Guidance for multi-tenant clusters
We suggest running Seldon Deploy in cluster-wide mode. If the full stack of suggested components is used then this makes it simpler to scale by adding new namespaces dynamically for new departments/users.
If you are able to use cluster-wide permissions, you don’t need to read this guide. Use one of the other install types.
The below is guidance on restricting the use of cluster-wide permissions.
Istio currently has very limited support for multi-tenancy.
There are alternative flavours of Istio. OpenShift Service Mesh has some multi-tenancy support.
An alternative is Ambassador, which can be installed namespaced.
If a non-default ingress setup is used then the
curlForm sections in the
deploy-values.yaml file need to be configured with templates applicable to the ingress URL rules being used.
From our testing, ArgoCD does require read permissions at a cluster-wide level on all objects.
Write permissions can however be entirely namespaced. Using this means configuring roles for each new namespace, as explained in the ArgoCD GitHub issue.
ArgoCD is only required in order to use GitOps. Seldon Deploy can be used without GitOps.
If using the
Production Installation with GitOps then this script should be consulted to adapt the steps for a multi-tenant cluster.
The main differences are:
The ArgoCD installation is different as it uses different roles from the manifests that ArgoCD publishes.
For each new namespace added to GitOps, we have to add roles for ArgoCD to be able to sync it.
For each new namespace a new instance of Seldon Core is installed, dedicated to that namespace.
For each new namespace new roles are added for Seldon Deploy to be able to operate on that namespace.
The details of these differences can be found in the script.
Seldon Core supports a namespaced install with a
singleNamespace setting in its Helm chart.
There is an example in
We suggest installing with the MinIO Helm chart. By default we setup one instance per cluster but that could be configured and at the time of writing ClusterRoles are used only on OpenShift
We suggest using Argo Workflows default installation which is cluster-wide but namespaced installations are possible.
Note that each Seldon namespace that runs batch jobs would need the ability to start Argo Workflows. Batch jobs are optional.
Configuring Seldon Deploy¶
Some functionality depends on Knative. If Knative is not used then this affects the request logger configuration. (Not using Knative also means the outlier and drift detector demos won’t work.)
Seldon Core has a default URL that its install instructions point to a Knative broker in
seldon-logs namespace (
executor.requestLogger.defaultEndpoint for seldon core).
This can be changed to point to
seldon-request-logger.seldon-logs (or your request logger location).
Detector component wizards and the Data Science metrics component wizard do need Knative 0.18.
The Seldon Deploy Helm chart has a
seldon-deploy-install/sd-setup/sd-install-default script uses the
MULTITENANT flag to set this.
There are two options from here.
Option 1 - One Deploy, per-Namespace RBAC¶
This is reduced RBAC rather than true multi-tenant.
rbac.readNamespaces is true then a single Deploy instance should be used.
This option requires a cluster-level read role to read namespaces.
When each namespace is added then new roles can be added for that namespace using the
Note that the GitOps script restarts Deploy each time a namespace is added.
Option 2 - Deploy Instance Per Namespace¶
This is full multi-tenant using only namespaced roles.
rbac.readNamespaces is false then a Deploy per namespace should be used.
Each Deploy then looks only at its own namespace.
The request logger namespace is configurable. This could be a dedicated namespace per Deploy instance or the same namespace as Deploy.