You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/openshift-ai-connector-for-rhdh/proc-setting-up-openshift-ai-connector-for-rhdh-with-rhoai.adoc
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,25 +25,25 @@ For more details, see {rhoai-docs-link}/enabling_the_model_registry_component/in
25
25
26
26
. Configure {rhoai-short}-related RBAC and credentials.
27
27
A Kubernetes `ServiceAccount` and a `service-account-token` Secret are required for the connector to retrieve data from {rhoai-short}. The following resources must be created, replacing namespace names (`ai-rhdh` for {product-very-short}, `rhoai-model-registries` for {rhoai-short}) as needed:
28
-
** `ServiceAccount` (`rhdh-rhoai-bridge`). For example:
28
+
** `ServiceAccount` (`rhdh-rhoai-connector`). For example:
29
29
+
30
30
[source,yaml]
31
31
----
32
32
apiVersion: v1
33
33
kind: ServiceAccount
34
34
metadata:
35
-
name: rhdh-rhoai-bridge
35
+
name: rhdh-rhoai-connector
36
36
namespace: ai-rhdh
37
37
----
38
-
** `ClusterRole` and `ClusterRoleBinding` (`rhdh-rhoai-bridge`) to allow access to OCP resources like `routes`, `services`, and `inferenceservices`. For example:
38
+
** `ClusterRole` and `ClusterRoleBinding` (`rhdh-rhoai-connector`) to allow access to OCP resources like `routes`, `services`, and `inferenceservices`. For example:
39
39
+
40
40
[source,yaml]
41
41
----
42
42
# Example for `ClusterRole`
43
43
apiVersion: rbac.authorization.k8s.io/v1
44
44
kind: ClusterRole
45
45
metadata:
46
-
name: rhdh-rhoai-bridge
46
+
name: rhdh-rhoai-connector
47
47
annotations:
48
48
argocd.argoproj.io/sync-wave: "0"
49
49
rules:
@@ -81,14 +81,14 @@ rules:
81
81
apiVersion: rbac.authorization.k8s.io/v1
82
82
kind: ClusterRoleBinding
83
83
metadata:
84
-
name: rhdh-rhoai-bridge
84
+
name: rhdh-rhoai-connector
85
85
roleRef:
86
86
apiGroup: rbac.authorization.k8s.io
87
87
kind: ClusterRole
88
-
name: rhdh-rhoai-bridge
88
+
name: rhdh-rhoai-connector
89
89
subjects:
90
90
- kind: ServiceAccount
91
-
name: rhdh-rhoai-bridge
91
+
name: rhdh-rhoai-connector
92
92
namespace: ai-rhdh
93
93
----
94
94
** `Role` and `RoleBinding` to allow ConfigMap updates within the {product-very-short} namespace. For example:
@@ -99,7 +99,7 @@ subjects:
99
99
apiVersion: rbac.authorization.k8s.io/v1
100
100
kind: Role
101
101
metadata:
102
-
name: rhdh-rhoai-bridge
102
+
name: rhdh-rhoai-connector
103
103
namespace: ai-rhdh
104
104
rules:
105
105
- apiGroups: [""]
@@ -131,28 +131,28 @@ subjects:
131
131
apiVersion: rbac.authorization.k8s.io/v1
132
132
kind: RoleBinding
133
133
metadata:
134
-
name: rhdh-rhoai-bridge
134
+
name: rhdh-rhoai-connector
135
135
namespace: ai-rhdh
136
136
roleRef:
137
137
apiGroup: rbac.authorization.k8s.io
138
138
kind: Role
139
-
name: rhdh-rhoai-bridge
139
+
name: rhdh-rhoai-connector
140
140
subjects:
141
141
- kind: ServiceAccount
142
-
name: rhdh-rhoai-bridge
142
+
name: rhdh-rhoai-connector
143
143
namespace: ai-rhdh
144
144
----
145
-
** Secret (`rhdh-rhoai-bridge-token`) of type `kubernetes.io/service-account-token` that goes along with the `rhdh-rhoai-bridge` `ServiceAccount`.
145
+
** Secret (`rhdh-rhoai-connector-token`) of type `kubernetes.io/service-account-token` that goes along with the `rhdh-rhoai-connector` `ServiceAccount`.
** If {product-very-short} was installed using the Operator, modify your {product-very-short} custom resource (CR) instance.
174
174
** If {product-very-short} was installed using the Helm charts, modify the *Deployment* specification.
175
175
176
-
. The system relies on three sidecar containers ({openshift-ai-connector-name}) running alongside the `backstage-backend` container. Add these sidecar containers to your configuration referencing the `rhdh-rhoai-bridge-token` Secret:
176
+
. The system relies on three sidecar containers ({openshift-ai-connector-name}) running alongside the `backstage-backend` container. Add these sidecar containers to your configuration referencing the `rhdh-rhoai-connector-token` Secret:
177
177
** `location`: Provides the REST API for {product-very-short} plugins to fetch model metadata.
178
178
** `storage-rest`: Maintains a cache of AI Model metadata in a ConfigMap called `bac-import-model`.
179
179
** `rhoai-normalizer`: Acts as a Kubernetes controller and {rhoai-short} client, normalizing {rhoai-short} metadata for the connector. The following code block is an example:
Copy file name to clipboardExpand all lines: modules/openshift-ai-connector-for-rhdh/ref-model-to-entity-mapping.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
[id="ref-model-to-entity-mapping_{context}"]
4
4
= Model-to-Entity mapping
5
5
6
-
{openshift-ai-connector-name-short} integrates with {openshift-ai-connector-name-short}, the model catalog, and KServe-based Model Deployments (InferenceServices). This integration automatically converts your AI/ML artifacts into familiar {backstage} entities, simplifying management and providing a unified view of your models.
6
+
Model-to-Entity mapping integrates with {openshift-ai-connector-name-short}, the model catalog, and KServe-based Model Deployments (InferenceServices). This integration automatically converts your AI/ML artifacts into familiar {backstage} entities, simplifying management and providing a unified view of your available AI models to your developer teams.
7
7
8
8
This offering interfaces with the {openshift-ai-connector-name-short}, model catalog, and KServe-based Model Deployments (InferenceServices) to create familiar {backstage} entities.
0 commit comments