Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add support to configure dnsPolicy on the Helm chart deployment #2902

Merged
merged 2 commits into from
Aug 9, 2022

Conversation

michelzanini
Copy link
Contributor

Description

Add support to configure dnsPolicy on the Helm chart deployment.
This allows us to set the dnsPolicy to Default and skip in-cluster DNS to improve performance.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Jul 21, 2022
@k8s-ci-robot
Copy link
Contributor

Welcome @michelzanini!

It looks like this is your first PR to kubernetes-sigs/external-dns 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes-sigs/external-dns has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. 😃

@k8s-ci-robot k8s-ci-robot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Jul 21, 2022
@michelzanini
Copy link
Contributor Author

/assign @stevehipwell

Copy link
Contributor

@stevehipwell stevehipwell left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the PR @michelzanini, I've added a couple of suggested changes. Out of interest did you open an issue to discuss the issues you were having which led to this PR?

charts/external-dns/templates/deployment.yaml Outdated Show resolved Hide resolved
charts/external-dns/values.yaml Outdated Show resolved Hide resolved
@michelzanini
Copy link
Contributor Author

michelzanini commented Jul 22, 2022

Code changes have being implemented.
I have not open an issue as its a simple config change.
The issues we have that will make this help is to decrease the load on CoreDns. This config is supported on most add-ons we use like AWS load balancer, cluster autoscaler, etc...

@stevehipwell
Copy link
Contributor

@michelzanini it's not a hard and fast rule but I'd recommend opening an issue before opening a PR, the maintainers may have a wider view and be able to validate an approach before anyone writes any code or has to review it. From the Helm chart perspective I'm fine with this change but I can't tell you if there is an edge case which relies on using the cluster DNS.

Have you checked that this change works at least for your use case?

@michelzanini
Copy link
Contributor Author

Have you checked that this change works at least for your use case?

Yes it does. All this does is allow the pod to go directly to AWS for DNS resolution skipping CoreDNS. CoreDNS is useful if you need to reference a service within the cluster by using the service name. External DNS does not call other pods and works independently so it will only do DNS resolution to external domains such as AWS APIs it needs to call etc.
This avoid problems such as https://pracucci.com/kubernetes-dns-resolution-ndots-options-and-why-it-may-affect-application-performances.html.

Also recommended in some other places like https://aws.github.io/aws-eks-best-practices/security/docs/pods/#disable-service-discovery.

This setting is available to be configured on other Helm charts that use Cloud/AWS APIs such as Cluster Autoscaler and AWS load balancer controller etc.

it's not a hard and fast rule but I'd recommend opening an issue before opening a PR

I can create one if you think its required. Let me know.

@stevehipwell
Copy link
Contributor

@Raffo @seanmalloy @njuettner could you approve the workflow for first time contribution?

@seanmalloy
Copy link
Member

@Raffo @seanmalloy @njuettner could you approve the workflow for first time contribution?

GitHub Actions CI check are running now.

@stevehipwell
Copy link
Contributor

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jul 28, 2022
@stevehipwell
Copy link
Contributor

/assign @seanmalloy

@Raffo
Copy link
Contributor

Raffo commented Aug 9, 2022

/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: michelzanini, Raffo

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 9, 2022
@k8s-ci-robot k8s-ci-robot merged commit 5382a0a into kubernetes-sigs:master Aug 9, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants