Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MSBFS additions #485

Open
wants to merge 3 commits into
base: main
Choose a base branch
from
Open

MSBFS additions #485

wants to merge 3 commits into from

Conversation

cristiklein
Copy link
Collaborator

As discussed during the last PM meeting, I added clarification for how our customers can comply with MSBFS.

Copy link
Contributor

@llarsson llarsson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

DNSSEC-related comment that I'd love to see addressed, but other than that, it looks great!

@@ -83,6 +84,9 @@ host -a demo.example.com.
!!!important
Be cautious when using CNAMEs and apex domains (e.g., `example.com`). See [here](https://serverfault.com/questions/613829/why-cant-a-cname-record-be-used-at-the-apex-aka-root-of-a-domain) for a long discussion of potential problems and current workarounds.

!!!important
MSBFS 2020:7 4 kap. 9 § requires you to use DNSSEC for all your registered domains.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this deserves a longer explanation, so they know what they need to do. Because it goes against the usual "we make a bunch of domains for you, and you then make a prettier CNAME for your end users". It could be something simple like:

"For DNSSEC to work, you have to make A records in your DNS provider and point them to the load balancer that is fronting the Ingress Controller. Cloud infrastructure provider specific behaviors can apply, so talk to your cluster administrator to make sure you get these things right."

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mkey, I just checked and it took me 5 minutes to enable DNSSEC on an AWS Route53 domain. I think we should leave the instructions as-is and push for DNSSEC in the arch meeting. 😄

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants