Closed ajinkya933 closed 1 year ago
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.
I am facing the same problem; I follow the same steps on Kubeflow Azure; however, I cannot use kubeflow.
I have the same problem but after signing in microsoft I get error 403 access denied to my kubeflow deployment.
The Azure docs are actually really out of date and are being removed in https://github.com/kubeflow/website/pull/3547, they are now maintained on https://azure.github.io/kubeflow-aks/main/.
If you are still having a problem, please raise your issue there, or try a different distribution of Kubeflow.
Personally, I recommend deployKF, and that's not just because I maintain it! (It will probably make your OIDC integration much easier).
/close
@thesuperzapper: Closing this issue.
As per documentation (https://www.kubeflow.org/docs/distributions/azure/authentication-oidc/), we have to download the kfctl v1.3.0 release from the Kubeflow releases page (https://github.com/kubeflow/kfctl/releases/tag/v1.3.0). But, kfctl v1.3.0 does not exist on the provided link
I took the latest version of kfctl available as of today ( kfctl v1.2.0-0-gbc038f9 )
But still I am unable to authenticate OIDC properly here are the detailed steps taken:
Configure OIDC Auth service settings:
In
.cache/manifests/manifests-{kubeflow version}-branch/stacks/azure/application/oidc-authservice/kustomization.yaml
update the settings with values corresponding your app registration as follows:Configure OIDC scopes:
In
.cache/manifests/manifests-{kkubeflow version}-branch/istio/oidc-authservice/base/statefulset.yaml
update OIDC scopes to remove groups and keep profile and email.Deploy Kubeflow:
Check that the resources were deployed correctly in namespace kubeflow:
Expose Kubeflow securely over HTTPS
Update Istio Gateway to expose port 443 with HTTPS and make port 80 redirect to 443:
The Gateway spec should look like the following:
Expose Kubeflow with a load balancer service:
After that, obtain the LoadBalancer IP address or Hostname from its status and create the necessary certificate.
Note: If you are exposing Ingress gateway through public IP, make sure it matches the IP address of the OIDC REDIRECT_URL by running:
In my case it dosent match so: If it doesn’t match, update REDIRECT_URL in the StatefulSet to be the public IP address from the last step, by running:
Create a self-signed Certificate with cert-manager:
Apply certificate.yaml in istio-system namespace
Add the redirect URI below to the app registered with Microsoft Identity:
Note: Make sure the app’s redirect URI matches the oidc_redirect_uri value in OIDC auth service settings.
Navigate to
https://<YOUR_LOADBALANCER_IP_ADDRESS_OR_DNS_NAME>/
Then I see this:
Then I click on Advanced and -> proceed
Then I see this:
Finally when I enter my credentials and login I see this (HTTP ERROR 504) page took too long to respond. :
How can I solve this ?