- 13 Jan, 2021 1 commit
-
-
Victor Chan authored
-
- 12 Jan, 2021 4 commits
-
-
Victor Chan authored
changed wording to prevent confusion of using R53 in govcloud vs needing to make public facing r53 entries
-
Victor Chan authored
-
Victor Chan authored
-
Victor Chan authored
-
- 16 Dec, 2020 1 commit
-
-
RaymondKYLiu authored
-
- 29 Sep, 2020 1 commit
-
-
Rajat Jindal authored
-
- 03 Sep, 2020 1 commit
-
-
Benjamin Pineau authored
When it syncs AWS DNS with k8s cluster content (at `--interval`), external-dns submits two distinct Route53 API calls: * to fetch available zones (eg. for tag based zones discovery, or when zones are created after exernal-dns started), * to fetch relevant zones' resource records. Each call taxes the Route53 APIs calls budget (5 API calls per second per AWS account/region hard limit), increasing the probability of being throttled. Changing synchronization interval would mitigate those calls' impact, but at the cost of keeping stale records for a longer time. For most practical uses cases, zones list aren't expected to change frequently. Even less so when external-dns is provided an explicit, static zones set (`--zone-id-filter` rather than `--aws-zone-tags`). Using a zones list cache halves the number of Route53 read API calls.
-
- 21 Aug, 2020 1 commit
-
-
Sean Malloy authored
The k8s external-dns project now uses the official Kubernetes projects container registry at k8s.gcr.io. Update all references to use the new registry.
-
- 05 Aug, 2020 1 commit
-
-
David Dooling authored
* Update apiVersions in docs Update docs to reflect new apiVersions for ingresses and deployments. * Add selector to apps/v1 deployments
-
- 08 Jul, 2020 1 commit
-
-
Raffaele Di Fazio authored
* intial removal of inappropriate terminology Signed-off-by:
Raffaele Di Fazio <raffo@github.com> * removed other occurrences Signed-off-by:
Raffaele Di Fazio <raffo@github.com> * gofmt Signed-off-by:
Raffaele Di Fazio <raffo@github.com> * addresses comment Signed-off-by:
Raffaele Di Fazio <raffo@github.com> * gofmt Signed-off-by:
Raffaele Di Fazio <raffo@github.com>
-
- 18 Feb, 2020 2 commits
-
-
Alfred Krohmer authored
-
Alfred Krohmer authored
-
- 18 Jan, 2020 1 commit
-
-
Michael S. Fischer authored
Using EC2 Instance Roles to provide Route 53 permissions is overly permissive and dangerous. Emphasize using alternatives such as EKS IAM Roles for Service Accounts, kiam, or kube2iam that limit access to the ExternalDNS pod.
-
- 07 Jan, 2020 1 commit
-
-
Martin Linkhorst authored
-
- 12 Nov, 2019 1 commit
-
-
Yujun Zhang authored
`Deployment` has been removed from `apiVersion: extensions/v1beta1` See https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/
-
- 18 Oct, 2019 1 commit
-
-
Piotr Jander authored
-
- 15 Oct, 2019 1 commit
-
-
Zoltán Reegn authored
The extensions/v1beta1 API is deprecated for Deployment and with 1.16 is not served by default anymore. This breaks the examples on k8s 1.16. See this blog post for details on the deprecations: https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/
-
- 08 Oct, 2019 1 commit
-
-
David Grizzanti authored
-
- 16 Sep, 2019 1 commit
-
-
Brian Hong authored
Amazon EKS supports IAM Roles for Service Accounts. It mounts tokens files to `/var/run/secrets/eks.amazonaws.com/serviceaccount/token`. Unfortunately, external-dns runs as 'nobody' so it cannot access this file. External DNS is then unable to make any AWS API calls to work: ``` time="2019-09-11T07:31:53Z" level=error msg="WebIdentityErr: unable to read file at /var/run/secrets/eks.amazonaws.com/serviceaccount/token\ncaused by: open /var/run/secrets/eks.amazonaws.com/serviceaccount/token: permission denied" ``` See: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html Below are the file permissions mounted on External DNS pod: ``` ~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/ total 0 drwxrwxrwt 3 root root 100 Sep 11 06:40 . drwxr-xr-x 3 root root 28 Sep 11 06:40 .. drwxr-xr-x 2 root root 60 Sep 11 06:40 ..2019_09_11_06_40_49.865776187 lrwxrwxrwx 1 root root 31 Sep 11 06:40 ..data -> ..2019_09_11_06_40_49.865776187 lrwxrwxrwx 1 root root 12 Sep 11 06:40 token -> ..data/token ~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token -rw------- 1 root root 1028 Sep 11 06:40 /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token ``` This commit fixes this problem by specifying securityContext to make mounted volumes with 65534 (nobody) group ownership.
-
- 10 Sep, 2019 1 commit
-
-
Alfred Krohmer authored
-
- 02 May, 2019 1 commit
-
-
Paweł Prażak authored
Fixes `Failed to watch *v1.Node: unknown (get nodes)`
-
- 02 Apr, 2019 1 commit
-
-
igork authored
-
- 29 Mar, 2019 1 commit
-
-
Tim Hobbs authored
Tutorial specifies version >0.4 which also removed the requirement for a trailing period. New users could misunderstand the trailing dot as a significant syntax. Removing the dot simplifies the configuration of the annotation.
-
- 22 Feb, 2019 2 commits
-
-
Dirk Gómez authored
-
Shota Ito authored
This PR is a comment about "Multiple DNS names per Service" setting.
-
- 26 Jan, 2019 1 commit
-
-
Alex Nederlof authored
I got stuck here and opened #865 because I thought it was a bug. I hope this will help others set it up correctly the first time.
-
- 14 Jan, 2019 1 commit
-
-
Ignasi Fosch authored
This way the use of `jq`, and the output in this document would make sense.
-
- 09 Nov, 2018 1 commit
-
-
vaegt authored
-
- 28 Jun, 2018 1 commit
-
-
Nick Jüttner authored
-
- 15 Jun, 2018 2 commits
-
-
Nick Jüttner authored
Introducing support for NodePort services might break cluster which using RBAC * allow external-dns to list nodes Signed-off-by:
Nick Jüttner <nick@zalando.de>
-
Nick Jüttner authored
* Add recent changes to the changelog * Update version in docs Signed-off-by:
Nick Jüttner <nick@zalando.de>
-
- 06 Jun, 2018 1 commit
-
-
Jaromir Vanek authored
-
- 22 May, 2018 1 commit
-
-
Raffaele Di Fazio authored
* Minor changes to docs and faq * Other minor changes * better docs * Addressed comments
-
- 16 May, 2018 1 commit
-
-
Martin Linkhorst authored
-
- 15 May, 2018 1 commit
-
-
Henning Jacobs authored
-
- 24 Apr, 2018 1 commit
-
-
Dan Bond authored
-
- 23 Apr, 2018 1 commit
-
-
Martin Linkhorst authored
-
- 27 Feb, 2018 1 commit
-
-
Zach Arnold authored
* update RBAC rules in docs * update docs with split between rbac and non * make deployment use new sa * docs: correctly reference service account in CRB * docs: correctly reference service account in CRB in other docs
-
- 26 Jan, 2018 1 commit
-
-
shane lee authored
* [aws-doc-update] docker image version and new arg aws-zone-type * changes after review * remove annotation for ingress * docs: modify docs according to suggestions
-