Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Documented Azure DNS deployment #1525

Merged
merged 3 commits into from
Jun 6, 2024
Merged

Documented Azure DNS deployment #1525

merged 3 commits into from
Jun 6, 2024

Conversation

infbase
Copy link
Contributor

@infbase infbase commented Apr 2, 2024

Updated Helm chart, docs and examples for connecting to Azure Public DNS service.

Users should now be able to connect external-dns to an existing Azure Public DNS zone by setting the correct helm values, as demonstrated in the example deployment added to the docs in this PR.

Related to issue #642

@infbase infbase changed the title Azure dns Documented Azure DNS deployment Apr 2, 2024
Copy link

netlify bot commented Apr 2, 2024

Deploy Preview for k8gb-preview ready!

Name Link
🔨 Latest commit 28c84fc
🔍 Latest deploy log https://app.netlify.com/sites/k8gb-preview/deploys/666183e5f1ea970008d1df65
😎 Deploy Preview https://deploy-preview-1525--k8gb-preview.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

Copy link
Member

@ytsarev ytsarev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@infbase thank you so much for the contribution! Overall, it looks great, my main concern is that the Azure clientSecret is getting exposed as plain text. Can we find a way to avoid it? Happy to collaborate on this topic and try to find a solution together.

"aadClientId": "{{ .Values.azuredns.aadClientId }}",
{{- end -}}
{{- if .Values.azuredns.aadClientSecret -}}
"aadClientSecret": "{{ .Values.azuredns.aadClientSecret }}",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does it mean we will have the client secret as plain text in the values.yaml? We probably should keep it in the Secret

@@ -0,0 +1,9 @@
{{- if and .Values.azuredns.enabled .Values.azuredns.createAuthSecret }}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we probably should create this Secret with Credentials outside of the helm chart and point to it from the values.yaml for k8gb to pick up

},
"aadClientSecret": {
"type": "string"
},
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As pointed out above, I have concerns about propagating aadClientId and aadClientSecret as plaintext values. Can we keep them in some input Secret? I appreciate that it might be tricky as we construct the external-dns Secret data in external-dns.azure-credentials template function.

@ytsarev
Copy link
Member

ytsarev commented May 29, 2024

@infbase as discussed in community , let's provide ability to reference existing secret for more secure scenario

ytsarev
ytsarev previously approved these changes Jun 6, 2024
Copy link
Member

@ytsarev ytsarev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

To not to bloat this PR, i created separate #1585 to track the existing secret reference case.

@infbase thanks a lot for your contribution!

@ytsarev ytsarev merged commit ffaac02 into k8gb-io:master Jun 6, 2024
12 checks passed
@ytsarev ytsarev mentioned this pull request Jun 23, 2024
4 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants