Skip to content

Latest commit

 

History

History
44 lines (39 loc) · 1.73 KB

provider_rfc2136.md

File metadata and controls

44 lines (39 loc) · 1.73 KB

Enabling RFC2136 for ExternalDNS

In order to enable the provider RFC2136 on ExternalDNS, the following rfc2136.* parameters should be changed in the values.yaml of the K8GB helm chart:

  • One authentication method should be enabled on the values:

    • Insecure
      • This method doesn't use any authentication and anonymous updates to the DNS records can be executed
    • TSIG
      • This method uses TSIG authentication that relies on a token provided for the DNS records update.
    • GSS-TSIG
      • This method uses GSS-TSIG authentication, which is a variation of the TSIG method, but uses Kerberos for the generation of tokens for authentication and authorization
      • Method used by Active Directory Windows DNS
  • GSS-TSIG

    • kerberos-username
      • this key should have the value of a Active Directory user account that has permissions for DNS updates
    • kerberos-password
      • password of the user account that will be used. Be aware that this isn't encrypted and so far ExternalDNS doesn't support adding a Secret reference for this value, so it will be stored in clear text
    • kerberos-realm
      • domain that will be used for authentication of the user

Sample for GSS-TSIG authentication

rfc2136:
  enabled: true
  rfc2136Opts:
    - host: yourAcDc.k8gb.local
    - port: 53
  rfc2136auth:
    insecure:
      enabled: false
    tsig:
      enabled: false
      tsigCreds:
        - tsig-secret-alg: hmac-sha256
        - tsig-keyname: externaldns-key
    gssTsig:
      enabled: true
      gssTsigCreds:
        - kerberos-username: someServiceAccount
        - kerberos-password: insecurePlainTextPassword
        - kerberos-realm: yourKerberosRealm.domain