external-dns icon indicating copy to clipboard operation
external-dns copied to clipboard

fix: `TXT` record when killed at the wrong time

Open PascalBourdier opened this issue 1 year ago • 20 comments

why?

TXT entries are very special because external-dns use it to "lock" the owner

currently, a DNS will be like that:

time="2023-12-16T16:50:40Z" level=info msg="Changing record." action=CREATE record=oops-test... ttl=1 type=CNAME zone=ff...
time="2023-12-16T16:50:41Z" level=info msg="Changing record." action=CREATE record=edns-cf-oops-test... ttl=1 type=TXT zone=ff..
time="2023-12-16T16:50:41Z" level=info msg="Changing record." action=CREATE record=edns-cf-cname-oops-test... ttl=1 type=TXT zone=ff...

most of the time it's ok but in some cases, sh*t happen and external-dns pod can be killed at the wrong time

and it can be annoying because if only the CNAME record is created, then external-dns can't update or remove it

how

In fact we have to managed two cases: creation & deletion

If we create TXT records in a first step during creation and remove TXT in a last step for deletion we can avoid it safely

Maybe this could be made also in other providers

Description

Fixes #ISSUE

Checklist

  • [ ] Unit tests updated
  • [ ] End user documentation updated

PascalBourdier avatar Dec 16 '23 17:12 PascalBourdier

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: Once this PR has been reviewed and has the lgtm label, please assign sheerun for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment Approvers can cancel approval by writing /approve cancel in a comment

k8s-ci-robot avatar Dec 16 '23 17:12 k8s-ci-robot

Hi @PascalBourdier. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Dec 16 '23 17:12 k8s-ci-robot

Hello @PascalBourdier,

Thanks for this interesting PR ! In order to keep this issue really fixed, we'll need a test case that fails without this change on the provider.

mloiseleur avatar Dec 18 '23 07:12 mloiseleur

Hello @PascalBourdier,

Thanks for this interesting PR ! In order to keep this issue really fixed, we'll need a test case that fails without this change on the provider.

I don't know how to add this test case Could you help me ?

PascalBourdier avatar Jan 05 '24 08:01 PascalBourdier

@PascalBourdier I think the bigger problem is, that you fix it only in one provider and maybe we should fix it in all at once. Did you ever observed such an issue or is it actually a guess?

szuecs avatar Jan 08 '24 13:01 szuecs

@PascalBourdier I think the bigger problem is, that you fix it only in one provider and maybe we should fix it in all at once. Did you ever observed such an issue or is it actually a guess?

In fact, it is a first version and you're right we should do it for all providers I observed it on my side (on cloudflare and not on aws)

PascalBourdier avatar Jan 08 '24 14:01 PascalBourdier

The Kubernetes project currently lacks enough contributors to adequately respond to all PRs.

This bot triages PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the PR is closed

You can:

  • Mark this PR as fresh with /remove-lifecycle stale
  • Close this PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

k8s-triage-robot avatar Apr 07 '24 15:04 k8s-triage-robot

/remove-lifecycle stale /retitle fix: TXT record when killed at the wrong time

mloiseleur avatar May 03 '24 11:05 mloiseleur

The Kubernetes project currently lacks enough contributors to adequately respond to all PRs.

This bot triages PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the PR is closed

You can:

  • Mark this PR as fresh with /remove-lifecycle stale
  • Close this PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

k8s-triage-robot avatar Aug 01 '24 11:08 k8s-triage-robot

/remove-lifecycle stale

PascalBourdier avatar Aug 01 '24 12:08 PascalBourdier