You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When creating a Service of type LoadBalancer it's ExternalIPs value will be used by components such as external-dns to create A records for traffic routing, however, as the private internal IPv4 address of the NLB is appended to the Ingress IPs property of the LoadBalancerStatus returned to service and both the public IPv4 and private IPv4 are added to DNS.
It would be helpful to disable this functionality when external-dns, or other components which reference this property and expect only public IP addresses are deployed.
Note: Workaround is to enforce the External-DNS record e.g. using kyverno policy and external-dns.alpha.kubernetes.io/target annotation injection based on status.loadBalancer.ingress[] field.
Almost all cloud providers that we use support a way to create a LB with only public address or enforce it through flag. Please have a look if possible to implement such feature
Is this a BUG REPORT or FEATURE REQUEST?
Choose one: FEATURE REQUEST
When creating a Service of type
LoadBalancer
it's ExternalIPs value will be used by components such as external-dns to create A records for traffic routing, however, as the private internal IPv4 address of the NLB is appended to the Ingress IPs property of the LoadBalancerStatus returned to service and both the public IPv4 and private IPv4 are added to DNS.It would be helpful to disable this functionality when external-dns, or other components which reference this property and expect only public IP addresses are deployed.
kubernetes-sigs/external-dns#2810 - Issue discussing this in external-dns
The text was updated successfully, but these errors were encountered: