numerous-pizza-94528
03/30/2025, 12:52 PMfreezing-airport-6809
freezing-airport-6809
gentle-tomato-480
03/31/2025, 8:13 AMshy-morning-17240
03/31/2025, 6:39 PMstorage:
type: custom #sandbox, s3, gcs and custom
custom:
type: minio # or s3, local, mem, stow
container: default container/bucket name (flyte creates if not exist)
stow:
kind: s3 # or azure, google, oracle, swift, b2, sftp, local
config: #stow config associated with specified stow kind
access_key_id:
auth_type:
secret_key:
disable_ssl:
endpoint: <http://your-custom-url.com|your-custom-url.com>
v2_signing:
signedUrl:
stowConfigOverride:
# really important when deploying flyte to avoid errors related to MD5 checksum errors. Typically same as stow.config.endpoint
endpoint: <http://your-custom-url.com|your-custom-url.com>
enable-multicontainer:
On the other hand, making Flyte production ready consists of load-balancing, ingresses and adding TLS encryption to ingresses
I would focus on the later 2, since telling researchers that they have to port forward services to local workstations (vs giving them a config file and calling it a day) on top of making sure code is now tailored for Flyte will create friction. Flyte has a flag that will create ingresses for you, and you can just modify those ingresses to suit your needs:
common:
ingress:
create: true
ingressClassName: nginx # or whatever you use
separateGrpcIngress: true # not necessary, but I prefer separate ingresses for http and grpc for better debugging when things go wrong
commonAnnotations:
<http://ingress.kubernetes.io/rewrite-target|ingress.kubernetes.io/rewrite-target>: /
<http://nginx.ingress.kubernetes.io/ssl-redirect|nginx.ingress.kubernetes.io/ssl-redirect>: "true"
<http://kubernetes.io/ingress.class|kubernetes.io/ingress.class>: public
httpAnnotations:
<http://nginx.ingress.kubernetes.io/app-root|nginx.ingress.kubernetes.io/app-root>: /console
grpcAnnotations:
<http://nginx.ingress.kubernetes.io/backend-protocol|nginx.ingress.kubernetes.io/backend-protocol>: GRPC
host: <http://some.domain.com|some.domain.com> # NOTE: change for the URL you'll use to connect to Flyte
### Comment if you want to remove TLS support from HTTP/GRPC (NOTE: GRPC service only works with TLS when using kubernetes ingress)
tls:
enabled: true
hosts:
- "<http://some.domain.com|some.domain.com>"
secretName: some-domain-tls # you have to create this secret sepparately using whatever ca certificate key your IT department uses
shy-morning-17240
03/31/2025, 6:43 PMearly-addition-41415
03/31/2025, 9:54 PM