README.md 10.3 KB
Newer Older
1
2
3
4
<p align="center">
	<img src="img/external-dns.png" width="40%" align="center" alt="ExternalDNS">
</p>

Lauri Apple's avatar
Lauri Apple committed
5
# ExternalDNS
6
7
[![Build Status](https://travis-ci.org/kubernetes-incubator/external-dns.svg?branch=master)](https://travis-ci.org/kubernetes-incubator/external-dns)
[![Coverage Status](https://coveralls.io/repos/github/kubernetes-incubator/external-dns/badge.svg?branch=master)](https://coveralls.io/github/kubernetes-incubator/external-dns?branch=master)
8
[![GitHub release](https://img.shields.io/github/release/kubernetes-incubator/external-dns.svg)](https://github.com/kubernetes-incubator/external-dns/releases)
9
[![go-doc](https://godoc.org/github.com/kubernetes-incubator/external-dns?status.svg)](https://godoc.org/github.com/kubernetes-incubator/external-dns)
10
[![Go Report Card](https://goreportcard.com/badge/github.com/kubernetes-incubator/external-dns)](https://goreportcard.com/report/github.com/kubernetes-incubator/external-dns)
Henning Jacobs's avatar
title    
Henning Jacobs committed
11

Lauri Apple's avatar
Lauri Apple committed
12
ExternalDNS synchronizes exposed Kubernetes Services and Ingresses with DNS providers.
Henning Jacobs's avatar
Henning Jacobs committed
13

Lauri Apple's avatar
Lauri Apple committed
14
## What It Does
Henning Jacobs's avatar
Henning Jacobs committed
15

16
Inspired by [Kubernetes DNS](https://github.com/kubernetes/dns), Kubernetes' cluster-internal DNS server, ExternalDNS makes Kubernetes resources discoverable via public DNS servers. Like KubeDNS, it retrieves a list of resources (Services, Ingresses, etc.) from the [Kubernetes API](https://kubernetes.io/docs/api/) to determine a desired list of DNS records. *Unlike* KubeDNS, however, it's not a DNS server itself, but merely configures other DNS providers accordingly—e.g. [AWS Route 53](https://aws.amazon.com/route53/) or [Google CloudDNS](https://cloud.google.com/dns/docs/).
Henning Jacobs's avatar
Henning Jacobs committed
17

Lauri Apple's avatar
Lauri Apple committed
18
In a broader sense, ExternalDNS allows you to control DNS records dynamically via Kubernetes resources in a DNS provider-agnostic way.
19

20
21
The [FAQ](docs/faq.md) contains additional information and addresses several questions about key concepts of ExternalDNS.

22
23
To see ExternalDNS in action, have a look at this [video](https://www.youtube.com/watch?v=9HQ2XgL9YVI).

24
## The Latest Release: v0.4
25

26
27
28
29
30
31
ExternalDNS' current release is `v0.4`. This version allows you to keep selected zones (via `--domain-filter`) synchronized with Ingresses and Services of `type=LoadBalancer` in various cloud providers:
* [Google CloudDNS](https://cloud.google.com/dns/docs/)
* [AWS Route 53](https://aws.amazon.com/route53/)
* [AzureDNS](https://azure.microsoft.com/en-us/services/dns)
* [CloudFlare](https://www.cloudflare.com/de/dns)
* [DigitalOcean](https://www.digitalocean.com/products/networking)
32
* [DNSimple](https://dnsimple.com/)
33
* [Infoblox](https://www.infoblox.com/products/dns/)
Henning Jacobs's avatar
Henning Jacobs committed
34

35
From this release, ExternalDNS can become aware of the records it is managing (enabled via `--registry=txt`), therefore ExternalDNS can safely manage non-empty hosted zones. We strongly encourage you to use `v0.4` with `--registry=txt` enabled and `--txt-owner-id` set to a unique value that doesn't change for the lifetime of your cluster. You might also want to run ExternalDNS in a dry run mode (`--dry-run` flag) to see the changes to be submitted to your DNS Provider API.
36

37
38
39
40
Note that all flags can be replaced with environment variables; for instance,
`--dry-run` could be replaced with `EXTERNAL_DNS_DRY_RUN=1`, or
`--registry txt` could be replaced with `EXTERNAL_DNS_REGISTRY=txt`.

41
42
43
44
45
46
47
48
## Deploying to a Cluster

The following tutorials are provided:

* [AWS](docs/tutorials/aws.md)
* [Azure](docs/tutorials/azure.md)
* [Cloudflare](docs/tutorials/cloudflare.md)
* [DigitalOcean](docs/tutorials/digitalocean.md)
49
* [Infoblox](docs/tutorials/infoblox.md)
50
51
52
53
54
55
* Google Container Engine
	* [Using Google's Default Ingress Controller](docs/tutorials/gke.md)
	* [Using the Nginx Ingress Controller](docs/tutorials/nginx-ingress.md)

## Running Locally

Lauri Apple's avatar
Lauri Apple committed
56
### Technical Requirements
Henning Jacobs's avatar
Henning Jacobs committed
57

Lauri Apple's avatar
Lauri Apple committed
58
59
Make sure you have the following prerequisites:
* A local Go 1.7+ development environment.
60
* Access to a Google/AWS account with the DNS API enabled.
Lauri Apple's avatar
Lauri Apple committed
61
62
63
64
65
* Access to a Kubernetes cluster that supports exposing Services, e.g. GKE.

### Setup Steps

First, get ExternalDNS:
Henning Jacobs's avatar
Henning Jacobs committed
66

67
68
69
```console
$ go get -u github.com/kubernetes-incubator/external-dns
```
Henning Jacobs's avatar
Henning Jacobs committed
70

Lauri Apple's avatar
Lauri Apple committed
71
Next, run an application and expose it via a Kubernetes Service:
Henning Jacobs's avatar
Henning Jacobs committed
72

73
74
75
76
```console
$ kubectl run nginx --image=nginx --replicas=1 --port=80
$ kubectl expose deployment nginx --port=80 --target-port=80 --type=LoadBalancer
```
77

78
Annotate the Service with your desired external DNS name. Make sure to change `example.org` to your domain.
79

80
81
82
```console
$ kubectl annotate service nginx "external-dns.alpha.kubernetes.io/hostname=nginx.example.org."
```
83

84
85
86
87
88
89
90
91
Optionally, you can customize the TTL value of the resulting DNS record by using the `external-dns.alpha.kubernetes.io/ttl` annotation:

```console
$ kubectl annotate service nginx "external-dns.alpha.kubernetes.io/ttl=10"
```

For more details on configuring TTL, see [here](docs/ttl.md).

92
Locally run a single sync loop of ExternalDNS.
93

94
```console
95
$ external-dns --registry txt --txt-owner-id my-cluster-id --provider google --google-project example-project --source service --once --dry-run
96
```
Henning Jacobs's avatar
Henning Jacobs committed
97

98
This should output the DNS records it will modify to match the managed zone with the DNS records you desire. Note TXT records having `my-cluster-id` value embedded. Those are used to ensure that ExternalDNS is aware of the records it manages.
Henning Jacobs's avatar
Henning Jacobs committed
99

100
Once you're satisfied with the result, you can run ExternalDNS like you would run it in your cluster: as a control loop, and **not in dry-run** mode:
101
102

```console
103
$ external-dns --registry txt --txt-owner-id my-cluster-id --provider google --google-project example-project --source service
104
105
```

Lauri Apple's avatar
Lauri Apple committed
106
Check that ExternalDNS has created the desired DNS record for your Service and that it points to its load balancer's IP. Then try to resolve it:
107
108
109
110
111
112
113
114
115
116
117
118

```console
$ dig +short nginx.example.org.
104.155.60.49
```

Now you can experiment and watch how ExternalDNS makes sure that your DNS records are configured as desired. Here are a couple of things you can try out:
* Change the desired hostname by modifying the Service's annotation.
* Recreate the Service and see that the DNS record will be updated to point to the new load balancer IP.
* Add another Service to create more DNS records.
* Remove Services to clean up your managed zone.

Lauri Apple's avatar
Lauri Apple committed
119
The [tutorials](docs/tutorials) section contains examples, including Ingress resources, and shows you how to set up ExternalDNS in different environments such as other cloud providers and alternative Ingress controllers.
120

121
122
123
124
# Note

If using a txt registry and attempting to use a CNAME the `--txt-prefix` must be set to avoid conflicts.  Changing `--txt-prefix` will result in lost ownership over previously created records.

