-
Notifications
You must be signed in to change notification settings - Fork 674
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use serviceAccount for Ray from the propeller configuration #5821
Conversation
Signed-off-by: peterghaddad <[email protected]>
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #5821 +/- ##
=======================================
Coverage 36.35% 36.35%
=======================================
Files 1304 1304
Lines 110147 110147
=======================================
+ Hits 40042 40045 +3
+ Misses 65938 65935 -3
Partials 4167 4167
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
In Should we be using the built out headGroupSpec instead of the one originally defined? See here. @eapolinario any thoughts here? We also observed that modifying the serviceAccount through the |
The issue is that the call to GetServiceAccountNameFromTaskExecutionMetadata always gets the security context from task execution metadata, which has the So even though we set the service account in
constructRayJob .
As you're proposing in this PR, the crux of the change should be around flyte/flyteplugins/go/tasks/plugins/k8s/ray/ray.go Lines 192 to 195 in ffd72a0
What if we used only used the service account name from the config if that set at all (i.e. instead of relying on setting its default value to "default" make that "" ) and if that's not set then we call serviceAccountName = flytek8s.GetServiceAccountNameFromTaskExecutionMetadata(taskCtx.TaskExecutionMetadata()) .
@peterghaddad , wdyt? Also, cc: @pingsutw |
I like this approach. I'll submit a PR for this change. |
Tracking issue
Closes #5820
Why are the changes needed?
Currently, the serviceAccount pulls from the securityContext of the k8s cluster that the FlytePropeller is deployed at.
Instead, have the option to configure the propeller to use a specific serviceAccountName on k8s when the configuration value is set to a value other than "default".
What changes were proposed in this pull request?
How was this patch tested?
Setup process
Screenshots
Check all the applicable boxes
Related PRs
Docs link