forked from k-space/kube
32 lines
1.1 KiB
Markdown
32 lines
1.1 KiB
Markdown
# Bind setup
|
|
|
|
The Bind primary resides outside Kubernetes at `193.40.103.2` and
|
|
it's internally reachable via `172.20.0.2`
|
|
|
|
Bind secondaries are hosted inside Kubernetes and load balanced behind `62.65.250.2`
|
|
|
|
Ingresses and DNSEndpoints referring to `k-space.ee`, `kspace.ee`, `k6.ee`
|
|
are picked up automatically by `external-dns` and updated on primary.
|
|
|
|
The primary triggers notification events to `172.20.53.{1..3}`
|
|
which are internally exposed IP-s of the secondaries.
|
|
|
|
# Secrets
|
|
|
|
To configure TSIG secrets:
|
|
|
|
```
|
|
kubectl create secret generic -n bind bind-readonly-secret \
|
|
--from-file=readonly.key
|
|
kubectl create secret generic -n bind bind-readwrite-secret \
|
|
--from-file=readwrite.key
|
|
kubectl create secret generic -n bind external-dns
|
|
kubectl -n bind delete secret tsig-secret
|
|
kubectl -n bind create secret generic tsig-secret \
|
|
--from-literal=TSIG_SECRET=$(cat readwrite.key | grep secret | cut -d '"' -f 2)
|
|
kubectl -n cert-manager delete secret tsig-secret
|
|
kubectl -n cert-manager create secret generic tsig-secret \
|
|
--from-literal=TSIG_SECRET=$(cat readwrite.key | grep secret | cut -d '"' -f 2)
|
|
```
|
|
|