You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/openshift-ai-connector-for-rhdh/proc-setting-up-openshift-ai-connector-for-rhdh-with-rhoai.adoc
+28-22Lines changed: 28 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ metadata:
48
48
argocd.argoproj.io/sync-wave: "0"
49
49
rules:
50
50
- apiGroups:
51
-
- apiextensions.k8s.sio
51
+
- apiextensions.k8s.io
52
52
resources:
53
53
- customresourcedefinitions
54
54
verbs:
@@ -91,11 +91,11 @@ subjects:
91
91
name: rhdh-rhoai-connector
92
92
namespace: ai-rhdh
93
93
----
94
-
** `Role` and `RoleBinding` to allow ConfigMap updates within the {product-very-short} namespace. For example:
94
+
** `Role` and `RoleBinding` to allow ConfigMap updates within the {product-very-short} namespace (`ai-rhdh`). For example:
95
95
+
96
96
[source,yaml]
97
97
----
98
-
# Example for `Role`
98
+
# Example for `Role` in the {product-very-short} namespace (ai-rhdh)
99
99
apiVersion: rbac.authorization.k8s.io/v1
100
100
kind: Role
101
101
metadata:
@@ -109,25 +109,26 @@ rules:
109
109
+
110
110
[source,yaml]
111
111
----
112
-
# Example for `RoleBinding`
112
+
# Example for `RoleBinding` in the {product-very-short} namespace (ai-rhdh)
113
113
apiVersion: rbac.authorization.k8s.io/v1
114
114
kind: RoleBinding
115
115
metadata:
116
-
name: rhdh-rhoai-dashboard-permissions
117
-
namespace: rhoai-model-registries
116
+
name: rhdh-rhoai-connector
117
+
namespace: ai-rhdh
118
118
roleRef:
119
119
apiGroup: rbac.authorization.k8s.io
120
120
kind: Role
121
-
name: registry-user-modelregistry-public
121
+
name: rhdh-rhoai-connector
122
122
subjects:
123
-
- apiGroup: rbac.authorization.k8s.io
124
-
kind: Group
125
-
name: system:serviceaccounts:ai-rhdh
123
+
- kind: ServiceAccount
124
+
name: rhdh-rhoai-connector
125
+
namespace: ai-rhdh
126
126
----
127
-
** `RoleBinding` in the {rhoai-short} namespace to grant the {product-very-short} `ServiceAccount` read permissions to the model registry data (binding to `registry-user-modelregistry-public`).
127
+
** `RoleBinding` in the {rhoai-short} namespace (`rhoai-model-registries`) to grant the {product-very-short} `ServiceAccount` read permissions to the model registry data (binding to `registry-user-modelregistry-public`).
128
128
+
129
129
[source,yaml]
130
130
----
131
+
# Example for `RoleBinding` in the {rhoai-short} namespace (rhoai-model-registries)
131
132
apiVersion: rbac.authorization.k8s.io/v1
132
133
kind: RoleBinding
133
134
metadata:
@@ -173,7 +174,14 @@ plugins:
173
174
** If {product-very-short} was installed using the Operator, modify your {product-very-short} custom resource (CR) instance.
174
175
** If {product-very-short} was installed using the Helm charts, modify the *Deployment* specification.
175
176
176
-
. The system relies on three sidecar containers ({openshift-ai-connector-name}) running alongside the `backstage-backend` container. Add these sidecar containers to your configuration referencing the `rhdh-rhoai-connector-token` Secret:
177
+
. The system relies on three sidecar containers ({openshift-ai-connector-name}) running alongside the `backstage-backend` container.
178
+
+
179
+
[NOTE]
180
+
====
181
+
During startup, you may see non-critical log errors, such as `connection refused` or `in cluster config error: open /var/run/secrets/kubernetes.io/serviceaccount/token: no such file or directory`, in the sidecar logs (in the `location` container). These errors are expected during the initial setup and do not indicate a failure, provided the container eventually becomes healthy.
182
+
====
183
+
184
+
Add these sidecar containers to your configuration referencing the `rhdh-rhoai-connector-token` Secret:
177
185
** `location`: Provides the REST API for {product-very-short} plugins to fetch model metadata.
178
186
** `storage-rest`: Maintains a cache of AI Model metadata in a ConfigMap called `bac-import-model`.
179
187
** `rhoai-normalizer`: Acts as a Kubernetes controller and {rhoai-short} client, normalizing {rhoai-short} metadata for the connector. The following code block is an example:
0 commit comments