certwatcher | TLS cert expiry early-warning service | TLS library
kandi X-RAY | certwatcher Summary
kandi X-RAY | certwatcher Summary
utility to monitor the certificates in use by a host and alert if they're expiring soon.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- notify sends a notification to the user .
- main is the main entry point for testing .
- check verifies that the certificate is valid
certwatcher Key Features
certwatcher Examples and Code Snippets
Community Discussions
Trending Discussions on certwatcher
QUESTION
I originally posted this question as an issue on the GitHub project for the AWS Load Balancer Controller here: https://github.com/kubernetes-sigs/aws-load-balancer-controller/issues/2069.
I'm seeing some odd behavior that I can't trace or explain when trying to get the loadBalacnerDnsName from an ALB created by the controller. I'm using v2.2.0 of the AWS Load Balancer Controller in a CDK project. The ingress that I deploy triggers the provisioning of an ALB, and that ALB can connect to my K8s workloads running in EKS.
Here's my problem: I'm trying to automate the creation of a Route53 A Record that points to the loadBalancerDnsName
of the load balancer, but the loadBalancerDnsName
that I get in my CDK script is not the same as the loadBalancerDnsName
that shows up in the AWS console once my stack has finished deploying. The value in the console is correct and I can get a response from that URL. My CDK script outputs the value of the DnsName as a CfnOutput value, but that URL does not point to anything.
In CDK, I have tried to use KubernetesObjectValue
to get the DNS name from the load balancer. This isn't working (see this related issue: https://github.com/aws/aws-cdk/issues/14933), so I'm trying to lookup the Load Balancer with CDK's .fromLookup
and using a tag that I added through my ingress annotation:
ANSWER
Answered 2021-Jun-13 at 20:23I think that the answer is to use external-dns.
ExternalDNS allows you to control DNS records dynamically via Kubernetes resources in a DNS provider-agnostic way.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install certwatcher
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page