Christian Glombek
0076e4156c Add support for multiple Istio Ingress Gateways
The --istio-ingress-gateway flag may now be specified multiple times.
2019-03-18 22:13:44 +01:00
Kubernetes Prow Robot
c3702c9130
Merge pull request #895 from dsbrng25b/infoblox-dns-view
Infoblox provider support for DNS view
2019-03-18 09:44:22 -07:00
David Schneider
909e376387 Make view configurable for infoblox provider 2019-03-15 18:05:50 +01:00
Dimitrij Klesev
6da894253e
Run gofmt on main 2019-02-19 11:21:23 +01:00
Dimitrij Klesev
79bf8c807e
Add RcodeZero Anycast DNS provider 2019-02-19 11:20:15 +01:00
Anand Patel
60a79b698b merge with master 2019-02-14 15:17:03 -05:00
njuettner
8810311ca8 Resolving conflicts 2019-01-28 14:15:09 +01:00
Anand Patel
a023ad7475 merge with master 2019-01-18 10:54:24 -05:00
Joe Hohertz
7a28e3047a Adds a new flag --aws-api-retries which allows overriding the
number of retries that API calls will attempt before giving up.

This somewhat mitigates the issues discussed in #484 by allowing
the current sync attempt to complete vs. failing and starting anew.

Defaults to 3, which is what the aws-sdk-go defaults to where not
specified.

Signed-off-by: Joe Hohertz <joe@viafoura.com>
2019-01-17 12:37:27 -05:00
njuettner
370bae6dd3 Cloudflare pagination for zones 2019-01-16 16:13:49 +01:00
Cesar Wong
65e13af9b7 Add zone tag filter for AWS 2018-12-07 10:38:52 -05:00
Anand Patel
3454363d67 allow hostname annotations to be ignored 2018-10-17 17:17:15 -04:00
k8s-ci-robot
dd352b347b
Merge pull request #702 from mackIOConsulting/rfc2136_provider
Rfc2136 provider
2018-10-11 05:49:34 -07:00
Martin Linkhorst
7dbd6b0fa9
fix: pass all relevant CLI flags to AWS provider (#719) 2018-09-27 13:54:40 +02:00
Vladislav Troinich
d32a03ad32 Add couple of tests for RFC2136 provider 2018-09-24 10:52:28 +03:00
Vladislav Troinich
02437bb25c Merge remote-tracking branch 'origin/master' into rfc2136_provider
# Conflicts:
#	Gopkg.lock
#	Gopkg.toml
2018-09-07 10:51:35 +03:00
Peter Bale
be4b4accf9 Change the way aws batching works
This is to change the way batching works when using the aws provider.
Originally, batching would take the first n records you want to update
and perform the desired actions on those records as part of a sync. It
would then wait for the configured sync period and take the first n
records again and sync them. The issue with this is that when you are
using the TXT registry with a custom prefix, the updates can sync a TXT
record and not the accompanying A/CNAME record. This causes external-dns
to get out of sync with what is created and what the current state
actually is. This update uses the same idea of batching, however, rather
than stopping after the first batch until the next run, batching will
now have a separate batch interval which controls the interval between
each batch in the same sync period. This allows external-dns to fully
sync with route53 as part of each sync and can then know that the state
is complete.

Fixes https://github.com/kubernetes-incubator/external-dns/issues/679
2018-09-06 16:44:20 +01:00
Jonas Michel
b9b6842195 Add Source implementation for Istio Gateway (#694)
* add Istio Gateway Source

* add documentation for Istio Gateway Source

* make both istio namespace and ingress gateway service configurable

* prefix gateway types, constructors, and flags with 'istio-'

* fix: add missing sources to source flag docs
2018-09-06 16:39:32 +02:00
Vladislav Troinich
0151de539c Add RFC2136 provider 2018-09-06 11:46:01 +03:00
Nick Jüttner
488f10394a
Merge branch 'master' into generic-source 2018-09-03 10:55:12 +02:00
Nick Jüttner
08c791ff5b
Merge pull request #653 from Devatoria/feature/service_types_filter
Add filter by service type feature
2018-08-31 16:37:10 +02:00
Li Yi
1db16f35af Initial support for Alibaba Cloud 2018-08-28 17:30:36 +08:00
shashidharatd
18aee82d3d Add crd source which gets Endpoints from CRD 2018-08-22 19:37:21 +05:30
Devatoria
05068e3ad3 Add filter by service type feature 2018-08-17 17:14:44 +02:00
Nick Jüttner
dbfc884ba3
Merge pull request #678 from cliedeman/fix/linode-user-agent
Set Linode user agent
2018-08-16 17:21:59 +02:00
Julian Vassev
e6cae22ec4 Configure req timeout calling k8s APIs
When running in a pod sometimes the request to get ingreses/services
stalls indefinitely. A simple pod restart fixes this. Hard to reproduce
but I got lucky and did thread dump which revealed a gorouting blocked
on call to k8s.

What's new is a `--request-timeout` flag that makes requests to k8s
bounded in time. The default is 30s - this may cause some deployments
with a slow api-server to timeout.
2018-08-16 02:59:21 -07:00
cliedeman
ba6c82e043 Set Linode user agent and change to linode/linodego package 2018-08-16 11:17:54 +02:00
Loren Brindze
65b33ad7e2 adding assume role to aws_sd provider 2018-08-14 09:44:12 -07:00