Skip to content

Conversation

madmecodes
Copy link
Contributor

Pull Request Template for Kubeflow Manifests

✏️ Summary of Changes

This PR addresses a security issue with KServe inference endpoints by applying oauth2-proxy authentication to the cluster-local-gateway. Currently, KServe endpoints lack proper authentication because they use the cluster-local-gateway which has an ALLOW policy instead of proper oauth2-proxy authentication.

Changes include:

  1. Modified the cluster-local-gateway AuthorizationPolicy to use oauth2-proxy authentication instead of allowing all traffic without authentication
  2. Updated the KServe test workflow to:
    • Use proper Kubeflow user namespaces instead of generic test namespaces
    • Test with tokens from the appropriate service accounts
    • Apply predictor-specific AuthorizationPolicy for tests

This ensures KServe inference endpoints are properly secured and require authentication, just like other Kubeflow services accessed through the istio-ingressgateway.

📦 Dependencies

No direct dependencies on other PRs. This PR combines improvements that were planned for PR #2936 with the security fix.

🐛 Related Issues

✅ Contributor Checklist


You can join the CNCF Slack and access our meetings at the Kubeflow Community website. Our channel on the CNCF Slack is here #kubeflow-platform.

@madmecodes
Copy link
Contributor Author

madmecodes commented Mar 18, 2025

PS: okay i will look into the failed CI/CD runs, fixing them

@juliusvonkohout juliusvonkohout added this to the 1.10.1 milestone Mar 18, 2025
@juliusvonkohout
Copy link
Member

/retest

@madmecodes
Copy link
Contributor Author

madmecodes commented Mar 18, 2025

/retest

Screenshot 2025-03-18 at 11 05 09 PM

namespace creation is failing, i am debugging that, i will tag u once the issue is solved, sorry for the inconvenience :(

@juliusvonkohout
Copy link
Member

juliusvonkohout commented Mar 20, 2025

#3062 is merged, so you can just rebase to master and have way less complexity

juliusvonkohout and others added 3 commits March 20, 2025 20:10
Signed-off-by: juliusvonkohout <45896133+juliusvonkohout@users.noreply.github.com>
This change applies oauth2-proxy authentication to the cluster-local-gateway,
ensuring KServe inference endpoints require proper authentication.
Also adds a predictor-specific AuthorizationPolicy for test workflows.

Fixes kubeflow#2811

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
…dd wait steps

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
@madmecodes madmecodes force-pushed the fix-kserve-auth-2811 branch from 1aea113 to 6813561 Compare March 20, 2025 14:57
Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
The Profile CRD needs to be installed via multi-tenancy components
before attempting to create a user profile. This ensures the
kubeflow-user-example-com namespace is properly created for tests.

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
@madmecodes
Copy link
Contributor Author

madmecodes commented Mar 21, 2025

if KF-Profile is before KF-multi-tenancy
created a dependency issue.

common/kubeflow-namespace/base creates kubeflow namespace
common/user-namespace/base creates kubeflow-user-example-com namespace and profile controllers

If KF-profile is after Multi Tenancy

Screenshot 2025-03-21 at 12 22 56 PM Screenshot 2025-03-21 at 2 35 59 PM

@juliusvonkohout Could you please review the installation order, and guide a bit, still facing the namespace issue.

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@akagami-harsh can you cross check whether this file is auto generated?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The gateway-authorizationpolicy.yaml file appears to be a manually created file that doesn't change when running the synchronize-istio-manifests.sh script.

… in cluster-local-gateway

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
@madmecodes
Copy link
Contributor Author

madmecodes commented Mar 24, 2025

working on Auth Policy, so that unwanted namespace get access denied

PS: found
In Istio, when a request enters through the ingress gateway (typically in the istio-system namespace), the source namespace evaluated by the AuthorizationPolicy is the namespace of the ingress gateway’s service account, not the namespace associated with the token in the Authorization header. Here’s why unauthorized access isn’t blocked

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
@madmecodes
Copy link
Contributor Author

madmecodes commented Mar 24, 2025

@juliusvonkohout Currently Auth Policy is allowing access to models, via any namespace, if it has a valid JWT we need to change it to so that only specified namespaces in AuthPolicy can access them, am i thinking in the right direction?

i am testing it locally, when its too strict, it forbids all if too permissive, allows all (with valid JWT), working on a middle path, am i working on right problem?
Screenshot 2025-03-24 at 7 32 24 PM

Screenshot 2025-03-24 at 7 36 45 PM Screenshot 2025-03-24 at 7 36 58 PM

@juliusvonkohout
Copy link
Member

juliusvonkohout commented Mar 24, 2025

@juliusvonkohout Currently Auth Policy is allowing access to models, via any namespace, if it has a valid JWT we need to change it to so that only specified namespaces in AuthPolicy can access them, am i thinking in the right direction?

i am testing it locally, when its too strict, it forbids all if too permissive, allows all (with valid JWT), working on a middle path, am i working on right problem? Screenshot 2025-03-24 at 7 32 24 PM
Screenshot 2025-03-24 at 7 36 45 PM Screenshot 2025-03-24 at 7 36 58 PM

Yes, that is what we want. Only mebers/serviceaccounts of the same namespace should be able to access it. Maybe you can work with the allowing the default-editor, default and default-viewer serviceaccount of the same namespace as principals in the authorizationpolicy.

@juliusvonkohout
Copy link
Member

See also https://github.com/kubeflow/manifests/blob/master/apps/pipeline/upstream/base/installs/multi-user/istio-authorization-config.yaml

@juliusvonkohout juliusvonkohout changed the title Document secure Kserve authentication via automted tests Document secure Kserve authentication via automated tests Mar 24, 2025
madmecodes and others added 2 commits March 25, 2025 17:28
Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
@juliusvonkohout
Copy link
Member

juliusvonkohout commented Mar 25, 2025

Let me do some changes, merge the PR and then you can create a follow-up PR for the remaining stuff @madmecodes

  • The dex test is just a bit flaky. Lets try to make it more robust.
  • Do not hardcode "kubeflow-user-example-com" in the authorizationpolicy, but make it pick up the namespace where the authorizationpolicy is deployed in automatically.
  • You need to make sure that you cannot inference with a token from another namespace e.g. kubeflow-user-example-com-attacker. For path-based and host-based access.

@madmecodes
Copy link
Contributor Author

Let me do some changes, merge the PR and then you can create a follow-up PR for the remaining stuff @madmecodes

  • The dex test is just a bit flaky. Lets try to make it more robust.
  • Do not hardcode "kubeflow-user-example-com" in the authorizationpolicy, but make it pick up the namespace where the authorizationpolicy is deployed in automatically.
  • You need to make sure that you cannot inference with a token from another namespace e.g. kubeflow-user-example-com-attacker. For path-based and host-based access.

yes, i am working on this only, facing some problems, troubleshooting them, i will create a follow up PR for these 3 things as mentioned once the PR is merged.

  1. Make the Dex test more robust (fix flakiness)
  2. Avoid hardcoding namespaces in AuthorizationPolicy
  3. Ensure tokens from other namespaces can't access models

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
@juliusvonkohout
Copy link
Member

/lgtm
/approve

@google-oss-prow
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: juliusvonkohout

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@google-oss-prow google-oss-prow bot merged commit 7f8837f into kubeflow:master Mar 25, 2025
25 checks passed
@juliusvonkohout
Copy link
Member

Please make sure that you rebase to master before you create the new branch / PR.

@juliusvonkohout
Copy link
Member

In the follow up PR you can either remove or secure the cluster-local-gateway. Whatever works for kserve and keeps all security tests green.

kunal-511 pushed a commit to kunal-511/kubeflow-manifests that referenced this pull request Mar 28, 2025
)

* update the kserve tests

Signed-off-by: juliusvonkohout <45896133+juliusvonkohout@users.noreply.github.com>

* Secure KServe endpoints with oauth2-proxy authentication

This change applies oauth2-proxy authentication to the cluster-local-gateway,
ensuring KServe inference endpoints require proper authentication.
Also adds a predictor-specific AuthorizationPolicy for test workflows.

Fixes kubeflow#2811

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Fix KServe workflows: use consistent paths, namespace handling, and add wait steps

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Fix Fix KServe auth workflow by ordering components correctly

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Fix order of KF Profile creation after multi-tenancy installation

The Profile CRD needs to be installed via multi-tenancy components
before attempting to create a user profile. This ensures the
kubeflow-user-example-com namespace is properly created for tests.

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* test: namespace manual creation Update kserve_m2m_test.yaml workflow

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update requirements.txt

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* update: attempt to Enable secure KServe inferencing with oauth2-proxy authentication

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* enable istio-cni

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Delete tests/gh-actions/deploy-dex-login-environment/kustomization.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update centraldashboard_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update: Istio-cni-1-24 authorizationpolicy to use custom oauth2-proxy in cluster-local-gateway

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: kserve_m2m_test.yaml attacker namespace test

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: KServe AuthorizationPolicy

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: using old KServe AuthorizationPolicy

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: Kserve Auth policy namespace access

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: fix the label in Auth Policy

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: test, kserve_m2m_test using principals not namespaces

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

---------

Signed-off-by: juliusvonkohout <45896133+juliusvonkohout@users.noreply.github.com>
Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
Co-authored-by: juliusvonkohout <45896133+juliusvonkohout@users.noreply.github.com>
kunal-511 pushed a commit to kunal-511/kubeflow-manifests that referenced this pull request Mar 28, 2025
)

* update the kserve tests

Signed-off-by: juliusvonkohout <45896133+juliusvonkohout@users.noreply.github.com>

* Secure KServe endpoints with oauth2-proxy authentication

This change applies oauth2-proxy authentication to the cluster-local-gateway,
ensuring KServe inference endpoints require proper authentication.
Also adds a predictor-specific AuthorizationPolicy for test workflows.

Fixes kubeflow#2811

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Fix KServe workflows: use consistent paths, namespace handling, and add wait steps

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Fix Fix KServe auth workflow by ordering components correctly

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Fix order of KF Profile creation after multi-tenancy installation

The Profile CRD needs to be installed via multi-tenancy components
before attempting to create a user profile. This ensures the
kubeflow-user-example-com namespace is properly created for tests.

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* test: namespace manual creation Update kserve_m2m_test.yaml workflow

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update requirements.txt

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* update: attempt to Enable secure KServe inferencing with oauth2-proxy authentication

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* enable istio-cni

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Delete tests/gh-actions/deploy-dex-login-environment/kustomization.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update centraldashboard_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update: Istio-cni-1-24 authorizationpolicy to use custom oauth2-proxy in cluster-local-gateway

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: kserve_m2m_test.yaml attacker namespace test

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: KServe AuthorizationPolicy

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: using old KServe AuthorizationPolicy

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: Kserve Auth policy namespace access

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: fix the label in Auth Policy

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: test, kserve_m2m_test using principals not namespaces

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

---------

Signed-off-by: juliusvonkohout <45896133+juliusvonkohout@users.noreply.github.com>
Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
Co-authored-by: juliusvonkohout <45896133+juliusvonkohout@users.noreply.github.com>
Signed-off-by: kunal-511 <yoyokvunal@gmail.com>
juliusvonkohout added a commit to kunal-511/kubeflow-manifests that referenced this pull request Mar 28, 2025
)

* update the kserve tests

Signed-off-by: juliusvonkohout <45896133+juliusvonkohout@users.noreply.github.com>

* Secure KServe endpoints with oauth2-proxy authentication

This change applies oauth2-proxy authentication to the cluster-local-gateway,
ensuring KServe inference endpoints require proper authentication.
Also adds a predictor-specific AuthorizationPolicy for test workflows.

Fixes kubeflow#2811

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Fix KServe workflows: use consistent paths, namespace handling, and add wait steps

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Fix Fix KServe auth workflow by ordering components correctly

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Fix order of KF Profile creation after multi-tenancy installation

The Profile CRD needs to be installed via multi-tenancy components
before attempting to create a user profile. This ensures the
kubeflow-user-example-com namespace is properly created for tests.

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* test: namespace manual creation Update kserve_m2m_test.yaml workflow

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update requirements.txt

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* update: attempt to Enable secure KServe inferencing with oauth2-proxy authentication

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* enable istio-cni

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Delete tests/gh-actions/deploy-dex-login-environment/kustomization.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update dex_oauth2-proxy_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update centraldashboard_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update: Istio-cni-1-24 authorizationpolicy to use custom oauth2-proxy in cluster-local-gateway

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: kserve_m2m_test.yaml attacker namespace test

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: KServe AuthorizationPolicy

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: using old KServe AuthorizationPolicy

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: Kserve Auth policy namespace access

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: fix the label in Auth Policy

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update: test, kserve_m2m_test using principals not namespaces

Signed-off-by: madmecodes <ayushguptadev1@gmail.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

* Update kserve_m2m_test.yaml

Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>

---------

Signed-off-by: juliusvonkohout <45896133+juliusvonkohout@users.noreply.github.com>
Signed-off-by: madmecodes <ayushguptadev1@gmail.com>
Signed-off-by: Julius von Kohout <45896133+juliusvonkohout@users.noreply.github.com>
Co-authored-by: juliusvonkohout <45896133+juliusvonkohout@users.noreply.github.com>
Signed-off-by: kunal-511 <yoyokvunal@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Istio CNI by default Enable and document for Kubeflow 1.10 Kserve secure inferencing from inside and outside the cluster with tokens

3 participants