-
Notifications
You must be signed in to change notification settings - Fork 903
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor existing_arrikto into a community supported config #599
Comments
Thanks, @yanniszark for filing this issue. Let me link @jlewi's comment which summarizes this: Currently kfctl_k8s_istio.yaml is a configuration that works for everyone but is not identity aware and doesn't have a good story for how you access it from outside the cluster (kubectl port-forward works but isn't great). Is the proposal to change that to
Adding advanced options to
Originally posted by @jlewi in #560 (comment) |
It follows from here that we would stop supporting kfctl_k8s_istio.yaml and replace it with kfctl_k8s_istio_dex.yaml |
Thanks @yanniszark; I'd like to propose one additional
The motivation is as follows
|
One important assumption we need to note is that with 0.7 release the identity at Kubeflow gateway and Kubernetes' API are assumed to be the same for a user. |
We've thought of introducing Istio 1.3.1 with this config. |
@krishnadurai and @yanniszark any update on this ? What is the remaining work that needs to be done for 1.0? |
@jlewi Here's the status:
Overall, I'm looking to complete the implementation by sometime next week. |
Thanks @krishnadurai; how's this coming? We've cut the 1.0-branch so changes will need to be pulled into that branch either via cherry-picks or rebasing the branch |
@krishnadurai and @yanniszark can we close this out or is there more work to be done? |
@jlewi I believe @krishnadurai wanted for the Dex plugin to make it into 1.0. In addition, there is this issue for updating the docs: kubeflow/website#1592 |
I am closely looking at this issue as it is something we need in our AWS environment, particularly referring to the option of passing the DOMAIN envar in order to generate a valid cert based on the domain/load-balancer exposure with the deployment. Does PR #600 actually implement the functionality described here or is there further work to be done on Dex @krishnadurai |
Both of the above tasks will look to provide 'DOMAIN' environment variable. Expect this to be completed within a few weeks. We are not looking for this to be a part of 1.0. |
@krishnadurai and @yanniszark any update on this? How close are we to closing this? |
@krishnadurai and @yanniszark ping? |
@jlewi I'll send in a PR for this. |
Thanks @krishnadurai so it sounds like we can close this as soon as the docs are submitted. |
/close We'll create a separate issue for Dex plugin implementation. |
@krishnadurai: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
There seems to be a community agreement that Kubeflow needs a config in the lines of
existing_arrikto.
Since our intention was for it to be a community config from the start, we refactor it into a community-supported config.
The proposed new name is
kfctl_istio_dex.yaml
.What is included:
/cc @krishnadurai @ddutta @jlewi @johnugeorge @vkoukis @cvenets
The text was updated successfully, but these errors were encountered: