adding missing files #2259
No reviewers
Labels
No labels
1week
2weeks
Failed compliance check
IP cameras
NATS
Possible security concern
Review effort 1/5
Review effort 2/5
Review effort 3/5
Review effort 4/5
Review effort 5/5
UI
aardvark
accessibility
amd64
api
arm64
auth
back-end
bgp
blog
bug
build
checkers
ci-cd
cleanup
cnpg
codex
core
dependencies
device-management
documentation
duplicate
dusk
ebpf
enhancement
eta 1d
eta 1hr
eta 3d
eta 3hr
feature
fieldsurvey
github_actions
go
good first issue
help wanted
invalid
javascript
k8s
log-collector
mapper
mtr
needs-triage
netflow
network-sweep
observability
oracle
otel
plug-in
proton
python
question
reddit
redhat
research
rperf
rperf-checker
rust
sdk
security
serviceradar-agent
serviceradar-agent-gateway
serviceradar-web
serviceradar-web-ng
siem
snmp
sysmon
topology
ubiquiti
wasm
wontfix
zen-engine
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
carverauto/serviceradar!2259
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "refs/pull/2259/head"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Imported from GitHub pull request.
Original GitHub pull request: #1681
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/pull/1681
Original created: 2025-10-02T07:08:22Z
Original updated: 2025-10-02T07:10:39Z
Original head: carverauto/serviceradar:k8s/missing_ext_dns
Original base: main
Original merged: 2025-10-02T07:08:59Z by @mfreeman451
PR Type
Enhancement
Description
Add complete external-dns Kubernetes configuration
Configure Cloudflare DNS provider integration
Set up RBAC permissions and service account
Include deployment with health checks
Diagram Walkthrough
File Walkthrough
README.md
Documentation for external-dns setupk8s/external-dns/base/README.md
clusterrolebinding.yaml
RBAC cluster role binding configurationk8s/external-dns/base/clusterrolebinding.yaml
kustomization.yaml
Kustomization resource definitionk8s/external-dns/base/kustomization.yaml
patch.yaml
Domain-specific configuration patchk8s/external-dns/base/patch.yaml
rbac.yaml
RBAC permissions for external-dnsk8s/external-dns/base/rbac.yaml
service-account.yaml
Service account for external-dnsk8s/external-dns/base/service-account.yaml
service.yaml
Service configuration for external-dnsk8s/external-dns/base/service.yaml
external-dns.yaml
Main external-dns deployment configurationk8s/external-dns/base/external-dns.yaml
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/1681#issuecomment-3359503277
Original created: 2025-10-02T07:09:36Z
PR Compliance Guide 🔍
Below is a summary of compliance checks for this PR:
Secret handling risk
Description: Documentation suggests creating a Kubernetes Secret from literal values which can
encourage committing or pasting plaintext API keys; ensure secrets are injected via secure
CI/secret manager and not stored in repo history or terminals.
README.md [8-11]
Referred Code
Excessive RBAC permissions
Description: Broad CRUD permissions granted to custom resource 'dnsendpoints' may exceed least
privilege; if create/update/delete are unnecessary, restrict verbs to read-only to reduce
blast radius.
rbac.yaml [23-28]
Referred Code
🎫 No ticket provided
Codebase context is not defined
Follow the guide to enable codebase context checks.
No custom compliance provided
Follow the guide to enable custom compliance check.
Compliance status legend
🟢 - Fully Compliant🟡 - Partial Compliant
🔴 - Not Compliant
⚪ - Requires Further Human Verification
🏷️ - Compliance label
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/1681#issuecomment-3359508240
Original created: 2025-10-02T07:10:39Z
PR Code Suggestions ✨
Explore these optional code suggestions:
Correct the unsafe and broken Kustomize configuration
The base
external-dnsconfiguration is unsafe due to an empty domain filter,posing a security risk. A patch file intended to scope the domain exists but is
not applied by the Kustomize configuration, which needs to be corrected.
Examples:
k8s/external-dns/base/external-dns.yaml [24]
k8s/external-dns/base/kustomization.yaml [1-8]
Solution Walkthrough:
Before:
After:
Suggestion importance[1-10]: 10
__
Why: The suggestion correctly identifies a critical security vulnerability where an empty
domain-filterinexternal-dns.yamlis not patched bykustomization.yaml, potentially allowing modifications to any DNS zone.Restore missing arguments in patch
Restore missing arguments in the
external-dnsdeployment patch to preventincorrect DNS record management. The patch currently removes
--registry=txt,--txt-owner-id, and--managed-record-typesarguments from the baseconfiguration.
k8s/external-dns/base/patch.yaml [1-16]
Suggestion importance[1-10]: 9
__
Why: The suggestion correctly identifies that the Kustomize patch replaces the entire
argslist, removing critical arguments like--registry=txtand--txt-owner-id, which can lead to serious DNS record management issues.Remove deprecated API group alias
Remove the deprecated
networkingAPI group alias from theClusterRoledefinition, using only the canonical
networking.k8s.iogroup to ensure futurecompatibility.
k8s/external-dns/base/rbac.yaml [13-15]
Suggestion importance[1-10]: 4
__
Why: The suggestion correctly points out the use of a deprecated
networkingAPI group alias, and removing it improves future compatibility and aligns with best practices.