Skip to content

Commit d3212c3

Browse files
Fix headings, whitespace
Fixed headings around "Secure Updates" . Also fixed a couple of whitespace issues.
1 parent 6b51068 commit d3212c3

File tree

1 file changed

+11
-9
lines changed

1 file changed

+11
-9
lines changed

docs/tutorials/rfc2136.md

+11-9
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,8 @@ To use external-dns with BIND: generate/procure a key, configure DNS and add a
66
deployment of external-dns.
77

88
### Server credentials:
9-
- RFC2136 was developed for and tested with
10-
[BIND](https://www.isc.org/downloads/bind/) DNS server. This documentation
11-
assumes that you already have a configured and working server. If you don't,
9+
- RFC2136 was developed for and tested with [BIND](https://www.isc.org/downloads/bind/) DNS server.
10+
This documentation assumes that you already have a configured and working server. If you don't,
1211
please check BIND documents or tutorials.
1312
- If your DNS is provided for you, ask for a TSIG key authorized to update and
1413
transfer the zone you wish to update. The key will look something like below.
@@ -134,7 +133,11 @@ tutorial and are covered in the main documentation.
134133

135134
### Test with external-dns installed on local machine (optional)
136135
You may install external-dns and test on a local machine by running:
137-
```external-dns --txt-owner-id k8s --provider rfc2136 --rfc2136-host=192.168.0.1 --rfc2136-port=53 --rfc2136-zone=k8s.example.org --rfc2136-tsig-secret=96Ah/a2g0/nLeFGK+d/0tzQcccf9hCEIy34PoXX2Qg8= --rfc2136-tsig-secret-alg=hmac-sha256 --rfc2136-tsig-keyname=externaldns-key --rfc2136-tsig-axfr --source ingress --once --domain-filter=k8s.example.org --dry-run```
136+
137+
```
138+
external-dns --txt-owner-id k8s --provider rfc2136 --rfc2136-host=192.168.0.1 --rfc2136-port=53 --rfc2136-zone=k8s.example.org --rfc2136-tsig-secret=96Ah/a2g0/nLeFGK+d/0tzQcccf9hCEIy34PoXX2Qg8= --rfc2136-tsig-secret-alg=hmac-sha256 --rfc2136-tsig-keyname=externaldns-key --rfc2136-tsig-axfr --source ingress --once --domain-filter=k8s.example.org --dry-run
139+
```
140+
138141
- host should be the IP of your master DNS server.
139142
- tsig-secret should be changed to match your secret.
140143
- tsig-keyname needs to match the keyname you used (if you changed it).
@@ -309,7 +312,7 @@ You'll want to configure `external-dns` similarly to the following:
309312

310313
### Secure Updates Using RFC3645 (GSS-TSIG)
311314

312-
### DNS-side configuration
315+
#### DNS-side configuration
313316

314317
1. Create a DNS zone
315318
2. Enable secure dynamic updates for the zone
@@ -318,7 +321,7 @@ You'll want to configure `external-dns` similarly to the following:
318321
If you see any error messages which indicate that `external-dns` was somehow not able to fetch
319322
existing DNS records from your DNS server, this could mean that you forgot about step 3.
320323

321-
#### Kerberos Configuration
324+
##### Kerberos Configuration
322325

323326
DNS with secure updates relies upon a valid Kerberos configuration running within the `external-dns` container. At this time, you will need to create a ConfigMap for the `external-dns` container to use and mount it in your deployment. Below is an example of a working Kerberos configuration inside a ConfigMap definition. This may be different depending on many factors in your environment:
324327

@@ -356,8 +359,7 @@ data:
356359
yourdomain.com = YOUR-REALM.COM
357360
.yourdomain.com = YOUR-REALM.COM
358361
```
359-
In most cases, the realm name will probably be the same as the domain name, so you can simply replace
360-
`YOUR-REALM.COM` with something like `YOURDOMAIN.COM`.
362+
In most cases, the realm name will probably be the same as the domain name, so you can simply replace `YOUR-REALM.COM` with something like `YOURDOMAIN.COM`.
361363

362364
Once the ConfigMap is created, the container `external-dns` container needs to be told to mount that ConfigMap as a volume at the default Kerberos configuration location. The pod spec should include a similar configuration to the following:
363365

@@ -376,7 +378,7 @@ Once the ConfigMap is created, the container `external-dns` container needs to b
376378
...
377379
```
378380

379-
#### `external-dns` configuration
381+
##### `external-dns` configuration
380382

381383
You'll want to configure `external-dns` similarly to the following:
382384

0 commit comments

Comments
 (0)