You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Follow the steps under [Deploy ExternalDNS](#deploy-externaldns) using either RBAC or non-RBAC. Make sure to uncomment the section that mounts volumes, so that the credentials can be mounted.
234
234
235
235
> [!TIP]
236
-
> By default ExternalDNS takes the profile named `default` from the credentials file. If you want to use a different
237
-
> profile, you can set the environment variable `EXTERNAL_DNS_AWS_PROFILE` to the desired profile name or use the
236
+
> By default ExternalDNS takes the profile named `default` from the credentials file. If you want to use a different
237
+
> profile, you can set the environment variable `EXTERNAL_DNS_AWS_PROFILE` to the desired profile name or use the
238
238
> `--aws-profile` command line argument. It is even possible to use more than one profile at ones, separated by space in
239
-
> the environment variable `EXTERNAL_DNS_AWS_PROFILE` or by using `--aws-profile` multiple times. In this case
240
-
> ExternalDNS looks for the hosted zones in all profiles and keeps maintaining a mapping table between zone and profile
239
+
> the environment variable `EXTERNAL_DNS_AWS_PROFILE` or by using `--aws-profile` multiple times. In this case
240
+
> ExternalDNS looks for the hosted zones in all profiles and keeps maintaining a mapping table between zone and profile
241
241
> in order to be able to modify the zones in the correct profile.
242
242
243
243
### IAM Roles for Service Accounts
@@ -987,3 +987,67 @@ There are 3 options to control batch size for AWS provider:
987
987
988
988
Default values for flags `aws-batch-change-size-bytes` and `aws-batch-change-size-values` are taken from [AWS documentation](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/DNSLimitations.html#limits-api-requests) for Route53 API. **You should not change those values until you really have to.** <br>
989
989
Because those limits are in place, `aws-batch-change-size` can be set to any value: Even if your batch size is `4000` records, your change will be split to separate batches due to bytes/values size limits and apply request will be finished without issues.
990
+
991
+
992
+
## Using CRD source to manage DNS records in AWS
993
+
994
+
[CRD source](https://github.com/kubernetes-sigs/external-dns/blob/master/docs/contributing/crd-source.md) provides a generic mechanism and declarative way to manage DNS records in AWS using external-dns.
995
+
996
+
**Not all the record types are enabled by default so we must enable the required record types using `--managed-record-types`.**
Copy file name to clipboardExpand all lines: docs/tutorials/cloudflare.md
+65-2Lines changed: 65 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ Then apply one of the following manifests file to deploy ExternalDNS.
58
58
Create a values.yaml file to configure ExternalDNS to use CloudFlare as the DNS provider. This file should include the necessary environment variables:
59
59
60
60
```yaml
61
-
provider:
61
+
provider:
62
62
name: cloudflare
63
63
env:
64
64
- name: CF_API_KEY
@@ -76,7 +76,7 @@ env:
76
76
Use this in your values.yaml, if you are using API Token:
77
77
78
78
```yaml
79
-
provider:
79
+
provider:
80
80
name: cloudflare
81
81
env:
82
82
- name: CF_API_TOKEN
@@ -307,3 +307,66 @@ Using the `external-dns.alpha.kubernetes.io/cloudflare-proxied: "true"` annotati
307
307
Using the `external-dns.alpha.kubernetes.io/cloudflare-region-key` annotation on your ingress, you can restrict which data centers can decrypt and serve HTTPS traffic. A list of available options can be seen [here](https://developers.cloudflare.com/data-localization/regional-services/get-started/).
308
308
309
309
If not set the value will default to `global`.
310
+
311
+
## Using CRD source to manage DNS records in Cloudflare
312
+
313
+
[CRD source](https://github.com/kubernetes-sigs/external-dns/blob/master/docs/contributing/crd-source.md) provides a generic mechanism and declarative way to manage DNS records in Cloudflare using external-dns.
314
+
315
+
**Not all the record types are enabled by default so we must enable the required record types using `--managed-record-types`.**
[CRD source](https://github.com/kubernetes-sigs/external-dns/blob/master/docs/contributing/crd-source.md) provides a generic mechanism and declarative way to manage DNS records in PowerDNS using external-dns.
180
180
181
+
Not all the record types are enabled by default so we can enable the required record types using `--managed-record-types`.
0 commit comments