Commit Graph

86 Commits

Author SHA1 Message Date
Jameel Al-Aziz
2df31d410b
Update aws IAM policy example
Update the IAM policy example to include `route53:ListTagsForResource` permissions.

This is required for `--aws-zone-tags`.
2023-06-23 01:48:20 -07:00
Raffaele Di Fazio
b7c1d9519e bump versions in all docs
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2023-05-29 23:11:04 +02:00
Arnaud Lefray
7b940026be
docs(aws): remove mention of deprecated annotation filter 2023-05-09 08:46:56 +02:00
Arnaud Lefray
f42f3705c5
docs: replace mentions of ingress.class annotations for the spec.ingressClassName field 2023-05-05 16:11:26 +02:00
Raffaele Di Fazio
00f919d20f all the v0.13.4 updates
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2023-03-27 23:07:49 +02:00
Kubernetes Prow Robot
38e786203c
Merge pull request #3433 from jwenz723/master
Add AWS VPC endpoint canonical hosted zone IDs
2023-03-08 12:50:09 -08:00
Jeff Wenzbauer
31f06153f6
add documentation about canonical hosted zones 2023-02-22 13:45:19 -07:00
Jeff Wenzbauer
94d72a5ca8
add documentation about target-hosted-zone 2023-02-22 13:33:08 -07:00
Guangwen Feng
fb15602f12 Fix a minor typo in AWS tutorial
Signed-off-by: Guangwen Feng <fenggw-fnst@fujitsu.com>
2023-02-21 22:58:12 +08:00
Raffaele Di Fazio
75a83b013f replaces all versions of docker images
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2023-02-04 15:56:39 +01:00
John Gardiner Myers
d5e1fa1cc1 Update external-dns version in docs 2022-12-22 19:58:22 -08:00
John Gardiner Myers
9f382f41da Use registry.k8s.io instead of k8s.gcr.io 2022-12-22 19:55:54 -08:00
Bobby Argenbright
894f8e334f
fix more typos 2022-09-26 12:49:40 -07:00
Bobby Argenbright
138ac3d5f3
Update aws.md 2022-09-26 12:34:07 -07:00
Akshay Jain
6b3baec380
Fixed a minor typo in aws tutorial 2022-08-16 08:55:45 +02:00
Joaquin Menchaca
116d26af0c docs/tutorials/aws - small fix for env vars 2022-06-25 13:11:05 -07:00
Joaquin Menchaca
61a7c7bd57
minor fix for creating namespace 2022-05-23 13:23:22 -07:00
joaquin
0da9640b0f AWS refresh, added IRSA section 2022-05-22 15:14:29 -07:00
lou-lan
2f70ee66f1 Fix ingress formal error 2022-05-11 11:43:56 +08:00
Joshua Hoblitt
14a6603798 add quotes to ttl example to force string context
Annotation values may not be an integer, they must be handled as a
string.  The current example tested on k8s 1.20.13 generates this error
message:

    json: cannot unmarshal number into Go struct field ObjectMeta.metadata.annotations of type string
2022-01-14 12:14:28 -07:00
Kubernetes Prow Robot
ef1ed4d142
Merge pull request #2261 from nadilas/patch-1
Document usage of AWS env vars
2021-12-17 00:48:29 -08:00
Anthony Stanton
61e3948981 doc: how-to randomise startup vs AWS API throttling 2021-11-24 09:04:33 +01:00
afirth
45886608db Expand the AWS tutorial with common args to mitigate rate limiting 2021-11-03 10:58:27 +01:00
nadilas
07115e4092
Document usage of AWS env vars
Document the working method of using environment variables on the external-dns deployment to avoid the overhead of kiam or kube2iam when not using EKS
2021-09-01 22:53:13 +02:00
Kundan Kumar
083e243eae fix_2099 2021-06-03 17:07:44 +05:30
Kundan Kumar
e1cf5f88a7 updated ingress apiVersion 2021-03-16 12:42:30 +05:30
Jeff Spahr
eaf933328f updated docs to reference the v0.7.6 image 2021-02-04 22:29:38 -05:00
Victor Chan
8565d0fe78 small changes to get PR approved 2021-01-13 08:18:19 -08:00
Victor Chan
61ed6b643e changed wording to prevent confusion of using R53 in govcloud vs needing to make public facing r53 entries 2021-01-11 21:59:35 -08:00
Victor Chan
de93699850 tweak 2021-01-11 21:36:39 -08:00
Victor Chan
a4e469aa7f added space 2021-01-11 21:34:26 -08:00
Victor Chan
8eaef452e7 added instructions for govcloud 2021-01-11 21:33:03 -08:00
RaymondKYLiu
8bbce07337
Update aws.md 2020-12-17 00:47:18 +08:00
Rajat Jindal
a3dc3e8579 add documentation for aws health check id 2020-09-29 15:11:12 +05:30
Benjamin Pineau
837d1ea248 aws: cache zones list
When it syncs AWS DNS with k8s cluster content (at `--interval`), external-dns submits two distinct Route53 API calls:
* to fetch available zones (eg. for tag based zones discovery, or when zones are created after exernal-dns started),
* to fetch relevant zones' resource records.

Each call taxes the Route53 APIs calls budget (5 API calls per second per AWS account/region hard limit), increasing the probability of being throttled.
Changing synchronization interval would mitigate those calls' impact, but at the cost of keeping stale records for a longer time.

For most practical uses cases, zones list aren't expected to change frequently.
Even less so when external-dns is provided an explicit, static zones set (`--zone-id-filter` rather than `--aws-zone-tags`).

Using a zones list cache halves the number of Route53 read API calls.
2020-09-03 13:03:07 +02:00
Sean Malloy
b349103de7 Update Documentation with Updated Registry Location
The k8s external-dns project now uses the official Kubernetes projects
container registry at k8s.gcr.io. Update all references to use the new
registry.
2020-08-21 16:28:57 -05:00
David Dooling
cd750c95ea
Update apiVersions in docs (#1690)
* Update apiVersions in docs

Update docs to reflect new apiVersions for ingresses and deployments.

* Add selector to apps/v1 deployments
2020-08-05 00:44:28 -07:00
Raffaele Di Fazio
7505f29e4c
Remove occurrences of "master" from the project (#1636)
* intial removal of inappropriate terminology

Signed-off-by: Raffaele Di Fazio <raffo@github.com>

* removed other occurrences

Signed-off-by: Raffaele Di Fazio <raffo@github.com>

* gofmt

Signed-off-by: Raffaele Di Fazio <raffo@github.com>

* addresses comment

Signed-off-by: Raffaele Di Fazio <raffo@github.com>

* gofmt

Signed-off-by: Raffaele Di Fazio <raffo@github.com>
2020-07-08 01:13:08 -07:00
Alfred Krohmer
65208db6ec Address review comments 2020-02-18 20:18:56 +01:00
Alfred Krohmer
c91eae9d2f Update documentation to include RBAC permissions for endpoints resources 2020-02-18 19:43:41 +01:00
Michael S. Fischer
c1ebc7726f Update AWS documentation
Using EC2 Instance Roles to provide Route 53 permissions is overly
permissive and dangerous.  Emphasize using alternatives such
as EKS IAM Roles for Service Accounts, kiam, or kube2iam that
limit access to the ExternalDNS pod.
2020-01-18 16:45:49 -06:00
Martin Linkhorst
b78d472940
Merge branch 'master' into docs_apps/v1_deployment 2020-01-07 14:51:20 +01:00
Martin Linkhorst
ad54d4cad2 docs: switch apiVersion of Ingress to networking 2020-01-07 14:42:47 +01:00
Nick Jüttner
9418e3acd8
Merge pull request #1008 from devkid/feature/aws-routing-policies
[RFC] Add support for all AWS Route53 routing policies; add additional Setldentifier abstraction layer
2019-11-19 11:21:12 +01:00
Kubernetes Prow Robot
d02b4d11ab
Merge pull request #1268 from yujunz/tutorial/aws
Fix tutorial for kubernetes 1.16+
2019-11-12 04:06:06 -08:00
Yujun Zhang
4eb3da327c Fix tutorial for kubernetes 1.16+
`Deployment` has been removed from `apiVersion: extensions/v1beta1`

See https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/
2019-11-12 13:50:31 +08:00
Piotr Jander
36a8ec987a
Update aws.md 2019-10-18 13:51:27 +02:00
Zoltán Reegn
aff20c1ff7 docs: use apps/v1 instead of extensions/v1beta1 in Deployment examples
The extensions/v1beta1 API is deprecated for Deployment and with 1.16 is
not served by default anymore. This breaks the examples on k8s 1.16.

See this blog post for details on the deprecations:

https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/
2019-10-15 22:33:11 +02:00
David Grizzanti
c4db4af310 Propose a few doc changes to make the use of namespace more clear 2019-10-08 09:54:59 -04:00
Brian Hong
c97781a49d
Fix AWS IAM Roles for Service Accounts permission
Amazon EKS supports IAM Roles for Service Accounts. It mounts tokens
files to `/var/run/secrets/eks.amazonaws.com/serviceaccount/token`.
Unfortunately, external-dns runs as 'nobody' so it cannot access this
file. External DNS is then unable to make any AWS API calls to work:

```
time="2019-09-11T07:31:53Z" level=error msg="WebIdentityErr: unable to read file at /var/run/secrets/eks.amazonaws.com/serviceaccount/token\ncaused by: open /var/run/secrets/eks.amazonaws.com/serviceaccount/token: permission denied"
```

See: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html

Below are the file permissions mounted on External DNS pod:

```
~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/
total 0
drwxrwxrwt    3 root     root           100 Sep 11 06:40 .
drwxr-xr-x    3 root     root            28 Sep 11 06:40 ..
drwxr-xr-x    2 root     root            60 Sep 11 06:40 ..2019_09_11_06_40_49.865776187
lrwxrwxrwx    1 root     root            31 Sep 11 06:40 ..data -> ..2019_09_11_06_40_49.865776187
lrwxrwxrwx    1 root     root            12 Sep 11 06:40 token -> ..data/token
~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
-rw-------    1 root     root          1028 Sep 11 06:40 /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
```

This commit fixes this problem by specifying securityContext to make
mounted volumes with 65534 (nobody) group ownership.
2019-09-16 17:01:07 +09:00