Skip to content

fix(txt-registry): skip creation of already-existing TXT records (#4914)#5459

Merged
k8s-ci-robot merged 15 commits intokubernetes-sigs:masterfrom
u-kai:fix/issue-4914
Sep 1, 2025
Merged

fix(txt-registry): skip creation of already-existing TXT records (#4914)#5459
k8s-ci-robot merged 15 commits intokubernetes-sigs:masterfrom
u-kai:fix/issue-4914

Conversation

@u-kai
Copy link
Copy Markdown
Member

@u-kai u-kai commented May 24, 2025

What does it do ?

Adds a cache-based filter to TXTRegistry so that External-DNS no longer
tries to recreate TXT records that already exist in the provider.
Fixes #4914

Motivation

When only the data record (A/CNAME) is removed, External-DNS next sync loop
recreates that record and also tries to create the unchanged TXT record,
which providers like Route53 reject with “record already exists”.
Caching existing TXT entries and skipping them in ApplyChanges() prevents
this failure.

More

  • Yes, this PR title follows Conventional Commits
  • Yes, I added unit tests
  • Yes, I updated end user documentation accordingly

@k8s-ci-robot k8s-ci-robot requested a review from mloiseleur May 24, 2025 09:43
@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label May 24, 2025
@k8s-ci-robot k8s-ci-robot requested a review from szuecs May 24, 2025 09:43
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

Welcome @u-kai!

It looks like this is your first PR to kubernetes-sigs/external-dns 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes-sigs/external-dns has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. 😃

@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label May 24, 2025
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

Hi @u-kai. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label May 24, 2025
@mloiseleur
Copy link
Copy Markdown
Collaborator

mloiseleur commented May 24, 2025

Thanks.
I'm not sure of this approach 🤔 It may increase memory usage on big users.
/ok-to-test
cc @szuecs

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels May 24, 2025
@mloiseleur
Copy link
Copy Markdown
Collaborator

mloiseleur commented May 24, 2025

What happens the txt record has also been deleted ?
It will still be in this cache, so not re-created ?

@u-kai
Copy link
Copy Markdown
Member Author

u-kai commented May 24, 2025

@mloiseleur
Thanks for pointing that out — you’re right, the current patch keeps the TXT snapshot alive across the entire reconcile loop.
Apologies — I overlooked this in the first draft.

Proposed update

func (r *TXTRegistry) ApplyChanges(ctx context.Context, c *plan.Changes) error {
    ...

    if err := r.provider.ApplyChanges(ctx, c); err != nil {
        return err
    }

    // ✨ NEW: drop the snapshot so the next Records() call rebuilds it
    r.existingTXT = txtSnapshot{}  // formerly existingTXT

    return nil
}
  • Memory – The snapshot now lives for just one reconciliation pass.
    In my understanding, GC might run a little later than before, but the peak heap usage right after r.provider.Records() when the full slice of endpoints is allocated — remains exactly the same.
    If I’m mistaken, please let me know. 🙇

  • Correctness – If a TXT record is deleted between loops, the next Records() call rebuilds the snapshot without it, so the data record will be recreated.

Let me know if this per-loop cleanup addresses your concerns; I can push the change right away. 🙇‍♂️

@u-kai

This comment was marked as off-topic.

@mloiseleur

This comment was marked as off-topic.

@u-kai

This comment was marked as off-topic.

@ivankatliarchuk
Copy link
Copy Markdown
Member

ivankatliarchuk commented May 25, 2025

There are concerns Regarding TXT Caching as a Solution

I'm unclear how caching will resolve the underlying issue. From my perspective, this looks like a bug in either the CRD source, the TXT registry, or how records and plans are being handled. Instead of identifying and fixing that root cause, the current proposal is to introduce a new feature – TXT caching. The issue missing how-to reproduce, what the arguments are and version for reported bug is ~0.13, when latest version is 0.17, which means, the issue may no longer even exist.

The approach could actually worsen the situation for TXT records. Implementing a cache on a stateless service means the problem is likely to reappear during restarts or new service startups.

This proposed caching mechanism isn't a fix. We need to find the root cause of the problem. The expectation should be to reproduce the issue in a controlled environment and then try to pinpoint where the bug lies.

Relevant issue #4998

It appears there's a bug within either the CRD source, the TXT registry, or the mechanism for pulling records for a specific provider and handling the plan. Instead of addressing this underlying bug, the decision has been made to introduce a new feature: TXT caching.

@ivankatliarchuk
Copy link
Copy Markdown
Member

TXT registry already have a cache

recordsCache []*endpoint.Endpoint
and local endpoints and TXT records cache https://github.com/kubernetes-sigs/external-dns/blob/master/registry/txt.go#L138-L141

This is a high-impact issue, and without being able to reproduce it, it's tough to pinpoint the exact cause. It's even possible that upsert-only failed, but everything works fine when the sync flag is set.

I propose to start with:

  • Adding a unit test that specifically shows the issue where the record is deleted but the registry record persists.
  • Reproducing the actual bug on a local cluster using the Route53 provider and the latest external-dns.
  • Implementing the fix once the root cause is identified.

First two could be done in any order, but with focus on reproducing the problem and providing a unit test, that reveals the bug.

This is currently just an assumption, and without reproducing it, it's hard to be certain. We need to confirm that if a TXT registry record exists without a corresponding managed record (like A, AAAA, or CNAME), we either:

  • Mark the TXT registry record for deletion (though this won't work with upsert-only) and then apply the new changes, OR
  • Leave the TXT registry record untouched and only update the actual record.

@ivankatliarchuk
Copy link
Copy Markdown
Member

Fixes #5340

@ivankatliarchuk
Copy link
Copy Markdown
Member

ivankatliarchuk commented May 25, 2025

Fixes #5003

^ this issue is related, but not sure where scope of the fix will cover it

@u-kai
Copy link
Copy Markdown
Member Author

u-kai commented May 25, 2025

@ivankatliarchuk

Thank you for your feedback.

Initially, I approached this by introducing a caching mechanism.
However, based on mloiseleur suggestion, I revised the implementation to create a temporary data structure that exists only between the Records and ApplyChanges phases.
This structure functions similarly to a filter: it identifies and excludes any TXT records that already exist, preventing their re-creation. Once ApplyChanges is executed, this temporary structure is cleaned up.

The primary issue I'm addressing is ensuring that ExternalDNS can recreate an A record if it was accidentally deleted. Currently, when attempting to create an A record, ExternalDNS also tries to create a corresponding TXT record via the TXTRegistry.
If the TXT record already exists, providers like Route53 return an error, causing the entire operation to fail.

To resolve this, I implemented a mechanism to store existing TXT records during the Records phase. Before ApplyChanges attempts to create new records, it checks against this stored data to ensure it doesn't attempt to recreate existing TXT records, thereby avoiding errors.

Regarding recordsCache, I understand now that it's intended for non-TXT records and is scoped differently than my current change.
In contrast, my approach is limited to TXT records only, and the snapshot is used strictly within a single reconciliation loop to avoid stale state.
So while the naming may appear similar, the intention and scope are different.

I’ve pushed the updated implementation based on this approach.

Please let me know if I misunderstood any part of your suggestion — happy to revise if needed!

@u-kai
Copy link
Copy Markdown
Member Author

u-kai commented May 25, 2025

Hi @mloiseleur, I mentioned earlier that I would wait for your confirmation before pushing the changes, but I received a detailed comment from @ivankatliarchuk and pushed the revised implementation to help clarify the current behavior.

The latest code uses a temporary structure between Records and ApplyChanges instead of caching across reconciliation loops, as previously discussed.

Let me know if this direction still looks good to you — I’m happy to adjust if needed!

@ivankatliarchuk
Copy link
Copy Markdown
Member

Have you managed to validate that issue is still present or it's related to specific flags

  • upsert-only
  • sync
    ?

@ivankatliarchuk
Copy link
Copy Markdown
Member

relates: #3977

@u-kai
Copy link
Copy Markdown
Member Author

u-kai commented May 25, 2025

@ivankatliarchuk

Yes, I was able to reproduce the issue with both --policy=sync and --policy=upsert-only.
For clarity, I'm using hoge.com here as a placeholder — the actual domain has been replaced.

Environment

  • branch: master
  • command:
     external-dns \
    --provider aws \
    --registry txt \
    --txt-owner-id demo \
    --policy sync \ # and upsert-only
    --log-level debug \
    --source ingress
    
  • ingress resource
    apiVersion: networking.k8s.io/v1
     kind: Ingress
    metadata:
      name: demo-wild
      annotations:
        external-dns.alpha.kubernetes.io/aws-weight: "100"
        external-dns.alpha.kubernetes.io/hostname: api.hoge.com
        external-dns.alpha.kubernetes.io/set-identifier: demo
    spec:
      rules:
        - host: "api.hoge.com"
          http:
            paths:
              - path: /
                pathType: Prefix
                backend:
                  service:
                    name: demo-service
                    port:
                      number: 80

Steps to Reproduce

  1. Deploy ExternalDNS.
  2. Deploy the above Ingress and let ExternalDNS create the records.
  3. Manually delete the A record for api.hoge.com from Route53.

Wait for the next reconciliation loop.

Result

On the next loop, ExternalDNS tries to recreate the A record and the associated TXT record.
However, since the TXT record still exists, Route 53 throws an error due to the attempted re-creation of an already-existing record.

DEBU[0001] Adding api.hoge.com. to zone hoge.com. [Id: /hostedzone/ZONEIDXXXXXXXXX]
DEBU[0001] Adding api.hoge.com. to zone hoge.com. [Id: /hostedzone/ZONEIDXXXXXXXXX]
DEBU[0001] Adding a-api.hoge.com. to zone hoge.com. [Id: /hostedzone/ZONEIDXXXXXXXXX]
INFO[0001] Desired change: CREATE a-api.hoge.com TXT  profile=default zoneID=/hostedzone/ZONEIDXXXXXXXXX zoneName=hoge.com.
INFO[0001] Desired change: CREATE api.hoge.com A   profile=default zoneID=/hostedzone/ZONEIDXXXXXXXXX zoneName=hoge.com.
INFO[0001] Desired change: CREATE api.hoge.com TXT  profile=default zoneID=/hostedzone/ZONEIDXXXXXXXXX zoneName=hoge.com.
...
DEBU[0061] Adding api.hoge.com. to zone hoge.com. [Id: /hostedzone/ZONEIDXXXXXXXXX]
DEBU[0061] Adding api.hoge.com. to zone hoge.com. [Id: /hostedzone/ZONEIDXXXXXXXXX]
DEBU[0061] Adding a-api.hoge.com. to zone hoge.com. [Id: /hostedzone/ZONEIDXXXXXXXXX]
INFO[0061] Desired change: CREATE a-api.hoge.com TXT  profile=default zoneID=/hostedzone/ZONEIDXXXXXXXXX zoneName=hoge.com.
INFO[0061] Desired change: CREATE api.hoge.com A   profile=default zoneID=/hostedzone/ZONEIDXXXXXXXXX zoneName=hoge.com.
INFO[0061] Desired change: CREATE api.hoge.com TXT  profile=default zoneID=/hostedzone/ZONEIDXXXXXXXXX zoneName=hoge.com.
ERRO[0061] Failure in zone hoge.com. when submitting change batch: operation error Route 53: ChangeResourceRecordSets, https response error StatusCode: 400, RequestID: 08d2eafe-c886-46d3-bd49-c5f905a7d3ee, InvalidChangeBatch: [Tried to create resource record set [name='a-api.hoge.com.', type='TXT', set-identifier='demo'] but it already exists, Tried to create resource record set [name='api.hoge.com.', type='TXT', set-identifier='demo'] but it already exists]  profile=default zoneID=/hostedzone/ZONEIDXXXXXXXXX zoneName=hoge.com.
ERRO[0062] Failed to do run once: soft error
failed to submit all changes for the following zones: [/hostedzone/ZONEIDXXXXXXXXX]

@u-kai
Copy link
Copy Markdown
Member Author

u-kai commented May 25, 2025

@ivankatliarchuk
Thanks a lot for the review and helpful suggestion!
I've reflected the changes accordingly.

I'm currently reviewing the test cases and will follow up once everything is ready.

registry/txt.go Outdated
Comment on lines 321 to 328
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I do not understand this logic behind the solution.
Why we could not have something simple like?

for _, r := range filteredChanges.Create {
		if im.existingTXTs.is(not)Managed(r) {
			continue
		}
		if r.Labels == nil {
			r.Labels = make(map[string]string)
		}
		r.Labels[endpoint.OwnerLabelKey] = im.ownerID

		if im.cacheInterval > 0 {
			im.addToCache(r)
		}
	}

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the suggestion!

The reason the logic is structured this way is because filteredChanges.Create does not initially contain TXT records.
The TXT records are generated on the fly using im.generateTXTRecord(r), and those are what I intend to filter using existingTXTs.

Checking r directly (as in your example) wouldn’t work in this case, since it’s typically an A or CNAME record, not the TXT itself.
Let me know if I misunderstood your suggestion!

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Current implementation seems quite expensive in terms for computation.

It should be possible to pass any record to im.existingTXTs.is(not)Managed and validate it somehow.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just pushed a refactor — the generateTXTRecordWithFilter part is a bit more involved, but the main loop is now cleaner and should be more efficient overall.
Open to feedback, let me know what you think!

@k8s-ci-robot k8s-ci-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jun 27, 2025
Copy link
Copy Markdown
Member

@ivankatliarchuk ivankatliarchuk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

rest seems legit to me

We just w8 for @szuecs view

}
}

func (im *existingTXTs) add(r *endpoint.Endpoint) {
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

function not fully covered

Screenshot 2025-07-03 at 08 01 10

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

But agree, we need to be super careful, as pretty much every deployment rely on txt registry

@k8s-ci-robot k8s-ci-robot removed the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jul 3, 2025
@szuecs
Copy link
Copy Markdown
Contributor

szuecs commented Jul 30, 2025

However, if the goal is to stop managing certain records, wouldn't it be more appropriate to configure domainFilter or similar mechanisms? What do you think about that approach?

No that shouldn't be the tool.
Domainfilter should be used if you have zone .foo.example and suppose you have 2 automations that each manage one subdomain:

  • .bar.foo.example
  • .qux.foo.example

Txt registry is the fundamental ownership record such that you can have multiple clusters with multiple external-dns and whatever for example OpenTofu to manage a single zone.
If we rewrite txt records we should do this only in a script or run-once in order to hand over records from one external-dns to another one or rewrite prefix/suffix patterns to be able to change the design of your infrastructure.

@k8s-ci-robot k8s-ci-robot added the registry Issues or PRs related to a registry label Jul 30, 2025
@u-kai
Copy link
Copy Markdown
Member Author

u-kai commented Jul 30, 2025

@szuecs
Thanks for the clarification — I now understand the role of the TXT record and that it shouldn't be recreated.
I've made the changes as you suggested. I'd appreciate it if you could take another look.

Copy link
Copy Markdown
Contributor

@szuecs szuecs left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some non critical changes I would like to see.

Thanks for your work!

registry/txt.go Outdated
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ok

registry/txt.go Outdated
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I see but I think it's more confusing to have this comment.
I also see that how it's integrated we store only TXT records. This filters other records before *existingTXTs.add() is called https://github.com/kubernetes-sigs/external-dns/pull/5459/files#diff-353145d31754c56c5c08d53f4a5b1ee4cf2116cd605bbb9a7bc572c9072b2ab8R192-R194

I think in general the function name should be isAbsent or isNotKnown or isUnknown or isNotCached. We can think of existingTXTs.entries as an in-memory cache/store.
It's used as im.generateTXTRecordWithFilter(r, im.existingTXTs.isNotManaged)

im.generateTXTRecordWithFilter(r, im.existingTXTs.isAbsent)
im.generateTXTRecordWithFilter(r, im.existingTXTs.isNotKnown)
im.generateTXTRecordWithFilter(r, im.existingTXTs.isUnknown)
im.generateTXTRecordWithFilter(r, im.existingTXTs.isNotCached)

For me im.generateTXTRecordWithFilter(r, im.existingTXTs.isUnknown) reads best.
wdyt?

@u-kai
Copy link
Copy Markdown
Member Author

u-kai commented Aug 29, 2025

@szuecs
Thank you for the review. I've applied the requested changes. If there are no problems, I'd appreciate your approval. Please take a look when you have a moment.

@u-kai u-kai requested a review from szuecs August 30, 2025 06:17
@szuecs
Copy link
Copy Markdown
Contributor

szuecs commented Aug 31, 2025

/approve

@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: szuecs

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 31, 2025
@ivankatliarchuk
Copy link
Copy Markdown
Member

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Sep 1, 2025
@ivankatliarchuk
Copy link
Copy Markdown
Member

/hold cancel

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Sep 1, 2025
@k8s-ci-robot k8s-ci-robot merged commit c6ed951 into kubernetes-sigs:master Sep 1, 2025
14 checks passed
JesusMtnez pushed a commit to JesusMtnez/homelab that referenced this pull request Dec 1, 2025
…o v0.19.0 (#805)

This PR contains the following updates:

| Package | Update | Change |
|---|---|---|
| [registry.k8s.io/external-dns/external-dns](https://github.com/kubernetes-sigs/external-dns) | minor | `v0.18.0` -> `v0.19.0` |

---

### Release Notes

<details>
<summary>kubernetes-sigs/external-dns (registry.k8s.io/external-dns/external-dns)</summary>

### [`v0.19.0`](https://github.com/kubernetes-sigs/external-dns/releases/tag/v0.19.0)

[Compare Source](kubernetes-sigs/external-dns@v0.18.0...v0.19.0)

#### General information

- :information\_source: CLI flags allows to set behavior of previous version on the two breaking changes included in this release, if needed.
- :information\_source: Thanks to [@&#8203;valerian-roche](https://github.com/valerian-roche), this version can reduce the *average* memory usage by \~10 times, see [#&#8203;5596](kubernetes-sigs/external-dns#5596)

#### ⚠️ Breaking Changes

- feat(nodes)!: expose external ipv6 by default by [@&#8203;mloiseleur](https://github.com/mloiseleur) in [#&#8203;5575](kubernetes-sigs/external-dns#5575)
- feat(traefik)!: disable legacy listeners on traefik.containo.us API Group by [@&#8203;mloiseleur](https://github.com/mloiseleur) in [#&#8203;5565](kubernetes-sigs/external-dns#5565)

#### 🚀 Features

- feat(aws): add support for ap-east-2 by [@&#8203;chemi0213](https://github.com/chemi0213) in [#&#8203;5638](kubernetes-sigs/external-dns#5638)
- feat(aws): add support for geoproximity routing by [@&#8203;prasadkatti](https://github.com/prasadkatti) in [#&#8203;5347](kubernetes-sigs/external-dns#5347)
- feat(azure): update Azure provider configuration and documentation by [@&#8203;antchand](https://github.com/antchand) in [#&#8203;5648](kubernetes-sigs/external-dns#5648)
- feat(chart): add option to configure annotationFilter via dedicated helm value by [@&#8203;dshatokhin](https://github.com/dshatokhin) in [#&#8203;5737](kubernetes-sigs/external-dns#5737)
- feat(events): raise k8s events with fake provider by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5659](kubernetes-sigs/external-dns#5659)
- feat(metrics): publish build\_info metric by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5643](kubernetes-sigs/external-dns#5643)
- feat(nodes)!: expose external ipv6 by default by [@&#8203;mloiseleur](https://github.com/mloiseleur) in [#&#8203;5575](kubernetes-sigs/external-dns#5575)
- feat(source/istio): support version 1.25+ by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5611](kubernetes-sigs/external-dns#5611)
- feat(source/pods): support for annotation and label filter by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5583](kubernetes-sigs/external-dns#5583)
- feat(source): support --event flags with sources pod and node by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5642](kubernetes-sigs/external-dns#5642)
- feat(source): use transformers in pod informers to reduce memory footprint by [@&#8203;valerian-roche](https://github.com/valerian-roche) in [#&#8203;5596](kubernetes-sigs/external-dns#5596)
- feat(traefik)!: disable legacy listeners on traefik.containo.us API Group by [@&#8203;mloiseleur](https://github.com/mloiseleur) in [#&#8203;5565](kubernetes-sigs/external-dns#5565)

#### 🐛 Bug fixes

- fix(api): rollback oas and update linter by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5723](kubernetes-sigs/external-dns#5723)
- fix(aws): support aws\_ca\_bundle by [@&#8203;mwmix](https://github.com/mwmix) in [#&#8203;5665](kubernetes-sigs/external-dns#5665)
- fix(chart): Change .extraContainers type to array by [@&#8203;svengreb](https://github.com/svengreb) in [#&#8203;5564](kubernetes-sigs/external-dns#5564)
- fix(cloudflare): display of action in logs by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5550](kubernetes-sigs/external-dns#5550)
- fix(cloudflare): set comments properly by [@&#8203;7onn](https://github.com/7onn) in [#&#8203;5582](kubernetes-sigs/external-dns#5582)
- fix(cloudflare): unnecessary record updates by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5770](kubernetes-sigs/external-dns#5770)
- fix(controller): panic in events.Controller.Add() by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5766](kubernetes-sigs/external-dns#5766)
- fix(docs): Fixing some errors in the dev-guide example. by [@&#8203;mwmix](https://github.com/mwmix) in [#&#8203;5662](kubernetes-sigs/external-dns#5662)
- fix(endpoint): domains handling with idna by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5685](kubernetes-sigs/external-dns#5685)
- fix(helm): resolve RBAC permissions for namespaced gateway sources by [@&#8203;u-kai](https://github.com/u-kai) in [#&#8203;5578](kubernetes-sigs/external-dns#5578)
- fix(helm): Update helm value schema to allow `create-only` policy type by [@&#8203;coltonhughes](https://github.com/coltonhughes) in [#&#8203;5627](kubernetes-sigs/external-dns#5627)
- fix(http): concurrent map read/write by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5753](kubernetes-sigs/external-dns#5753)
- fix(instrumented\_http): migrate to own http instrumenter by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5650](kubernetes-sigs/external-dns#5650)
- fix(metrics): make prometheus labels more type safe by [@&#8203;mwmix](https://github.com/mwmix) in [#&#8203;5717](kubernetes-sigs/external-dns#5717)
- fix(oas): add required properties to api components by [@&#8203;evilhamsterman](https://github.com/evilhamsterman) in [#&#8203;5696](kubernetes-sigs/external-dns#5696)
- fix(pihole): create record for all targets by [@&#8203;vkolobara](https://github.com/vkolobara) in [#&#8203;5584](kubernetes-sigs/external-dns#5584)
- fix(provider/aws): null pointer when records mailformed by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5639](kubernetes-sigs/external-dns#5639)
- fix(provider/aws-sd): fix namespace type filtering by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5682](kubernetes-sigs/external-dns#5682)
- fix(provider): IDNA awareness in the zone finder by [@&#8203;hanapedia](https://github.com/hanapedia) in [#&#8203;5705](kubernetes-sigs/external-dns#5705)
- fix(rbac): conditional endpointslices perms by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5746](kubernetes-sigs/external-dns#5746)
- fix: reduce warning by using idna profile by [@&#8203;szuecs](https://github.com/szuecs) in [#&#8203;5587](kubernetes-sigs/external-dns#5587)
- fix(rfc2136): Use correct index for accessing UpdateOld if there are multiple chunks by [@&#8203;schwajo](https://github.com/schwajo) in [#&#8203;5542](kubernetes-sigs/external-dns#5542)
- fix(source): respect --expose-internal-ipv6 flag on NodePort services by [@&#8203;jonasbadstuebner](https://github.com/jonasbadstuebner) in [#&#8203;5652](kubernetes-sigs/external-dns#5652)
- fix(source/service): disable node informer when not required by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5613](kubernetes-sigs/external-dns#5613)
- fix(source/service): disable pod and endpointSlices informers when they are not needed by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5646](kubernetes-sigs/external-dns#5646)
- fix(source/service): make sure only unique targets available for futher processing by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5614](kubernetes-sigs/external-dns#5614)
- fix(txt-registry): skip creation of already-existing TXT records ([#&#8203;4914](kubernetes-sigs/external-dns#4914)) by [@&#8203;u-kai](https://github.com/u-kai) in [#&#8203;5459](kubernetes-sigs/external-dns#5459)
- fix: zonefinder used wrong quotation style by [@&#8203;szuecs](https://github.com/szuecs) in [#&#8203;5588](kubernetes-sigs/external-dns#5588)

#### 📝 Documentation

- docs: add information on external webhook usage by [@&#8203;Raffo](https://github.com/Raffo) in [#&#8203;5606](kubernetes-sigs/external-dns#5606)
- docs: add new webhook provider SAKURA Cloud into README by [@&#8203;ippanpeople](https://github.com/ippanpeople) in [#&#8203;5784](kubernetes-sigs/external-dns#5784)
- docs(aws): add helm repo command to the tutorial by [@&#8203;raghu-manne](https://github.com/raghu-manne) in [#&#8203;5618](kubernetes-sigs/external-dns#5618)
- docs: fix typo in compatibility table by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5769](kubernetes-sigs/external-dns#5769)
- docs(istio): document ingress annotation by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5756](kubernetes-sigs/external-dns#5756)
- docs(providers): add Myra Security DNS to the list by [@&#8203;armaaar](https://github.com/armaaar) in [#&#8203;5671](kubernetes-sigs/external-dns#5671)
- docs(readme): update k8s compatiblity table by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5747](kubernetes-sigs/external-dns#5747)
- docs: remove substitution in AES keygen examples by [@&#8203;super-octo-spoon](https://github.com/super-octo-spoon) in [#&#8203;5686](kubernetes-sigs/external-dns#5686)
- docs(source/service): headless records and root/base domain by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5624](kubernetes-sigs/external-dns#5624)

#### 📦 Others

- chore(ci): improve releaser script by [@&#8203;mloiseleur](https://github.com/mloiseleur) in [#&#8203;5571](kubernetes-sigs/external-dns#5571)
- chore(ci): update labels automation by [@&#8203;mloiseleur](https://github.com/mloiseleur) in [#&#8203;5580](kubernetes-sigs/external-dns#5580)
- chore(cloudflare): migrate CreateDNSRecord() to new lib by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5779](kubernetes-sigs/external-dns#5779)
- chore(cloudflare): migrate DNSRecord to new lib struct by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5762](kubernetes-sigs/external-dns#5762)
- chore(cloudflare): rename zoneService fields by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5761](kubernetes-sigs/external-dns#5761)
- chore(cloudflare): upgrade library to v5 by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5734](kubernetes-sigs/external-dns#5734)
- chore(cloudflare): use lib v4 for regional services by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5609](kubernetes-sigs/external-dns#5609)
- chore(codebase): code reuse by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5607](kubernetes-sigs/external-dns#5607)
- chore(codebase): enable linter nonamedreturns by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5594](kubernetes-sigs/external-dns#5594)
- chore(codebase): remove pointer to an interface by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5625](kubernetes-sigs/external-dns#5625)
- chore(deps): bump github.com/cloudflare/cloudflare-go/v4 from 4.5.1 to 4.6.0 in the dev-dependencies group by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5645](kubernetes-sigs/external-dns#5645)
- chore(deps): bump github.com/digitalocean/godo from 1.155.0 to 1.156.0 in the dev-dependencies group by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5623](kubernetes-sigs/external-dns#5623)
- chore(deps): bump github.com/oracle/oci-go-sdk/v65 from 65.94.0 to 65.95.0 in the dev-dependencies group by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5597](kubernetes-sigs/external-dns#5597)
- chore(deps): bump google.golang.org/api from 0.239.0 to 0.240.0 in the dev-dependencies group by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5605](kubernetes-sigs/external-dns#5605)
- chore(deps): bump renovatebot/github-action from 43.0.1 to 43.0.2 in the dev-dependencies group by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5592](kubernetes-sigs/external-dns#5592)
- chore(deps): bump renovatebot/github-action from 43.0.2 to 43.0.3 in the dev-dependencies group by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5644](kubernetes-sigs/external-dns#5644)
- chore(deps): bump renovatebot/github-action from 43.0.4 to 43.0.5 in the dev-dependencies group by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5691](kubernetes-sigs/external-dns#5691)
- chore(deps): bump the dev-dependencies group across 1 directory with 10 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5760](kubernetes-sigs/external-dns#5760)
- chore(deps): bump the dev-dependencies group across 1 directory with 17 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5704](kubernetes-sigs/external-dns#5704)
- chore(deps): bump the dev-dependencies group across 1 directory with 17 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5726](kubernetes-sigs/external-dns#5726)
- chore(deps): bump the dev-dependencies group across 1 directory with 18 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5739](kubernetes-sigs/external-dns#5739)
- chore(deps): bump the dev-dependencies group across 1 directory with 2 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5667](kubernetes-sigs/external-dns#5667)
- chore(deps): bump the dev-dependencies group across 1 directory with 2 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5732](kubernetes-sigs/external-dns#5732)
- chore(deps): bump the dev-dependencies group across 1 directory with 2 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5759](kubernetes-sigs/external-dns#5759)
- chore(deps): bump the dev-dependencies group across 1 directory with 3 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5579](kubernetes-sigs/external-dns#5579)
- chore(deps): bump the dev-dependencies group across 1 directory with 5 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5690](kubernetes-sigs/external-dns#5690)
- chore(deps): bump the dev-dependencies group across 1 directory with 8 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5637](kubernetes-sigs/external-dns#5637)
- chore(deps): bump the dev-dependencies group across 1 directory with 8 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5658](kubernetes-sigs/external-dns#5658)
- chore(deps): bump the dev-dependencies group with 10 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5668](kubernetes-sigs/external-dns#5668)
- chore(deps): bump the dev-dependencies group with 2 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5610](kubernetes-sigs/external-dns#5610)
- chore(deps): bump the dev-dependencies group with 3 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5628](kubernetes-sigs/external-dns#5628)
- chore(deps): bump the dev-dependencies group with 4 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5593](kubernetes-sigs/external-dns#5593)
- chore(deps): bump the dev-dependencies group with 4 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5673](kubernetes-sigs/external-dns#5673)
- chore(deps): bump the dev-dependencies group with 9 updates by [@&#8203;app/dependabot](https://github.com/app/dependabot) in [#&#8203;5763](kubernetes-sigs/external-dns#5763)
- chore(deps): update golangci-lint version to v2.2.2 by [@&#8203;dongjiang1989](https://github.com/dongjiang1989) in [#&#8203;5670](kubernetes-sigs/external-dns#5670)
- chore(endpoint): fix typo by [@&#8203;bachorp](https://github.com/bachorp) in [#&#8203;5787](kubernetes-sigs/external-dns#5787)
- chore(github-actions): test execution with low resources by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5729](kubernetes-sigs/external-dns#5729)
- chore(github): enchance issue-template for bug-report by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5692](kubernetes-sigs/external-dns#5692)
- chore(helm): add rbac unit-tests for istio sources by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5752](kubernetes-sigs/external-dns#5752)
- chore(metrics): refactor metrics to use common registry by [@&#8203;mwmix](https://github.com/mwmix) in [#&#8203;5677](kubernetes-sigs/external-dns#5677)
- chore(plan): added tests for cases with asterisks by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5640](kubernetes-sigs/external-dns#5640)
- chore(provider/aws): reduce if-nesting for dryRun condition by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5688](kubernetes-sigs/external-dns#5688)
- chore: release chart for v0.18.0 by [@&#8203;elafarge](https://github.com/elafarge) in [#&#8203;5633](kubernetes-sigs/external-dns#5633)
- chore(release): updates kustomize & docs with v0.18.0 by [@&#8203;mloiseleur](https://github.com/mloiseleur) in [#&#8203;5573](kubernetes-sigs/external-dns#5573)
- chore(source/istio): replace kube API calls with caching and ingress informers by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5743](kubernetes-sigs/external-dns#5743)
- chore(source/net-filter): improve flow logic and add more tests by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5629](kubernetes-sigs/external-dns#5629)
- chore(source): reorganise sources and wrappers by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5598](kubernetes-sigs/external-dns#5598)
- chore(source): use types instead of strings by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5699](kubernetes-sigs/external-dns#5699)
- chore(store\*): add reduce complexity and improve code coverage by [@&#8203;AndrewCharlesHay](https://github.com/AndrewCharlesHay) in [#&#8203;5568](kubernetes-sigs/external-dns#5568)
- refactor(annotations): use common prefix to simplify filtering in informer transformers by [@&#8203;valerian-roche](https://github.com/valerian-roche) in [#&#8203;5621](kubernetes-sigs/external-dns#5621)
- refactor(cloudflare): use lib v4 for zone services by [@&#8203;AndrewCharlesHay](https://github.com/AndrewCharlesHay) in [#&#8203;5654](kubernetes-sigs/external-dns#5654)
- refactor(provider/cloudflare): use local regionalHostname struct by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5615](kubernetes-sigs/external-dns#5615)
- refactor(source): document and add debug information on wrappers by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5687](kubernetes-sigs/external-dns#5687)
- refactor(source/istio): add transformers by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5728](kubernetes-sigs/external-dns#5728)
- refactor: use slices.Contains instead of handrolled for loop by [@&#8203;szuecs](https://github.com/szuecs) in [#&#8203;5589](kubernetes-sigs/external-dns#5589)
- test: improve coverage on http and metrics by [@&#8203;mwmix](https://github.com/mwmix) in [#&#8203;5712](kubernetes-sigs/external-dns#5712)
- test(source/istio): add missing edge cases with tests by [@&#8203;ivankatliarchuk](https://github.com/ivankatliarchuk) in [#&#8203;5715](kubernetes-sigs/external-dns#5715)
- tests(source/crd): increase timeouts when it can randomly fails by [@&#8203;vflaux](https://github.com/vflaux) in [#&#8203;5785](kubernetes-sigs/external-dns#5785)

