You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/source/ingress/istio.md
+37Lines changed: 37 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -97,6 +97,43 @@ Istio has the capability for fine grained traffic routing to your deployments. T
97
97
98
98
More information can be found in our [examples](../examples/istio_examples.html), including [canary updates](../examples/istio_canary.html).
99
99
100
+
## Configuring Authentication/Authorization
101
+
To force clients to authenticate/authorize themselves in order to access the seldon model deployments, you can leverage Istio's
102
+
`RequestAuthentication` and `AuthorizationPolicy`. This will deny or accept requests to the model depending on specified conditions that you designated in the policies.
103
+
More information can be found [here](https://istio.io/latest/docs/reference/config/security/authorization-policy/).
104
+
105
+
You can set the policies to target all the models belonging to a specific namespace, but you must be using istio sidecar proxy,
106
+
and ensure your seldon operator configuration has the following:
107
+
```
108
+
istio:
109
+
enabled: true
110
+
tlsMode: STRICT
111
+
```
112
+
113
+
When you've set up an `AuthorizationPolicy`, this will disrupt Prometheus from scraping metrics. Two proposed options to
114
+
resolve this issue are:
115
+
- You can specify that you want to allow GET requests to the prometheus endpoint in the `AuthorizationPolicy`
116
+
117
+
Example:
118
+
```
119
+
- to:
120
+
- operation:
121
+
methods: ["GET"]
122
+
paths: ["/prometheus"]
123
+
ports: ["6000", "8000", "6001"]
124
+
```
125
+
126
+
- You can also exclude ports in your Istio Operator configuration
127
+
```
128
+
proxy:
129
+
autoInject: enabled
130
+
clusterDomain: cluster.local
131
+
componentLogLevel: misc:error
132
+
enableCoreDump: false
133
+
excludeInboundPorts: ""
134
+
excludeOutboundPorts: "15021"
135
+
```
136
+
100
137
## Troubleshoot
101
138
If you saw errors like `Failed to generate bootstrap config: mkdir ./etc/istio/proxy: permission denied`, it's probably because you are running istio version <= 1.6.
102
139
Istio proxy sidecar by default needs to run as root (This changed in version >= 1.7, non-root is the default)
0 commit comments