You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cloud_experts_tutorials/cloud-experts-external-dns.adoc
+32-27Lines changed: 32 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,25 +20,27 @@ toc::[]
20
20
21
21
Configuring the xref:../applications/deployments/osd-config-custom-domains-applications.adoc[Custom Domain Operator] requires a wildcard CNAME DNS record in your Amazon Route 53 hosted zone. If you do not want to use a wildcard record, you can use the `External DNS` Operator to create individual entries for routes.
22
22
23
-
This tutorial guides you through deploying and configuring the External DNS Operator with a custom domain in {product-title} (ROSA).
23
+
Use this tutorial to deploy and configure the `External DNS` Operator with a custom domain in {product-title} (ROSA).
24
24
25
25
[IMPORTANT]
26
26
====
27
-
The External DNS Operator does not support IRSA/STS and uses long-lived IAM credentials. This tutorial will be updated once STS is supported.
27
+
The `External DNS` Operator does not support STS using IAM Roles for Service Accounts (IRSA) and uses long-lived Identity Access Management (IAM) credentials instead. This tutorial will be updated when the Operator supports STS.
28
28
====
29
29
30
30
[id="cloud-experts-external-dns-prerequisites"]
31
31
== Prerequisites
32
32
33
33
* A ROSA cluster
34
-
* You have access to the OpenShift CLI (`oc`)
35
-
* You have access to the AWS CLI (`aws`)
36
-
* A unique domain, such as *.apps.<company_name>.io
34
+
* A user account with `dedicated-admin` privileges
35
+
* The OpenShift CLI (`oc`)
36
+
* The Amazon Web Services (AWS) CLI (`aws`)
37
+
* A unique domain, such as `*.apps.<company_name>.io`
37
38
* An Amazon Route 53 public hosted zone for the above domain
ROSA manages secondary Ingress Controllers using the Custom Domain Operator. The following procedure outlines how to deploy a secondary Ingress Controller using a custom domain.
66
+
ROSA manages secondary Ingress Controllers using the `Custom Domain` Operator. Use the following procedure to deploy a secondary Ingress Controller using a custom domain.
60
67
61
68
.Prerequisites
62
69
@@ -65,16 +72,15 @@ ROSA manages secondary Ingress Controllers using the Custom Domain Operator. The
65
72
66
73
.Procedure
67
74
68
-
. Create a new project
75
+
. Create a new project:
69
76
+
70
77
[source,terminal]
71
78
----
72
79
$ oc new-project external-dns-operator
73
80
----
74
81
75
-
. Create a new TLS secret from a private key and a public certificate, where `fullchain.pem` is your full wildcard certificate chain (including any intermediaries) and `privkey.pem` is your wildcard certificate's private key.
82
+
. Create a new TLS secret from a private key and a public certificate, where `fullchain.pem` is your full wildcard certificate chain (including any intermediaries) and `privkey.pem` is your wildcard certificate's private key:
. Create a new project for our sample application:
297
+
Now that the `ExternalDNS` controller is running, you can deploy a sample application to confirm that the custom domain is configured and trusted when you expose a new route.
298
+
299
+
. Create a new project for your sample application:
0 commit comments