Configure external DNS servers (AWS Route53, Google CloudDNS and others) for Kubernetes Ingresses and Services
-
Updated
Mar 7, 2023 - Go
Configure external DNS servers (AWS Route53, Google CloudDNS and others) for Kubernetes Ingresses and Services
A community opinionated template for deploying a single Kubernetes cluster with Ansible and Terraform backed by Flux, SOPS, GitHub Actions, Renovate and more!
The Kubefirst Open Source Platform
Full feature EKS cluster with Terragrunt/Terraform
AWS EKS - kubernetes project
My home Kubernetes cluster managed by GitOps (Flux), deployed on Talos Linux.
Setup for a K8s home lab running on a single host (e.g. Intel NUC)
This repo contains Kubernetes manifests for the below mentioned topics
The project demonstrates how to use Ansible to deploy an Amazon EKS cluster incl. extensions and example workload
Terraform Manifests to create resources on Google Cloud Platform for hobbyists with limited budgets.
If you want to spin up ECK with production feature like, SAML cert-manager, this guide is for you.
Creating new secured (ssl) domains in k8s using helm
How to expose a Kubernetes web application with DNS and TLS
Example deployment of resources using flux
Terraform module to provision an IAM role for external-dns running in a Kops cluster, and attach an IAM policy to the role with permissions to modify Route53 record sets
Deploy golang and python apps in EKS cluster (mix EC2 and Fargate), service meshing using Istio, ALB Ingress, Terraform, Helm, golang admission controller, golang kubernetes operator
Utility to adopt AWS route53 entries (record sets) so the external-dns can track and update them based on Kubernetes ingresses
Buffalo Kubernetes/CNCF Meetup, Kube Cluster
Add a description, image, and links to the external-dns topic page so that developers can more easily learn about it.
To associate your repository with the external-dns topic, visit your repo's landing page and select "manage topics."