Skip to content

Commit fc24607

Browse files
authored
Merge pull request #4893 from TomyLobo/patch-1
docs(Microsoft DNS): improve instructions
2 parents 8572ae7 + d3bf750 commit fc24607

File tree

1 file changed

+29
-28
lines changed

1 file changed

+29
-28
lines changed

docs/tutorials/rfc2136.md

+29-28
Original file line numberDiff line numberDiff line change
@@ -299,41 +299,18 @@ spec:
299299
- --domain-filter=k8s.example.org
300300
```
301301

302-
## Microsoft DNS (Insecure Updates)
302+
## Microsoft DNS
303303

304304
While `external-dns` was not developed or tested against Microsoft DNS, it can be configured to work against it. YMMV.
305305

306-
### Insecure Updates
307-
308-
#### DNS-side configuration
309-
310-
1. Create a DNS zone
311-
2. Enable insecure dynamic updates for the zone
312-
3. Enable Zone Transfers to all servers
313-
314-
#### `external-dns` configuration
315-
316-
You'll want to configure `external-dns` similarly to the following:
317-
318-
```text
319-
...
320-
- --provider=rfc2136
321-
- --rfc2136-host=192.168.0.1
322-
- --rfc2136-port=53
323-
- --rfc2136-zone=k8s.example.org
324-
- --rfc2136-zone=k8s.your-zone.org
325-
- --rfc2136-insecure
326-
- --rfc2136-tsig-axfr # needed to enable zone transfers, which is required for deletion of records.
327-
...
328-
```
329-
330306
### Secure Updates Using RFC3645 (GSS-TSIG)
331307

332308
#### DNS-side configuration
333309

334310
1. Create a DNS zone
335-
2. Enable secure dynamic updates for the zone
336-
3. Enable Zone Transfers to all servers
311+
2. Enable **secure** dynamic updates for the zone
312+
3. Enable Zone Transfers to all servers and/or other domains
313+
4. Create a user with permissions to create/update/delete records in that zone
337314

338315
If you see any error messages which indicate that `external-dns` was somehow not able to fetch
339316
existing DNS records from your DNS server, this could mean that you forgot about step 3.
@@ -402,7 +379,7 @@ You'll want to configure `external-dns` similarly to the following:
402379
```text
403380
...
404381
- --provider=rfc2136
405-
- --rfc2136-gss-tsig
382+
- --rfc2136-gss-tsig
406383
- --rfc2136-host=dns-host.yourdomain.com
407384
- --rfc2136-port=53
408385
- --rfc2136-zone=your-zone.com
@@ -423,6 +400,30 @@ This means that Active Directory might only work if this is set to a specific do
423400
`KDC_ERR_S_PRINCIPAL_UNKNOWN Server not found in Kerberos database`.
424401
To fix this, try setting `--rfc2136-host` to the "actual" hostname of your DNS server.
425402

403+
### Insecure Updates
404+
405+
#### DNS-side configuration
406+
407+
1. Create a DNS zone
408+
2. Enable insecure dynamic updates for the zone
409+
3. Enable Zone Transfers to all servers and/or other domains
410+
411+
#### `external-dns` configuration
412+
413+
You'll want to configure `external-dns` similarly to the following:
414+
415+
```text
416+
...
417+
- --provider=rfc2136
418+
- --rfc2136-host=192.168.0.1
419+
- --rfc2136-port=53
420+
- --rfc2136-zone=k8s.example.org
421+
- --rfc2136-zone=k8s.your-zone.org
422+
- --rfc2136-insecure
423+
- --rfc2136-tsig-axfr # needed to enable zone transfers, which is required for deletion of records.
424+
...
425+
```
426+
426427
## DNS Over TLS (RFCs 7858 and 9103)
427428

428429
If your DNS server does zone transfers over TLS, you can instruct `external-dns` to connect over TLS with the following flags:

0 commit comments

Comments
 (0)