Configure external DNS servers (AWS Route53, Google CloudDNS and others) for Kubernetes Ingresses and Services
-
Updated
Nov 8, 2024 - Go
Configure external DNS servers (AWS Route53, Google CloudDNS and others) for Kubernetes Ingresses and Services
Manipulate DNS records on various DNS providers in a standardized way.
Google Cloud Associate Engineer repository on my journey to becoming a cloud expert. Feel free to take a look at the resources I used under the Links section.
External-DNS Webhook to manage IONOS DNS Records
External-DNS Webhook Provider to manage STACKIT DNS Records
Cert-Manager DNS challenge's webhook for k8s-dns-manager
Terraform module to provision battle-tested, batteries-included and secure GCP GKE Cluster with nginx-ingress and fully automated DNS (external-dns) + TLS/SSL management (cert-manager + Letsencrypt).
A webhook integration for Cert Manager that enables STACKIT DNS usage via its API as a DNS01 ACME Issuer. This repository provides Helm-based deployment, operational guidance for multiple Issuer configurations, and a comprehensive testing suite.
ddnsb0t is a program that uses CloudEvents to communicate to a Google Cloud Function and update DNS entries using CloudDNS.
Creates a Google Cloud DNS Zone and Resource Records
Add a description, image, and links to the clouddns topic page so that developers can more easily learn about it.
To associate your repository with the clouddns topic, visit your repo's landing page and select "manage topics."