ksdns

command module
v0.0.0-...-996a9f2 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Dec 12, 2022 License: Apache-2.0 Imports: 12 Imported by: 0

README

ksdns

An Operator for serving delegated zones that can be updated using rfc2136 (dynamic updates)

ksdns makes it easy to serve short(er) domain names from clusters in an easy way.

Just setup a root zone in a name server. This may be a public domain or a private domain.

For a public R53 zone named example.org:

  1. Deploy ksdns, setup a zone named prod.example.org
  2. Create an NS record and a glue record for the delegated service domain. The glue record should point to the IP exposed by the ksdns deployment.
  3. Point external-dns's RFC2136 provider to the zupd external IP.
  4. Use external-dns to expose nice domain names for services/ingresses/routes such as www.prod.example.org
  5. If the delegation is done in provider supported by Cert Manager and the zone is public, then cert-manager will be provision valid Let's encrypt cert for internal services. No need for pre-created certs using an internal CA!

Description

ksdns consists of two components:

  • zupdwhich is a CoreDNS based plugin that enables RFC2136 (Dynamic Updates) DNS operations. zupd stores it's state in Kubernetes with a controller and a Custom Resource which keeps state. A typical Corefile for the dynamic-update plugin would look like:
example.org:1053 sub.example.org:1053 {
  debug
  log
  ready
  bind 127.0.0.1
  prometheus :8080
  dynamicupdate test-zupd-1670010624270
  transfer {
    to * 
    to 192.168.1.1
  }
  tsig {
    secret foo IwBTJx9wrDp4Y1RyC3H0gA==
    require all
  }
}

zupd requires a kubeconfig to be run in-cluster to start. zupdmust run with leader election enabled if running more than one replica. It should also use TSIG for security when handling updates.

  • The ksdns-operator that deploys and manages zupd deployments. A typical deployment consists of a zupd deployment with frontfacing CoreDNS replicas with the secondary plugin enabled.

Use Case

ksdns can provide "service domains" for clusters. A service domain is a delegated domain that may be used by external-dns to update records dynamically. This also enables the use of cert-manager to provide public let's encrypt certificates for internal services.

Getting started
  1. Register a domain in AWS R53 (Or any supported provider for cert-manager)

  2. Deploy ksdns and setup a delegated zone pointing to the CoreDNS service external-ip.

    blahonga.me NS  Simple                      -   xxx.awsdns-62.co.uk.
                                                    xxx.awsdns-62.net.
                                                    xxx.awsdns-40.com.
                                                    xxx.awsdns-28.org.
    blahonga.me SOA Simple                      -   xxx.awsdns-62.co.uk. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
    
    ksdns.blahonga.me   A   Simple  -   192.168.1.1 ; glue record pointing to ksdns
    service.blahonga.me NS  Simple  -   ksdns.blahonga.me ; delegated domain
    

    Create the zone object for ksdns:

    apiVersion: rfc1035.ksdns.io/v1alpha1
    kind: Zone
    metadata:
        labels:
            app.kubernetes.io/name: zone
            app.kubernetes.io/instance: zone-service.blahonga.me
        name: service.blahonga.me
    spec:
    zone: |
        ; service.blahonga.me zone
        $ORIGIN service.blahonga.me.
        @                      3600 SOA   ksdns.blahonga.me (
                                    zone-admin.blahonga.corp.  ; address of responsible party
                                    20160727                   ; serial number, not used
                                    3600                       ; refresh period
                                    600                        ; retry period
                                    604800                     ; expire time
                                    1800                     ) ; minimum ttl
                              86400 NS    ksdns.blahonga.me.
    
  3. Deploy external-dns in a cluster and setup a RFC2136 provider using the zupd service.

  4. Deploy cert-manager and setup dns verification for the public zone in R53.

External-dns will now create records in the (internal) delegated zone for the cluster. The records should be resolvable form the internal network only.

If you need a let's encrypt cert, request a cert for a record in ksdns. Cert-manager will setup the DNS verification in the public R53 zone and ksdns will make sure that the service is resolvable inside your network.

Getting Started

You’ll need a Kubernetes cluster to run against. You can use KIND to get a local cluster for testing, or run against a remote cluster. Note: Your controller will automatically use the current context in your kubeconfig file (i.e. whatever cluster kubectl cluster-info shows).

Running on the cluster
  1. Install Instances of Custom Resources:
kubectl apply -f config/samples/
  1. Build and push your image to the location specified by IMG:
make docker-build docker-push IMG=<some-registry>/ksdns:tag
  1. Deploy the controller to the cluster with the image specified by IMG:
make deploy IMG=<some-registry>/ksdns:tag
Uninstall CRDs

To delete the CRDs from the cluster:

make uninstall
Undeploy controller

UnDeploy the controller to the cluster:

make undeploy

Contributing

// TODO(user): Add detailed information on how you would like others to contribute to this project

How it works

This project aims to follow the Kubernetes Operator pattern

It uses Controllers which provides a reconcile function responsible for synchronizing resources untile the desired state is reached on the cluster

Test It Out
  1. Install the CRDs into the cluster:
make install
  1. Run your controller (this will run in the foreground, so switch to a new terminal if you want to leave it running):
make run

NOTE: You can also run this in one step by running: make install run

Modifying the API definitions

If you are editing the API definitions, generate the manifests such as CRs or CRDs using:

make manifests

NOTE: Run make --help for more information on all potential make targets

More information can be found via the Kubebuilder Documentation

License

Copyright 2022.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis
apis
dns/v1alpha1
Package v1alpha1 contains API Schema definitions for the dns v1alpha1 API group +kubebuilder:object:generate=true +groupName=dns.ksdns.io
Package v1alpha1 contains API Schema definitions for the dns v1alpha1 API group +kubebuilder:object:generate=true +groupName=dns.ksdns.io
cmd
controllers
dns
pkg
zupd/api/v1alpha1
Package v1alpha1 contains API Schema definitions for the rfc1035 v1alpha1 API group +kubebuilder:object:generate=true +groupName=rfc1035.ksdns.io
Package v1alpha1 contains API Schema definitions for the rfc1035 v1alpha1 API group +kubebuilder:object:generate=true +groupName=rfc1035.ksdns.io
zupd/core
Package core registers the server and all plugins we support.
Package core registers the server and all plugins we support.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL