-
Notifications
You must be signed in to change notification settings - Fork 93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[WIP] Support for Azure DNS on AKS #912
Conversation
@sebader how does it look with this work? Do you need any help? We really want Azure support :) |
I didnt have time in the last few weeks to keep working further on this. However, I do have a working prototype running. Biggest blocker at the moment is my open PR on external-dns which adds NS support for Azure DNS. Any help to get that moving forward is much appreciated. Apart from that it will be mostly documentation that needs to be written - and possibly end-to-end tests. I don't have any understanding so far how your test suite for k8gb works. |
# Conflicts: # chart/k8gb/values.schema.json
@sebader we can temporarily fork external-dns and run the custom build to unblock ( it's not the first time we will do it). |
Ok. Let me try to find some time soon to continue here and build out the terraform templates to get the infrastructure set up for Azure. I'll obviously start with the public load balancing setup. But the original reason why I actually started all this work was to get to an internal global load balancer. I have that setup working, too. So as a later step I'll try to add the required setup for that as well. |
Both internal and public cases are super interesting, thanks! |
this is great to hear @ytsarev! I'll see if I can grab some time (and refresh my memory first :D) I would also make the switch to Workload Identity if possible, now that this is (almost) GA on Azure |
✅ Deploy Preview for k8gb-preview ready!
To edit notification comments on pull requests, go to your Netlify site settings. |
Implemented by #1525 and #1593 . NS record support is implemented in external-dns fork @sebader thank you so much for the initial implementation! Closing this PR as effectively completed. |
Work in progress - just opening for transparency already
This PR adds support for Azure DNS when running on AKS.
For now it only supports using the kubelet identity to authenticate against the Azure DNS zone with external-dns. One could add support for service principals as well, but that requires to store the client secret which I wanted to avoid for now. Once workload identities become available on AKS (successor of pod identity), that should be added, since using kubelet identity means, that all pods running on AKS will have access to that DNS zone. So it is not ideal but it is a first working version.
Working/implemented:
Missing/WIP
NS
support for Azure DNS kubernetes-sigs/external-dns#2835Closes #642