-
Notifications
You must be signed in to change notification settings - Fork 442
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add image pull secrets to k8s pod settings #2847
Conversation
Important Review skippedAuto reviews are disabled on this repository. Please check the settings in the CodeRabbit UI or the You can disable this status message by setting the Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (invoked as PR comments)
Additionally, you can add CodeRabbit Configration File (
|
In general I think ZenML should even be able to set those image pull secrets for users if they're using service connectors, correct? |
@schustmi hundred percent. but this change should also include other orchestrators in general, eventually. Right now, service connectors are only useful client side. I can start with this one and we can deal with other orchestrators after this, what say? |
This would be just a bit more difficult to set up, because you would have to give the ZenML pods permissions to create those secrets, but 100% that it should be doable. |
Describe changes
I added image pull secrets to k8s pod settings to allow pods to pull images when they are running on private clusters and other environments where implicit access is not easy to provide.
An alternative to this would be to create a custom service account, attach pull secrets to it and then use it for your orchestrator and step pods but the more options, the merrier. This would also be easier to use, imo.
Pre-requisites
Please ensure you have done the following:
develop
and the open PR is targetingdevelop
. If your branch wasn't based on develop read Contribution guide on rebasing branch to develop.Types of changes