Commit Graph

187 Commits

Author SHA1 Message Date
Ikiru Yoshizaki
a073e30f6c docs: add REgion for aws-sd external-dns deployment 2020-01-14 20:17:05 +09:00
JPantsjoha
7be57d4c53
Update gke.md 2020-01-13 11:52:22 +00:00
Jaromir Vanek
3f488acd6c AWS-SD: Rebrand AWS Auto Naming to Cloud Map 2020-01-07 17:25:35 -08:00
Martin Linkhorst
b78d472940
Merge branch 'master' into docs_apps/v1_deployment 2020-01-07 14:51:20 +01:00
Martin Linkhorst
f02c3c7679 docs: add missing template labels 2020-01-07 14:48:56 +01:00
Martin Linkhorst
ad54d4cad2 docs: switch apiVersion of Ingress to networking 2020-01-07 14:42:47 +01:00
David Grizzanti
084ea67be0
Update vinyldns docs
Make registry txt usage more clear
2020-01-06 09:14:45 -05:00
Kubernetes Prow Robot
1055d02037
Merge pull request #1328 from ashleyschuett/multiple-istio-ingress-gateway
Multiple istio ingress gateway
2019-12-27 06:27:38 -08:00
fcarletti
9aee917964
fix: use ingress gateway service as target instead of hard-coded ones 2019-12-23 10:33:01 +01:00
Kubernetes Prow Robot
e68ea6050b
Merge pull request #1319 from saidst/feature/extend-azure-private-dns-tutorial
Reworked tutorial for Azure Private DNS
2019-12-20 00:39:33 -08:00
saidst
a567ac58d8 changed intending. 2019-12-20 09:00:38 +01:00
saidst
c66576112b added example for simple check of correct ingress-controller configuration. 2019-12-17 19:45:35 +01:00
Andrew Hemming
7706910fe0
Corrected typo in readme 2019-12-16 09:00:17 +00:00
saidst
48ed325c56 added details for configuring nginx-ingress-controller in azure private dns tutorial. 2019-12-12 15:40:58 +01:00
Kubernetes Prow Robot
7ab7b2f3d5
Merge pull request #1163 from adipascu/patch-1
Fix confusing arrow direction
2019-12-05 02:50:32 -08:00
Kubernetes Prow Robot
09860ede26
Merge pull request #1305 from kubernetes-sigs/linki-patch-4
Add missing service account to spec
2019-12-03 06:56:57 -08:00
Martin Linkhorst
d5709d04d6
docs: add missing service account to spec 2019-12-02 13:49:08 +01:00
Alex Orange
1c8b189859 Improve RFC2136 documentation. 2019-11-26 11:36:27 -07:00
Zhang Jinghui
1e41400149 fix broken link of ingress-gce and ingress-nginx 2019-11-22 21:01:57 +08:00
Tim Jacomb
b7ea40ff78 Refine azure-private-dns tutorial 2019-11-19 12:04:52 +01:00
saidst
f14d792315 resolved review findings as of nov 12. 2019-11-19 12:04:52 +01:00
saidst
eb0cdb0962 Created Azure Private DNS Provider by forking Azure Provider. 2019-11-19 12:04:46 +01:00
Nick Jüttner
9418e3acd8
Merge pull request #1008 from devkid/feature/aws-routing-policies
[RFC] Add support for all AWS Route53 routing policies; add additional Setldentifier abstraction layer
2019-11-19 11:21:12 +01:00
Jakub Scholz
8475895fd4
Use apps/v1 for the deployment to be compatible with Kubernetes 1.16
Signed-off-by: Jakub Scholz <www@scholzj.com>
2019-11-14 23:01:42 +01:00
Kubernetes Prow Robot
d02b4d11ab
Merge pull request #1268 from yujunz/tutorial/aws
Fix tutorial for kubernetes 1.16+
2019-11-12 04:06:06 -08:00
Kubernetes Prow Robot
645ba9b8ef
Merge pull request #1234 from PiotrJander/patch-1
Update aws.md
2019-11-12 04:04:07 -08:00
Yujun Zhang
4eb3da327c Fix tutorial for kubernetes 1.16+
`Deployment` has been removed from `apiVersion: extensions/v1beta1`

See https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/
2019-11-12 13:50:31 +08:00
Eugene Klimov
b585868372
update links to RDNS 2019-11-06 09:09:15 +03:00
Kubernetes Prow Robot
ceae2f9a38
Merge pull request #1254 from bavarianbidi/docs/openstack/snippet-for-rbac-enabled-environment
docs/designate: add snippet for rbac env
2019-11-05 05:30:39 -08:00
Mario Constanti
a16827e73c docs/designate: add snippet for rbac env
* extend the external-dns deployment to work within a RBAC enabled
environment
* add short hint how to mount/use/trust self-sign certificates
2019-11-05 09:51:16 +01:00
Mario Constanti
82e43e85ec docs: fix log-level param in tutorials
* arg --debug is now --log-level=debug
* flag --log-level was merged 2017 with
  PR https://github.com/kubernetes-sigs/external-dns/pull/339
2019-11-04 06:53:30 +01:00
Nick Jüttner
f763d2a413 Move into kubernetes-sigs organization (#1245)
* Move into kubernetes-sigs organization

* Disable labeler action for forks
2019-11-01 17:10:19 +01:00
Piotr Jander
36a8ec987a
Update aws.md 2019-10-18 13:51:27 +02:00
Zoltán Reegn
aff20c1ff7 docs: use apps/v1 instead of extensions/v1beta1 in Deployment examples
The extensions/v1beta1 API is deprecated for Deployment and with 1.16 is
not served by default anymore. This breaks the examples on k8s 1.16.

See this blog post for details on the deprecations:

https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/
2019-10-15 22:33:11 +02:00
Kubernetes Prow Robot
cec75d7da4
Merge pull request #1223 from dgrizzanti/namespace_doc_updates
Propose a few doc changes to make the use of namespace more clear
2019-10-15 03:47:52 -07:00
David Grizzanti
c4db4af310 Propose a few doc changes to make the use of namespace more clear 2019-10-08 09:54:59 -04:00
Kubernetes Prow Robot
59475a1c5c
Merge pull request #1206 from dooman87/patch-1
#582: Unknown Serviceaccount error
2019-10-08 03:09:11 -07:00
Kubernetes Prow Robot
8db7e77d78
Merge pull request #1149 from dkeightley/master
Add RBAC manifest, update wording around IAM policy
2019-09-24 04:49:27 -07:00
Pokidov N. Dmitry
aa2b4589cd
#582: Unknown Serviceaccount error
Seems like there was attempts to fix it but change didn't make it to master
2019-09-24 10:26:37 +10:00
Kubernetes Prow Robot
40ede2557c
Merge pull request #1189 from Evesy/cf_token
Support Cloudflare API Token Auth
2019-09-17 04:12:23 -07:00
Brian Hong
c97781a49d
Fix AWS IAM Roles for Service Accounts permission
Amazon EKS supports IAM Roles for Service Accounts. It mounts tokens
files to `/var/run/secrets/eks.amazonaws.com/serviceaccount/token`.
Unfortunately, external-dns runs as 'nobody' so it cannot access this
file. External DNS is then unable to make any AWS API calls to work:

```
time="2019-09-11T07:31:53Z" level=error msg="WebIdentityErr: unable to read file at /var/run/secrets/eks.amazonaws.com/serviceaccount/token\ncaused by: open /var/run/secrets/eks.amazonaws.com/serviceaccount/token: permission denied"
```

See: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html

Below are the file permissions mounted on External DNS pod:

```
~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/
total 0
drwxrwxrwt    3 root     root           100 Sep 11 06:40 .
drwxr-xr-x    3 root     root            28 Sep 11 06:40 ..
drwxr-xr-x    2 root     root            60 Sep 11 06:40 ..2019_09_11_06_40_49.865776187
lrwxrwxrwx    1 root     root            31 Sep 11 06:40 ..data -> ..2019_09_11_06_40_49.865776187
lrwxrwxrwx    1 root     root            12 Sep 11 06:40 token -> ..data/token
~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
-rw-------    1 root     root          1028 Sep 11 06:40 /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
```

This commit fixes this problem by specifying securityContext to make
mounted volumes with 65534 (nobody) group ownership.
2019-09-16 17:01:07 +09:00
Mike Eves
49e0c8b0e7 Support Cloudflare API Token Auth 2019-09-12 22:00:29 +01:00
Alfred Krohmer
a1738f9828 Add documentation for routing policies 2019-09-10 20:47:36 +02:00
Braxton Schafer
905800f9e5
Update rfc2136 tutorial for use with Microsoft DNS
Clean up the tutorial and update it to clarify usage with non-BIND DNS servers.
2019-09-05 13:28:09 -05:00
Adrian Pascu
78c48af7e4
Fix confusing arrow direction 2019-08-23 16:45:14 +03:00
dkeightley
b12f3ef049 Add RBAC manifest, update wording around IAM policy 2019-08-15 11:47:03 +10:00
Kubernetes Prow Robot
eb54263256
Merge pull request #1084 from jonasrmichel/feature/contour-ingressroute
Add source implementation for Heptio Contour IngressRoute
2019-07-30 08:54:51 -07:00
Marc Sensenich
cf1827cf36 Add DNSimple Tutorial Document 2019-07-29 17:44:55 -04:00
Jason-ZW
f685704fcc Add rancher dns(RDNS) provider 2019-07-19 19:40:00 +08:00
Jonas Michel
43dce0b9d9 Add documentation for Contour IngressRoute source 2019-07-04 20:06:25 -05:00