Closed bodanc closed 6 months ago
+1
This appears not limited to Traefik. In AzureAKS using Istio the same thing occurs. The expected extra apiGroups are not added when specifying extra args in the values.yaml Manually applying the missing apigroups to the cluster role fixes the problem. (assuming all other security aspects are correct)
k8s: 1.27.3 helm: v3.12.3
The helm template. charts/external-dns/templates/clusterrole.yaml
has the sections needed but they don't appear to apply properly.
Chart installation against cluster
$ helm upgrade -f ./azuredns.yaml --namespace external-dns --install external-dns external-dns/external-dns
Release "external-dns" has been upgraded. Happy Helming!
NAME: external-dns
LAST DEPLOYED: Wed Nov 22 10:33:02 2023
NAMESPACE: external-dns
STATUS: deployed
REVISION: 6
TEST SUITE: None
NOTES:
***********************************************************************
* External DNS *
***********************************************************************
Chart version: 1.13.1
App version: 0.13.6
Image tag: registry.k8s.io/external-dns/external-dns:v0.13.6
***********************************************************************
azuredns.yaml
used above
fullnameOverride: external-dns
serviceAccount:
annotations:
azure.workload.identity/client-id: 00000000-0000-0000-0000-000000000000
podLabels:
azure.workload.identity/use: "true"
provider: azure
extraArgs:
- --domain-filter=somedomain.com
- --source=istio-virtualservice
secretConfiguration:
enabled: true
mountPath: "/etc/kubernetes/"
data:
azure.json: |
{
"tenantId": "00000000-0000-0000-0000-000000000000",
"subscriptionId": "00000000-0000-0000-0000-000000000000",
"resourceGroup": "networking",
"useWorkloadIdentityExtension": true
}
Missing apiGroups that need manually added to ClusterRole/external-dns
- apiGroups:
- networking.istio.io
resources:
- virtualservices
- gateways
verbs:
- get
- watch
- list
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
What happened:
I deployed external-dns via Helm in my AWS EKS cluster:
My external-dns Helm values.yaml file contains only the following config. changes:
Very soon after having been deployed, the external-dns pod begins to restart in a loop:
If, however, I patch the
external-dns-default
ClusterRole, everything works:What you expected to happen:
Unless I'm mistaken or missing something, I would expect that:
As per: https://github.com/kubernetes-sigs/external-dns/blob/master/docs/tutorials/traefik-proxy.md#manifest-for-clusters-with-rbac-enabled
IF external-dns is passed the --source=traefik-proxy arg at startup, the external-dns-default ClusterRole will dynamically be adjusted with the correct Traefik apiGroups.
How to reproduce it (as minimally and precisely as possible):
Please see above :)
Anything else we need to know?:
Environment:
external-dns --version
): v0.13.6