-
Notifications
You must be signed in to change notification settings - Fork 878
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add model registry sync script #2682
Add model registry sync script #2682
Conversation
Signed-off-by: Andrea Lamparelli <a.lamparelli95@gmail.com>
8200f09
to
38b0254
Compare
There are a couple of open points:
|
Thank you @lampajr for your contribution! I believe components in alpha release aren't eligible to be part of the core manifests, correct? |
Just add this to the Agenda of the next Manifests WG meeting. Seldon should be a similar effort. |
As discussed in the last Kubeflow Manifest WG meeting (2024-04-18) I am working on filling the requirements that are stated https://github.com/kubeflow/manifests/blob/master/proposals/20220926-contrib-component-guidelines.md#component-requirements. For easier management we decided to add missing files, like manifests README and OWNERS, directly in the Kubeflow Model Registry repository (see kubeflow/model-registry#69). Thus, I think that this PR could be considered as ready for review as it simply adds the script to sink the manifest folder from Kubeflow Model Registry. |
Are you sure that you also satisfy
|
This is still an ongoing task to ensure those things. |
/lgtm then we discuss the details when synchronizing |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: juliusvonkohout, lampajr The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/unhold |
@lampajr do you also need a networkpolicy for the manifest repository? Otherwise there wont be incoming traffic to the Kubeflow namespace for your pods. Please check https://github.com/kubeflow/manifests/tree/master/common/networkpolicies |
We will discuss about this in the next KFMR bi-weekly meeting (next Monday)
I am not sure I get this sentence, based on the https://github.com/kubeflow/manifests/tree/master/common/networkpolicies it looks like more an optional, second line of defence and especially for those pods that are not secured by Istio. So I don't get why you are saying a generic "there won't be incoming traffic". Do you mean just for those not protected by Istio? Or am I missing something else? 🤔 |
I have the same questions as @lampajr (thanks btw for contributing to this work). As the Model Registry registers with Istio: https://github.com/kubeflow/model-registry/tree/main/manifests/kustomize/options/istio |
If you have any kind of webhook or service in the Kubeflow namespace that needs access from other namespaces or the apiserver (webhook) you need a networkpolicy, because that is blocked by default. But i can create one in 5 Minutes if I see your deployment ports. We will notice anyway when testing the release if you need one. |
thanks for the quick feedback @juliusvonkohout , let's keep posted 👍 |
Signed-off-by: Andrea Lamparelli <a.lamparelli95@gmail.com>
Which issue is resolved by this Pull Request:
Resolves #2631
Description of your changes:
main
branchChecklist:
Make sure you have installed kustomize == 5.2.1+
make generate-changed-only
make test