Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update kubeflow/model-registry manifests from 5d8ed91 #2973

Merged
merged 3 commits into from
Feb 8, 2025

Conversation

tarilabs
Copy link
Member

@tarilabs tarilabs commented Feb 3, 2025

Pull Request Template for Kubeflow manifests Issues

✏️ A brief description of the changes

Updated KF manifests for MR following most recent release update

📦 List any dependencies that are required for this change

none

🐛 If this PR is related to an issue, please put the link to the issue here.

for KF 1.10 RC builds

✅ Contributor checklist


You can join the CNCF Slack and access our meetings at the Kubeflow Community website. Our channel on the CNCF Slack is here #kubeflow-platform.

Signed-off-by: tarilabs <matteo.mortari@gmail.com>
@tarilabs
Copy link
Member Author

tarilabs commented Feb 3, 2025

/assign @juliusvonkohout

as discussed in today's meeting, thank you again

Signed-off-by: tarilabs <matteo.mortari@gmail.com>
see details in kubeflow/model-registry#267 (comment)

Signed-off-by: tarilabs <matteo.mortari@gmail.com>
@juliusvonkohout juliusvonkohout self-requested a review February 4, 2025 08:59
Copy link
Member

@juliusvonkohout juliusvonkohout left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hello, you are missing a security context for most of your deployments. Please add

securityContext:
allowPrivilegeEscalation: false
seccompProfile:
type: RuntimeDefault
runAsNonRoot: true
capabilities:
drop:
- ALL

to all of your deployments.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hello, where is the Kubeflow userid header checked ?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @juliusvonkohout I'm assuming you are asking something similar as what pipelines has implemented here, we weren't told when we asked for feedback it was an option, if we need it, I'm happy to add it right away.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do we have tests for the UI ?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @juliusvonkohout, yes, we have a stack of tests run before merging both for unit testing and integration, everything runs in an action before every PR, not sure if there's extra test for kubeflow integration.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also, @juliusvonkohout, as this is still not integrated with Central Dashboard by default, we have not added the integration tests on Kubeflow Central Dashboard yet. (but as @lucferbux said, we test it on the model registry repo)

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

But do we have some basic tests in kubeflow/manifests for the UI before we enable it? See https://github.com/kubeflow/manifests/blob/a21afee95a7129d5374eebe84ef9b0983ec3adb5/.github/workflows/model_registry_test.yaml. We need some integration tests.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we add the tests in a follow up PR? I can raise a new bug to cover it and add it right away.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lucferbux then just please create a tracking issue for the next release and link it here.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm sorry @juliusvonkohout I didn't follow up on this, here's #2984 and I currently have a local draft PR that I'm testing, probably I'll push it later today, first thing monday.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hello, you are missing a security context for most of your deployments. Please add

securityContext:
allowPrivilegeEscalation: false
seccompProfile:
type: RuntimeDefault
runAsNonRoot: true
capabilities:
drop:
- ALL

to all of your deployments.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@tarilabs
Copy link
Member Author

tarilabs commented Feb 4, 2025

hi @juliusvonkohout @tarekabouzeid wrt to :

this was not raised as a blocker since:

I'd prefer to defer this new requirement on the roadmap for the next release(s).

for this release, what we received in Release team meeting, was to implement K8s matrix check, which we did promptly and as requested with

@juliusvonkohout
Copy link
Member

hi @juliusvonkohout @tarekabouzeid wrt to :

* [Update kubeflow/model-registry manifests from 5d8ed91 #2973 (review)](https://github.com/kubeflow/manifests/pull/2973#pullrequestreview-2592150562)

this was not raised as a blocker since:

* https://github.com/kubeflow/manifests/commits/master/apps/model-registry/upstream

I'd prefer to defer this new requirement on the roadmap for the next release(s).

for this release, what we received in Release team meeting, was to implement K8s matrix check, which we did promptly and as requested with

* [build: use also different K8s versions for E2E testing in GHA model-registry#659 (review)](https://github.com/kubeflow/model-registry/pull/659#pullrequestreview-2512327021)

Can you then create and link here a tracking issue for the security context in the next model-registry release?

@tarilabs
Copy link
Member Author

tarilabs commented Feb 5, 2025

The link has been created and for the next roadmap (ie KF) release(s) accordingly.
It is my understanding this is not a blocker like it's not been since #2973 (comment) and neither for other KF components.

@juliusvonkohout
Copy link
Member

I assume that kubeflow/model-registry#760 is the issue. For KFP and manifests we already have the securitycontext upstream :-)

I think we should have one for the integration tests as well, see #2973 (comment) and then i just add the two issues here as well #2763 and merge this PR.

@juliusvonkohout juliusvonkohout added this to the 1.10 milestone Feb 6, 2025
@lucferbux lucferbux mentioned this pull request Feb 7, 2025
7 tasks
@lucferbux
Copy link
Contributor

I assume that kubeflow/model-registry#760 is the issue. For KFP and manifests we already have the securitycontext upstream :-)

I think we should have one for the integration tests as well, see #2973 (comment) and then i just add the two issues here as well #2763 and merge this PR.

Ok, so for the Integration tests, already created #2984 so we are good there, I'll raise the PR asap.

@juliusvonkohout
Copy link
Member

I assume that kubeflow/model-registry#760 is the issue. For KFP and manifests we already have the securitycontext upstream :-)

I think we should have one for the integration tests as well, see #2973 (comment) and then i just add the two issues here as well #2763 and merge this PR.

Ok, so for the Integration tests, already created #2984 so we are good there, I'll raise the PR asap.

Yes please the securitycontext and the integration tests in BOTH (also kubeflow/manifests) repositories for the next release. They don't need to be exhaustive, but at least basic API and UI functionality must be tested and then we can review PRs to kubeflow/manifests way faster.

/lgtm
/approve

@google-oss-prow google-oss-prow bot added the lgtm label Feb 8, 2025
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: juliusvonkohout

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@google-oss-prow google-oss-prow bot merged commit 71ea0ee into kubeflow:master Feb 8, 2025
8 checks passed
@juliusvonkohout
Copy link
Member

@tarilabs it seems that

| Kubeflow Model Registry | apps/model-registry/upstream | [v0.2.12](https://github.com/kubeflow/model-registry/tree/v0.2.12/manifests/kustomize) |
has not been updated automatically by the script. Can you check that for the next manifest synchronization?

@tarilabs
Copy link
Member Author

@tarilabs it seems that

| Kubeflow Model Registry | apps/model-registry/upstream | [v0.2.12](https://github.com/kubeflow/model-registry/tree/v0.2.12/manifests/kustomize) |

has not been updated automatically by the script. Can you check that for the next manifest synchronization?

ack, thank you for raising it

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants