Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support imagePullSecrets in ServingRuntime #214

Closed
lizzzcai opened this issue Aug 22, 2022 · 3 comments · Fixed by #276
Closed

Support imagePullSecrets in ServingRuntime #214

lizzzcai opened this issue Aug 22, 2022 · 3 comments · Fixed by #276
Assignees

Comments

@lizzzcai
Copy link
Member

Is your feature request related to a problem? If so, please describe.

Most of our use cases are using custom servingRuntime which are built by the users. In this case, the servingRuntime image mostly will be stored in the user's private image registry.
However, the current ServingRuntime CRD doesn't have the imagePullSecrets, so we are not able to provide it to the user.

Describe your proposed solution

support imagePullSecrets under ServingRuntime.spec

Describe alternatives you have considered

Similiar to InferenceService CRD, ServingRuntime should be able to support most of the Pod Spec.

Additional context

@njhill
Copy link
Member

njhill commented Aug 25, 2022

@lizzzcai you can provide imagePullSecrets via the service account used for the deployment pods, which can be set via the serviceAccountName configuration parameter (see here). Is that sufficient or you need to be able to set different secrets per serving runtime?

@lizzzcai
Copy link
Member Author

@lizzzcai you can provide imagePullSecrets via the service account used for the deployment pods, which can be set via the serviceAccountName configuration parameter (see here). Is that sufficient or you need to be able to set different secrets per serving runtime?

Hi @njhill , I tested this method but found that it is a system-wide configuration on the modelmesh-serving namespace. Hoever in our case, we are using user-namespace and each namespace will have multiple imagePullSecrets per namespace. So either this model-serving-config can be applied and overwrite in user namespace or enable the full PodSpec in servingruntime will be helpful. The current workaround for us is to use webhook to inject it, but it will be good to have a long term solution from kserve side.

@lizzzcai
Copy link
Member Author

lizzzcai commented Oct 2, 2022

Hi @njhill , I have created a PR for this. I think it makes sense to add it as it is very common to use images from private repositories, and it is similar to volumes. What do you think?

@yuzisun yuzisun moved this to Done in KServe 0.10 Oct 21, 2022
kserve-oss-bot pushed a commit that referenced this issue Nov 12, 2022
#### Motivation
fix #214 
#### Modifications
1. Update servingRuntime CRDs to include imagePullSecrets
2. pass imagePullSecrets from Configuration and ServingRuntimePodSpec to deployment.Spec.Template and add tests
3. add docs in Configuration
#### Result
The user is able to pass imagePullSecrets from configuration and servingRuntime to runtime pod and uses images from the private image registry.

Signed-off-by: Lize Cai <lize.cai@sap.com>
HumairAK referenced this issue in HumairAK/modelmesh-serving Nov 30, 2022
#### Motivation
fix opendatahub-io#214 
#### Modifications
1. Update servingRuntime CRDs to include imagePullSecrets
2. pass imagePullSecrets from Configuration and ServingRuntimePodSpec to deployment.Spec.Template and add tests
3. add docs in Configuration
#### Result
The user is able to pass imagePullSecrets from configuration and servingRuntime to runtime pod and uses images from the private image registry.

Signed-off-by: Lize Cai <lize.cai@sap.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
No open projects
Status: Done
Development

Successfully merging a pull request may close this issue.

2 participants