Skip to content

Commit b6b1576

Browse files
helm-docs: automated action
1 parent 2f3a7ef commit b6b1576

File tree

1 file changed

+72
-0
lines changed

1 file changed

+72
-0
lines changed

charts/ziti-edge-tunnel/README.md

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ Kubernetes: `>= 1.20.0-0`
1818
## Overview
1919

2020
You may use this chart to reach services node-wide via your Ziti network via DNS. For example, if you create a repository or container registry Ziti service, and your cluster has no internet access, you can reach those repositories or container registries via Ziti services.
21+
2122
**NOTE:**
2223
For one node kubernetes approaches like k3s, this works out-of-the-box and you can extend your coredns configuration to forward to the Ziti DNS IP, as you can see [here](https://openziti.io/docs/guides/kubernetes/workload-tunneling/kubernetes-daemonset/).
2324
For multinode kubernetes installations, where your cluster DNS could run on a different node, you need to install the [node-local-dns](https://kubernetes.io/docs/tasks/administer-cluster/nodelocaldns/) feature, which secures that the Ziti DNS name will be resolved locally, on the very same tunneler, as Ziti Intercept IPs can change from node to node. See [this](https://github.com/lablabs/k8s-nodelocaldns-helm) helm chart for a possible implementation.
@@ -61,6 +62,77 @@ When you don't want to use the default key name `persisted-identity` you can def
6162

6263
If you want to resolve your Ziti domain inside the pods, you need to customize CoreDNS. See [Official docs](https://openziti.io/docs/guides/kubernetes/workload-tunneling/kubernetes-daemonset/).
6364

65+
#### Multinode example
66+
Customise ConfigMap that you apply for node-local-dns by appending the ziti specific domain and the upstream DNS server of ziti-edge-tunnel,
67+
68+
```yaml
69+
apiVersion: v1
70+
kind: ConfigMap
71+
metadata:
72+
name: node-local-dns
73+
namespace: kube-system
74+
labels:
75+
addonmanager.kubernetes.io/mode: Reconcile
76+
data:
77+
Corefile: |
78+
your.ziti.domain:53 {
79+
log
80+
errors
81+
reload
82+
loop
83+
bind __PILLAR__LOCAL__DNS__ __PILLAR__DNS__SERVER__
84+
forward . 100.64.0.2
85+
prometheus :9253
86+
}
87+
__PILLAR__DNS__DOMAIN__:53 {
88+
errors
89+
reload
90+
loop
91+
bind __PILLAR__LOCAL__DNS__ __PILLAR__DNS__SERVER__
92+
forward . 100.64.0.2
93+
prometheus :9253
94+
health __PILLAR__LOCAL__DNS__:8080
95+
}
96+
in-addr.arpa:53 {
97+
errors
98+
cache 30
99+
reload
100+
loop
101+
bind __PILLAR__LOCAL__DNS__ __PILLAR__DNS__SERVER__
102+
forward . __PILLAR__CLUSTER__DNS__ {
103+
force_tcp
104+
}
105+
prometheus :9253
106+
}
107+
ip6.arpa:53 {
108+
errors
109+
cache 30
110+
reload
111+
loop
112+
bind __PILLAR__LOCAL__DNS__ __PILLAR__DNS__SERVER__
113+
forward . __PILLAR__CLUSTER__DNS__ {
114+
force_tcp
115+
}
116+
prometheus :9253
117+
}
118+
.:53 {
119+
errors
120+
cache 30
121+
reload
122+
loop
123+
bind __PILLAR__LOCAL__DNS__ __PILLAR__DNS__SERVER__
124+
forward . __PILLAR__UPSTREAM__SERVERS__
125+
prometheus :9253
126+
}
127+
```
128+
129+
Refer to the documentation of NodeLocal DNSCache on how to replace the values starting with two underscores and then apply it by,
130+
131+
```console
132+
kubectl apply -f nodelocaldns.yaml
133+
```
134+
135+
#### One node example
64136
Customize CoreDNS configuration,
65137

66138
```console

0 commit comments

Comments
 (0)