1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

OSDOCS-16843-2: CQA for the NOP-2 External DNS Operator (EDO)

This commit is contained in:
dfitzmau
2026-01-28 09:50:35 +00:00
committed by openshift-cherrypick-robot
parent 6c3ce7a967
commit 466a559716
16 changed files with 268 additions and 182 deletions

View File

@@ -0,0 +1,26 @@
// Module included in the following assemblies:
//
// * /networking/networking_operators/external_dns_operator/external-dns-operator-release-notes.adoc
:_mod-docs-content-type: REFERENCE
[id="external-dns-operator-release-notes-1.0_{context}"]
= External DNS Operator 1.0
[role="_abstract"]
The External DNS Operator 1.0 release notes summarize all new features and enhancements, notable technical changes, major corrections from previous versions, and any known bugs upon general availability.
External DNS Operator 1.0.1::
+
The following advisory is available for the External DNS Operator version 1.0.1:
+
* link:https://access.redhat.com/errata/RHEA-2024:0537[RHEA-2024:0537 ExternalDNS Operator 1.0 operator/operand containers]
External DNS Operator 1.0.0::
+
The following advisory is available for the External DNS Operator version 1.0.0:
+
* link:https://access.redhat.com/errata/RHEA-2022:5867[RHEA-2022:5867 ExternalDNS Operator 1.0 operator/operand containers]
+
Bug fixes:
+
* Previously, the External DNS Operator issued a warning about the violation of the restricted SCC policy during ExternalDNS operand pod deployments. This issue has been resolved. (link:https://bugzilla.redhat.com/show_bug.cgi?id=2086408[BZ#2086408])

View File

@@ -0,0 +1,26 @@
// Module included in the following assemblies:
//
// * /networking/networking_operators/external_dns_operator/external-dns-operator-release-notes.adoc
:_mod-docs-content-type: REFERENCE
[id="external-dns-operator-release-notes-1.1_{context}"]
= External DNS Operator 1.1
[role="_abstract"]
The External DNS Operator 1.1 release notes summarize all new features and enhancements, notable technical changes, major corrections from previous versions, and any known bugs upon general availability.
External DNS Operator 1.1.1::
+
The following advisory is available for the External DNS Operator version 1.1.1:
+
* link:https://access.redhat.com/errata/RHEA-2024:0536[RHEA-2024:0536 ExternalDNS Operator 1.1 operator/operand containers]
External DNS Operator 1.1.0::
+
This release included a rebase of the operand from the upstream project version 0.13.1. The following advisory is available for the External DNS Operator version 1.1.0:
+
* link:https://access.redhat.com/errata/RHEA-2022:9086[RHEA-2022:9086-01 ExternalDNS Operator 1.1 operator/operand containers]
+
Bug fixes:
+
* Previously, the ExternalDNS Operator enforced an empty `defaultMode` value for volumes, which caused constant updates due to a conflict with the OpenShift API. Now, the `defaultMode` value is not enforced and operand deployment does not update constantly. (link:https://issues.redhat.com/browse/OCPBUGS-2793[OCPBUGS-2793])

View File

@@ -0,0 +1,24 @@
// Module included in the following assemblies:
//
// * /networking/networking_operators/external_dns_operator/external-dns-operator-release-notes.adoc
:_mod-docs-content-type: REFERENCE
[id="external-dns-operator-release-notes-1.2_{context}"]
= External DNS Operator 1.2
[role="_abstract"]
The External DNS Operator 1.2 release notes summarize all new features and enhancements, notable technical changes, major corrections from previous versions, and any known bugs upon general availability.
External DNS Operator 1.2.0::
+
The following advisory is available for the External DNS Operator version 1.2.0:
+
* link:https://access.redhat.com/errata/RHEA-2023:7239[RHEA-2022:5867 ExternalDNS Operator 1.2 operator/operand containers]
+
New features:
+
* The External DNS Operator now supports {aws-short} shared VPC. For more information, see "Creating DNS records in a different {aws-short} Account using a shared VPC".
+
Bug fixes:
+
* The update strategy for the operand changed from `Rolling` to `Recreate`. (link:https://issues.redhat.com/browse/OCPBUGS-3630[OCPBUGS-3630])

View File

@@ -0,0 +1,46 @@
// Module included in the following assemblies:
//
// * /networking/networking_operators/external_dns_operator/external-dns-operator-release-notes.adoc
:_mod-docs-content-type: REFERENCE
[id="external-dns-operator-release-notes-1.3_{context}"]
= External DNS Operator 1.3
[role="_abstract"]
The External DNS Operator 1.3 release notes summarize all new features and enhancements, notable technical changes, major corrections from previous versions, and any known bugs upon general availability.
External DNS Operator 1.3.3::
+
The following advisory is available for the External DNS Operator version 1.3.3:
+
* link:https://access.redhat.com/errata/RHBA-2025:23077[RHBA-2025:23077 Product Enhancement Advisory]
External DNS Operator 1.3.2::
+
The following advisory is available for the External DNS Operator version 1.3.2:
+
* link:https://access.redhat.com/errata/RHEA-2025:22454[RHEA-2025:22454 Product Enhancement Advisory]
External DNS Operator 1.3.1::
+
The following advisory is available for the External DNS Operator version 1.3.1:
+
* link:https://access.redhat.com/errata/RHEA-2025:15598[RHEA-2025:15598 Product Enhancement Advisory]
+
This update includes improved container security.
External DNS Operator 1.3.0::
+
The following advisory is available for the External DNS Operator version 1.3.0:
+
* link:https://access.redhat.com/errata/RHEA-2024:8550[RHEA-2024:8550 Product Enhancement Advisory]
+
This update includes a rebase to the 0.14.2 version of the upstream project.
+
Bug fixes:
+
* Previously, the ExternalDNS Operator could not deploy operands on HCP clusters. With this release, the Operator deploys operands in a running and ready state. (link:https://issues.redhat.com/browse/OCPBUGS-37059[OCPBUGS-37059])
+
* Previously, the ExternalDNS Operator was not using RHEL 9 as its building or base images. With this release, RHEL9 is the base. (link:https://issues.redhat.com/browse/OCPBUGS-41683[OCPBUGS-41683])
+
* Previously, the godoc had a broken link for Infoblox provider. With this release, the godoc is revised for accuracy. Some links are removed while some other are replaced with GitHub permalinks. (link:https://issues.redhat.com/browse/OCPBUGS-36797[OCPBUGS-36797])

View File

@@ -6,11 +6,12 @@
[id="nw-control-dns-records-public-dns-zone-infoblox_{context}"]
= Creating DNS records on a public DNS zone on Infoblox
You can create DNS records on a public DNS zone on Infoblox by using the External DNS Operator.
[role="_abstract"]
To create DNS records on Infoblox, use the External DNS Operator. The Operator manages external name resolution for your cluster services.
.Prerequisites
* You have access to the OpenShift CLI (`oc`).
* You have access to the {oc-first}.
* You have access to the Infoblox UI.
.Procedure
@@ -29,7 +30,7 @@ $ oc -n external-dns-operator create secret generic infoblox-credentials --from-
$ oc get routes --all-namespaces | grep console
----
+
.Example Output
.Example output
[source,terminal]
----
openshift-console console console-openshift-console.apps.test.example.com console https reencrypt/Redirect None
@@ -44,10 +45,10 @@ openshift-console downloads downloads-openshift-console.apps.
apiVersion: externaldns.olm.openshift.io/v1beta1
kind: ExternalDNS
metadata:
name: sample-infoblox <1>
name: sample-infoblox
spec:
provider:
type: Infoblox <2>
type: Infoblox
infoblox:
credentials:
name: infoblox-credentials
@@ -59,14 +60,20 @@ spec:
matchType: Exact
name: test.example.com
source:
type: OpenShiftRoute <3>
type: OpenShiftRoute
openshiftRouteOptions:
routerName: default <4>
routerName: default
----
<1> Specifies the External DNS name.
<2> Defines the provider type.
<3> You can define options for the source of DNS records.
<4> If the source type is `OpenShiftRoute`, you can pass the OpenShift Ingress Controller name. External DNS selects the canonical hostname of that router as the target while creating CNAME record.
+
where:
`metadata.name`:: Specifies the External DNS name.
`provider.type`:: Specifies the provider type.
`source.type`:: Specifies options for the source of DNS records.
`routerName`:: If the source type is `OpenShiftRoute`, you can pass the OpenShift Ingress Controller name. External DNS selects the canonical hostname of that router as the target while creating a CNAME record.
. Create the `ExternalDNS` resource on Infoblox by running the following command:
+
@@ -76,6 +83,7 @@ $ oc create -f external-dns-sample-infoblox.yaml
----
. From the Infoblox UI, check the DNS records created for `console` routes:
+
.. Click *Data Management* -> *DNS* -> *Zones*.
+
.. Select the zone name.

View File

@@ -7,7 +7,8 @@
[id="nw-control-dns-records-public-managed-zone-gcp_{context}"]
= Creating DNS records on a public managed zone for {gcp-short}
You can create DNS records on a public managed zone for {gcp-short} by using the External DNS Operator.
[role="_abstract"]
To create DNS records on {gcp-first}, use the External DNS Operator. The DNS Operator manages external name resolution for your cluster services.
.Prerequisites
@@ -72,27 +73,38 @@ $ gcloud dns managed-zones list | grep test.gcp.example.com
apiVersion: externaldns.olm.openshift.io/v1beta1
kind: ExternalDNS
metadata:
name: sample-gcp <1>
name: sample-gcp
spec:
domains:
- filterType: Include <2>
matchType: Exact <3>
name: test.gcp.example.com <4>
- filterType: Include
matchType: Exact
name: test.gcp.example.com
provider:
type: GCP <5>
type: GCP
source:
openshiftRouteOptions: <6>
routerName: default <7>
type: OpenShiftRoute <8>
openshiftRouteOptions:
routerName: default
type: OpenShiftRoute
# ...
----
<1> Specifies the External DNS name.
<2> By default, all hosted zones are selected as potential targets. You can include your hosted zone.
<3> The domain of the target must match the string defined by the `name` key.
<4> Specify the exact domain of the zone you want to update. The hostname of the routes must be subdomains of the specified domain.
<5> Defines the provider type.
<6> You can define options for the source of DNS records.
<7> If the source type is `OpenShiftRoute`, you can pass the OpenShift Ingress Controller name. External DNS selects the canonical hostname of that router as the target while creating CNAME record.
<8> Defines the `route` resource as the source for {gcp-short} DNS records.
+
where:
`metadata.name`:: Specifies the External DNS name.
`spec.domains.filterType`:: By default, all hosted zones are selected as potential targets. You can include your hosted zone.
`spec.domains.matchType`:: Specifies the domain of the target that must match the string defined by the `name` key.
`spec.domains.name`:: Specifies the exact domain of the zone you want to update. The hostname of the routes must be subdomains of the specified domain.
`spec.provider.type`:: Specifies the provider type.
`source.openshiftRouteOptions`:: Specifies options for the source of DNS records.
`openshiftRouteOptions.routerName`:: If the source type is `OpenShiftRoute`, you can pass the OpenShift Ingress Controller name. External DNS selects the canonical hostname of that router as the target while creating a CNAME record.
`type`:: Specifies the `route` resource as the source for {gcp-short} DNS records.
. Check the DNS records created for {product-title} routes by running the following command:
+

View File

@@ -0,0 +1,39 @@
// Module included in the following assemblies:
// * networking/understanding-external-dns-operator.adoc
:_mod-docs-content-type: REFERENCE
[id="nw-external-dns-operator-domain-limitations_{context}"]
= External DNS Operator domain name limitations
[role="_abstract"]
To prevent configuration errors when deploying the `ExternalDNS` resource, review the domain name limitations enforced by the External DNS Operator. Understanding these constraints ensures that your requested hostnames and domains are compatible with your underlying DNS provider.
The External DNS Operator uses the TXT registry that adds the prefix for TXT records. This reduces the maximum length of the domain name for TXT records. A DNS record cannot be present without a corresponding TXT record, so the domain name of the DNS record must follow the same limit as the TXT records. For example, a DNS record of `<domain_name_from_source>` results in a TXT record of `external-dns-<record_type>-<domain_name_from_source>`.
The domain name of the DNS records generated by the External DNS Operator has the following limitations:
[cols="3,2",options="header"]
|===
|Record type |Number of characters
|CNAME
|44
|Wildcard CNAME records on AzureDNS
|42
|A
|48
|Wildcard A records on AzureDNS
|46
|===
The following error shows in the External DNS Operator logs if the generated domain name exceeds any of the domain name limitations:
[source,terminal]
----
time="2022-09-02T08:53:57Z" level=error msg="Failure in zone test.example.io. [Id: /hostedzone/Z06988883Q0H0RL6UMXXX]"
time="2022-09-02T08:53:57Z" level=error msg="InvalidChangeBatch: [FATAL problem: DomainLabelTooLong (Domain label is too long) encountered with 'external-dns-a-hello-openshift-aaaaaaaaaa-bbbbbbbbbb-ccccccc']\n\tstatus code: 400, request id: e54dfd5a-06c6-47b0-bcb9-a4f7c3a4e0c6"
----

View File

@@ -5,45 +5,14 @@
[id="nw-external-dns-operator-logs_{context}"]
= Viewing External DNS Operator logs
You can view External DNS Operator logs by using the `oc logs` command.
[role="_abstract"]
To troubleshoot DNS configuration issues, view the External DNS Operator logs. Use the `oc logs` command to retrieve diagnostic information directly from the Operator pod.
.Procedure
. View the logs of the External DNS Operator by running the following command:
* View the logs of the External DNS Operator by running the following command:
+
[source,terminal]
----
$ oc logs -n external-dns-operator deployment/external-dns-operator -c external-dns-operator
----
== External DNS Operator domain name limitations
The External DNS Operator uses the TXT registry which adds the prefix for TXT records. This reduces the maximum length of the domain name for TXT records. A DNS record cannot be present without a corresponding TXT record, so the domain name of the DNS record must follow the same limit as the TXT records. For example, a DNS record of `<domain_name_from_source>` results in a TXT record of `external-dns-<record_type>-<domain_name_from_source>`.
The domain name of the DNS records generated by the External DNS Operator has the following limitations:
[cols="3a,8a",options="header"]
|===
|Record type |Number of characters
|CNAME
|44
|Wildcard CNAME records on AzureDNS
|42
|A
|48
|Wildcard A records on AzureDNS
|46
|===
The following error appears in the External DNS Operator logs if the generated domain name exceeds any of the domain name limitations:
[source,terminal]
----
time="2022-09-02T08:53:57Z" level=error msg="Failure in zone test.example.io. [Id: /hostedzone/Z06988883Q0H0RL6UMXXX]"
time="2022-09-02T08:53:57Z" level=error msg="InvalidChangeBatch: [FATAL problem: DomainLabelTooLong (Domain label is too long) encountered with 'external-dns-a-hello-openshift-aaaaaaaaaa-bbbbbbbbbb-ccccccc']\n\tstatus code: 400, request id: e54dfd5a-06c6-47b0-bcb9-a4f7c3a4e0c6"
----

View File

@@ -3,7 +3,10 @@
:_mod-docs-content-type: PROCEDURE
[id="nw-external-dns-operator_{context}"]
= External DNS Operator
= Deploying the External DNS Operator
[role="_abstract"]
You can deploy the External DNS Operator on-demand from the Software Catalog. Deploying the External DNS Operator creates a `Subscription` object.
The External DNS Operator implements the External DNS API from the `olm.openshift.io` API group. The External DNS Operator updates services, routes, and external DNS providers.
@@ -13,8 +16,6 @@ The External DNS Operator implements the External DNS API from the `olm.openshif
.Procedure
You can deploy the External DNS Operator on demand from the software catalog. Deploying the External DNS Operator creates a `Subscription` object.
. Check the name of an install plan, such as `install-zcvlr`, by running the following command:
+
[source,terminal]

View File

@@ -6,18 +6,17 @@
[id="nw-installing-external-dns-operator-cli_{context}"]
= Installing the External DNS Operator by using the CLI
You can install the External DNS Operator by using the CLI.
[role="_abstract"]
You can use the {oc-first} to install the External DNS Operator. The Operator manages the installation process directly from your terminal without you having to use the web console.
.Prerequisites
* You are logged in to the {product-title} web console as a user with `cluster-admin` permissions.
* You are logged into the OpenShift CLI (`oc`).
* You are logged in to the {oc-first}.
.Procedure
. Create a `Namespace` object:
+
.. Create a YAML file that defines the `Namespace` object:
+
.Example `namespace.yaml` file
@@ -27,8 +26,9 @@ apiVersion: v1
kind: Namespace
metadata:
name: external-dns-operator
# ...
----
+
.. Create the `Namespace` object by running the following command:
+
[source,terminal]
@@ -37,7 +37,7 @@ $ oc apply -f namespace.yaml
----
. Create an `OperatorGroup` object:
+
.. Create a YAML file that defines the `OperatorGroup` object:
+
.Example `operatorgroup.yaml` file
@@ -52,8 +52,9 @@ spec:
upgradeStrategy: Default
targetNamespaces:
- external-dns-operator
# ...
----
+
.. Create the `OperatorGroup` object by running the following command:
+
[source,terminal]
@@ -62,7 +63,7 @@ $ oc apply -f operatorgroup.yaml
----
. Create a `Subscription` object:
+
.. Create a YAML file that defines the `Subscription` object:
+
.Example `subscription.yaml` file
@@ -79,8 +80,9 @@ spec:
name: external-dns-operator
source: redhat-operators
sourceNamespace: openshift-marketplace
# ...
----
+
.. Create the `Subscription` object by running the following command:
+
[source,terminal]

View File

@@ -4,29 +4,37 @@
:_mod-docs-content-type: PROCEDURE
[id="nw-installing-external-dns-operator_{context}"]
= Installing the External DNS Operator with the software catalog
= Installing the External DNS Operator with the Software Catalog
You can install the External DNS Operator by using the {product-title} software catalog.
[role="_abstract"]
You can install the External DNS Operator by using the {product-title} Software Catalog. You can then manage the Operator lifecycle directly from the web console.
.Procedure
. Click *Ecosystem* -> *Software Catalog* in the {product-title} web console.
. Click *External DNS Operator*.
You can use the *Filter by keyword* text box or the filter list to search for External DNS Operator from the list of Operators.
. Click *External DNS Operator*. You can use the *Filter by keyword* text box or the filter list to search for External DNS Operator from the list of Operators.
. Select the `external-dns-operator` namespace.
. On the *External DNS Operator* page, click *Install*.
. On the *Install Operator* page, ensure that you selected the following options:
+
.. Update the channel as *stable-v1*.
+
.. Installation mode as *A specific name on the cluster*.
.. Installed namespace as `external-dns-operator`. If namespace `external-dns-operator` does not exist, it gets created during the Operator installation.
.. Select *Approval Strategy* as *Automatic* or *Manual*. Approval Strategy is set to *Automatic* by default.
+
.. Installed namespace as `external-dns-operator`. If namespace `external-dns-operator` does not exist, the Operator gets created during the Operator installation.
+
.. Select *Approval Strategy* as *Automatic* or *Manual*. The Approval Strategy defaults to *Automatic*.
+
.. Click *Install*.
+
If you select *Automatic* updates, the Operator Lifecycle Manager (OLM) automatically upgrades the running instance of your Operator without any intervention.
+
If you select *Manual* updates, the OLM creates an update request. As a cluster administrator, you must then manually approve that update request to have the Operator updated to the new version.
.Verification
Verify that the External DNS Operator shows the *Status* as *Succeeded* on the *Installed Operators* dashboard.
* Verify that the External DNS Operator shows the *Status* as *Succeeded* on the *Installed Operators* dashboard.

View File

@@ -16,99 +16,16 @@ The External DNS Operator is only supported on the `x86_64` architecture.
These release notes track the development of the External DNS Operator in {product-title}.
[id="external-dns-operator-release-notes-1.3.3"]
== External DNS Operator 1.3.3
include::modules/external-dns-operator-release-notes-1.3.adoc[leveloffset=+1]
The following advisory is available for the External DNS Operator version 1.3.3:
include::modules/external-dns-operator-release-notes-1.2.adoc[leveloffset=+1]
* link:https://access.redhat.com/errata/RHBA-2025:23077[RHBA-2025:23077 Product Enhancement Advisory]
[role="_additional-resources"]
.Additional resources
[id="external-dns-operator-release-notes-1.3.2"]
== External DNS Operator 1.3.2
* xref:../../../networking/networking_operators/external_dns_operator/nw-creating-dns-records-on-aws.adoc#nw-control-dns-records-public-aws-with-VPC_creating-dns-records-on-aws[Creating DNS records in a different {aws-short} Account using a shared VPC]
The following advisory is available for the External DNS Operator version 1.3.2:
include::modules/external-dns-operator-release-notes-1.1.adoc[leveloffset=+1]
* link:https://access.redhat.com/errata/RHEA-2025:22454[RHEA-2025:22454 Product Enhancement Advisory]
include::modules/external-dns-operator-release-notes-1.0.adoc[leveloffset=+1]
[id="external-dns-operator-release-notes-1.3.1"]
== External DNS Operator 1.3.1
The following advisory is available for the External DNS Operator version 1.3.1:
* link:https://access.redhat.com/errata/RHEA-2025:15598[RHEA-2025:15598 Product Enhancement Advisory]
This update includes improved container security.
[id="external-dns-operator-release-notes-1.3.0"]
== External DNS Operator 1.3.0
The following advisory is available for the External DNS Operator version 1.3.0:
* link:https://access.redhat.com/errata/RHEA-2024:8550[RHEA-2024:8550 Product Enhancement Advisory]
This update includes a rebase to the 0.14.2 version of the upstream project.
[id="external-dns-operator-.3.0-bug-fixes"]
=== Bug fixes
Previously, the ExternalDNS Operator could not deploy operands on HCP clusters. With this release, the Operator deploys operands in a running and ready state. (link:https://issues.redhat.com/browse/OCPBUGS-37059[*OCPBUGS-37059*])
Previously, the ExternalDNS Operator was not using RHEL 9 as its building or base images. With this release, RHEL9 is the base. (link:https://issues.redhat.com/browse/OCPBUGS-41683[*OCPBUGS-41683*])
Previously, the godoc had a broken link for Infoblox provider. With this release, the godoc is revised for accuracy. Some links are removed while some other are replaced with GitHub permalinks. (link:https://issues.redhat.com/browse/OCPBUGS-36797[*OCPBUGS-36797*])
[id="external-dns-operator-release-notes-1.2.0"]
== External DNS Operator 1.2.0
The following advisory is available for the External DNS Operator version 1.2.0:
* link:https://access.redhat.com/errata/RHEA-2023:7239[RHEA-2022:5867 ExternalDNS Operator 1.2 operator/operand containers]
[id="external-dns-operator-1.2.0-new-features"]
=== New features
* The External DNS Operator now supports {aws-short} shared VPC. For more information, see xref:../../../networking/networking_operators/external_dns_operator/nw-creating-dns-records-on-aws.adoc#nw-control-dns-records-public-aws-with-VPC_creating-dns-records-on-aws[Creating DNS records in a different {aws-short} Account using a shared VPC].
[id="external-dns-operator-1.2.0-bug-fixes"]
=== Bug fixes
* The update strategy for the operand changed from `Rolling` to `Recreate`. (link:https://issues.redhat.com/browse/OCPBUGS-3630[*OCPBUGS-3630*])
[id="external-dns-operator-release-notes-1.1.1"]
== External DNS Operator 1.1.1
The following advisory is available for the External DNS Operator version 1.1.1:
* link:https://access.redhat.com/errata/RHEA-2024:0536[RHEA-2024:0536 ExternalDNS Operator 1.1 operator/operand containers]
[id="external-dns-operator-release-notes-1.1.0"]
== External DNS Operator 1.1.0
This release included a rebase of the operand from the upstream project version 0.13.1. The following advisory is available for the External DNS Operator version 1.1.0:
* link:https://access.redhat.com/errata/RHEA-2022:9086[RHEA-2022:9086-01 ExternalDNS Operator 1.1 operator/operand containers]
[id="external-dns-operator-1.1.0-bug-fix"]
=== Bug fixes
* Previously, the ExternalDNS Operator enforced an empty `defaultMode` value for volumes, which caused constant updates due to a conflict with the OpenShift API. Now, the `defaultMode` value is not enforced and operand deployment does not update constantly. (link:https://issues.redhat.com/browse/OCPBUGS-2793[*OCPBUGS-2793*])
[id="external-dns-operator-release-notes-1.0.1"]
== External DNS Operator 1.0.1
The following advisory is available for the External DNS Operator version 1.0.1:
* link:https://access.redhat.com/errata/RHEA-2024:0537[RHEA-2024:0537 ExternalDNS Operator 1.0 operator/operand containers]
[id="external-dns-operator-release-notes-1.0.0"]
== External DNS Operator 1.0.0
The following advisory is available for the External DNS Operator version 1.0.0:
* link:https://access.redhat.com/errata/RHEA-2022:5867[RHEA-2022:5867 ExternalDNS Operator 1.0 operator/operand containers]
[id="external-dns-operator-1.0.0-bug-fixes"]
=== Bug fixes
* Previously, the External DNS Operator issued a warning about the violation of the restricted SCC policy during ExternalDNS operand pod deployments. This issue has been resolved. (link:https://bugzilla.redhat.com/show_bug.cgi?id=2086408[*BZ#2086408*])

View File

@@ -1,12 +1,13 @@
:_mod-docs-content-type: ASSEMBLY
include::_attributes/common-attributes.adoc[]
[id="creating-dns-records-on-gcp"]
= Creating DNS records on {gcp-short}
= Creating DNS records on Google Cloud Platform
include::_attributes/common-attributes.adoc[]
:context: creating-dns-records-on-gcp
toc::[]
You can create DNS records on {gcp-first} by using the External DNS Operator.
[role="_abstract"]
To create DNS records on {gcp-first}, use the External DNS Operator. The DNS Operator manages external name resolution for your cluster services.
[IMPORTANT]
====

View File

@@ -6,6 +6,8 @@ include::_attributes/common-attributes.adoc[]
toc::[]
You can create DNS records on Infoblox by using the External DNS Operator.
[role="_abstract"]
To create DNS records on Infoblox, use the External DNS Operator. The Operator manages external name resolution for your cluster services.
include::modules/nw-control-dns-records-public-hosted-zone-infoblox.adoc[leveloffset=+1]

View File

@@ -6,7 +6,8 @@ include::_attributes/common-attributes.adoc[]
toc::[]
You can install the External DNS Operator on cloud providers such as AWS, Azure, and {gcp-short}.
[role="_abstract"]
To manage DNS records on your cloud infrastructure, install the External DNS Operator. This Operator supports deployment on major cloud providers, including {aws-first}, {azure-first}, and {gcp-first}.
// Installing the External DNS Operator with OperatorHub
include::modules/nw-installing-external-dns-operator.adoc[leveloffset=+1]

View File

@@ -6,7 +6,11 @@ include::_attributes/common-attributes.adoc[]
toc::[]
The External DNS Operator deploys and manages `ExternalDNS` to provide the name resolution for services and routes from the external DNS provider to {product-title}.
[role="_abstract"]
To provide name resolution for services and routes from an External DNS provider to {product-title}, use the External DNS Operator. This Operator deploys and manages `ExternalDNS` to synchronize your cluster resources with the external provider.
// External DNS Operator domain name limitations
include::modules/nw-external-dns-operator-domain-limitations.adoc[leveloffset=+1]
// External DNS Operator
include::modules/nw-external-dns-operator.adoc[leveloffset=+1]