-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Enhancement]: Nameserver #10835
Comments
You should probably elaborate on the use-case and why this is a general issue. |
The use case is replication between on premises Kafka clusters provisioned with Strimzi and Confluent Cloud clusters with private connectivity. Now, we run two networks on premises. One for dev/qa namespaces and one for prod, on Openshift. Target clusters are segregated in three seperate networks: dev, stage, prod. dnsConfig, dnsPolicy would allow to lift configuration for resolution for these connectors to the level of the pods within its namespace and thereby match the corresponding remote resolver. I.e. the use case is a scenario where remote server names have identical domains across environments and environments (here at the source) don't exist in different networks (different dev and qa namespaces share the same source cluster: a dev/qa Openshift cluster). |
Ok, thanks for the clarification. We will triage it in the next call, but I think it makes sense. Would you be interested in contributing it assuming it is accepted? |
Thank you, Jakub. Assuming this feature gets accepted, I’d be glad to contribute. I need to discuss it with my superior before making any firm commitments. Let's synchronize on this point after triage. |
This will be really useful as a workaround for our issue with Cloud DNS: #9551. We may deploy CoreDNS explicitly for the Strimzi components. |
@ventsislav-georgiev I'm not sure how it relates to your issue. In your case, you IIRC do not have basic DNS functionality in your Kubernetes cluster - in other words your cluster is non-compliant. This issue is about some weird multi-network environment. Unfortunately, we did not get to this in the last community call triage as we run out of time. I do not expect that this would have any general objections. But I expect that it would ned a proposal to explain the use cases and how it will be actually done. |
Related problem
Our Mirrormaker2 connectors need to use different nameservers for name resolution depending on in which Openshift namespace they are deployed.
dnsConfig and dnsPolicy on Pods allow for configuration of /etc/resolv.conf.
However, CRDs for connectors don't seem to expose this.
A volumeMount to /etc/resolv.conf based on ConfigMap seems not to be allowed (only additional mounts to /mnt).
Custom commands that update /etc/resolv.conf don't seem to be supported either.
JVM System properties don't seem to support an option to configure nameservers either.
Unless there are other mechanisms to configure Kafkamirrormaker2 containers to utilize specific nameservers, exposing dnsConfig and dnsPolicy on the CRD(s) seem to be the most logical way to support this feature.
Suggested solution
Let the CRD(s) expose dnsConfig and dnsPolicy for pods.
Alternatives
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: