-
Notifications
You must be signed in to change notification settings - Fork 1
TXT records #2
Comments
|
@badra001 - probably will work on this next week. So can we flush out the strategy?
I am not sure if I understand this statement below
|
|
For an A or an AAAA, we use the same name. We only need one txt per RR name (it may have an A, an AAAA, or both). We will add the same thing to the PTR zone, but as a TXT record: |
|
For any CNAMEs that get created, we will need a prefix (defined as an ENV, default "_txt"), because a CNAME can't have a TXT record. It'll be exactly the same stuff. |
|
OK. Getting fuller picture... few follow up questions.
|
|
For fun, I added somethign similar to the manual records I've setup with terraform: I'm going to pop this into a module, so this will be defined similarly as the automated route53 stuff, but with a different heritage. |
One text records per RR name. An RR may have multiple other records, like A, AAAA, other TXT, MX, a few other possibilities. We're not looking at any other ones at this time besides A and AAAA. And the TXT. Saving the A or AAAA in the TXT is redundant.
Dots are standard for this stuff. Underscores are typically discouraged from DNS, as they aren't legal, at least by specification, but many things use the underscore: Active Directory, DMARC, domain validation, etc. This seems like a good use of it, and consistent with other uses.
TXT allows nearly everything, but putting quotes there needed by json will be very icky. We'll go with the format specified. |
|
Regarding the TXT record, we need to be mindful of the Route53 API limit (5 per second). Currently, A, PTR, and CNAME (optional) results in 3 ChangeRecordSet API calls. I've spaced them out (1 sec) to minimize the going over the limit, but if we add TXT records for each, then we have 6 API calls. Few ways to work-around:
Long Term
|
|
Actually, the ChangeRecordSet is per PHZ so we won't be able to bundle everything into a single API call. At best, 1 API call per PHZ (forward and reverse) and probably separate one for CNAME if the zoneid is different. |
|
Closed in d37ecd6 |
I was looking at the external-dns in the k8s sigs project (https://github.com/kubernetes-sigs/external-dns) and they record text records using a tag of "heritage". It seems we can adopt the same style. The goal is to only remove records we added by the automation.
Ideas:
If someone changes these tags, the DNS will not update.
The text was updated successfully, but these errors were encountered: