-
-
Notifications
You must be signed in to change notification settings - Fork 462
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] Allow CoreDNS extension with custom configuration #816
Comments
I saw in an different product a coredns configuration like this one
which allows overides by imports (https://coredns.io/plugins/import/) Maybe this could be a solution to solve this feature request. |
Hi @johgoe , thanks for opening this issue and thanks for the suggestion. |
I added a note to k3s-io/k3s#462 |
Following up on this in k3s-io/k3s#4397 |
Moving this to Milestone v5.5.0 as I'd like to integrate it with some larger changes that require detecting the used K3s version first and matching it against a map of supported features. |
Is there any new status on this? It seems that adding |
I'm facing the same issue. I don't know that much about coredns, if I patch the ConfigMap to add a The patched main ConfigMap that works: apiVersion: v1
data:
Corefile: |
.:53 {
errors
health
ready
# That rewrite rule is working fine in the Corefile
rewrite name my-internal.domain.com host.k3d.internal
kubernetes cluster.local in-addr.arpa ip6.arpa {
pods insecure
fallthrough in-addr.arpa ip6.arpa
}
# etc... My attempt with a custom ConfigMap: apiVersion: v1
kind: ConfigMap
metadata:
name: coredns-custom
namespace: kube-system
data:
my-internal.domain.server: |
my-internal.domain.com {
log
rewrite name my-internal.domain.com host.k3d.internal
} Am I doing it wrong? Edit: I added the So Edit 2: I finally fixed my issue with the following ConfigMap: apiVersion: v1
kind: ConfigMap
metadata:
name: coredns-custom
namespace: kube-system
data:
my-internal.domain.server: |
my-internal.domain.com {
log
rewrite name my-internal.domain.com host.k3d.internal
forward . 127.0.0.1
} |
It seems like this has been addressed upstream at k3s (k3s-io/k3s#7639). In my limited testing, it's working like it should! |
We want to add add a custom core dns configuration
e.g.
to core dns configmap. Currently we have to patch the coredns configmap after every start again.
The text was updated successfully, but these errors were encountered: