You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Secure, ideally by default, the data plane of the jobs managed by the training operator.
This would include:
The creation of NetworkPolicies that prevent ingress traffic to the training jobs, i.e., only intra-job Pod-to-Pod communication is allowed
The configuration of (m)TLS for Pod-to-Pod communication wherever possible, or provide some documentation on how to achieve it, possibly using external solution like a service mesh for example.
Why is this needed?
In multi-tenant setups, it's important to guarantee tenants are isolated from each other.
Love this feature?
Give it a 👍 We prioritize the features with most 👍
The text was updated successfully, but these errors were encountered:
What you would like to be added?
Secure, ideally by default, the data plane of the jobs managed by the training operator.
This would include:
Why is this needed?
In multi-tenant setups, it's important to guarantee tenants are isolated from each other.
Love this feature?
Give it a 👍 We prioritize the features with most 👍
The text was updated successfully, but these errors were encountered: