1. 13 Jan, 2021 1 commit
  2. 12 Jan, 2021 4 commits
  3. 16 Dec, 2020 1 commit
  4. 29 Sep, 2020 1 commit
  5. 03 Sep, 2020 1 commit
    • Benjamin Pineau's avatar
      aws: cache zones list · 837d1ea2
      Benjamin Pineau authored
      When it syncs AWS DNS with k8s cluster content (at `--interval`), external-dns submits two distinct Route53 API calls:
      * to fetch available zones (eg. for tag based zones discovery, or when zones are created after exernal-dns started),
      * to fetch relevant zones' resource records.
      
      Each call taxes the Route53 APIs calls budget (5 API calls per second per AWS account/region hard limit), increasing the probability of being throttled.
      Changing synchronization interval would mitigate those calls' impact, but at the cost of keeping stale records for a longer time.
      
      For most practical uses cases, zones list aren't expected to change frequently.
      Even less so when external-dns is provided an explicit, static zones set (`--zone-id-filter` rather than `--aws-zone-tags`).
      
      Using a zones list cache halves the number of Route53 read API calls.
      837d1ea2
  6. 21 Aug, 2020 1 commit
  7. 05 Aug, 2020 1 commit
  8. 08 Jul, 2020 1 commit
  9. 18 Feb, 2020 2 commits
  10. 18 Jan, 2020 1 commit
    • Michael S. Fischer's avatar
      Update AWS documentation · c1ebc772
      Michael S. Fischer authored
      Using EC2 Instance Roles to provide Route 53 permissions is overly
      permissive and dangerous.  Emphasize using alternatives such
      as EKS IAM Roles for Service Accounts, kiam, or kube2iam that
      limit access to the ExternalDNS pod.
      c1ebc772
  11. 07 Jan, 2020 1 commit
  12. 12 Nov, 2019 1 commit
  13. 18 Oct, 2019 1 commit
  14. 15 Oct, 2019 1 commit
  15. 08 Oct, 2019 1 commit
  16. 16 Sep, 2019 1 commit
    • Brian Hong's avatar
      Fix AWS IAM Roles for Service Accounts permission · c97781a4
      Brian Hong authored
      Amazon EKS supports IAM Roles for Service Accounts. It mounts tokens
      files to `/var/run/secrets/eks.amazonaws.com/serviceaccount/token`.
      Unfortunately, external-dns runs as 'nobody' so it cannot access this
      file. External DNS is then unable to make any AWS API calls to work:
      
      ```
      time="2019-09-11T07:31:53Z" level=error msg="WebIdentityErr: unable to read file at /var/run/secrets/eks.amazonaws.com/serviceaccount/token\ncaused by: open /var/run/secrets/eks.amazonaws.com/serviceaccount/token: permission denied"
      ```
      
      See: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html
      
      Below are the file permissions mounted on External DNS pod:
      
      ```
      ~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/
      total 0
      drwxrwxrwt    3 root     root           100 Sep 11 06:40 .
      drwxr-xr-x    3 root     root            28 Sep 11 06:40 ..
      drwxr-xr-x    2 root     root            60 Sep 11 06:40 ..2019_09_11_06_40_49.865776187
      lrwxrwxrwx    1 root     root            31 Sep 11 06:40 ..data -> ..2019_09_11_06_40_49.865776187
      lrwxrwxrwx    1 root     root            12 Sep 11 06:40 token -> ..data/token
      ~ $ ls -al /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
      -rw-------    1 root     root          1028 Sep 11 06:40 /var/run/secrets/eks.amazonaws.com/serviceaccount/..data/token
      ```
      
      This commit fixes this problem by specifying securityContext to make
      mounted volumes with 65534 (nobody) group ownership.
      Unverified
      c97781a4
  17. 10 Sep, 2019 1 commit
  18. 02 May, 2019 1 commit
  19. 02 Apr, 2019 1 commit
  20. 29 Mar, 2019 1 commit
  21. 22 Feb, 2019 2 commits
  22. 26 Jan, 2019 1 commit
  23. 14 Jan, 2019 1 commit
  24. 09 Nov, 2018 1 commit
  25. 28 Jun, 2018 1 commit
  26. 15 Jun, 2018 2 commits
  27. 06 Jun, 2018 1 commit
  28. 22 May, 2018 1 commit
  29. 16 May, 2018 1 commit
  30. 15 May, 2018 1 commit
  31. 24 Apr, 2018 1 commit
  32. 23 Apr, 2018 1 commit
  33. 27 Feb, 2018 1 commit
    • Zach Arnold's avatar
      update RBAC rules in docs (#451) · 38952778
      Zach Arnold authored
      * update RBAC rules in docs
      
      * update docs with split between rbac and non
      
      * make deployment use new sa
      
      * docs: correctly reference service account in CRB
      
      * docs: correctly reference service account in CRB in other docs
      38952778
  34. 26 Jan, 2018 1 commit