-
Notifications
You must be signed in to change notification settings - Fork 164
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introduce a problematic DNS and ExternalDNS version with the fix #5604
Conversation
This successfully blocks all ExternalDNS updates 💥 |
d326182
to
9ad49d1
Compare
9ad49d1
to
5d349a2
Compare
Now trying the same with an ExternalDNS version that should tolerate some broken records. This is hopefully green. |
So this is green now. It means a single broken record doesn't block ExternalDNS and hence it passes all e2e tests. We should try to get kubernetes-sigs/external-dns#1209 merged or run a fork. |
As discussed let's go ahead with our internally released version from kubernetes-sigs/external-dns@a18bf2b which includes kubernetes-sigs/external-dns#1209. Dropping the |
👍 |
1 similar comment
👍 |
Let's add a Service of
Type: LoadBalancer
giving it a DNS name that ExternalDNS has problems with (as ofv0.13.1
, it might be fixed in later versions)The idea is that DNS should be pretty broken when running e2e tests. Then we can see if introducing #5602 makes sure to ignore the bad record.