Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 18. External DNS Operator
18.1. External DNS Operator release notes Link kopierenLink in die Zwischenablage kopiert!
The External DNS Operator deploys and manages
ExternalDNS
The External DNS Operator is only supported on the
x86_64
These release notes track the development of the External DNS Operator in OpenShift Container Platform.
18.1.1. External DNS Operator 1.2.0 Link kopierenLink in die Zwischenablage kopiert!
The following advisory is available for the External DNS Operator version 1.2.0:
18.1.1.1. New features Link kopierenLink in die Zwischenablage kopiert!
- The External DNS Operator now supports AWS shared VPC. For more information, see Creating DNS records in a different AWS Account using a shared VPC.
18.1.1.2. Bug fixes Link kopierenLink in die Zwischenablage kopiert!
-
The update strategy for the operand changed from to
Rolling. (OCPBUGS-3630)Recreate
18.1.2. External DNS Operator 1.1.1 Link kopierenLink in die Zwischenablage kopiert!
The following advisory is available for the External DNS Operator version 1.1.1:
18.1.3. External DNS Operator 1.1.0 Link kopierenLink in die Zwischenablage kopiert!
This release included a rebase of the operand from the upstream project version 0.13.1. The following advisory is available for the External DNS Operator version 1.1.0:
18.1.3.1. Bug fixes Link kopierenLink in die Zwischenablage kopiert!
-
Previously, the ExternalDNS Operator enforced an empty value for volumes, which caused constant updates due to a conflict with the OpenShift API. Now, the
defaultModevalue is not enforced and operand deployment does not update constantly. (OCPBUGS-2793)defaultMode
18.1.4. External DNS Operator 1.0.1 Link kopierenLink in die Zwischenablage kopiert!
The following advisory is available for the External DNS Operator version 1.0.1:
18.1.5. External DNS Operator 1.0.0 Link kopierenLink in die Zwischenablage kopiert!
The following advisory is available for the External DNS Operator version 1.0.0:
18.1.5.1. Bug fixes Link kopierenLink in die Zwischenablage kopiert!
- Previously, the External DNS Operator issued a warning about the violation of the restricted SCC policy during ExternalDNS operand pod deployments. This issue has been resolved. (BZ#2086408)
18.2. External DNS Operator in OpenShift Container Platform Link kopierenLink in die Zwischenablage kopiert!
The External DNS Operator deploys and manages
ExternalDNS
18.2.1. External DNS Operator Link kopierenLink in die Zwischenablage kopiert!
The External DNS Operator implements the External DNS API from the
olm.openshift.io
Prerequisites
-
You have installed the CLI tool.
yq
Procedure
You can deploy the External DNS Operator on demand from the OperatorHub. Deploying the External DNS Operator creates a
Subscription
Check the name of an install plan by running the following command:
$ oc -n external-dns-operator get sub external-dns-operator -o yaml | yq '.status.installplan.name'Example output
install-zcvlrCheck if the status of an install plan is
by running the following command:Complete$ oc -n external-dns-operator get ip <install_plan_name> -o yaml | yq '.status.phase'Example output
CompleteView the status of the
deployment by running the following command:external-dns-operator$ oc get -n external-dns-operator deployment/external-dns-operatorExample output
NAME READY UP-TO-DATE AVAILABLE AGE external-dns-operator 1/1 1 1 23h
18.2.2. External DNS Operator logs Link kopierenLink in die Zwischenablage kopiert!
You can view External DNS Operator logs by using the
oc logs
Procedure
View the logs of the External DNS Operator by running the following command:
$ oc logs -n external-dns-operator deployment/external-dns-operator -c external-dns-operator
18.2.2.1. External DNS Operator domain name limitations Link kopierenLink in die Zwischenablage kopiert!
The External DNS Operator uses the TXT registry which adds the prefix for TXT records. This reduces the maximum length of the domain name for TXT records. A DNS record cannot be present without a corresponding TXT record, so the domain name of the DNS record must follow the same limit as the TXT records. For example, a DNS record of
<domain_name_from_source>
external-dns-<record_type>-<domain_name_from_source>
The domain name of the DNS records generated by the External DNS Operator has the following limitations:
| Record type | Number of characters |
|---|---|
| CNAME | 44 |
| Wildcard CNAME records on AzureDNS | 42 |
| A | 48 |
| Wildcard A records on AzureDNS | 46 |
The following error appears in the External DNS Operator logs if the generated domain name exceeds any of the domain name limitations:
time="2022-09-02T08:53:57Z" level=error msg="Failure in zone test.example.io. [Id: /hostedzone/Z06988883Q0H0RL6UMXXX]"
time="2022-09-02T08:53:57Z" level=error msg="InvalidChangeBatch: [FATAL problem: DomainLabelTooLong (Domain label is too long) encountered with 'external-dns-a-hello-openshift-aaaaaaaaaa-bbbbbbbbbb-ccccccc']\n\tstatus code: 400, request id: e54dfd5a-06c6-47b0-bcb9-a4f7c3a4e0c6"
18.3. Installing External DNS Operator on cloud providers Link kopierenLink in die Zwischenablage kopiert!
You can install the External DNS Operator on cloud providers such as AWS, Azure, and Google Cloud.
18.3.1. Installing the External DNS Operator with OperatorHub Link kopierenLink in die Zwischenablage kopiert!
You can install the External DNS Operator by using the OpenShift Container Platform OperatorHub.
Procedure
-
Click Operators
OperatorHub in the OpenShift Container Platform web console. - Click External DNS Operator. You can use the Filter by keyword text box or the filter list to search for External DNS Operator from the list of Operators.
-
Select the namespace.
external-dns-operator - On the External DNS Operator page, click Install.
On the Install Operator page, ensure that you selected the following options:
- Update the channel as stable-v1.
- Installation mode as A specific name on the cluster.
-
Installed namespace as . If namespace
external-dns-operatordoes not exist, it gets created during the Operator installation.external-dns-operator - Select Approval Strategy as Automatic or Manual. Approval Strategy is set to Automatic by default.
- Click Install.
If you select Automatic updates, the Operator Lifecycle Manager (OLM) automatically upgrades the running instance of your Operator without any intervention.
If you select Manual updates, the OLM creates an update request. As a cluster administrator, you must then manually approve that update request to have the Operator updated to the new version.
Verification
Verify that the External DNS Operator shows the Status as Succeeded on the Installed Operators dashboard.
18.3.2. Installing the External DNS Operator by using the CLI Link kopierenLink in die Zwischenablage kopiert!
You can install the External DNS Operator by using the CLI.
Prerequisites
-
You are logged in to the OpenShift Container Platform web console as a user with permissions.
cluster-admin -
You are logged into the OpenShift CLI ().
oc
Procedure
Create a
object:NamespaceCreate a YAML file that defines the
object:NamespaceExample
namespace.yamlfileapiVersion: v1 kind: Namespace metadata: name: external-dns-operatorCreate the
object by running the following command:Namespace$ oc apply -f namespace.yaml
Create an
object:OperatorGroupCreate a YAML file that defines the
object:OperatorGroupExample
operatorgroup.yamlfileapiVersion: operators.coreos.com/v1 kind: OperatorGroup metadata: name: external-dns-operator namespace: external-dns-operator spec: upgradeStrategy: Default targetNamespaces: - external-dns-operatorCreate the
object by running the following command:OperatorGroup$ oc apply -f operatorgroup.yaml
Create a
object:SubscriptionCreate a YAML file that defines the
object:SubscriptionExample
subscription.yamlfileapiVersion: operators.coreos.com/v1alpha1 kind: Subscription metadata: name: external-dns-operator namespace: external-dns-operator spec: channel: stable-v1 installPlanApproval: Automatic name: external-dns-operator source: redhat-operators sourceNamespace: openshift-marketplaceCreate the
object by running the following command:Subscription$ oc apply -f subscription.yaml
Verification
Get the name of the install plan from the subscription by running the following command:
$ oc -n external-dns-operator \ get subscription external-dns-operator \ --template='{{.status.installplan.name}}{{"\n"}}'Verify that the status of the install plan is
by running the following command:Complete$ oc -n external-dns-operator \ get ip <install_plan_name> \ --template='{{.status.phase}}{{"\n"}}'Verify that the status of the
pod isexternal-dns-operatorby running the following command:Running$ oc -n external-dns-operator get podExample output
NAME READY STATUS RESTARTS AGE external-dns-operator-5584585fd7-5lwqm 2/2 Running 0 11mVerify that the catalog source of the subscription is
by running the following command:redhat-operators$ oc -n external-dns-operator get subscriptionExample output
NAME PACKAGE SOURCE CHANNEL external-dns-operator external-dns-operator redhat-operators stable-v1Check the
version by running the following command:external-dns-operator$ oc -n external-dns-operator get csvExample output
NAME DISPLAY VERSION REPLACES PHASE external-dns-operator.v<1.y.z> ExternalDNS Operator <1.y.z> Succeeded
18.4. External DNS Operator configuration parameters Link kopierenLink in die Zwischenablage kopiert!
The External DNS Operator includes the following configuration parameters.
18.4.1. External DNS Operator configuration parameters Link kopierenLink in die Zwischenablage kopiert!
The External DNS Operator includes the following configuration parameters:
| Parameter | Description |
|---|---|
|
| Enables the type of a cloud provider.
|
|
| Enables you to specify DNS zones by their domains. If you do not specify zones, the
|
|
| Enables you to specify AWS zones by their domains. If you do not specify domains, the
|
|
| Enables you to specify the source for the DNS records,
|
18.5. Creating DNS records on AWS Link kopierenLink in die Zwischenablage kopiert!
You can create DNS records on AWS and AWS GovCloud by using External DNS Operator.
18.5.1. Creating DNS records on an public hosted zone for AWS by using Red Hat External DNS Operator Link kopierenLink in die Zwischenablage kopiert!
You can create DNS records on a public hosted zone for AWS by using the Red Hat External DNS Operator. You can use the same instructions to create DNS records on a hosted zone for AWS GovCloud.
Procedure
Check the user. The user must have access to the
namespace. If you don’t have the credentials, as you can fetch the credentials from thekube-systemnamespace to use the cloud provider client:kube-system$ oc whoamiExample output
system:adminFetch the values from aws-creds secret present in
namespace.kube-system$ export AWS_ACCESS_KEY_ID=$(oc get secrets aws-creds -n kube-system --template={{.data.aws_access_key_id}} | base64 -d) $ export AWS_SECRET_ACCESS_KEY=$(oc get secrets aws-creds -n kube-system --template={{.data.aws_secret_access_key}} | base64 -d)Get the routes to check the domain:
$ oc get routes --all-namespaces | grep consoleExample output
openshift-console console console-openshift-console.apps.testextdnsoperator.apacshift.support console https reencrypt/Redirect None openshift-console downloads downloads-openshift-console.apps.testextdnsoperator.apacshift.support downloads http edge/Redirect NoneGet the list of dns zones to find the one which corresponds to the previously found route’s domain:
$ aws route53 list-hosted-zones | grep testextdnsoperator.apacshift.supportExample output
HOSTEDZONES terraform /hostedzone/Z02355203TNN1XXXX1J6O testextdnsoperator.apacshift.support. 5Create
resource forExternalDNSsource:route$ cat <<EOF | oc create -f - apiVersion: externaldns.olm.openshift.io/v1beta1 kind: ExternalDNS metadata: name: sample-aws1 spec: domains: - filterType: Include2 matchType: Exact3 name: testextdnsoperator.apacshift.support4 provider: type: AWS5 source:6 type: OpenShiftRoute7 openshiftRouteOptions: routerName: default8 EOF- 1
- Defines the name of external DNS resource.
- 2
- By default all hosted zones are selected as potential targets. You can include a hosted zone that you need.
- 3
- The matching of the target zone’s domain has to be exact (as opposed to regular expression match).
- 4
- Specify the exact domain of the zone you want to update. The hostname of the routes must be subdomains of the specified domain.
- 5
- Defines the
AWS Route53DNS provider. - 6
- Defines options for the source of DNS records.
- 7
- Defines OpenShift
routeresource as the source for the DNS records which gets created in the previously specified DNS provider. - 8
- If the source is
OpenShiftRoute, then you can pass the OpenShift Ingress Controller name. External DNS Operator selects the canonical hostname of that router as the target while creating CNAME record.
Check the records created for OCP routes using the following command:
$ aws route53 list-resource-record-sets --hosted-zone-id Z02355203TNN1XXXX1J6O --query "ResourceRecordSets[?Type == 'CNAME']" | grep console
18.5.2. Creating DNS records in a different AWS Account using a shared VPC Link kopierenLink in die Zwischenablage kopiert!
You can use the ExternalDNS Operator to create DNS records in a different AWS account using a shared Virtual Private Cloud (VPC). By using a shared VPC, an organization can connect resources from multiple projects to a common VPC network. Organizations can then use VPC sharing to use a single Route 53 instance across multiple AWS accounts.
Prerequisites
- You have created two Amazon AWS accounts: one with a VPC and a Route 53 private hosted zone configured (Account A), and another for installing a cluster (Account B).
- You have created an IAM Policy and IAM Role with the appropriate permissions in Account A for Account B to create DNS records in the Route 53 hosted zone of Account A.
- You have installed a cluster in Account B into the existing VPC for Account A.
- You have installed the ExternalDNS Operator in the cluster in Account B.
Procedure
Get the Role ARN of the IAM Role that you created to allow Account B to access Account A’s Route 53 hosted zone by running the following command:
$ aws --profile account-a iam get-role --role-name user-rol1 | head -1Example output
ROLE arn:aws:iam::1234567890123:role/user-rol1 2023-09-14T17:21:54+00:00 3600 / AROA3SGB2ZRKRT5NISNJN user-rol1Locate the private hosted zone to use with Account A’s credentials by running the following command:
$ aws --profile account-a route53 list-hosted-zones | grep testextdnsoperator.apacshift.supportExample output
HOSTEDZONES terraform /hostedzone/Z02355203TNN1XXXX1J6O testextdnsoperator.apacshift.support. 5Create the
object by running the following command:ExternalDNS$ cat <<EOF | oc create -f - apiVersion: externaldns.olm.openshift.io/v1beta1 kind: ExternalDNS metadata: name: sample-aws spec: domains: - filterType: Include matchType: Exact name: testextdnsoperator.apacshift.support provider: type: AWS aws: assumeRole: arn: arn:aws:iam::12345678901234:role/user-rol11 source: type: OpenShiftRoute openshiftRouteOptions: routerName: default EOF- 1
- Specify the Role ARN to have DNS records created in Account A.
Check the records created for OpenShift Container Platform (OCP) routes by using the following command:
$ aws --profile account-a route53 list-resource-record-sets --hosted-zone-id Z02355203TNN1XXXX1J6O --query "ResourceRecordSets[?Type == 'CNAME']" | grep console-openshift-console
18.6. Creating DNS records on Azure Link kopierenLink in die Zwischenablage kopiert!
You can create DNS records on Azure by using the External DNS Operator.
Using the External DNS Operator on a Microsoft Entra Workload ID-enabled cluster or a cluster that runs in Microsoft Azure Government (MAG) regions is not supported.
18.6.1. Creating DNS records on an Azure public DNS zone Link kopierenLink in die Zwischenablage kopiert!
You can create DNS records on a public DNS zone for Azure by using the External DNS Operator.
Prerequisites
- You must have administrator privileges.
-
The user must have access to the
adminnamespace.kube-system
Procedure
Fetch the credentials from the
namespace to use the cloud provider client by running the following command:kube-system$ CLIENT_ID=$(oc get secrets azure-credentials -n kube-system --template={{.data.azure_client_id}} | base64 -d)$ CLIENT_SECRET=$(oc get secrets azure-credentials -n kube-system --template={{.data.azure_client_secret}} | base64 -d)$ RESOURCE_GROUP=$(oc get secrets azure-credentials -n kube-system --template={{.data.azure_resourcegroup}} | base64 -d)$ SUBSCRIPTION_ID=$(oc get secrets azure-credentials -n kube-system --template={{.data.azure_subscription_id}} | base64 -d)$ TENANT_ID=$(oc get secrets azure-credentials -n kube-system --template={{.data.azure_tenant_id}} | base64 -d)Log in to Azure by running the following command:
$ az login --service-principal -u "${CLIENT_ID}" -p "${CLIENT_SECRET}" --tenant "${TENANT_ID}"Get a list of routes by running the following command:
$ oc get routes --all-namespaces | grep consoleExample output
openshift-console console console-openshift-console.apps.test.azure.example.com console https reencrypt/Redirect None openshift-console downloads downloads-openshift-console.apps.test.azure.example.com downloads http edge/Redirect NoneGet a list of DNS zones by running the following command:
$ az network dns zone list --resource-group "${RESOURCE_GROUP}"Create a YAML file, for example,
, that defines theexternal-dns-sample-azure.yamlobject:ExternalDNSExample
external-dns-sample-azure.yamlfileapiVersion: externaldns.olm.openshift.io/v1beta1 kind: ExternalDNS metadata: name: sample-azure1 spec: zones: - "/subscriptions/1234567890/resourceGroups/test-azure-xxxxx-rg/providers/Microsoft.Network/dnszones/test.azure.example.com"2 provider: type: Azure3 source: openshiftRouteOptions:4 routerName: default5 type: OpenShiftRoute6 - 1
- Specifies the External DNS name.
- 2
- Defines the zone ID.
- 3
- Defines the provider type.
- 4
- You can define options for the source of DNS records.
- 5
- If the source type is
OpenShiftRoute, you can pass the OpenShift Ingress Controller name. External DNS selects the canonical hostname of that router as the target while creating CNAME record. - 6
- Defines the
routeresource as the source for the Azure DNS records.
Check the DNS records created for OpenShift Container Platform routes by running the following command:
$ az network dns record-set list -g "${RESOURCE_GROUP}" -z test.azure.example.com | grep consoleNoteTo create records on private hosted zones on private Azure DNS, you need to specify the private zone under the
field which populates the provider type tozonesin theazure-private-dnscontainer arguments.ExternalDNS
18.7. Creating DNS records on Google Cloud Link kopierenLink in die Zwischenablage kopiert!
You can create DNS records on Google Cloud by using the External DNS Operator.
Using the External DNS Operator on a cluster with Google Cloud Workload Identity enabled is not supported. For more information about the Google Cloud Workload Identity, see Google Cloud Workload Identity.
18.7.1. Creating DNS records on a public managed zone for Google Cloud Link kopierenLink in die Zwischenablage kopiert!
You can create DNS records on a public managed zone for Google Cloud by using the External DNS Operator.
Prerequisites
- You must have administrator privileges.
Procedure
Copy the
secret in thegcp-credentialsfile by running the following command:encoded-gcloud.json$ oc get secret gcp-credentials -n kube-system --template='{{$v := index .data "service_account.json"}}{{$v}}' | base64 -d - > decoded-gcloud.jsonExport your Google credentials by running the following command:
$ export GOOGLE_CREDENTIALS=decoded-gcloud.jsonActivate your account by using the following command:
$ gcloud auth activate-service-account <client_email as per decoded-gcloud.json> --key-file=decoded-gcloud.jsonSet your project by running the following command:
$ gcloud config set project <project_id as per decoded-gcloud.json>Get a list of routes by running the following command:
$ oc get routes --all-namespaces | grep consoleExample output
openshift-console console console-openshift-console.apps.test.gcp.example.com console https reencrypt/Redirect None openshift-console downloads downloads-openshift-console.apps.test.gcp.example.com downloads http edge/Redirect NoneGet a list of managed zones by running the following command:
$ gcloud dns managed-zones list | grep test.gcp.example.comExample output
qe-cvs4g-private-zone test.gcp.example.comCreate a YAML file, for example,
, that defines theexternal-dns-sample-gcp.yamlobject:ExternalDNSExample
external-dns-sample-gcp.yamlfileapiVersion: externaldns.olm.openshift.io/v1beta1 kind: ExternalDNS metadata: name: sample-gcp1 spec: domains: - filterType: Include2 matchType: Exact3 name: test.gcp.example.com4 provider: type: GCP5 source: openshiftRouteOptions:6 routerName: default7 type: OpenShiftRoute8 - 1
- Specifies the External DNS name.
- 2
- By default, all hosted zones are selected as potential targets. You can include your hosted zone.
- 3
- The domain of the target must match the string defined by the
namekey. - 4
- Specify the exact domain of the zone you want to update. The hostname of the routes must be subdomains of the specified domain.
- 5
- Defines the provider type.
- 6
- You can define options for the source of DNS records.
