Sample config setting Kubeflow with custom OIDC provider

0

Is there any step-by-step guides/tutorials on how to implement Kubeflow with custom OIDC providers?

I want to install Kubeflow in region Jakarta with EKS, but Cognito is not available in region JKT (ap-southeast-3), so alternatively I'm looking to use Dex and custom OIDC provider (Github or Google workspace).

I've tried to do some research but can't figure out how to set it:

2 Risposte
1
Risposta accettata

In specific case of AWS region Jakarta, the ALB at the time of writing this answer only supports authentication with OIDC.

To work with Kubeflow, we can configure the ALB to authenticate directly with auth-idp-oidc. We will have to get endpoints, client ID, and client secret from our OIDC idP, and specify it as annotations to the ALB ingress, and we'll also need an envoy filter to pass authenticated user data to Kubeflow.

For step-by-step sample, you can try to follow this guide.

AWS
con risposta 2 anni fa
0

You can use Cognito in another region. There, you can federate your custom OIDC through the Identity Providers section of Cognito.

Cognito is integrated nicely with the EC2 Load Balancers, which sit in front of the EKS ingress gateway, used by the ui for ml-pipelines, notebooks, model serving, etc. So, all requests ending to your Kubeflow environment through that ingress, are authorised. Furthermore, the ALB access logs for your Kubeflow traffic are stored in S3 by the ALB properties, externally to EKS. That makes it agnostic to Kubeflow and hence a best practice for security auditing.

profile pictureAWS
theofpa
con risposta 2 anni fa

Accesso non effettuato. Accedi per postare una risposta.

Una buona risposta soddisfa chiaramente la domanda, fornisce un feedback costruttivo e incoraggia la crescita professionale del richiedente.

Linee guida per rispondere alle domande