docs/version-update-playbook.md
This playbook describes the best practices and steps to safely upgrade External-DNS in Kubernetes clusters.
Upgrading External-DNS involves validating configuration compatibility, testing changes, and ensuring no unintended DNS record modifications occur.
Note; We strongly encourage the community to help the maintainers validate changes before they are merged or released. Early validation and feedback are key to ensuring stable upgrades for everyone.
⚠️ Breaking CLI flag or annotation changes are common in
0.xreleases.
If using Helm:
values.yaml structural changesextraArgsBefore upgrading, confirm:
💡 Watch out for deprecated Kubernetes API versions (e.g.,
v1/endpoints→discovery.k8s.io/v1/endpointslices).
Run the new External-DNS version in a staging cluster.
--dry-run mode to preview intended changes:
external-dns correctly identifies and plans updates without actually applying them.dry-run is not supported for a specific caseargs:
- --dry-run
Before applying the upgrade, take a snapshot of your DNS zone(s).
Example (AWS Route53):
aws route53 list-resource-record-sets --hosted-zone-id ZONE_ID > backup.json
Use equivalent tooling for your DNS provider (Cloudflare, Google Cloud DNS, etc.).
Having a backup ensures you can restore records if External-DNS misconfigures entries and you have a solid DR solution.
Instead of upgrading in-place, use a phased rollout across multiple environments or clusters.
Recommended Approaches
a. Multi-Cluster Rollout and Progression
external-dns version first in sandbox, then staging, and finally production.b. Read-Only Parallel Deployment
args:
- --dry-run
- ...other flags
Observe logs and planned record updates to confirm behavior.
Observe logs and planned record updates to confirm behavior.
Monitor and Validate
After deploying the new version, continuously observe both application logs and DNS synchronization metrics to ensure External-DNS behaves as expected.
Logging
Check logs for anomalies or unexpected record changes:
kubectl logs -n external-dns deploy/external-dns --tail=100 -f
Look for:
WARN or ERROR messages, particularly related to provider authentication or permissions.TXT registry conflicts (ownership issues between multiple instances).If using a centralized logging stack (e.g., Loki, Elasticsearch, or CloudWatch Logs):
external-dns logs with DNS provider API logs to detect mismatches.Metrics and Observability
Check metrics exposed by External-DNS (if Prometheus scraping is enabled):
Focus on:
Example PromQL checks:
rate(external_dns_registry_errors_total[5m]) > 0
rate(external_dns_provider_requests_total{operation="DELETE"}[5m])
Ideally, you should have a set of automated tests
Query key DNS records directly:
dig +short myapp.example.com
nslookup api.staging.example.com
Ensure that A, CNAME, and TXT records remain correct and point to expected endpoints.
Additional Tips