Run and monitor a workflow
Go to file
2025-03-28 08:45:57 +01:00
conf argo by kube invocation 2025-02-14 12:00:29 +01:00
demo_nginx oclib 2024-11-07 13:36:28 +01:00
models Added methods to verify if workflow contains compute on other peers before setting up admiralty 2025-03-07 16:19:26 +01:00
tools oclib update + kubernetes client for argo submit 2025-02-18 15:04:52 +01:00
utils Docker OC-MONITORD 2025-02-17 16:54:25 +01:00
workflow_builder adjustment 2025-03-28 08:45:57 +01:00
.gitignore conf 2024-08-06 11:42:59 +02:00
docker_schedulerd.json Merge branch 'feature/namespace' into main 2025-02-18 08:24:22 +01:00
Dockerfile better 2025-02-18 08:26:05 +01:00
exemple.yml oclib 2024-11-07 13:36:28 +01:00
go.mod adjustment 2025-03-28 08:45:57 +01:00
go.sum adjustment 2025-03-28 08:45:57 +01:00
LICENSE.md Téléverser les fichiers vers "/" 2024-10-03 10:53:51 +02:00
main.go Implemented setup of the admiralty env on two peers in a workflow before execution 2025-03-13 17:07:17 +01:00
Makefile adjustment 2025-03-28 08:45:57 +01:00
oc-monitord adjustment 2025-03-28 08:45:57 +01:00
README.md dev launch mode 2025-03-06 09:33:25 +01:00
test-logs-workflow.json oclib 2024-11-07 13:36:28 +01:00

oc-monitor

DO : make build

## Deploy in k8s (dev)

While a registry with all of the OC docker images has not been set-up we can export this image to k3s ctr

docker save oc-monitord:latest | sudo k3s ctr images import -

Then in the pod manifest for oc-monitord use :

image: docker.io/library/oc-monitord
imagePullPolicy: Never

Not doing so will end up in the pod having a ErrorImagePull

Allow argo to create services

In order for monitord to expose open cloud services on the node, we need to give him permission to create k8s services.

For that we can update the RBAC configuration for a role already created by argo :

### Manually edit the rbac authorization

kubectl edit roles.rbac.authorization.k8s.io -n argo argo-role

In rules add a new entry :

- apiGroups:
  - ""
  resources:  
  - services
    verbs:                                                                                                                                                          
    - get
    - create

Patch the rbac authorization with a one liner

kubectl patch role argo-role -n argo --type='json' -p='[{"op": "add", "path": "/rules/-", "value": {"apiGroups": [""], "resources": ["services"], "verbs": ["get","create"]}}]'

Check wether the modification is effective

kubectl auth can-i create services --as=system:serviceaccount:argo:argo -n argo

This command must return "yes"

## TODO

  • [ ] Logs the output of each pods :
    • logsPods() function already exists
    • need to implement the logic to create each pod's logger and start the monitoring routing
  • [ ] Allow the front to known on which IP the service are reachable
    • currently doing it by using kubectl get nodes -o wide

### Adding ingress handling to support reverse proxing

  • Test wether ingress-nginx is running or not
    • Do something if not found : stop running and send error log OR start installation