coredns/middleware/kubernetes
Miek Gieben 6cc3f47d46 middleware/authpath: Fix return from k8s mw (#871)
* middleware/authpath: Fix return from k8s mw

Return the correct search path from the kubernetes' AutoPath function.
Based on preliminary discussion in #870

* PodWithIP can be private

Fix and add docs to functions.

* CR: remove the error from AutoPathFunc
2017-08-10 19:26:31 +01:00
..
autopath.go middleware/authpath: Fix return from k8s mw (#871) 2017-08-10 19:26:31 +01:00
controller.go all: gometalinter (#843) 2017-08-06 05:54:24 -07:00
DEV-README.md Update the various Kubernetes middleware README files. (#630) 2017-04-19 22:42:45 +01:00
federation.go WIP: Parserequest2 cutback (#868) 2017-08-10 01:08:58 -07:00
federation_test.go WIP: Parserequest2 cutback (#868) 2017-08-10 01:08:58 -07:00
handler.go WIP: Parserequest2 cutback (#868) 2017-08-10 01:08:58 -07:00
handler_test.go mw/kubernetes: autopath refactors (#850) 2017-08-07 14:45:30 -07:00
kubernetes.go middleware/authpath: Fix return from k8s mw (#871) 2017-08-10 19:26:31 +01:00
kubernetes_test.go WIP: Parserequest2 cutback (#868) 2017-08-10 01:08:58 -07:00
ns.go not used anymore (#832) 2017-08-04 16:03:30 -07:00
ns_test.go WIP: Parserequest2 cutback (#868) 2017-08-10 01:08:58 -07:00
parse.go WIP: Parserequest2 cutback (#868) 2017-08-10 01:08:58 -07:00
parse_test.go mw/kubernetes: fix parseTests (#875) 2017-08-10 02:23:27 -07:00
README.md WIP: autopath as middleware (#859) 2017-08-09 03:13:38 -07:00
reverse.go middleware/kubernetes: put reverse function in own file (#863) 2017-08-09 05:18:46 -07:00
reverse_test.go middleware/kubernetes: put reverse function in own file (#863) 2017-08-09 05:18:46 -07:00
setup.go middleware/authpath: Fix return from k8s mw (#871) 2017-08-10 19:26:31 +01:00
setup_test.go WIP: autopath as middleware (#859) 2017-08-09 03:13:38 -07:00
subzone.go Move to logging package (#191) 2016-07-18 18:47:36 +01:00
subzone_test.go Run golint and go vet (#276) 2016-09-21 17:01:19 +01:00

kubernetes

The kubernetes middleware enables the reading zone data from a Kubernetes cluster. It implements the Kubernetes DNS-Based Service Discovery Specification.

CoreDNS running the kubernetes middleware can be used as a replacement of kube-dns in a kubernetes cluster. See the deployment repository for details on how to deploy CoreDNS in Kubernetes.

Syntax

kubernetes ZONE [ZONE...] [
	resyncperiod DURATION
	endpoint URL
	tls CERT KEY CACERT]
	namespaces NAMESPACE [NAMESPACE...]
	labels EXPRESSION
	pods POD-MODE]
	upstream ADDRESS [ADDRESS...]
	federation NAME DOMAIN
	fallthrough
}
  • resyncperiod DURATION

    The Kubernetes data API resynchronization period. Default is 5m. Example values: 60s, 5m, 1h

    Example:

      kubernetes cluster.local. {
      	resyncperiod 15m
      }
    
  • endpoint URL

    Use URL for a remote k8s API endpoint. If omitted, it will connect to k8s in-cluster using the cluster service account.

    Example:

      kubernetes cluster.local. {
      	endpoint http://k8s-endpoint:8080
      }
    
  • tls CERT KEY CACERT

    The TLS cert, key and the CA cert file names for remote k8s connection. This option is ignored if connecting in-cluster (i.e. endpoint is not specified).

    Example:

      kubernetes cluster.local. {
      	endpoint https://k8s-endpoint:8443
      	tls cert key cacert
      }
    
  • namespaces NAMESPACE [NAMESPACE...]

