-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow SSH access into Notebook Pods #23
Comments
@kimwnasptd @jiridanek @ederign @juliusvonkohout I am interested to know your thoughts on this, as allowing SSH into Notebook Pods is a long standing request, but is complex to do safely. |
In practice most people i know use a local vscode and connect it to the workbench/workspace via vscode extensions and a Kubeconfig. So it works on the Kubernetes, not the Kubeflow layer. |
@juliusvonkohout I assume you are talking about the "attach to container" feature: Or are you talking about using the If you are talking about the first option, it still has a few problems:
Hence why I want to figure out a generic solution for SSH into the Notebook Pods without compromising the security of the cluster. |
"Hence why I want to figure out a generic solution for SSH into the Notebook Pods without compromising the security of the cluster." yes, Code-server/vscode is just a workraound |
@thesuperzapper This is indeed an interesting feature that can open up a bunch of new use cases and I agree that we should be careful on security considerations. I would also start exploring option 1 (jump-box). One thing we need to figure out is how users will securely add their own SSH keys. The first approach that comes to my mind is to allow them to assign a public key to a given notebook on the spawner UI. Another approach would be a 'key per namespace', that will allow me to ssh in any notebook of a given namespace. |
Is relying on the Kubernetes API a scalable and reliable solution for managing workloads? I'm concerned that the kube-apiserver could become a bottleneck if multiple users simultaneously access numerous pods, particularly given that tools like VSCode may generate a high volume of small requests. |
Whats the Goal?
I am trying to figure out how to allow users to SSH into Notebook Pods from their laptop. The benefit of this is supporting tools like Remote VSCode and JetBrains Gateway (for PyCharm) with the resources (e.g. GPUs) of the Pod.
The main issue is how to expose the Notebook Pod via SSH on the Istio Ingress Gateway.
What's the Problem?
SSH uses TCP which can't do hostname/HTTP-path routing like we do for the web-based UIs of the Notebooks. The naive approach is to have the Istio Ingress Gateway listen on a unique port for each Notebook (which is obviously not scalable or secure).
In my mind there are only TWO ways to make this work:
command
inauthorized_keys
to another-t username@<WORKSPACE_NAME>.<NAMESPACE_NAME>.svc.cluster.local
] command (see idea here)fail2ban
to stop brute forcingOther Notes
While it is technically possible to use
kubectl port-forward
on the laptop to expose any port that the Notebook Pod is listening on (e.g. SSH port), I am not sure this is desirable at scale because it requires all users to have thepod/exec
RBAC on the profile namespace, which is very privileged.Final Thoughts
There are lots of security considerations to allowing remote SSH access, especially for the people who put Kubeflow on the public internet (NOT advised).
I am interested to hear people's ideas for how we can do this safely.
The text was updated successfully, but these errors were encountered: