-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow other ConfigMap names than "coredns" #24
Comments
I have forked and modified for the same usecase. https://github.com/saithejareddy/hairpin-proxy Both were needed in case your workloads are running in Linodes k8s. |
Thanks for taking the initiative @saithejareddy! I also needed this for Kubernetes on Linode. I can't run untrusted Docker images in production and your code on GitHub was throwing a bunch of errors when I built and ran it. I fixed it. Here's a version of your fork that works for me: https://github.com/sdudley/hairpin-proxy When using this, don't forget to update the Role for
Then, in the deployment for the controller:
|
Thank you @sdudley for fixing the errors. Can you please raise a pull request? I will merge the changes and raise a pull request with compumike/hairpin-proxy repository. |
Observation: this requires the manual creation of an empty If the configmap doesn't exist maybe it can be created, initially empty, and then proceed to add the This would also require to change the kube-system role to add the |
Hi @saithejareddy - This project does not look like it is being actively maintained by its author, so it seems like raising a PR would be a waste of time...but people are welcome to do whatever they want with my fork. I have been using it for a few days now and it appears stable. @dvarrazzo, yes, I should have specified in my comment above that you need to "create a ConfigMap called coredns-custom in the kube-system namespace", or more precisely, this:
I like working with Python about as much as I like swimming with alligators. Since I am not moving to Florida any time soon, I will leave it up to someone else if they want to take the initiative to add features like auto-creating the configmap. |
So you must love this Ruby project 😄 FYI yesterday I tested @saithejareddy branch with @sdudley last commit and it worked very well, after creating a configmap exactly like the one you suggest (you are right, there needs to be at least an empty entry for |
Great work everyone! I needed a fully integrated branch to incorporate into some automated deployment, so I put my own fork together: https://github.com/JarvusInnovations/hairpin-proxy It has the needed ConfigMap built into |
Hi!
When deploying CoreDNS using a RKE2 in Rancher, they name the CoreDNS file "rke2-coredns". But since it is hardcoded here as:
... make me unable to use this for my CoreDNS instance.
Perhaps the name of the ConfigMap should be an option that is just defaulted to "coredns", but could be overridden?
The text was updated successfully, but these errors were encountered: