apiVersion:rbac.authorization.k8s.io/v1kind:ClusterRolemetadata:name:external-dnslabels:app.kubernetes.io/name:external-dnsrules:-apiGroups:[""]resources:["services","endpoints","pods","nodes"]verbs:["get","watch","list"]-apiGroups:["extensions","networking.k8s.io"]resources:["ingresses"]verbs:["get","watch","list"]-apiGroups:["networking.istio.io"]resources:["gateways","virtualservices"]verbs:["get","watch","list"]---apiVersion:rbac.authorization.k8s.io/v1kind:ClusterRoleBindingmetadata:name:external-dns-viewerlabels:app.kubernetes.io/name:external-dnsroleRef:apiGroup:rbac.authorization.k8s.iokind:ClusterRolename:external-dnssubjects:-kind:ServiceAccountname:external-dnsnamespace:external-dns---apiVersion:apps/v1kind:Deploymentmetadata:name:external-dnsnamespace:external-dnslabels:app.kubernetes.io/name:external-dnsspec:selector:matchLabels:app.kubernetes.io/name:external-dnsstrategy:type:Recreatetemplate:metadata:labels:app.kubernetes.io/name:external-dnsspec:serviceAccountName:external-dnssecurityContext:fsGroup:65534containers:-name:external-dnsimage:bitnami/external-dns:0.13.1# must specify env AWS_REGION in AWS china regions# env:# - name: AWS_REGION# value: cn-north-1args:---source=service---source=ingress---source=istio-gateway# choose one---source=istio-virtualservice# or both# - --domain-filter=external-dns-test.my-org.com # will make ExternalDNS see only the hosted zones matching provided domain, omit to process all available hosted zones---provider=aws# - --policy=upsert-only # would prevent ExternalDNS from deleting any records, omit to enable full synchronization# - --aws-zone-type=public # only look at public hosted zones (valid values are public, private or no value for both)---registry=txt---txt-owner-id=my-identifier