Skip to content

Commit b8e3b11

Browse files
author
Riley Hun
committed
update docs
1 parent cd179c3 commit b8e3b11

File tree

1 file changed

+37
-0
lines changed

1 file changed

+37
-0
lines changed

doc/source/ingress/istio.md

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -97,6 +97,43 @@ Istio has the capability for fine grained traffic routing to your deployments. T
9797

9898
More information can be found in our [examples](../examples/istio_examples.html), including [canary updates](../examples/istio_canary.html).
9999

100+
## Configuring Authentication/Authorization
101+
To force clients to authenticate/authorize themselves in order to access the seldon model deployments, you can leverage Istio's
102+
`RequestAuthentication` and `AuthorizationPolicy`. This will deny or accept requests to the model depending on specified conditions that you designated in the policies.
103+
More information can be found [here](https://istio.io/latest/docs/reference/config/security/authorization-policy/).
104+
105+
You can set the policies to target all the models belonging to a specific namespace, but you must be using istio sidecar proxy,
106+
and ensure your seldon operator configuration has the following:
107+
```
108+
istio:
109+
enabled: true
110+
tlsMode: STRICT
111+
```
112+
113+
When you've set up an `AuthorizationPolicy`, this will disrupt Prometheus from scraping metrics. Two proposed options to
114+
resolve this issue are:
115+
- You can specify that you want to allow GET requests to the prometheus endpoint in the `AuthorizationPolicy`
116+
117+
Example:
118+
```
119+
- to:
120+
- operation:
121+
methods: ["GET"]
122+
paths: ["/prometheus"]
123+
ports: ["6000", "8000", "6001"]
124+
```
125+
126+
- You can also exclude ports in your Istio Operator configuration
127+
```
128+
proxy:
129+
autoInject: enabled
130+
clusterDomain: cluster.local
131+
componentLogLevel: misc:error
132+
enableCoreDump: false
133+
excludeInboundPorts: ""
134+
excludeOutboundPorts: "15021"
135+
```
136+
100137
## Troubleshoot
101138
If you saw errors like `Failed to generate bootstrap config: mkdir ./etc/istio/proxy: permission denied`, it's probably because you are running istio version <= 1.6.
102139
Istio proxy sidecar by default needs to run as root (This changed in version >= 1.7, non-root is the default)

0 commit comments

Comments
 (0)