Overview

November 2, 2025 · View on GitHub

Volcengine Provider is a webhook-based provider built for ExternalDNS. It bridges ExternalDNS and Volcengine DNS so that every DNS record (create, update, delete) emitted by ExternalDNS is translated into the corresponding Volcengine DNS API call through a lightweight webhook server.

Features

  • Webhook integration – dynamic DNS-record management via ExternalDNS webhooks
  • Volcengine DNS native – all operations are forwarded to Volcengine DNS service
  • Flexible configuration – configurable through files or environment variables

Installation

Prerequisites

  • Helm 3.x installed
  • [Optional] Volcengine API key (AK/SK) and VPC information ready
  • [Optional] VKE IRSA ready

[Optional] Prepare Volcengine API AK SK

Volcengine API key (AK/SK) should be created with the following permissions:

{
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "private_zone:*"
      ],
      "Resource": [
        "*"
      ]
    }
  ]
}

[Optional] Prepare VKE RISA

https://www.volcengine.com/docs/6460/1324604

Deploy with Helm

  1. Export environment variables
   export VOLCENGINE_CREDENTILALS_PROVIDER="aksk"         # support aksk or irsa
   export VOLCENGINE_SECRET_NAME="your-secret-with-ak-sk" # optional if use aksk
   export VOLCENGINE_OIDC_ROLE_TRN="your-oidc-role-trn"   # optional if use irsa
   export VOLCENGINE_AK="your-ak"
   export VOLCENGINE_SK="your-sk"
   export VOLCENGINE_VPC="your-vpc-id"
   export VOLCENGINE_REGION="cn-beijing"
   export VOLCENGINE_PRIVATEZONE_ENDPOINT="open.volcengineapi.com"
   export VOLCENGINE_STS_ENDPOINT="open.volcengineapi.com"
   export TARGET_DOMAINS="{test.com,test2.com}"
  1. [Optional] Create the Secret
   kubectl create secret generic ${VOLCENGINE_SECRET_NAME} \
   --from-literal=access-key=${VOLCENGINE_AK} \
   --from-literal=secret-key=${VOLCENGINE_SK} \
   --namespace kube-system
  1. Install the chart
   helm upgrade --install external-dns \
   manifests/externaldns \
   --namespace kube-system \
   --set userConfig.env.provider.credentialsProvider=${VOLCENGINE_CREDENTILALS_PROVIDER} \
   --set userConfig.env.provider.secretName=${VOLCENGINE_SECRET_NAME} \
   --set userConfig.env.provider.oidcRoleTrn=${VOLCENGINE_OIDC_ROLE_TRN} \
   --set userConfig.env.provider.vpc=${VOLCENGINE_VPC} \
   --set userConfig.env.provider.region=${VOLCENGINE_REGION} \
   --set userConfig.env.provider.privatezoneEndpoint=${VOLCENGINE_PRIVATEZONE_ENDPOINT} \
   --set userConfig.env.provider.stsEndpoint=${VOLCENGINE_STS_ENDPOINT} \
   --set userConfig.args.controller.domainFilter=${TARGET_DOMAINS} \
   --set publicConfig.image.controller.repository=registry.k8s.io/external-dns/external-dns \
   --set publicConfig.image.provider.repository=volcengine/external-dns-volcengine-webhook
  1. Verify
   helm list -n kube-system
   kubectl get pods -n kube-system -l app.kubernetes.io/name=external-dns

Helm parameters

ParameterDescriptionDefaultRequired
userConfig.env.provider.credentialsProviderProvider used to obtain Volcengine API credentials. Valid values: aksk (default) or irsaakskyes
userConfig.env.provider.secretNameKubernetes secret that contains Volcengine Access Key (access-key) and Secret Key (secret-key), must set if credentialsProvider=aksk--no
userConfig.env.provider.oidcRoleTrnVolcengine OpenID Connect (OIDC) role to assume for API access, must set if credentialsProvider=irsa--no
userConfig.env.provider.vpcVolcengine VPC identifier where the DNS zone is located.--yes
userConfig.env.provider.regionVolcengine region in which the DNS zone resides.cn-beijingyes
userConfig.env.provider.privatezoneEndpointCustom Volcengine OpenAPI privatezone endpoint (overrides built-in global endpoint).open.volcengineapi.comyes
userConfig.env.provider.stsEndpointCustom Volcengine OpenAPI sts endpoint (overrides built-in global endpoint).sts.volcengineapi.comyes
userConfig.args.controller.domainFiltersLimit possible target zones by a list of domain suffixes; specify multiple times or use comma-separated values (same as --domain-filter).--yes
userConfig.args.controller.policyHow DNS records are synchronized between source and provider. Valid values: sync (create/update/delete) and upsert-only (create/update, never delete) (same as --policy).upsert-onlyno
userConfig.args.controller.registryRegistry implementation used to keep track of DNS record ownership. Valid values: txt (default TXT registry) or noop (no ownership records) (same as --registry).txtno
userConfig.args.controller.txtOwnerIdIdentifier used as the owner for TXT registry records; must be unique across concurrent ExternalDNS instances (same as --txt-owner-id).--no
userConfig.args.controller.txtPrefixPrefix added to ownership TXT record names to avoid collisions with real DNS records (same as --txt-prefix).externaldns-%{record_type}.no
userConfig.args.controller.txtWildcardReplacementWildcard string replacement to use in TXT record names for wildcard * (same as --txt-wildcard-replacement).wildcardno
userConfig.args.provider.logLevelEnable verbose debug logging in the Volcengine webhook provider.infono
publicConfig.image.controller.repositoryContainer image for the ExternalDNS controller.registry.k8s.io/external-dns/external-dnsno
publicConfig.image.provider.repositoryContainer image for the Volcengine webhook provider.volcengine/external-dns-volcengine-webhookno

Tip: override defaults with --set or supply a custom values.yaml via -f.

Examples

external-dns support to reconcile LoadBalancer type service and ingress to dns record by default.

external-dns default reconcile policy is upsert-only.

Service(LoadBalancer Type)

kubectl apply -f example/service.yaml
apiVersion: v1
kind: Service
metadata:
  name: nginx-service
  annotations:
    external-dns.alpha.kubernetes.io/hostname: nginx.test.com.  # expect to create record with hostname nginx.test.com
    external-dns.alpha.kubernetes.io/ttl: "300"                 # expect to set ttl to 300
spec:
  selector:
    app: nginx     
  ports:
    - protocol: TCP
      port: 80    
      targetPort: 80   
  type: LoadBalancer   # LoadBalancer

Ingress

kubectl apply -f example/ingress.yaml
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  annotations:
    vke.volcengine.com/ingress-type: ingress-nginx
    external-dns.alpha.kubernetes.io/ttl: "300" # expect to set ttl to 300
  name: nginx-ingress-external
spec:
  ingressClassName: nginx
  rules:
    - host: nginx-ingress-external.test.com   # expect to create record with hostname nginx-ingress-external.test.com
      http:
        paths:
          - backend:
              service:
                name: nginx-service
                port:
                  number: 80
            path: /path1
            pathType: Prefix
    - host: nginx-ingress-external2.test.com  # expect to create record with hostname nginx-ingress-external2.test.com
      http:
        paths:
          - backend:
              service:
                name: nginx-service
                port:
                  number: 80
            path: /path2
            pathType: Prefix