Skip to content

Commit

Permalink
binderhub and daskhub: scheduler/worker pods to have permission to pu…
Browse files Browse the repository at this point in the history
…ll built images
  • Loading branch information
consideRatio committed Jul 1, 2024
1 parent 63c06ba commit 17434b0
Show file tree
Hide file tree
Showing 2 changed files with 19 additions and 1 deletion.
12 changes: 12 additions & 0 deletions docs/howto/features/binderhub-ui.md
Original file line number Diff line number Diff line change
Expand Up @@ -409,6 +409,7 @@ binderhub-service:
password: <password>
```

(features:binderhub-service:private-registry)=
### 4. If pushing to quay.io registry, also setup the credentials for image pulling

When pushing to the quay registry, the images are pushed as `private` by default (even if the plan doesn't allow it).
Expand All @@ -423,3 +424,14 @@ jupyterhub:
username: <robot_account_name>
password: <password>
```

If dask-gateway is enabled, the scheduler and worker pods needs to be configured
to reference the k8s Secret created by the JupyterHub chart through the config
above. This is done like below:

```yaml
dask-gateway:
gateway:
backend:
imagePullSecrets: [{name: image-pull-secret}]
```
8 changes: 7 additions & 1 deletion docs/howto/features/dask.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ To enable dask-gateway support on a hub, the following configuration changes nee
enabled: true
```

1. set `jupyterhub.singleuser.cloudMetadata.blockWithIptables` to false
1. set `jupyterhub.singleuser.cloudMetadata.blockWithIptables` to false:

This is to don't block access to the cloud provider's metadata server!
If we do the coupling between the cloud providers IAM permissions and
Expand All @@ -39,6 +39,12 @@ To enable dask-gateway support on a hub, the following configuration changes nee
blockWithIptables: false
```

1. if binderhub is enabled to work against a private container registry:

Then dask-gateway's scheduler and worker pods need to pull from that
registry, so follow steps in [](features:binderhub-service:private-registry)
to set up permissions for that.

(howto:features:daskhub)=
## To an existing cluster

Expand Down

0 comments on commit 17434b0

Please sign in to comment.