-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(SURE-3392) [RFE] Enable possibility to set private DNS on AKS provisioning #131
Comments
See also rancher/dashboard#7163 |
@kkaempf not sure what labels are in use on this repo but as noted elsewhere, UI is blocked by this, not the other way around. |
It is still blocked by UI, I have updated UI issue rancher/dashboard#7163 (comment) |
UI scheduled it for 2.9.0, adapting milestone accordingly |
Blocked, requires UI fixes rancher/dashboard#7163 (comment) |
UI has a solution in rancher/dashboard#10744 that has been merged so backend should be unblocked. @kkaempf is ui-blocked the right label here? If there's something like "blocked by UI" that sounds more apt but I haven't reviewed all the labels on these repos for context. |
Seems unblocked as rancher/dashboard#7163 is fixed, adding "To Test", thanks. |
Validated on build: Meanwhile tested via API and fix working fine.
|
Validation passed on build:
Spec:
|
Request description:
Enable the possibility to set private DNS on AKS provisioning cluster.
Actual behavior:
Currently, there is no setting in Rancher to set a private DNS for AKS cluster.
Expected behavior:
Add the possibility to set private DNS on AKS provisioning cluster.
Additional notes:
Customer network infrastructure is more or less the same as the "hub and spoke" on the page: https://docs.microsoft.com/en-us/azure/aks/private-clusters#hub-and-spoke-with-custom-dns
Customer DNS is centralized in the hub network, and they want to run AKS clusters in spoke networks.
To get it to work, they need to be able to point the AKS clusters to the central private DNS zone. Otherwise, the created AKS cluster's Kubernetes API endpoint address won't resolve, and the cluster will fail to provision, and the VMs can't resolve the Kubernetes API address.
Additional Azure documentation on how to set a custom private DNS zone: https://docs.microsoft.com/en-us/azure/aks/private-clusters#create-a-private-aks-cluster-with-a-custom-private-dns-zone
Changes:
The text was updated successfully, but these errors were encountered: