Sample config setting Kubeflow with custom OIDC provider

0

Is there any step-by-step guides/tutorials on how to implement Kubeflow with custom OIDC providers?

I want to install Kubeflow in region Jakarta with EKS, but Cognito is not available in region JKT (ap-southeast-3), so alternatively I'm looking to use Dex and custom OIDC provider (Github or Google workspace).

I've tried to do some research but can't figure out how to set it:

2개 답변
1
수락된 답변

In specific case of AWS region Jakarta, the ALB at the time of writing this answer only supports authentication with OIDC.

To work with Kubeflow, we can configure the ALB to authenticate directly with auth-idp-oidc. We will have to get endpoints, client ID, and client secret from our OIDC idP, and specify it as annotations to the ALB ingress, and we'll also need an envoy filter to pass authenticated user data to Kubeflow.

For step-by-step sample, you can try to follow this guide.

AWS
답변함 2년 전
0

You can use Cognito in another region. There, you can federate your custom OIDC through the Identity Providers section of Cognito.

Cognito is integrated nicely with the EC2 Load Balancers, which sit in front of the EKS ingress gateway, used by the ui for ml-pipelines, notebooks, model serving, etc. So, all requests ending to your Kubeflow environment through that ingress, are authorised. Furthermore, the ALB access logs for your Kubeflow traffic are stored in S3 by the ALB properties, externally to EKS. That makes it agnostic to Kubeflow and hence a best practice for security auditing.

profile pictureAWS
theofpa
답변함 2년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인