-
Notifications
You must be signed in to change notification settings - Fork 430
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ Add support for private dns zones #1033
✨ Add support for private dns zones #1033
Conversation
063b827
to
e4fdf8b
Compare
e4fdf8b
to
102fdd4
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Had a couple questions. Looks great!
b481e14
to
c9174dd
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
all good except for one small kind of nit
c9174dd
to
f901354
Compare
/lgtm |
Does Azure Private DNS allow setting a recursive resolver? My very limited experience with it seemed to cause DNS issues, but there's a good chance it wasn't configured properly. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Couple requested changes. Per the sorted imports, I'll open a PR with a linter rule to enforce.
@jadarsie what do you think of private DNS entries with regard to Azure Stack? |
@voor it does not, but Azure VMs are already configured to have "a recursive DNS service that is provided separately as part of Azure's infrastructure" (source https://docs.microsoft.com/en-us/azure/dns/dns-domain-delegation#resolution-and-delegation). What kind of issues did you run into? I have not observed any issues while testing this so far. |
db27e15
to
0bf5c23
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/retest |
(testing something unrelated) /test pull-cluster-api-provider-azure-capi-e2e |
/test pull-cluster-api-provider-azure-capi-e2e |
/test pull-cluster-api-provider-azure-capi-e2e fixed the cred issue in #1043 |
/retest |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: nader-ziada The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
different flake :( /retest |
/test pull-cluster-api-provider-azure-e2e |
For reference, the page linked in the description doesn't include the relevant issue; I think it was moved here: https://docs.microsoft.com/en-us/azure/load-balancer/load-balancer-troubleshoot-backend-traffic#cause-4-accessing-the-internal-load-balancer-frontend-from-the-participating-load-balancer-backend-pool-vm |
What type of PR is this?
/kind feature
What this PR does / why we need it: This PR adds private dns support for private clusters. When a cluster with an internal api server LB is created, capz will create a private dns zone with it and link it to the cluster's vnet. The internal LB IP is then added to the dns zone as a record with hostname
apiserver
. This allows reaching the API Server from within the vnet with FQDNapiserver.$CLUSTER_NAME.capz.io
. It also fixes the hairpin routing issue on all control plane VMs by adding a hosts entry so control planes resolveapiserver
as localhost.Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #1016
Special notes for your reviewer:
Please confirm that if this PR changes any image versions, then that's the sole change this PR makes.
TODOs:
Release note: