Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Oauth proxy limit #324

Closed
wants to merge 102 commits into from
Closed

Oauth proxy limit #324

wants to merge 102 commits into from

Conversation

fcami
Copy link

@fcami fcami commented Feb 2, 2023

Motivation

Fix opendatahub-io#62

Modifications

--- a/config/internal/base/deployment.yaml.tmpl
+++ b/config/internal/base/deployment.yaml.tmpl
@@ -162,10 +162,10 @@ spec:
             failureThreshold: 3
           resources:
             limits:
-              cpu: 100m
+              cpu: 2
               memory: 256Mi
             requests:
-              cpu: 100m
+              cpu: 500m
               memory: 256Mi
           volumeMounts:
             - mountPath: /etc/tls/private

Result

anishasthana and others added 30 commits August 30, 2022 14:53
Signed-off-by: Anish Asthana <[email protected]>
Revert "Fix etcd endpoints when etcd is in different namespace (opendatahub-io#188)"
This change will hide models behind proxy. Only tokens which have "get"
access to services in the namespace the modelservingruntime is deployed
in will be able to hit models.

Signed-off-by: Anish Asthana <[email protected]>
Signed-off-by: Anish Asthana <[email protected]>
…h_manifest

Allow ODH Model Controller to create cluster role bindings
Adding ModelMesh Serving end to end tests
Update manifests' directory structure
Wait for CRDS to be created in quickstart script
Removing Pipfile and Pipfile.lock references
DharmitD and others added 25 commits October 31, 2022 17:42
Fix: Fix sed for kfdef URI / CI test failure
Merge commit was created on November 8th, 2022. The reason
we have elected to do this instead of a normal rebase is due to
a merge commit having been created at some point in the past, which
has made rebases impossible
…_edits

Stop odh model controller from adding/removing namespace labels
Signed-off-by: Anish Asthana <[email protected]>
Add HumairAK to owners. Longer term we need to revisit
the reviewers and approvers instead of having everyone
able to approve PRs

Signed-off-by: Anish Asthana <[email protected]>
Update the annotations required for authentication and routes
Stop workflows from triggering on PRs to main
…agement

Allow odh model controller to manage the storage config secret
…el_controller

Move model-controller back into dedicated repo
Have etcd service select only etcd pods.
Update OWNERS to reflect new team structure
With a CPU limit of 100m, oauth-proxy seems unable to cope with the
load associated with its own liveness probes, leading to the model
mesh pods being restarted every so often once a certain number of
routes (inference services) are created.

Raise the CPU limit from 100m to 2.
Raise the CPU request from 100m to 0.5.

Related-to: opendatahub-io#62
Related-to: opendatahub-io#16
Signed-off-by: François Cami <[email protected]>
@kserve-oss-bot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: fcami
To complete the pull request process, please assign njhill after the PR has been reviewed.
You can assign the PR to them by writing /assign @njhill in a comment when ready.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@fcami
Copy link
Author

fcami commented Feb 2, 2023

Sorry, closing this one, will work through ODH first.

@fcami fcami closed this Feb 2, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

oauth-proxy's CPU limit is far too low
10 participants