You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: NOTICE.txt
+1-1
Original file line number
Diff line number
Diff line change
@@ -4,4 +4,4 @@ Licensed under the Apache License, Version 2.0 (the "License"). You may not use
4
4
5
5
http://aws.amazon.com/apache2.0/
6
6
7
-
or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
7
+
or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Copy file name to clipboardexpand all lines: docs/add-ons/external-dns.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# ExternalDNS
2
2
3
-
[External DNS](https://github.com/kubernetes-sigs/external-dns) is a Kubernetes add-on that can automate the management of DNS records based on Ingress and Service resources.
3
+
[External DNS](https://github.com/kubernetes-sigs/external-dns) is a Kubernetes add-on that can automate the management of DNS records based on Ingress and Service resources.
4
4
5
5
For complete project documentation, please visit the [External DNS Github repository](https://github.com/kubernetes-sigs/external-dns).
Copy file name to clipboardexpand all lines: examples/eks-cluster-with-external-dns/README.md
+8-8
Original file line number
Diff line number
Diff line change
@@ -1,28 +1,28 @@
1
1
# EKS Cluster with External DNS
2
2
3
-
This example demonstrates how to leverage External DNS, in concert with Ingress Nginx and AWS Load Balancer Controller. It demonstrates how you can easily provision multiple services with secure, custom domains which sit behind a single load balancer.
3
+
This example demonstrates how to leverage External DNS, in concert with Ingress Nginx and AWS Load Balancer Controller. It demonstrates how you can easily provision multiple services with secure, custom domains which sit behind a single load balancer.
4
4
5
5
The pattern deploys the sample workloads that reside in the [EKS Blueprints Workloads repo](https://github.com/aws-samples/eks-blueprints-workloads) via ArgoCD. The [configuration for `team-riker`](https://github.com/aws-samples/eks-blueprints-workloads/tree/main/teams/team-riker/dev/templates) will deploy an Ingress resource which contains configuration for both path-based routing and the custom hostname for the `team-riker` service. Once the pattern is deployed, you will be able to reach the `team-riker` sample workload via a custom domain you supply.
6
6
7
7
## How to Deploy
8
8
9
9
### Prerequisites:
10
10
11
-
#### Tools
11
+
#### Tools
12
12
13
13
Ensure that you have installed the following tools in your Mac or Windows Laptop before start working with this module and run Terraform Plan and Apply
This example requires the following AWS resources:
21
21
22
-
* A Route53 Hosted Zone for a domain that you own.
23
-
* A SSL/TLS certificate for your domain stored in AWS Certificate Manager (ACM).
24
-
25
-
For information on Route53 Hosted Zones, [see Route53 documentation](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/hosted-zones-working-with.html). For instructions on requesting a SSL/TLS certificate for your domain, see [ACM docs](https://docs.aws.amazon.com/acm/latest/userguide/gs.html).
22
+
* A Route53 Hosted Zone for a domain that you own.
23
+
* A SSL/TLS certificate for your domain stored in AWS Certificate Manager (ACM).
24
+
25
+
For information on Route53 Hosted Zones, [see Route53 documentation](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/hosted-zones-working-with.html). For instructions on requesting a SSL/TLS certificate for your domain, see [ACM docs](https://docs.aws.amazon.com/acm/latest/userguide/gs.html).
26
26
27
27
### Deployment Steps
28
28
@@ -43,7 +43,7 @@ terraform init
43
43
44
44
#### Step3: Replace placeholder values in terraform.tfvars
45
45
46
-
Both values in `terraform.tfvars` must be updated.
46
+
Both values in `terraform.tfvars` must be updated.
47
47
48
48
*`eks_cluster_domain` - the domain for your cluster. Value is used to look up a Route53 Hosted Zone that you own. DNS records created by `ExternalDNS` will be created in this Hosted Zone.
49
49
*`acm_certificate_domain` - the domain for a certificate in ACM that will be leveraged by `Ingress Nginx`. Value is used to look up an ACM certificate that will be used to terminate HTTPS connections. This value should likely be a wildcard cert for your `eks_cluster_domain`.
Copy file name to clipboardexpand all lines: modules/kubernetes-addons/external-dns/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
## Introduction
4
4
5
-
[External DNS](https://github.com/kubernetes-sigs/external-dns) is a Kubernetes add-on that can automate the management of DNS records based on Ingress and Service resources.
5
+
[External DNS](https://github.com/kubernetes-sigs/external-dns) is a Kubernetes add-on that can automate the management of DNS records based on Ingress and Service resources.
6
6
7
7
For complete project documentation, please visit the [ExternalDNS Github repository](https://github.com/kubernetes-sigs/external-dns).
0 commit comments