    Only expose the k8s namespaces listed. If this option is omitted all namespaces are exposed

    Example:

      kubernetes cluster.local. {
      	namespaces demo default
      }
    
  • labels EXPRESSION

    Only expose the records for Kubernetes objects that match this label selector. The label selector syntax is described in the Kubernetes User Guide - Labels.

    Example:

    The following example only exposes objects labeled as "application=nginx" in the "staging" or "qa" environments.

      kubernetes cluster.local. {
      	labels environment in (staging, qa),application=nginx
      }
    
  • pods POD-MODE

    Set the mode for handling IP-based pod A records, e.g. 1-2-3-4.ns.pod.cluster.local. in A 1.2.3.4. This option is provided to facilitate use of SSL certs when connecting directly to pods.

    Valid values for POD-MODE:

    • disabled: Default. Do not process pod requests, always returning NXDOMAIN

    • insecure: Always return an A record with IP from request (without checking k8s). This option is is vulnerable to abuse if used maliciously in conjunction with wildcard SSL certs. This option is provided for backward compatibility with kube-dns.

    • verified: Return an A record if there exists a pod in same namespace with matching IP. This option requires substantially more memory than in insecure mode, since it will maintain a watch on all pods.

    Example:

      kubernetes cluster.local. {
      	pods verified
      }
    
  • upstream ADDRESS [ADDRESS...]

    Defines upstream resolvers used for resolving services that point to external hosts (External Services). ADDRESS can be an ip, an ip:port, or a path to a file structured like resolv.conf.

    Example:

     kubernetes cluster.local. {
     	upstream 12.34.56.78:5053
     }
    
    
  • federation NAME DOMAIN

    Defines federation membership. One line for each federation membership. Each line consists of the name of the federation, and the domain.

    Example:

      kubernetes cluster.local. {
      	federation myfed foo.example.com
      }
    
  • fallthrough

    If a query for a record in the cluster zone results in NXDOMAIN, normally that is what the response will be. However, if you specify this option, the query will instead be passed on down the middleware chain, which can include another middleware to handle the query.

Examples

Example 1: This is a minimal configuration with no options other than zone. It will handle all queries in the cluster.local zone and connect to Kubernetes in-cluster, but it will not provide PTR records for services, or A records for pods.

kubernetes cluster.local

Example 2: Handle all queries in the cluster.local zone. Connect to Kubernetes in-cluster. Handle all PTR requests for 10.0.0.0/16 . Verify the existence of pods when answering pod requests. Resolve upstream records against 10.102.3.10.

10.0.0.0/16 cluster.local {
    kubernetes {
        pods verified
        upstream 10.102.3.10:53
    }
}

Selective Exposure Example: Handle all queries in the cluster.local zone. Connect to Kubernetes in-cluster. Only expose objects in the test and staging namespaces. Resolve upstream records using the servers configured in /etc/resolv.conf.

kubernetes cluster.local {
	namespaces test staging

Federation Example: Handle all queries in the cluster.local zone. Connect to Kubernetes in-cluster. Handle federated service requests in the prod and stage federations. Resolve upstream records using the servers configured in /etc/resolv.conf.

cluster.local {
    kubernetes {
	    federation prod prod.feddomain.com
	    federation stage stage.feddomain.com
	    upstream /etc/resolv.conf
	}
}

Out-Of-Cluster Example: Handle all queries in the cluster.local zone. Connect to Kubernetes from outside the cluster. Verify the existence of pods when answering pod requests. Resolve upstream records against 10.102.3.10.

kubernetes cluster.local {
	endpoint https://k8s-endpoint:8443
	tls cert key cacert
	pods verified
	upstream 10.102.3.10:53
}

Wildcard

Some query labels accept a wildcard value to match any value. If a label is a valid wildcard (*, or the word "any"), then that label will match all values. The labels that accept wildcards are:

  • service in an A record request: service.namespace.svc.zone.
    • e.g. *.ns.svc.myzone.local
  • namespace in an A record request: service.namespace.svc.zone.
    • e.g. nginx.*.svc.myzone.local
  • port and/or protocol in an SRV request: _port._protocol.service.namespace.svc.zone.
    • e.g. _http.*.service.ns.svc.
  • multiple wild cards are allowed in a single query.
    • e.g. A Request *.*.svc.zone. or SRV request *.*.*.*.svc.zone.