Skip to content

Commit 859621e

Browse files
authored
Merge pull request #57402 from xenolinux/EDNS-cluster-wide-proxy
OCPBUGS#10545: Configuring cluster wide proxy on the External DNS Operator
2 parents 75bfde9 + 2ef7084 commit 859621e

File tree

3 files changed

+60
-0
lines changed

3 files changed

+60
-0
lines changed

_topic_maps/_topic_map.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1160,6 +1160,8 @@ Topics:
11601160
File: nw-creating-dns-records-on-gcp
11611161
- Name: Creating DNS records on a public DNS zone for Infoblox
11621162
File: nw-creating-dns-records-on-infoblox
1163+
- Name: Configuring the cluster-wide proxy on the External DNS Operator
1164+
File: nw-configuring-cluster-wide-egress-proxy
11631165
- Name: Network policy
11641166
Dir: network_policy
11651167
Topics:
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * networking/external_dns_operator/nw-configuring-cluster-wide-egress-proxy.adoc
4+
5+
:_content-type: PROCEDURE
6+
[id="nw-configuring-cluster-wide-proxy_{context}"]
7+
= Configuring the External DNS Operator to trust the certificate authority of the cluster-wide proxy
8+
9+
You can configure the External DNS Operator to trust the certificate authority of the cluster-wide proxy.
10+
11+
.Procedure
12+
13+
. Create the config map to contain the CA bundle in the `external-dns-operator` namespace by running the following command:
14+
+
15+
[source,terminal]
16+
----
17+
$ oc -n external-dns-operator create configmap trusted-ca
18+
----
19+
20+
. To inject the trusted CA bundle into the config map, add the `config.openshift.io/inject-trusted-cabundle=true` label to the config map by running the following command:
21+
+
22+
[source,terminal]
23+
----
24+
$ oc -n external-dns-operator label cm trusted-ca config.openshift.io/inject-trusted-cabundle=true
25+
----
26+
27+
. Update the subscription of the External DNS Operator by running the following command:
28+
+
29+
[source,terminal]
30+
----
31+
$ oc -n external-dns-operator patch subscription external-dns-operator --type='json' -p='[{"op": "add", "path": "/spec/config", "value":{"env":[{"name":"TRUSTED_CA_CONFIGMAP_NAME","value":"trusted-ca"}]}}]'
32+
----
33+
34+
.Verification
35+
36+
* After the deployment of the External DNS Operator is completed, verify that the trusted CA environment variable is added to the `external-dns-operator` deployment by running the following command:
37+
+
38+
[source,terminal]
39+
----
40+
$ oc -n external-dns-operator exec deploy/external-dns-operator -c external-dns-operator -- printenv TRUSTED_CA_CONFIGMAP_NAME
41+
----
42+
+
43+
.Example output
44+
[source,terminal]
45+
----
46+
trusted-ca
47+
----
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
:_content-type: ASSEMBLY
2+
[id="external-dns-operator-cluster-wide-proxy"]
3+
= Configuring the cluster-wide proxy on the External DNS Operator
4+
include::_attributes/common-attributes.adoc[]
5+
:context: external-dns-operator-cluster-wide-proxy
6+
7+
toc::[]
8+
9+
You can configure the cluster-wide proxy in the External DNS Operator. After configuring the cluster-wide proxy in the External DNS Operator, Operator Lifecycle Manager (OLM) automatically updates all the deployments of the Operators with the environment variables such as `HTTP_PROXY`, `HTTPS_PROXY`, and `NO_PROXY`.
10+
11+
include::modules/configuring-egress-proxy-edns-operator.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)