-
-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rules Not automatically removed after resource deletion #126
Comments
hi, could you also enable debug logging in external-dns and post the logs? external-dns should send the records to be deleted to the webhook provider. |
Sorry for getting back late. Debug logs for external-dns after removing the recordtime="2024-09-15T05:37:25Z" level=info msg="Instantiating new Kubernetes client" Removed repeated info to keep it shorttime="2024-09-15T05:39:38Z" level=debug msg="No endpoints could be generated from service dns/external-dns-adguard" Removed repeated info to keep it shorttime="2024-09-15T06:08:55Z" level=debug msg="No endpoints could be generated from service default/whoami" Webhook container logs{"level":"info","msg":"creating adguard provider with no kind of domain filters","time":"2024-09-15T05:37:20Z"} external-dns-provider-adguard {"level":"debug","msg":"response code from GET request to status: 200","time":"2024-09-15T05:37:29Z"}
provider: webhook
extraArgs:
webhook-provider-url: http://localhost:8888
sidecars:
- name: adguard-webhook
image: ghcr.io/muhlba91/external-dns-provider-adguard:v7.0.0
ports:
- containerPort: 8888
name: http
livenessProbe:
httpGet:
path: /healthz
port: http
initialDelaySeconds: 10
timeoutSeconds: 5
readinessProbe:
httpGet:
path: /healthz
port: http
initialDelaySeconds: 10
timeoutSeconds: 5
env:
- name: LOG_LEVEL
value: debug
- name: ADGUARD_URL
valueFrom:
secretKeyRef:
name: adguard-configuration
key: url
- name: ADGUARD_USER
valueFrom:
secretKeyRef:
name: adguard-configuration
key: user
- name: ADGUARD_PASSWORD
valueFrom:
secretKeyRef:
name: adguard-configuration
key: password
- name: SERVER_HOST
value: "0.0.0.0"
- name: DRY_RUN
value: "false"
logLevel: debug
sources:
- service
- gateway-httproute
- gateway-grpcroute
- gateway-tlsroute
- gateway-tcproute
- gateway-udproute
Whoami service is deployed in default namespace |
After creating resource using HTTPRoute rules are created automatically in adguard. However, after removing the HTTPRoute resource from the cluster, I noticed that the associated filtering rules are not automatically removed.
Some additional details:
The external-dns policy is set to
sync
.I attempted setting the environment variable
ADGUARD_SET_IMPORTANT_FLAG=false
, but there was no change in behavior.Could you clarify if this behavior is expected, or if I'm missing something in the configuration?
HTTPRoute:
Filtring rules created:
Provider logs:
Kubernetes version: v1.30.4
Gateway implementation: cilium
Cilium Version: 1.16.1
External-dns Version: 0.15.0
Provider Version: 7.0.0
The text was updated successfully, but these errors were encountered: