Closed uanid closed 7 months ago
Wouldn't it be simpler to use a domain filter or domain exclusion and put the load balancers you don't want published outside the filter?
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
i have this requirement but for the traefik-proxy
.
My usecase is app.example.com -> Cloudfront -> app.lb.example.com
on normal ingress objects it looks like this
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: app
annotations:
alb.ingress.kubernetes.io/scheme: internet-facing
external-dns.alpha.kubernetes.io/hostname: app.lb.example.com
external-dns.alpha.kubernetes.io/ingress-hostname-source: annotation-only
spec:
tls:
- secretName: 'app-certificate'
ingressClassName: default
rules:
- host: app.example.com
This works and only manages app.lb.example.com
But for a non generic ingress that doesnt support the ingress-hostname-source
annotation it then tries to create records for both app.lb.example.com
and app.example.com
domain filters would work i.e --domain-filter=.lb.example.com
but only if we never wanted any .example.com
domains managed which isnt the case, so then we would end up excluding the app.example.com
domains which would work. but the problem with this is it ends up being managed at the helm/configuration side instead of app side kinda defeating the purpose of the magic of version controlled crds i.e testing via branch pinning
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
What would you like to be added: It would be great if Istio VirtualService could support the external-dns.alpha.kubernetes.io/ingress-hostname-source annotation. The ingress-hostname-source can have values such as "annotation-only" or "defined-hosts-only" to determine where to get the ingress' hostname from.
Why is this needed: I would like to restrict the usage of the VirtualService hostname while using nested LoadBalancers. For example:
In this case, I would like to limit the records created by External-DNS for the VirtualService hostname to
myapp-direct.example.com
. Sincev1.networking.k8s.io/Ingress source
already provides such an option, it would be helpful to extend the same functionality to VirtualService.