-
Notifications
You must be signed in to change notification settings - Fork 261
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable possibility to set private DNS on AKS provisioning #7163
Comments
I think we need to talk to backend about this to understand where we would wire this in to the request we send to create an AKS cluster |
There's no private dns zone field defined in the relevant schema so I think we'll need backend involvement to add support for the feature then UI work to expose it; the backend issue is here |
We should be unblocked now by rancher/aks-operator#131 -- @mantis-toboggan-md can you take a look and confirm? |
@gaktive I don't think we're unblocked here. I still don't see this field defined in the aksClusterConfigSpec schema; I believe we're waiting on rancher/rancher#39422 |
Taking Team 2 (Hostbusters) off and putting Highlander instead. |
To be specific we are talking about this case when AKS is deployed as private cluster and we are setting cluster with these options:
|
@cpinjani is the expected format for privateDNSZone documented somewhere? What you have quoted doesn't seem to line up with the error message in your screenshot |
@mantis-toboggan-md In the UI field "Private DNS Zone ID", user is suppose to provide full resource-id of privateDNSZone which on Azure postal is of format, as error message states. Reference
Let me know if this clarifies. |
Validation passed on build: Spec:
|
Validated again on Rancher(v2.9-a9355940c0629ca419b7dd3e4098c4ea0e52c0c0-head); Dashboard(master 46a44c1), it is fixed. Cluster update works as expected too. |
Internal reference: SURE-3392
Request description:
Enable the possibility to set private DNS on AKS provisioning cluster. Currently, clusters are manually provisioned (or via Terraform) and skips the UI completely.
Actual behavior:
Currently, there is no setting in Rancher to set a private DNS for AKS cluster.
Expected behavior:
Add the possibility to set private DNS on AKS provisioning cluster.
Additional notes:
Based on one environment, the network infrastructure is more or less the same as the "hub and spoke" on the page: https://docs.microsoft.com/en-us/azure/aks/private-clusters#hub-and-spoke-with-custom-dns
Their DNS is centralized in the hub network, and they want to run AKS clusters in spoke networks.
To get it to work, they need to be able to point the AKS clusters to the central private DNS zone. Otherwise, the created AKS cluster's Kubernetes API endpoint address won't resolve, and the cluster will fail to provision, and the VMs can't resolve the Kubernetes API address.
Additional Azure documentation on how to set a custom private DNS zone: https://docs.microsoft.com/en-us/azure/aks/private-clusters#create-a-private-aks-cluster-with-a-custom-private-dns-zone
Usage: under clusters.tf, within the
resource
JSON, there'd be aprivate_dns_zone_id
to leverageThe text was updated successfully, but these errors were encountered: