Skip to content

Conversation

pschoen-itsc
Copy link
Contributor

@pschoen-itsc pschoen-itsc commented Mar 14, 2025

Pull Request Template for Kubeflow Manifests

✏️ Summary of Changes

Use ACLs in seaweedfs to isolate access to artifacts by profile. When a new profile is created, credentials for this profile will be created by seaweedfs and put as secret into the new namespace. ACLs will be set to limited to access from this profile to his subdir in the bucket.

📦 Dependencies

🐛 Related Issues

Don't know if there is currently an open issue

✅ Contributor Checklist


You can join the CNCF Slack and access our meetings at the Kubeflow Community website. Our channel on the CNCF Slack is here #kubeflow-platform.

@pschoen-itsc
Copy link
Contributor Author

@juliusvonkohout I need to do a bit more testing (for example UI components), but the integration between seaweedfs and kf-pipelines works that way.

@juliusvonkohout
Copy link
Member

/retest

- namespaceSelector:
matchExpressions:
- key: kubernetes.io/metadata.name
operator: In
values:
- istio-system
- podSelector: {}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ml-pipeline-ui and maybe others need it as well without the artifact proxy

@juliusvonkohout juliusvonkohout marked this pull request as ready for review March 16, 2025 18:07
@juliusvonkohout
Copy link
Member

juliusvonkohout commented Mar 16, 2025

@juliusvonkohout I need to do a bit more testing (for example UI components), but the integration between seaweedfs and kf-pipelines works that way.

Thank you very much for the PR. I have added a lot of comments and clarifications.

Now the question is why does the pipeline not stop running.

@juliusvonkohout juliusvonkohout force-pushed the integrate-profiles-with-seaweedfs branch from 29091b6 to 5c1a8ca Compare March 16, 2025 18:17
@google-oss-prow google-oss-prow bot added size/L and removed size/XL labels Apr 11, 2025
@juliusvonkohout
Copy link
Member

Do you mind squashing and signing your commits (DCO) and rebasing to master?

@juliusvonkohout
Copy link
Member

@juliusvonkohout juliusvonkohout mentioned this pull request Apr 22, 2025
7 tasks
@pschoen-itsc pschoen-itsc force-pushed the integrate-profiles-with-seaweedfs branch from 06e4502 to 190b8f4 Compare April 25, 2025 15:00
@google-oss-prow google-oss-prow bot added size/L and removed size/XXL labels Apr 25, 2025
@juliusvonkohout
Copy link
Member

Thank you, i just re-enabled the tests

@juliusvonkohout
Copy link
Member

juliusvonkohout commented Apr 25, 2025

Ah i broke the DCO, but you can just squash my test enabling commit and take ownership of it if needed. Otherwise i will fix it later myself

Signed-off-by: Patrick Schönthaler <[email protected]>
@pschoen-itsc pschoen-itsc force-pushed the integrate-profiles-with-seaweedfs branch from 2084827 to fc31f52 Compare April 25, 2025 16:54
@google-oss-prow google-oss-prow bot added size/XL and removed size/L labels Apr 25, 2025
@juliusvonkohout
Copy link
Member

juliusvonkohout commented Apr 25, 2025

Signed-off-by: Patrick Schönthaler <[email protected]>
Signed-off-by: Patrick Schönthaler <[email protected]>
Signed-off-by: Patrick Schönthaler <[email protected]>
@pschoen-itsc
Copy link
Contributor Author

The End-to-End Integration test succeded before, now it fails without changing anything...
@juliusvonkohout can you just retrigger it?

@milinddethe15
Copy link
Member

/retest

@juliusvonkohout
Copy link
Member

juliusvonkohout commented Apr 27, 2025

Amazing, thank you very much. It it such an improvement of the status quo.

In a follow up PR we should

  1. check whether ubuntu-latest-16-cores is really needed instead of the smaller nodes
  2. test it also in https://github.com/kubeflow/manifests/blob/master/.github/workflows/full_kubeflow_integration_test.yaml
  3. Add security checks to fest for unauthorized access
  4. Adjust the Argo Workflow-Controller configuration map to achieve the same for V1 pipelines (easy, did so before)
  5. See how we can upstream that to KFP
    @akagami-harsh this could be interesting for you.

Thank you everyone!
I am pushing this for 4 years or so and even had google and redhat employees involved, back then even Amazon. It is fundamental for CVEs, maintainabiliy (minio is now stuck for 5 years or so) and hard multi-tenancy as basic requirement for a sane platform. We also had approaches there for several years with minio. it started all in 2020 here kubeflow/pipelines#4649 and went via kubeflow/pipelines#7725 (2022) and #2826 (October 2024) to #3051 (2025). Without that experimental and extended tests it would have been very hard to pull of and coordinate. I want to especially highlight @pschoen-itsc who spent his effort here for the public health sector in Germany where many insurances need hard multi-tenancy to process data.

/lgtm
/approve

Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: juliusvonkohout

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@google-oss-prow google-oss-prow bot merged commit de2bf1e into kubeflow:master Apr 27, 2025
8 of 9 checks passed
@juliusvonkohout
Copy link
Member

Tracked in #3119

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants