-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ingress: external-dns.alpha.kubernetes.io/hostname: force usage #1053
Comments
I have a similar situation that would benefit from this. We have a public-facing AWS ALB ingress that we place behind a CloudFront distribution. Ideally we'd like to be able to just have a single DNS record for that ALB, configured via |
+1 |
With external DNS creating records for entries in the ingress :
This conflicts with what I want to happen with ingress-nginx.
This will route all traffic that doesn't have a r53 entry to the ingress-nginx ALB. This is the intended effect. ingress-nginx sets up it's configuration by reading the ingress:
As of at least the latest release, this is creating a r53 entry for my.domain1.com with an A record that resolves to the internal kubernetes cluster internal IP. |
@wallentx Surely you mean ingress-nginx service annotation Just set |
Per the code in github the annotation only adds names to the list. There is no way to remove or override hostnames. https://github.com/kubernetes-incubator/external-dns/blob/master/source/ingress.go#L270-L289 You can however use the TXT registry to stop external-dns from managing certain records and then take over management of those records. This comment has more details #819 (comment) |
Using TXT would force me to use However, not having a
Thankfully external DNS considers a missing txt an owner mismatch 🤞 Downside: this produces logs like these, and I need to ensure I have |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
not stale |
/remove-lifecycle stale |
@max-lobur Use the --txt-prefix option |
An option to force external-dns to ignore hostnames from ingress and create records for hostnames from |
#1650 is a potential solution to this problem. |
/kind feature |
+1 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
not stale |
/remove-lifecycle stale stale bots are so annoying |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
The specific use case described by the OP can be solved on the ingress controller side: kubernetes/ingress-nginx#6752 However, there might be other use cases where the feature requested here is required. /remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/remove-lifecycle stale |
/reopen |
@bitsofinfo: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/remove-lifecycle rotten |
This functionality was added in #1696 |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Currently if I have an
Ingress
defined with annotation:external-dns.alpha.kubernetes.io/hostname: my.domain1.com
The
Ingress
also has:external-dns creates dns records for BOTH
my.domain1.com
andwww.domain1.com
It would be great if an option or additional annotation could be added that could instruct external-dns to ONLY create entries for what is in
external-dns.alpha.kubernetes.io/hostname
and ignore whats in the Ingress- hosts
stanzas.I need this for situations where the service behind an ingress is accessed directly via certain names but can also accessed via other proxies in front of it. So it needs to be concerned with all possible
Host:
headers.... but I don't necessarily want to alter DNS for all of them if that makes sense.The text was updated successfully, but these errors were encountered: