Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[frontend] Getting Unauthorized error while trying to retrive pod/log information from kubeflow UI #11544

Closed
harsha1163 opened this issue Jan 21, 2025 · 6 comments

Comments

@harsha1163
Copy link

Environment

AKS Cluster

  • How did you deploy Kubeflow Pipelines (KFP)?
  • KFP version: 2.1.0

Steps to reproduce

While trying to check the pod information getting "unauthorized" error. After restart of the ml-pipeline-ui deployment, the authorization error is dissappearing.

Expected result

Should show up the pod info if the pod exists other wise should show pod not found error.

Materials and Reference


Image

Impacted by this bug? Give it a 👍.

@vishalmishra369
Copy link

hey if this problem has not been taken by anyone can i work on it ?
If yes then please do assign it to me !!.

regards,
vishal

@harsha1163
Copy link
Author

@vishalmishra369,

Any idea what could be the reason of unauthorized error?

We have installed kubeflow in an AKS cluster with "Cilium" as network policy. Unable to figure out what is the issue. Is it due to Cilium or some other thing. We have the same setup in AKS with Azure as network policy, there we are not facing any issues.

Any guess will be highly appreciated. Thanks.

@juliusvonkohout
Copy link
Member

juliusvonkohout commented Feb 26, 2025

Please read the whole readme first, especially the istio / cilium part https://github.com/kubeflow/manifests#istio and make sure you are on a clean Kubeflow 1.9.1 install. It works with cilium. Also check your Dex and oauth2-proxy settings.

@harsha1163
Copy link
Author

harsha1163 commented Feb 27, 2025

@juliusvonkohout, thanks for pointing to the document. Actually I am using kubeflow bundled with Deploykf. I am installing using deploykf distribution.

I went through the istio/cilium part in the above pointed page, there were two parameters which are mentioned to change in cilium config.

bpf-lb-sock-hostns-only: "true"
cni-exclusive: "false"

I am using "Azure CNI powered by Cilium" and the cilium is installed on the AKS cluster automatically by Azure. Not explicitly installing using helm.

After checking the config, out of two parameters, bpf-lb-sock-hostns-only: "true" --> this parameter is already there as expected.

but cni-exclusive: "false" this parameter is not there and is not part of cilium config. Azure is not giving an option to modify the CNI and suppress Clilum. I suspect that the authorization issue is due to that the cilium is taking precedence over istio.

Is there any other way to resolve this issue?

I can install cilium with out using "Azure CNI powered by Cilium" as network policy, but installing on my own will not get any support from azure if there are any issues. it would be good to have support from azure as we are planning to expand this in production.

@juliusvonkohout
Copy link
Member

juliusvonkohout commented Feb 27, 2025

@juliusvonkohout, thanks for pointing to the document. Actually I am using kubeflow bundled with Deploykf. I am installing using deploykf distribution.

I went through the istio/cilium part in the above pointed page, there were two parameters which are mentioned to change in cilium config.

bpf-lb-sock-hostns-only: "true" cni-exclusive: "false"

I am using "Azure CNI powered by Cilium" and the cilium is installed on the AKS cluster automatically by Azure. Not explicitly installing using helm.

After checking the config, out of two parameters, bpf-lb-sock-hostns-only: "true" --> this parameter is already there as expected.

but cni-exclusive: "false" this parameter is not there and is not part of cilium config. Azure is not giving an option to modify the CNI and suppress Clilum. I suspect that the authorization issue is due to that the cilium is taking precedence over istio.

Is there any other way to resolve this issue?

I can install cilium with out using "Azure CNI powered by Cilium" as network policy, but installing on my own will not get any support from azure if there are any issues. it would be good to have support from azure as we are planning to expand this in production.

Then please contact the provider of deployKF, this is not the issue tracker for deployKF specific problems. If you install from https://github.com/kubeflow/manifests or https://github.com/kubeflow/pipelines directly we might be able to help you, but this topic seems to be very AKS and DeployKF specific.

/close

Copy link

@juliusvonkohout: Closing this issue.

In response to this:

@juliusvonkohout, thanks for pointing to the document. Actually I am using kubeflow bundled with Deploykf. I am installing using deploykf distribution.

I went through the istio/cilium part in the above pointed page, there were two parameters which are mentioned to change in cilium config.

bpf-lb-sock-hostns-only: "true" cni-exclusive: "false"

I am using "Azure CNI powered by Cilium" and the cilium is installed on the AKS cluster automatically by Azure. Not explicitly installing using helm.

After checking the config, out of two parameters, bpf-lb-sock-hostns-only: "true" --> this parameter is already there as expected.

but cni-exclusive: "false" this parameter is not there and is not part of cilium config. Azure is not giving an option to modify the CNI and suppress Clilum. I suspect that the authorization issue is due to that the cilium is taking precedence over istio.

Is there any other way to resolve this issue?

I can install cilium with out using "Azure CNI powered by Cilium" as network policy, but installing on my own will not get any support from azure if there are any issues. it would be good to have support from azure as we are planning to expand this in production.

Then please contact the provider of deployKF, this is not the issue tracker for deployKF specific problems. If you install from https://github.com/kubeflow/manifests or https://github.com/kubeflow/pipelines directly we might be able to help you, but this topic seemsto be very AKS and DeployKF specific.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants