-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS: Skip hosted zones, if GetHostedZones returns AccessDenied #287
AWS: Skip hosted zones, if GetHostedZones returns AccessDenied #287
Conversation
Any feedback on this? Next I'll update the doc and the Changelog. |
Thanks @totallyunknown Some remarks
|
Thanks for the PR. The approach is aligned with #230, but now looking at it seems this approach does not suit everyone needs:
|
@totallyunknown as mentioned in the comment above we will have certain issues with AWS rate limiting. We were thinking of tagging hosted zones to select hosted zones to manage. What are your thoughts on that, or if you think you want to try that approach instead? |
Thanks for the feedback. I had already the same thoughts about the API request volume. In the longer run it might useful, to have a prometheus metric exposed, counting the API requests for AWS. We could implement some kind of internal caching for With the current behaviour external-dns is broken, if any of the domain names is restricted by a IAM policy. So we need this check somehow anyway? #322 might solve our problem, but leaves the problem above with the permissions. I think we should introduce a new flag for filtering zones, who external-dns might be responsible for. I would like to introduce zone filter ( Example: Hosted Zone ID: Ingress/Service Hostname: With |
@totallyunknown Would a filter for |
@totallyunknown metrics for http requests are already implemented I currently alert when we get enough failures from aws I use the above as I currently hit limits with to many instances of external-dns running on multiple clusters |
@totallyunknown @ideahitme One year anniversary for this PR 😞 What's the current opinion about this? Did any change of mind happen since last year? |
IT seems the PR is stale. I'll close it. Feel free to create a new one. |
I'll have the problem, that I have private and public route53 zones. If the IAM policy has restrictions to specific zones, external-dns will fail. This PR tries to make a GetHostedZone-Call in Zones() and exclude all Zones where we don't have access.
This will fix #230.