external dns fixes #2281
No reviewers
Labels
No labels
1week
2weeks
Failed compliance check
IP cameras
NATS
Possible security concern
Review effort 1/5
Review effort 2/5
Review effort 3/5
Review effort 4/5
Review effort 5/5
UI
aardvark
accessibility
amd64
api
arm64
auth
back-end
bgp
blog
bug
build
checkers
ci-cd
cleanup
cnpg
codex
core
dependencies
device-management
documentation
duplicate
dusk
ebpf
enhancement
eta 1d
eta 1hr
eta 3d
eta 3hr
feature
fieldsurvey
github_actions
go
good first issue
help wanted
invalid
javascript
k8s
log-collector
mapper
mtr
needs-triage
netflow
network-sweep
observability
oracle
otel
plug-in
proton
python
question
reddit
redhat
research
rperf
rperf-checker
rust
sdk
security
serviceradar-agent
serviceradar-agent-gateway
serviceradar-web
serviceradar-web-ng
siem
snmp
sysmon
topology
ubiquiti
wasm
wontfix
zen-engine
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
carverauto/serviceradar!2281
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "refs/pull/2281/head"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Imported from GitHub pull request.
Original GitHub pull request: #1709
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/pull/1709
Original created: 2025-10-05T18:52:40Z
Original updated: 2025-10-05T19:01:53Z
Original head: carverauto/serviceradar:update/k8s_ingress
Original base: main
Original merged: 2025-10-05T19:01:49Z by @mfreeman451
PR Type
Enhancement
Description
Update external-dns to v0.19.0 from v0.15.1
Add Cloudflare Go SDK dependency
Add endpointslices RBAC permissions for discovery API
Diagram Walkthrough
File Walkthrough
go.mod
Add Cloudflare Go SDK dependencygo.mod
github.com/cloudflare/cloudflare-go v0.116.0as indirectdependency
go.sum
Update dependency checksumsgo.sum
cloudflare-go,goccy/go-json,google/go-querystring,and
golang.org/x/timepackagesexternal-dns.yaml
Upgrade external-dns image versionk8s/external-dns/base/external-dns.yaml
rbac.yaml
Add endpointslices RBAC permissionsk8s/external-dns/base/rbac.yaml
endpointslicesresource indiscovery.k8s.ioAPIgroup
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/1709#issuecomment-3369252691
Original created: 2025-10-05T18:53:13Z
PR Compliance Guide 🔍
Below is a summary of compliance checks for this PR:
No security concerns identified
No security vulnerabilities detected by AI analysis. Human verification advised for critical code.🎫 No ticket provided
Codebase context is not defined
Follow the guide to enable codebase context checks.
No custom compliance provided
Follow the guide to enable custom compliance check.
Compliance status legend
🟢 - Fully Compliant🟡 - Partial Compliant
🔴 - Not Compliant
⚪ - Requires Further Human Verification
🏷️ - Compliance label
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/1709#issuecomment-3369253217
Original created: 2025-10-05T18:54:08Z
PR Code Suggestions ✨
Explore these optional code suggestions:
Justify the significant external-dns upgrade
The PR description should be updated to summarize key changes from the
external-dns upgrade (v0.15.1 to v0.19.0) and confirm that the new version was
validated in a non-production environment.
Examples:
k8s/external-dns/base/external-dns.yaml [20]
Solution Walkthrough:
Before:
After:
Suggestion importance[1-10]: 7
__
Why: The suggestion correctly highlights the operational risk of a significant version jump for a critical component like
external-dnsand rightly asks for more context and validation in the PR description.