#### 📦 Docker Image

```
docker pull registry.k8s.io/external-dns/external-dns:v0.19.0
```

#### New Contributors

- [@&#8203;svengreb](https://github.com/svengreb) made their first contribution in [#&#8203;5564](kubernetes-sigs/external-dns#5564)
- [@&#8203;schwajo](https://github.com/schwajo) made their first contribution in [#&#8203;5542](kubernetes-sigs/external-dns#5542)
- [@&#8203;valerian-roche](https://github.com/valerian-roche) made their first contribution in [#&#8203;5621](kubernetes-sigs/external-dns#5621)
- [@&#8203;chemi0213](https://github.com/chemi0213) made their first contribution in [#&#8203;5638](kubernetes-sigs/external-dns#5638)
- [@&#8203;vkolobara](https://github.com/vkolobara) made their first contribution in [#&#8203;5584](kubernetes-sigs/external-dns#5584)
- [@&#8203;raghu-manne](https://github.com/raghu-manne) made their first contribution in [#&#8203;5618](kubernetes-sigs/external-dns#5618)
- [@&#8203;coltonhughes](https://github.com/coltonhughes) made their first contribution in [#&#8203;5627](kubernetes-sigs/external-dns#5627)
- [@&#8203;elafarge](https://github.com/elafarge) made their first contribution in [#&#8203;5633](kubernetes-sigs/external-dns#5633)
- [@&#8203;mwmix](https://github.com/mwmix) made their first contribution in [#&#8203;5662](kubernetes-sigs/external-dns#5662)
- [@&#8203;super-octo-spoon](https://github.com/super-octo-spoon) made their first contribution in [#&#8203;5686](kubernetes-sigs/external-dns#5686)
- [@&#8203;armaaar](https://github.com/armaaar) made their first contribution in [#&#8203;5671](kubernetes-sigs/external-dns#5671)
- [@&#8203;hanapedia](https://github.com/hanapedia) made their first contribution in [#&#8203;5705](kubernetes-sigs/external-dns#5705)
- [@&#8203;evilhamsterman](https://github.com/evilhamsterman) made their first contribution in [#&#8203;5696](kubernetes-sigs/external-dns#5696)
- [@&#8203;dshatokhin](https://github.com/dshatokhin) made their first contribution in [#&#8203;5737](kubernetes-sigs/external-dns#5737)
- [@&#8203;antchand](https://github.com/antchand) made their first contribution in [#&#8203;5648](kubernetes-sigs/external-dns#5648)
- [@&#8203;ippanpeople](https://github.com/ippanpeople) made their first contribution in [#&#8203;5784](kubernetes-sigs/external-dns#5784)
- [@&#8203;bachorp](https://github.com/bachorp) made their first contribution in [#&#8203;5787](kubernetes-sigs/external-dns#5787)

**Full Changelog**: <kubernetes-sigs/external-dns@v0.18.0...v0.19.0>

</details>

---

### Configuration

📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS45My4yIiwidXBkYXRlZEluVmVyIjoiNDEuOTMuMiIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwL21pbm9yIl19-->

Reviewed-on: https://codeberg.org/JesusMtnez/homelab/pulls/805
Co-authored-by: JesusMtnez-bot <jesusmartinez93+bot@gmail.com>
Co-committed-by: JesusMtnez-bot <jesusmartinez93+bot@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. registry Issues or PRs related to a registry size/L Denotes a PR that changes 100-499 lines, ignoring generated files. tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

External DNS controller does not sync records as expected

5 participants