@@ -24,12 +24,12 @@ the namespace where the _external-dns_ deployments are created so that they can
24
24
apiVersion : v1
25
25
kind : Secret
26
26
metadata :
27
- name : aws-access-key
28
- namespace : external-dns-operator
27
+ name : aws-access-key
28
+ namespace : external-dns-operator
29
29
stringData :
30
- credentials : |-
30
+ credentials : |-
31
31
[default]
32
- aws_access_key_id = " <AWS_ACCESS_KEY_ID>"
32
+ aws_access_key_id = "<AWS_ACCESS_KEY_ID>"
33
33
aws_secret_access_key = "<AWS_SECRET_ACCESS_KEY>"
34
34
` ` `
35
35
@@ -39,16 +39,16 @@ the namespace where the _external-dns_ deployments are created so that they can
39
39
apiVersion: externaldns.olm.openshift.io/v1beta1
40
40
kind: ExternalDNS
41
41
metadata:
42
- name: aws-example
42
+ name: aws-example
43
43
spec:
44
- provider:
44
+ provider:
45
45
type: AWS
46
46
aws:
47
- credentials:
47
+ credentials:
48
48
name: aws-access-key
49
- zones: # Replace with the desired hosted zone IDs
49
+ zones: # Replace with the desired hosted zone IDs
50
50
- "Z3URY6TWQ91KXX"
51
- source:
51
+ source:
52
52
type: Service
53
53
fqdnTemplate:
54
54
- '{{.Name}}.mydomain.net'
@@ -129,7 +129,7 @@ As for the rest: the usage is exactly the same as for [AWS](#aws).
129
129
3. Attach the permission policy to the role :
130
130
131
131
` ` ` bash
132
- curl -o external-dns-permission-policy.json https://raw.githubusercontent.com/openshift/external-dns-operator/main/assets/iam-policy .json
132
+ curl -o external-dns-permission-policy.json https://raw.githubusercontent.com/openshift/external-dns-operator/main/assets/iam_policy .json
133
133
aws iam put-role-policy --role-name external-dns --policy-name perms-policy-external-dns --policy-document file://external-dns-permission-policy.json
134
134
` ` `
135
135
@@ -139,10 +139,10 @@ As for the rest: the usage is exactly the same as for [AWS](#aws).
139
139
apiVersion: v1
140
140
kind: Secret
141
141
metadata:
142
- name: aws-sts-creds
143
- namespace: external-dns-operator
142
+ name: aws-sts-creds
143
+ namespace: external-dns-operator
144
144
stringData:
145
- credentials: |-
145
+ credentials: |-
146
146
[default]
147
147
sts_regional_endpoints = regional
148
148
role_arn = ${EXTERNAL_DNS_ROLEARN}
@@ -155,16 +155,16 @@ As for the rest: the usage is exactly the same as for [AWS](#aws).
155
155
apiVersion: externaldns.olm.openshift.io/v1beta1
156
156
kind: ExternalDNS
157
157
metadata:
158
- name: ${EXTERNAL_DNS_NAME}
158
+ name: ${EXTERNAL_DNS_NAME}
159
159
spec:
160
- provider:
160
+ provider:
161
161
type: AWS
162
162
aws:
163
- credentials:
163
+ credentials:
164
164
name: aws-sts-creds
165
- zones: # Replace with the desired hosted zone IDs
165
+ zones: # Replace with the desired hosted zone IDs
166
166
- "Z3URY6TWQ91KXX"
167
- source:
167
+ source:
168
168
type: Service
169
169
fqdnTemplate:
170
170
- '{{.Name}}.mydomain.net'
@@ -187,11 +187,11 @@ the following information is required:
187
187
apiVersion: v1
188
188
kind: Secret
189
189
metadata:
190
- name: infoblox-credentials
191
- namespace: # operator namespace
190
+ name: infoblox-credentials
191
+ namespace: external-dns- operator
192
192
data:
193
- EXTERNAL_DNS_INFOBLOX_WAPI_USERNAME: # Base-64 encoded username
194
- EXTERNAL_DNS_INFOBLOX_WAPI_PASSWORD: # Base-64 encoded password
193
+ EXTERNAL_DNS_INFOBLOX_WAPI_USERNAME: # Base-64 encoded username
194
+ EXTERNAL_DNS_INFOBLOX_WAPI_PASSWORD: # Base-64 encoded password
195
195
` ` `
196
196
197
197
2. Create an `ExternalDNS` resource as follows :
@@ -200,19 +200,19 @@ the following information is required:
200
200
apiVersion: externaldns.olm.openshift.io/v1beta1
201
201
kind: ExternalDNS
202
202
metadata:
203
- name: infoblox-example
203
+ name: infoblox-example
204
204
spec:
205
- provider:
205
+ provider:
206
206
type: Infoblox
207
207
infoblox:
208
- credentials:
208
+ credentials:
209
209
name: infoblox-credentials
210
- gridHost: # the grid master host from the previous step. eg: 172.26.1.200
211
- wapiPort: # the WAPI port, eg: 80, 443, 8080
212
- wapiVersion: # the WAPI version, eg: 2.11, 2.3.1
213
- zones: # Replace with the desired hosted zones
210
+ gridHost: # the grid master host from the previous step. eg: 172.26.1.200
211
+ wapiPort: # the WAPI port, eg: 80, 443, 8080
212
+ wapiVersion: # the WAPI version, eg: 2.11, 2.3.1
213
+ zones: # Replace with the desired hosted zones
214
214
- "ZG5zLm5ldHdvcmtfdmlldyQw"
215
- source:
215
+ source:
216
216
type: Service
217
217
fqdnTemplate:
218
218
- '{{.Name}}.mydomain.net'
@@ -237,13 +237,13 @@ running note down the following details:
237
237
238
238
` ` ` json
239
239
{
240
- "gatewayHost": "https://bluecatgw.example.com",
241
- "gatewayUsername": "user",
242
- "gatewayPassword": "pass",
243
- "dnsConfiguration": "Example",
244
- "dnsView": "Internal",
245
- "rootZone": "example.com",
246
- "skipTLSVerify": false
240
+ "gatewayHost": "https://bluecatgw.example.com",
241
+ "gatewayUsername": "user",
242
+ "gatewayPassword": "pass",
243
+ "dnsConfiguration": "Example",
244
+ "dnsView": "Internal",
245
+ "rootZone": "example.com",
246
+ "skipTLSVerify": false
247
247
}
248
248
` ` `
249
249
@@ -263,15 +263,19 @@ external-dns [documentation for BlueCat](https://github.com/kubernetes-sigs/exte
263
263
apiVersion: externaldns.olm.openshift.io/v1beta1
264
264
kind: ExternalDNS
265
265
metadata:
266
- name: bluecat-example
266
+ name: bluecat-example
267
267
spec:
268
- provider:
268
+ provider:
269
269
type: BlueCat
270
270
blueCat:
271
- config :
271
+ configFile :
272
272
name: bluecat-config
273
- zones: # Replace with the desired hosted zones
273
+ zones: # Replace with the desired hosted zones
274
274
- "78127234..."
275
+ source:
276
+ type: Service
277
+ fqdnTemplate:
278
+ - '{{.Name}}.mydomain.net'
275
279
` ` `
276
280
277
281
# GCP
@@ -284,10 +288,10 @@ Before creating an ExternalDNS resource for GCP, the following is required:
284
288
apiVersion: v1
285
289
kind: Secret
286
290
metadata:
287
- name: gcp-access-key
288
- namespace: # operator namespace
291
+ name: gcp-access-key
292
+ namespace: external-dns- operator
289
293
data:
290
- gcp-credentials.json: # gcp-service-account-key-file
294
+ gcp-credentials.json: # gcp-service-account-key-file
291
295
` ` `
292
296
293
297
2. Create an `ExternalDNS` CR as follows :
@@ -296,18 +300,18 @@ Before creating an ExternalDNS resource for GCP, the following is required:
296
300
apiVersion: externaldns.olm.openshift.io/v1beta1
297
301
kind: ExternalDNS
298
302
metadata:
299
- name: sample-gcp
303
+ name: sample-gcp
300
304
spec:
301
- # DNS provider
302
- provider:
305
+ # DNS provider
306
+ provider:
303
307
type: GCP
304
308
gcp:
305
- credentials:
309
+ credentials:
306
310
name: gcp-access-key
307
- project: gcp-devel
308
- zones: # Replace with the desired managed zones
311
+ project: gcp-devel
312
+ zones: # Replace with the desired managed zones
309
313
- "3651032588905568971"
310
- source:
314
+ source:
311
315
type: Service
312
316
fqdnTemplate:
313
317
- '{{.Name}}.mydomain.net'
@@ -323,21 +327,21 @@ Before creating an ExternalDNS resource for Azure, the following is required:
323
327
apiVersion: v1
324
328
kind: Secret
325
329
metadata:
326
- name: azure-config-file
327
- namespace: # operator namespace
330
+ name: azure-config-file
331
+ namespace: external-dns- operator
328
332
data:
329
- azure.json: # azure-config-file
333
+ azure.json: # azure-config-file
330
334
` ` `
331
335
332
336
The contents of `azure.json` should be similar to this :
333
337
334
338
` ` ` json
335
339
{
336
- "tenantId": "01234abc-de56-ff78-abc1-234567890def",
337
- "subscriptionId": "01234abc-de56-ff78-abc1-234567890def",
338
- "resourceGroup": "MyDnsResourceGroup",
339
- "aadClientId": "01234abc-de56-ff78-abc1-234567890def",
340
- "aadClientSecret": "<clientSecret>"
340
+ "tenantId": "01234abc-de56-ff78-abc1-234567890def",
341
+ "subscriptionId": "01234abc-de56-ff78-abc1-234567890def",
342
+ "resourceGroup": "MyDnsResourceGroup",
343
+ "aadClientId": "01234abc-de56-ff78-abc1-234567890def",
344
+ "aadClientSecret": "<clientSecret>"
341
345
}
342
346
` ` `
343
347
@@ -347,17 +351,17 @@ Before creating an ExternalDNS resource for Azure, the following is required:
347
351
apiVersion: externaldns.olm.openshift.io/v1beta1
348
352
kind: ExternalDNS
349
353
metadata:
350
- name: sample-azure
354
+ name: sample-azure
351
355
spec:
352
- # DNS provider
353
- provider:
356
+ # DNS provider
357
+ provider:
354
358
type: Azure
355
359
azure:
356
- configFile:
360
+ configFile:
357
361
name: azure-config-file
358
- zones: # Replace with the desired hosted zones
362
+ zones: # Replace with the desired hosted zones
359
363
- "myzoneid"
360
- source:
364
+ source:
361
365
type: Service
362
366
fqdnTemplate:
363
367
- '{{.Name}}.mydomain.net'
0 commit comments