This repository provides a GitOps-based approach to deploying and managing OpenDataHub and its dependencies using Kustomize. It serves as a standardized, repeatable, and automated way to configure the complete OpenDataHub stack.
- OpenDataHub - GitOps Repository
This repository addresses OpenDataHub dependencies that are treated as administrator-owned resources. It provides a template for deploying these prerequisites in a standardized way, simplifying the administrator's workflow by providing a single source of truth for the entire OpenDataHub stack.
This repository works with GitOps tools (ArgoCD, Flux, etc.).
The repository is designed to be applied in layers, providing flexibility in deployment:
- Granular Installation: Each dependency or component has its own
kustomization.yamland can be applied independently. - Grouped Installation: Top-level folders contain
kustomization.yamlfiles that include all items within them. - Composition: Each component is self-contained and includes its required dependencies.
| Operator | Purpose | Namespace | Used By | Operators Required |
|---|---|---|---|---|
| Cert-Manager | Certificate management and TLS provisioning | cert-manager-operator |
Model Serving (Kueue, Ray) | |
| Kueue | Job queue for distributed workloads | openshift-kueue-operator |
Model Serving (Ray), Trainer | Cert-Manager |
| Cluster Observability Operator | Cluster observability and monitoring | openshift-cluster-observability-operator |
Monitoring | |
| OpenTelemetry Product | OpenTelemetry product | openshift-opentelemetry-operator |
Monitoring | |
| Leader Worker Set | Deploy a LWS in OpenShift for distributed inference workflows | openshift-lws-operator |
Model Server | Cert-Manager |
| Job Set Operator | Job management as a unit | openshift-jobset-operator |
Trainer | |
| Custom Metrics Autoscaler | Event-driven autoscaler based on KEDA | openshift-keda |
Model Serving | |
| Tempo Operator | Distributed tracing backend | openshift-tempo-operator |
Tracing infrastructure | |
| Red Hat Connectivity Link | Multicloud application connectivity and API management | kuadrant-system |
Model Serving (KServe) | Leader Worker Set, Cert-Manager |
| MariaDB Operator | MariaDB for OpenShift | mariadb-operator |
TrustyAI (optional, only if using database mode) | |
| Node Feature Discovery | Detects hardware features and capabilities of nodes | openshift-nfd |
LlamaStack Operator | |
| NVIDIA GPU Operator | Enables GPU-accelerated workloads on NVIDIA hardware | nvidia-gpu-operator |
Model Serving, LlamaStack Operator | Node Feature Discovery |
Some operators require additional configuration. Below are the configuration requirements for each operator:
Additional configuration is needed to enable TLS for Authorino. This is done in two stages:
-
Apply RHCL base configuration (no TLS enabled):
kubectl apply -k configurations/rhcl-operator
-
Verify that Kuadrant CR and Authorino CR exist and are Ready:
kubectl get kuadrant -n <kuadrant-namespace> kubectl get authorino -n <kuadrant-namespace>
-
Run the preparation script to annotate the Service, generate the TLS certificate Secret, and update the kustomization.yaml for RHCL:
make prepare-authorino-tls KUADRANT_NS=<kuadrant-namespace>
-
Re-apply the configuration to enable TLS for Authorino:
kubectl apply -k configurations/rhcl-operator
-
Verify that Authorino has TLS enabled:
kubectl get authorino authorino -n <kuadrant-namespace> -o jsonpath='{.spec.listener.tls}'
MariaDB operator is an optional dependency in case the user is planning to use TrustyAI with Database mode.
As such, it is not listed by default among other dependencies in dependencies/operators/kustomization.yaml, and has specific installation steps.
Due to TLS issues with newer MariaDB versions, the recommended version is v0.29
- Apply MariaDB Operator resources using:
kubectl apply -k dependencies/operators/maria-db - Get InstallPlan name for MariaDB Operator v0.29 using:
kubectl get installplan -n mariadb-operator | grep v0.29 | sed 's/ .*//'- Approve the InstallPlan using (insert the previously-obtained InstallPlan name):
kubectl patch installplan <install-plan-name> -n mariadb-operator --type merge -p '{"spec":{"approved":true}}'- Wait for the MariaDB Operator installation to complete. Verify that the operator pod is running using:
kubectl get pods -n mariadb-operator -l control-plane=controller-managerTo add a new dependency, follow the Contributing guide.
- OpenShift cluster (version 4.19 or later)
kubectlorocCLI installed- Cluster admin permissions
- Kustomize v5 or later (optional -
kubectlhas built-in Kustomize support)
Looking for inference only? If you only need model serving (KServe + distributed inference) without the full platform, see the Inference Only Stack Guide.
# 1. Clone the repository
git clone https://github.com/opendatahub-io/odh-gitops.git
cd odh-gitops
# 2. Modify as needed
# 3. Follow the desired tool installation instructions,
# using the correct branch matching your desired
# OpenDataHub version (e.g. odh-3.0)- ArgoCD installed
- Cluster admin permissions
- The ArgoCD instance needs permissions to handle cluster configuration. Follow this documentation. Additional permissions needed are:
- all actions on kueues.kueue.openshift.io
- all actions on kuadrants.kuadrant.io
To install the repository with ArgoCD, create a new ArgoCD application and point it to the repository with the desired branch. To ensure it will work, since it uses custom resources whose definitions are installed by the operators by OLM in a second step, you need to skip dry run on missing resources in the Application resource.
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: ...
spec:
syncPolicy:
syncOptions:
- SkipDryRunOnMissingResource=trueCreate an application, setting the sync policy to skip dry run on missing resources, and point to the base directory kustomization.yaml.
In this way, all dependencies will be installed automatically.
To install specific dependencies, open dependencies/operators/kustomization.yaml and comment out the dependencies you don't need.
Do the same for configurations/kustomization.yaml.
For example, if the Kueue operator is not needed, comment it out like this in dependencies/operators/kustomization.yaml:
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
components:
- ../../components/operators/cert-manager
# - ../../components/operators/kueue-operatorAfter that, setup the application to point to the base directory kustomization.yaml file.
# Install all dependencies
kubectl apply -k dependencies
# Wait some seconds to let the operators install
# Install operator configurations
kubectl apply -k configurationskubectl apply -k dependencies/operators/cert-manager
kubectl apply -k dependencies/operators/kueue-operator
# Wait some seconds to let the operators install
# Install specific operator configurations
kubectl apply -k configurations/kueue-operatorYou can modify dependencies/operators/kustomization.yaml to comment out dependencies you don't need.
For example, if the Kueue operator is not needed, comment it out like this:
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
components:
- ../../components/operators/cert-manager
# - ../../components/operators/kueue-operatorIf you need the Kueue operator later, uncomment it and apply the changes:
# Install the dependencies
kubectl apply -k dependencies/
# Install the operator configurations
kubectl apply -k configurations/- Fork or Clone this repository as a starting point for your organization
- Select the Branch matching your target OpenDataHub version (e.g.,
odh-3.0) - Customize the configurations for your specific environment
- Test thoroughly in a non-production environment
- Maintain your fork with updates and customizations
- Apply using your GitOps tool (ArgoCD, Flux, etc.) or
kubectl
- Inference Only Stack Installation Guide - Deploy only the inference/model-serving subset (KServe + distributed inference) without the full platform
- No Formal Releases: This repository does not have official releases. Users are expected to clone or fork the repository and use it as a basis for their own configurations.
- Branch per OpenDataHub and RHOAI Version: Each minor version of OpenDataHub/RHOAI has a dedicated branch (e.g.,
odh-3.x,rhoai-3.x). This will simplify the fix or updates of the specific minor version. - Tag: Each z-stream release has a dedicated tag (e.g.,
odh-3.0.0,rhoai-3.0.0) to ensure compatibility. - Version Selection: Always select the branch that corresponds to your target OpenDataHub/RHOAI version.
The release workflow is as follows:
- On the day of the code freeze, the release branch is created from the main branch.
- Changes in main can be cherry-picked into the release branch if needed.
- Since the chart depends on the OLM channel, if a new version uses a different OLM channel, the chart will need to be updated after the OLM is released.
- The GA date, once the release is done, the repository will be tagged with the corresponding tag.