Uploaded image for project: 'Red Hat OpenShift AI Engineering'
  1. Red Hat OpenShift AI Engineering
  2. RHOAIENG-5089

Create NetworkPolicies that secure Ray Clusters Head REST / Dashboard Endpoint

XMLWordPrintable

    • 3
    • False
    • Hide

      None

      Show
      None
    • False
    • No
    • No
    • No Coverage
    • RHOAI DW - 1, RHOAI DW - 2
    • Testable

      For each Ray cluster created in the context of Distributed Workloads, a NetworkPolicy should be created, that blocks all ingress traffic to that Ray cluster head node HTTP / REST API / Dashboard endpoint, except:

      • From Pods within the local Ray cluster namespace
      • From the KubeRay controller deployed in the RHOAI application namespace

      That should be done in the DW RayCluster controller.

      Acceptance criteria:

      • As a data scientist, I can create a Ray cluster, with "zero-trust" security enabled by default, and:
        • Access the dashboard, after login from the Web browser
        • Connect to my cluster from within the notebook using the CodeFlare SDK and submit jobs
      • As a data scientist, I can create a RayJob resource, and that RayJob runs successfully in the target Ray cluster
      • As a platform admin, given I create a Pod in a different namespace that the previously created Ray cluster, and I exec into that Pod, I cannot access any of the Ray cluster endpoints (client, dashboard, GCS,  metrics)

            kpostlet@redhat.com Kevin Postlethwait
            astefanu@redhat.com Antonin Stefanutti
            Karel Suta Karel Suta
            RHOAI Distributed Workloads
            Votes:
            0 Vote for this issue
            Watchers:
            6 Start watching this issue

              Created:
              Updated:
              Resolved: