crooked-apartment-11483
09/08/2023, 4:35 PMcool-lifeguard-49380
09/09/2023, 7:54 AMcool-lifeguard-49380
09/09/2023, 7:55 AMcool-lifeguard-49380
09/09/2023, 7:56 AMcrooked-apartment-11483
09/19/2023, 5:44 AMcool-lifeguard-49380
09/21/2023, 7:19 AMIt seems like TLS termination for a gRPC request has to be handled by a proxy / service mesh, but I don’t quite understand why.I first tried putting flyteadmin directly behind the ingress and make it use a self-signed TLS certificate. Flyteadmin has the option to serve TLS and the ingress was also healthy. However, some of the other flyte backends refused to talk to it due to the self-signed cert and ignored the insecureSkipVerify flag in their config which is supposed to tell them to accept the self-signed cert. Also, if I let flyteadmin use the cert itself, I would have had to find a way to restart it when the cert is renewed. There are some open source tools that monitor secrets and restart pods when the secrets update, this would have worked. However, because of the first issue, i found it easier to terminate TLS at a reverse proxy / service mesh and then let flyte itself run without any encryption. Since we have been running flyte with istio for a while and I personally think istio is amazing, I went for it. One could do the same thing with an nginx pod though. Just the restarting of the pod would have to be solved again …
Flyte enables production-grade orchestration for machine learning workflows and data processing created to accelerate local workflows to production.
Powered by