-
Notifications
You must be signed in to change notification settings - Fork 671
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature] Have cluster resource controller leverage k8s secrets #541
Comments
cc @jeevb |
Thank you @katrogan. Would it be reasonable to also leverage config maps in the same way? |
@jeevb Secrets has been merged - https://github.com/flyteorg/flytesnacks/blob/master/cookbook/core/intermediate/use_secrets.py and I think we can take this up in the next month |
This was a nice to have at one point for injecting secrets and config maps into dynamically created flyte task namespaces. The current way to do this was rather involved using double base64-encoded secrets, mounting them as a volume and using the mounted file as a value in a cluster resource template. That being said, we’ve since moved to pre-creating these namespaces, and don’t use cluster resource templates. |
* fix: upgrade react-flow-renderer version Signed-off-by: James <[email protected]> * fix: use setTimeout for queue on the next render Signed-off-by: James <[email protected]> * fix: use one state variable and fitView after nodesChange Signed-off-by: James <[email protected]> * introduce needFitView
Signed-off-by: Katrina Rogan <[email protected]>
) * added CleanupOnFailure support for TaskNodeStatus to support aborting failed task nodes Signed-off-by: Daniel Rammer <[email protected]> * updated flyteplugins and generated Signed-off-by: Daniel Rammer <[email protected]> * updated flyteplugins Signed-off-by: Daniel Rammer <[email protected]> --------- Signed-off-by: Daniel Rammer <[email protected]>
) * added CleanupOnFailure support for TaskNodeStatus to support aborting failed task nodes Signed-off-by: Daniel Rammer <[email protected]> * updated flyteplugins and generated Signed-off-by: Daniel Rammer <[email protected]> * updated flyteplugins Signed-off-by: Daniel Rammer <[email protected]> --------- Signed-off-by: Daniel Rammer <[email protected]>
Signed-off-by: Katrina Rogan <[email protected]>
Hello 👋, This issue has been inactive for over 9 months. To help maintain a clean and focused backlog, we'll be marking this issue as stale and will close the issue if we detect no activity in the next 7 days. Thank you for your contribution and understanding! 🙏 |
Hello 👋, This issue has been inactive for over 9 months and hasn't received any updates since it was marked as stale. We'll be closing this issue for now, but if you believe this issue is still relevant, please feel free to reopen it. Thank you for your contribution and understanding! 🙏 |
Most folks use secret manager the recommended path for this. Please refer to https://docs.flyte.org/projects/cookbook/en/latest/auto_examples/productionizing/use_secrets.html#using-secrets-in-a-task |
Motivation: Why do you think this is important?
In addition to reading substitutable secret values from mounted file paths or injected environment variables, it would be useful to access kubernetes secrets when running the cluster resource controller.
Goal: What should the final outcome look like, ideally?
It should be possible to inject kubernetes secrets as substitutable template values in the cluster resource controller.
Describe alternatives you've considered
A clear and concise description of any alternative solutions or features you've considered.
Flyte component
[Optional] Propose: Link/Inline
If you have ideas about the implementation please propose the change. If inline keep it short, if larger then you link to an external document.
Additional context
Add any other context or screenshots about the feature request here.
Is this a blocker for you to adopt Flyte
Please let us know if this makes it impossible to adopt Flyte
The text was updated successfully, but these errors were encountered: