1. 03 Jun, 2021 1 commit
  2. 16 Mar, 2021 1 commit
  3. 05 Feb, 2021 1 commit
  4. 13 Jan, 2021 1 commit
  5. 12 Jan, 2021 4 commits
  6. 16 Dec, 2020 1 commit
  7. 29 Sep, 2020 1 commit
  8. 03 Sep, 2020 1 commit
    • Benjamin Pineau's avatar
      aws: cache zones list · 837d1ea2
      Benjamin Pineau authored
      When it syncs AWS DNS with k8s cluster content (at `--interval`), external-dns submits two distinct Route53 API calls:
      * to fetch available zones (eg. for tag based zones discovery, or when zones are created after exernal-dns started),
      * to fetch relevant zones' resource records.
      
      Each call taxes the Route53 APIs calls budget (5 API calls per second per AWS account/region hard limit), increasing the probability of being throttled.
      Changing synchronization interval would mitigate those calls' impact, but at the cost of keeping stale records for a longer time.
      
      For most practical uses cases, zones list aren't expected to change frequently.
      Even less so when external-dns is provided an explicit, static zones set (`--zone-id-filter` rather than `--aws-zone-tags`).
      
      Using a zones list cache halves the number of Route53 read API calls.
      837d1ea2
  9. 21 Aug, 2020 1 commit
  10. 05 Aug, 2020 1 commit
  11. 08 Jul, 2020 1 commit
  12. 18 Feb, 2020 2 commits
  13. 18 Jan, 2020 1 commit
    • Michael S. Fischer's avatar
      Update AWS documentation · c1ebc772
      Michael S. Fischer authored
      Using EC2 Instance Roles to provide Route 53 permissions is overly
      permissive and dangerous.  Emphasize using alternatives such
      as EKS IAM Roles for Service Accounts, kiam, or kube2iam that
      limit access to the ExternalDNS pod.
      c1ebc772
  14. 07 Jan, 2020 1 commit
  15. 12 Nov, 2019 1 commit
  16. 18 Oct, 2019 1 commit
  17. 15 Oct, 2019 1 commit
  18. 08 Oct, 2019 1 commit
  19. 16 Sep, 2019 1 commit
    • Brian Hong's avatar
      Fix AWS IAM Roles for Service Accounts permission · c97781a4
      Brian Hong authored
      Amazon EKS supports IAM Roles for Service Accounts. It mounts tokens
      files to `/var/run/secrets/eks.amazonaws.com/serviceaccount/token`.
      Unfortunately, external-dns runs as 'nobody' so it cannot access this
      file. External DNS is then unable to make any AWS API calls to work:
      
      ```
      time="2019-09-11T07:31:53Z" level=error msg="WebIdentityErr: unable to read file at /var/run/secrets/eks.amazonaws.com/serviceaccount/token\ncaused by: open /var/run/secrets/eks.amazonaws.com/serviceaccount/token: permission denied"
      ```
      
      See: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html
      
      Below are the file permissions mounted on External DNS pod:
      
      ```
      ~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/
      total 0
      drwxrwxrwt    3 root     root           100 Sep 11 06:40 .
      drwxr-xr-x    3 root     root            28 Sep 11 06:40 ..
      drwxr-xr-x    2 root     root            60 Sep 11 06:40 ..2019_09_11_06_40_49.865776187
      lrwxrwxrwx    1 root     root            31 Sep 11 06:40 ..data -> ..2019_09_11_06_40_49.865776187
      lrwxrwxrwx    1 root     root            12 Sep 11 06:40 token -> ..data/token
      ~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
      -rw-------    1 root     root          1028 Sep 11 06:40 /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
      ```
      
      This commit fixes this problem by specifying securityContext to make
      mounted volumes with 65534 (nobody) group ownership.
      c97781a4
  20. 10 Sep, 2019 1 commit
  21. 02 May, 2019 1 commit
  22. 02 Apr, 2019 1 commit
  23. 29 Mar, 2019 1 commit
    • Tim Hobbs's avatar
      Remove superfluous trailing period from hostname · 252dc2b0
      Tim Hobbs authored
      Tutorial specifies version >0.4 which also removed the requirement for a trailing period.  New users could misunderstand the trailing dot as a significant syntax.  Removing the dot simplifies the configuration of the annotation.
      252dc2b0
  24. 22 Feb, 2019 2 commits
  25. 26 Jan, 2019 1 commit
  26. 14 Jan, 2019 1 commit
  27. 09 Nov, 2018 1 commit
  28. 28 Jun, 2018 1 commit
  29. 15 Jun, 2018 2 commits
  30. 06 Jun, 2018 1 commit
  31. 22 May, 2018 1 commit
  32. 16 May, 2018 1 commit
  33. 15 May, 2018 1 commit
  34. 24 Apr, 2018 1 commit