125
126
# Roadmap

Lauri Apple's avatar
Lauri Apple committed
127
ExternalDNS was built with extensibility in mind. Adding and experimenting with new DNS providers and sources of desired DNS records should be as easy as possible. It should also be possible to modify how ExternalDNS behaves—e.g. whether it should add records but never delete them.
128

129
Here's a rough outline on what is to come (subject to change):
130
131
132

### v0.1

133
134
- [x] Support for Google CloudDNS
- [x] Support for Kubernetes Services
135
136
137

### v0.2

138
139
- [x] Support for AWS Route 53
- [x] Support for Kubernetes Ingresses
140

141
### v0.3
142

143
144
145
- [x] Support for AWS Route 53 via ALIAS
- [x] Support for multiple zones
- [x] Ownership System
146

147
148
149
150
151
152
153
### v0.4 - _current version_

- [x] Support for AzureDNS
- [x] Support for CloudFlare
- [x] Support for DigitalOcean
- [x] Multiple DNS names per Service

154
155
### v1.0

156
- [ ] Ability to replace Kops' [DNS Controller](https://github.com/kubernetes/kops/tree/master/dns-controller)
157
- [x] Ability to replace Zalando's [Mate](https://github.com/linki/mate)
158
- [x] Ability to replace Molecule Software's [route53-kubernetes](https://github.com/wearemolecule/route53-kubernetes)
159
160
161
162
163
164
165
166
167
168

### Yet to be defined

* Support for CoreDNS and Azure DNS
* Support for record weights
* Support for different behavioral policies
* Support for Services with `type=NodePort`
* Support for TPRs
* Support for more advanced DNS record configurations

169
170
Have a look at [the milestones](https://github.com/kubernetes-incubator/external-dns/milestones) to get an idea of where we currently stand.

Lauri Apple's avatar
Lauri Apple committed
171
## Contributing
172

173
We encourage you to get involved with ExternalDNS, as users, contributors or as new maintainers that can take over some parts like different providers and help with code reviews.
174

175
176
177
178
179
180
181
182
183
184
185
Providers which currently need maintainers:

* Azure
* Cloudflare
* Digital Ocean
* Google Cloud Platform

Any provider should have at least one maintainer. It would be nice if you run it in production, but it is not required.
You should check changes and make sure your provider is working correctly.

It would be also great to have an automated end-to-end test for different cloud providers, so help from Kubernetes maintainers and their idea on how this can be done would be valuable.
186

187
188
189
190
191
Read the [contributing guidelines](CONTRIBUTING.md) and have a look at [the contributing docs](docs/contributing/getting-started.md) to learn about building the project, the project structure, and the purpose of each package.

If you are interested please reach out to us on the [Kubernetes slack](http://slack.k8s.io) in the #external-dns channel.

For an overview on how to write new Sources and Providers check out [Sources and Providers](docs/contributing/sources-and-providers.md).
192

Lauri Apple's avatar
Lauri Apple committed
193
## Heritage
194

Lauri Apple's avatar
Lauri Apple committed
195
ExternalDNS is an effort to unify the following similar projects in order to bring the Kubernetes community an easy and predictable way of managing DNS records across cloud providers based on their Kubernetes resources:
196
197

* Kops' [DNS Controller](https://github.com/kubernetes/kops/tree/master/dns-controller)
198
* Zalando's [Mate](https://github.com/linki/mate)
199
* Molecule Software's [route53-kubernetes](https://github.com/wearemolecule/route53-kubernetes)
200
201
202
203
204
205
206
207
208
209
210

## Kubernetes Incubator

This is a [Kubernetes Incubator project](https://github.com/kubernetes/community/blob/master/incubator.md).
The project was established 2017-Feb-9 (initial announcement [here](https://groups.google.com/forum/#!searchin/kubernetes-dev/external$20dns%7Csort:relevance/kubernetes-dev/2wGQUB0fUuE/9OXz01i2BgAJ)).
The incubator team for the project is:

* Sponsor: sig-network
* Champion: Tim Hockin (@thockin)
* SIG: sig-network

Lauri Apple's avatar
Lauri Apple committed
211
212
213
214
215
For more information about sig-network, such as meeting times and agenda, check out the [community site](https://github.com/kubernetes/community/tree/master/sig-network).

### Code of conduct

Participation in the Kubernetes community is governed by the [Kubernetes Code of Conduct](code-of-conduct.md).