- 7
- If the source type is
OpenShiftRoute, you can pass the OpenShift Ingress Controller name. External DNS selects the canonical hostname of that router as the target while creating CNAME record. - 8
- Defines the
routeresource as the source for Google Cloud DNS records.
Check the DNS records created for OpenShift Container Platform routes by running the following command:
$ gcloud dns record-sets list --zone=qe-cvs4g-private-zone | grep console
18.8. Creating DNS records on Infoblox Link kopierenLink in die Zwischenablage kopiert!
You can create DNS records on Infoblox by using the External DNS Operator.
18.8.1. Creating DNS records on a public DNS zone on Infoblox Link kopierenLink in die Zwischenablage kopiert!
You can create DNS records on a public DNS zone on Infoblox by using the External DNS Operator.
Prerequisites
-
You have access to the OpenShift CLI ().
oc - You have access to the Infoblox UI.
Procedure
Create a
object with Infoblox credentials by running the following command:secret$ oc -n external-dns-operator create secret generic infoblox-credentials --from-literal=EXTERNAL_DNS_INFOBLOX_WAPI_USERNAME=<infoblox_username> --from-literal=EXTERNAL_DNS_INFOBLOX_WAPI_PASSWORD=<infoblox_password>Get a list of routes by running the following command:
$ oc get routes --all-namespaces | grep consoleExample Output
openshift-console console console-openshift-console.apps.test.example.com console https reencrypt/Redirect None openshift-console downloads downloads-openshift-console.apps.test.example.com downloads http edge/Redirect NoneCreate a YAML file, for example,
, that defines theexternal-dns-sample-infoblox.yamlobject:ExternalDNSExample
external-dns-sample-infoblox.yamlfileapiVersion: externaldns.olm.openshift.io/v1beta1 kind: ExternalDNS metadata: name: sample-infoblox1 spec: provider: type: Infoblox2 infoblox: credentials: name: infoblox-credentials gridHost: ${INFOBLOX_GRID_PUBLIC_IP} wapiPort: 443 wapiVersion: "2.3.1" domains: - filterType: Include matchType: Exact name: test.example.com source: type: OpenShiftRoute3 openshiftRouteOptions: routerName: default4 - 1
- Specifies the External DNS name.
- 2
- Defines the provider type.
- 3
- You can define options for the source of DNS records.
- 4
- If the source type is
OpenShiftRoute, you can pass the OpenShift Ingress Controller name. External DNS selects the canonical hostname of that router as the target while creating CNAME record.
Create the
resource on Infoblox by running the following command:ExternalDNS$ oc create -f external-dns-sample-infoblox.yamlFrom the Infoblox UI, check the DNS records created for
routes:console-
Click Data Management
DNS Zones. - Select the zone name.
-
Click Data Management
18.9. Configuring the cluster-wide proxy on the External DNS Operator Link kopierenLink in die Zwischenablage kopiert!
After configuring the cluster-wide proxy, the Operator Lifecycle Manager (OLM) triggers automatic updates to all of the deployed Operators with the new contents of the
HTTP_PROXY
HTTPS_PROXY
NO_PROXY
18.9.1. Trusting the certificate authority of the cluster-wide proxy Link kopierenLink in die Zwischenablage kopiert!
You can configure the External DNS Operator to trust the certificate authority of the cluster-wide proxy.
Procedure
Create the config map to contain the CA bundle in the
namespace by running the following command:external-dns-operator$ oc -n external-dns-operator create configmap trusted-caTo inject the trusted CA bundle into the config map, add the
label to the config map by running the following command:config.openshift.io/inject-trusted-cabundle=true$ oc -n external-dns-operator label cm trusted-ca config.openshift.io/inject-trusted-cabundle=trueUpdate the subscription of the External DNS Operator by running the following command:
$ oc -n external-dns-operator patch subscription external-dns-operator --type='json' -p='[{"op": "add", "path": "/spec/config", "value":{"env":[{"name":"TRUSTED_CA_CONFIGMAP_NAME","value":"trusted-ca"}]}}]'
Verification
After the deployment of the External DNS Operator is completed, verify that the trusted CA environment variable is added to the
deployment by running the following command:external-dns-operator$ oc -n external-dns-operator exec deploy/external-dns-operator -c external-dns-operator -- printenv TRUSTED_CA_CONFIGMAP_NAMEExample output
trusted-ca