forked from k-space/kube
81 lines
1.9 KiB
YAML
81 lines
1.9 KiB
YAML
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: external-dns-k6
|
|
namespace: bind
|
|
spec:
|
|
revisionHistoryLimit: 0
|
|
selector:
|
|
matchLabels: &selectorLabels
|
|
app.kubernetes.io/name: external-dns
|
|
domain: k6.ee
|
|
template:
|
|
metadata:
|
|
labels: *selectorLabels
|
|
spec:
|
|
serviceAccountName: external-dns
|
|
resources:
|
|
limits:
|
|
cpu: 100m
|
|
memory: 100Mi
|
|
requests:
|
|
cpu: 2m
|
|
memory: 35Mi
|
|
containers:
|
|
- name: external-dns
|
|
image: registry.k8s.io/external-dns/external-dns:v0.14.2
|
|
envFrom:
|
|
- secretRef:
|
|
name: tsig-secret
|
|
args:
|
|
- --log-level=debug
|
|
- --events
|
|
- --registry=noop
|
|
- --provider=rfc2136
|
|
- --source=service
|
|
- --source=crd
|
|
- --domain-filter=k6.ee
|
|
- --rfc2136-tsig-axfr
|
|
- --rfc2136-host=172.20.0.2
|
|
- --rfc2136-port=53
|
|
- --rfc2136-zone=k6.ee
|
|
- --rfc2136-tsig-keyname=readwrite
|
|
- --rfc2136-tsig-secret-alg=hmac-sha512
|
|
- --rfc2136-tsig-secret=$(TSIG_SECRET)
|
|
# https://github.com/kubernetes-sigs/external-dns/issues/2446
|
|
---
|
|
apiVersion: externaldns.k8s.io/v1alpha1
|
|
kind: DNSEndpoint
|
|
metadata:
|
|
name: k6
|
|
namespace: bind
|
|
spec:
|
|
endpoints:
|
|
- dnsName: k6.ee
|
|
recordTTL: 300
|
|
recordType: SOA
|
|
targets:
|
|
- "ns1.k-space.ee. hostmaster.k-space.ee. (1 300 300 300 300)"
|
|
- dnsName: k6.ee
|
|
recordTTL: 300
|
|
recordType: NS
|
|
targets:
|
|
- ns1.k-space.ee
|
|
- ns2.k-space.ee
|
|
- dnsName: ns1.k-space.ee
|
|
recordTTL: 300
|
|
recordType: A
|
|
targets:
|
|
- 193.40.103.2
|
|
- dnsName: ns2.k-space.ee
|
|
recordTTL: 300
|
|
recordType: A
|
|
targets:
|
|
- 62.65.250.2
|
|
- dnsName: k-space.ee
|
|
recordTTL: 300
|
|
recordType: MX
|
|
targets:
|
|
- 10 mail.k-space.ee
|