apiVersion: v1 kind: ServiceAccount metadata: name: labels: app.kubernetes.io/name: --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: labels: app.kubernetes.io/name: rules: - apiGroups: [""] resources: ["services","endpoints","pods","nodes"] verbs: ["get","watch","list"] - apiGroups: ["extensions","networking.k8s.io"] resources: ["ingresses"] verbs: ["get","watch","list"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: external-dns-viewer labels: app.kubernetes.io/name: roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: subjects: - kind: ServiceAccount name: namespace: default # change to desired namespace: externaldns, kube-addons --- apiVersion: apps/v1 kind: Deployment metadata: name: labels: app.kubernetes.io/name: spec: strategy: type: Recreate selector: matchLabels: app.kubernetes.io/name: template: metadata: labels: app.kubernetes.io/name: spec: serviceAccountName: containers: - name: image: registry.k8s.io/external-dns/external-dns:v0.13.2 args: - --source=service - --source=ingress - --domain-filter= # will make ExternalDNS see only the hosted zones matching provided domain, omit to process all available hosted zones - --provider=aws - --policy=upsert-only # would prevent ExternalDNS from deleting any records, omit to enable full synchronization - --aws-zone-type=public # only look at public hosted zones (valid values are public, private or no value for both) - --registry=txt - --txt-owner-id= env: - name: AWS_DEFAULT_REGION value: # change to region where EKS is installed # # Uncommend below if using static credentials # - name: AWS_SHARED_CREDENTIALS_FILE # value: /.aws/credentials # volumeMounts: # - name: aws-credentials # mountPath: /.aws # readOnly: true # volumes: # - name: aws-credentials # secret: # secretName: external-dns