-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Chained CNAME resolution fails #321
Comments
This was discussed here: Debugging issue with external service - Google Groups. I believe I'm having the same issue, any updates? |
@noazark It's been tagged, but not yet resolved. |
I was the one who reported the original issue. I haven't had much time to look at the code, but what I tested so far seems to indicated that in func agent/nodeLookup the qType is set to TypeANY instead of TypeA, which causes the DNS lookup to just return the top result. |
Small explanation to the proposed fix: The problem occurs because only dns.TypeA and TypeAAAA returned records are added to the record list consul builds (cf. https://github.com/hashicorp/consul/blob/master/command/agent/dns.go#L470). Since in a chained cname, the (n-1) records until the A lookup will be CNAME type, the fix only required adding CNAME returned records to the record list. |
I am also encountering this problem when trying to use an RDS external service. What is the priority on this issue, any plans to incorporate the above fix? |
@begriffs Should be an easy enough fix, we'll try to make sure its in 0.5.1 |
Thanks a lot. |
Add -job to filename to match convention
… auth method (hashicorp#321) Kubernetes service account could have multiple secrets associated with it. Previously, we were only looking at the first secret in the list and using that secret to create or update the auth method in Consul. However, on some platforms (Openshift) the service account may contain other types of secrets. Specifically, in the case of Openshift, there are two secrets: one for the service account token and the other for docker credentials. This second secret gets injected automatically by Openshift. This changes our implementation to use the first secret of type kubernetes.io/service-account-token.
Consul only does a single level of CNAME resolution, but this may not be enough for services like RDS.
The text was updated successfully, but these errors were encountered: