Sandbox DNS Records
In order to direct traffic to the default services enabled by the Sandbox project, DNS records must exist which point the service names to your cluster ingress IP. For ease of management, it's suggested that a single A record be created for the cluster, and then additional CNAME records for the services which point at that cluster A record.
Sample Zone File
Example records for yourzone.com:
ingress IN A <ingress ip address (kubectl get service -n nginx-ingress)>
auth IN CNAME ingress.yourzone.com. # Required for oauth2 proxy
argocd IN CNAME ingress.yourzone.com. # ArgoCD UI
grafana IN CNAME ingress.yourzone.com. # Grafana UI
your-app IN CNAME ingress.yourzone.com. # Add any additional services
Alternative
If you don't have an available DNS domain, you can use a service like nip.io which automatically
directs *.[your-ip].nip.io
to the ip specified by setting the Cluster Domain to [your-ip].nip.io
at install time.
This method isn't compatible with Automatic SSL Certs from LetsEncrypt, so you'll also need to either:
- Disable the TLS endpoints with helm argument
--set clusterTLSInsecure=true
- Modify the cert-manager or virtual-servers to work with alternate settings (see Customizing Default Services)