Sample config setting Kubeflow with custom OIDC provider

0

Is there any step-by-step guides/tutorials on how to implement Kubeflow with custom OIDC providers?

I want to install Kubeflow in region Jakarta with EKS, but Cognito is not available in region JKT (ap-southeast-3), so alternatively I'm looking to use Dex and custom OIDC provider (Github or Google workspace).

I've tried to do some research but can't figure out how to set it:

2回答
1
承認された回答

In specific case of AWS region Jakarta, the ALB at the time of writing this answer only supports authentication with OIDC.

To work with Kubeflow, we can configure the ALB to authenticate directly with auth-idp-oidc. We will have to get endpoints, client ID, and client secret from our OIDC idP, and specify it as annotations to the ALB ingress, and we'll also need an envoy filter to pass authenticated user data to Kubeflow.

For step-by-step sample, you can try to follow this guide.

AWS
回答済み 2年前
0

You can use Cognito in another region. There, you can federate your custom OIDC through the Identity Providers section of Cognito.

Cognito is integrated nicely with the EC2 Load Balancers, which sit in front of the EKS ingress gateway, used by the ui for ml-pipelines, notebooks, model serving, etc. So, all requests ending to your Kubeflow environment through that ingress, are authorised. Furthermore, the ALB access logs for your Kubeflow traffic are stored in S3 by the ALB properties, externally to EKS. That makes it agnostic to Kubeflow and hence a best practice for security auditing.

profile pictureAWS
theofpa
回答済み 2年前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