-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add poddefault for automatic Jupyterlab authentication #6629
Conversation
Hi @juliusvonkohout. Thanks for your PR. I'm waiting for a kubeflow member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@Bobgy this is probably something we shouldn't decide for users, (not all admins will want to auto-mount a token). Also, I think this PR highlights that we should extend the main Then, the Kubeflow Pipelines YAML would only need to include those |
It is not auto mounted. it is just providing the poddefault that might/can be used in a Jupyterlab. kubeflow/kubeflow#6160 would auto mount it by default. But if you have a cleaner solution that is of course appreciated. |
Is the profile controller able to monitor these resources and recreate them if they have been deleted? |
Yes, I believe the profile controller repeatedly does a reconciliation loop (every 10s maybe? something like that) and if it ever sees a missing resource, it creates a new one. The sync.py script does not do really detailed inspection of the objects though, so for example if you edited the proposed PodDefault and just deleted the spec, the profile controller wouldn't notice that or fix anything |
@thesuperzapper I don't know if admins will want to auto-mount tokens, but this feature feels like an easy quality of life improvement for users that doesn't change much for admins. It creates an object that users have permission to create for themselves (any user could create this Having seamless access to the pipeline client from notebooks feels like a feature most users would expect. I really like the |
@@ -339,6 +340,51 @@ def sync(self, parent, children): | |||
} | |||
} | |||
}, | |||
{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suggest adding a header so this doesn't look like part of the above artifact fetcher resources (I'm not particular about the wording, just don't want it to read that this is part of the artifact server)
{ | |
# Adds "Allow access to Kubeflow Pipelines" button in Notebook spawner UI | |
{ |
If there is agreement on making this change, the tests in |
Actually i and @thesuperzapper want to get rid of metacontroller and pipelines-profile-controller as described in #7219 (comment). This WIP pull request also contains the change you proposed above. Are you willing to help there? |
I am for removing the profile controller and metacontroller, and really like the Re #7219 I like what you've outlined (adding comment there too). It would be good to get someone from the pipelines group to express buy-in. I cannot contribute to either of these immediately, but can probably help within a few weeks. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
@juliusvonkohout aside from the part of exposing this PodDefault on each user namespace (discussion about Profile Controller and Metacontroller) I'd like to at least bring more awareness to users regarding this PodDefault. Could you at least create a PR and add this in https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook/examples? I'm looking into a restructure of the docs and would love to have a section of common use-cases of PodDefaults, and that's why I want to try and populate this dir as much as possible |
@kimwnasptd the pipeline docs I added a while ago show an example of using a PodDefault to automatically mount the KFP ServiceAccount token and set Expand the "Full Kubeflow (from inside cluster)" section |
closed due to inactivity |
Description of your changes:
@Bobgy
A poddefault is automatically created according to #5138
Checklist: