-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
external-dns not ignoring pre-existing DNS records it does not have ownership of #3715
Comments
Please show the bogus resources that lead to this and which source you use including all flags. |
Sure, the dns zone has this relevant record that isn't managed by external-dns:
Here are some debug logs comparing the behaviour between the two versions.
It seems |
It's not surprising, external-dns now treats different record types on the same domain as being independent. |
Was this change documented anywhere? Maybe I've missed it, but I don't see it in the changelog for v0.13.5. What would be your recommended action for this? Remove the CNAMEs and have external-dns manage them? Or is there a way that we can have external-dns check for existing CNAME records, and skip record creation as afaik they cannot coexist with other record types: rfc1912, rfc1034? |
@johngmyers sorry to disturb you, but I don't quite get the idea in #3747 , is it to focus on filtering by owner ID on the domain level and prefer A over CNAME? That's because I'm having a similar issue on 0.13.6, it goes through most of the hostnames fine, but a few subdomains in the same zone already have CNAMEs in place and it crashes with the same fatal error as OP. Does this mean that there is no way to skip/ignore hosts with existing CNAMEs in general and the only way is to either filter out the whole domain our skip those subdomains with a mix of annotations directly on resources? Thanks. |
still seeing an error with chart version 6.28.0 and app version 0.13.6. Getting the error below: time="2023-11-01T13:29:42Z" level=fatal msg="googleapi: Error 400: The resource record set 'entity.change.additions[www.beta.domain.com.][A]' is invalid because the DNS name 'www.beta.domain.com.' has a resource record set of the type 'CNAME'. A DNS name may have either one CNAME resource record set or resource record sets of other types, but not both., cnameResourceRecordSetConflict" www. is CNAMED to a cloudfront distro outside of external-dns |
I am getting this conflict error in pod logs TXT record already created along with CNAME, but seeing this message for all the CNAME and TXT records created by External-DNS. Is there any way to suppress the checking for TXT record again and again by External-DNS? |
Testing this on the latest release (0.14.0), it looks like the issue has been resolved. I'm now seeing external-dns checking for ownership of the records, and ignoring the conflict:
|
Since upgrading to
0.13.5
from0.13.4
, external-dns will try and create A an record when a CNAME already exists in the zone that it does not control, where previously it would skip trying to create/manage this record. This causes external-dns to crashloop with the following error:Here’s our relevant helm chart configuration for our deployment:
I’ve seen other issues where TXT and A records collide when the registry hasn’t been configured, but this looks to be a different issue:
#262
#740
#318
These bugs look to be similar:
#3714
#3706
Not a contribution.
The text was updated successfully, but these errors were encountered: