Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add option to use only new format TXT records #4946

Open
wants to merge 9 commits into
base: master
Choose a base branch
from

Conversation

malpou
Copy link

@malpou malpou commented Dec 12, 2024

Description

Adds a new flag --txt-new-format-only that allows configuring external-dns to only create TXT records in the new format, containing record type information. This helps reduce the number of DNS records created when using external-dns at scale, addressing provider-specific record limits.

By default, the TXT registry creates both old and new format records for backwards compatibility. The new format includes the record type in the name (e.g., "a-" prefix for A records). With this change, users can opt-in to using only the new format when all their external-dns instances support it.

Key changes:

  • Add --txt-new-format-only flag (defaults to false for backwards compatibility)
  • Add configuration option to TXTRegistry
  • Update TXT record generation to respect the new setting
  • Add tests for the feature
  • Maintain existing behavior by default

Example usage:

# Default behavior - creates both old and new format records
external-dns

# Enable new format only - reduces number of TXT records
external-dns --txt-new-format-only

Note: AAAA records already only create new format records regardless of this setting, as they have special handling.

Fixes #3167
Fixes #4636

Checklist

  • Unit tests updated
  • End user documentation updated

Copy link

linux-foundation-easycla bot commented Dec 12, 2024

CLA Signed

The committers listed above are authorized under a signed CLA.

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign mloiseleur for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. label Dec 12, 2024
@k8s-ci-robot
Copy link
Contributor

Welcome @malpou!

It looks like this is your first PR to kubernetes-sigs/external-dns 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes-sigs/external-dns has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. 😃

@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Dec 12, 2024
@k8s-ci-robot
Copy link
Contributor

Hi @malpou. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. and removed cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. labels Dec 12, 2024
@@ -3,6 +3,24 @@
The TXT registry is the default registry.
It stores DNS record metadata in TXT records, using the same provider.

## Record Format Options
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you include a subsection on how to handle the migration from two records to a single record? Specifically, what are the steps involved in this consolidation, and will the external DNS automatically delete the old records or will manual cleanup be necessary?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Right now i haven't thought of any automatic cleanup, so for now it would be a manual cleanup for the old format TXT records.

Is that an okay approach, or would you like it to happen automatically?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mentioning this in the documentation likely is enough.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added an extra section describing a manual migration flow.

external-dns

# Only create new format records
external-dns --txt-new-format-only
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this required - --managed-record-types=TXT or with that flags we imply implicitly that TXT records should be handled?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The flag, is the initial implementation thought as an addition to the flags you would already start external-dns with.

So no it doesn't implicitly tell that we are using TXT records.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The usage of the flag should be more clear now.

@ivankatliarchuk
Copy link
Contributor

ivankatliarchuk commented Jan 4, 2025

resolves #3420

relates #3757 I do not think this issue is a blocker, as we could deprecate flags or plan migrations

pr-refresh #3744

pr that potentially need to be merged first #3774

- Legacy format: Creates a TXT record without record type information
- New format: Creates a TXT record with record type information (e.g., 'a-' prefix for A records)

By default, the TXT registry creates records in both formats for backwards compatibility. You can configure it to use only the new format by using the `--txt-new-format-only` flag. This reduces the number of TXT records created, which can be helpful when working with provider-specific record limits.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we add a bit more information about this behaviour as well? e.g. why external-dns creates two records

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't have the history of why there are 2 formats, but would be glad to add some more text about it.

We just reached a point in my team at work where we would like to get rid of our duplicate TXT records in all of our DNS zones.

@@ -138,6 +138,7 @@ type Config struct {
TXTSuffix string
TXTEncryptEnabled bool
TXTEncryptAESKey string `secure:"yes"`
TXTNewFormatOnly bool
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

would it be possible to update types_test.go as well?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added tests for the new flag now

@ivankatliarchuk
Copy link
Contributor

ivankatliarchuk commented Jan 4, 2025

Is this flag --txt-new-format-only could be considered like always use default latest/new format?

@malpou
Copy link
Author

malpou commented Jan 4, 2025

I'd like for the new format to be the default thing, but i don't have enough insight to know if that's currently possible??

This PR, focuses on giving people the option to move over to the new format without breaking anything for people that don't want that at this point in time.

It seems like there are multiple persons that would like this option (myself included), without having to move over to encrypted records to get rid of the extra records.

@k8s-ci-robot k8s-ci-robot added cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. and removed cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Jan 4, 2025
@malpou malpou force-pushed the feat/txt-registry-new-format-only branch from 7ad3deb to 8937026 Compare January 4, 2025 15:03
@k8s-ci-robot k8s-ci-robot removed the cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. label Jan 4, 2025
@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Jan 4, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
3 participants