A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://run-ai-docs.nvidia.com/self-hosted/workloads-in-nvidia-run-ai/assets/credentials below:

Credentials | Run:ai Documentation

Credentials | Run:ai Documentation
  1. Workloads in NVIDIA Run:ai
  2. Workload Assets
Credentials

This section explains what credentials are and how to create and use them.

Credentials are workload assets that simplify the complexities of Kubernetes secrets. They consist of and mask sensitive access information, such as passwords, tokens, and access keys, which are necessary for gaining access to various resources.

Credentials are crucial for the security of AI workloads and the resources they require, as they restrict access to authorized users, verify identities, and ensure secure interactions. By enforcing the protection of sensitive data, credentials help organizations comply with industry regulations, fostering a secure environment overall.

Essentially, credentials enable AI practitioners to access relevant protected resources, such as private data sources and Docker images, thereby streamlining the workload submission process.

The Credentials table can be found under Workload manager in the NVIDIA Run:ai User interface.

The Credentials table provides a list of all the credentials defined in the platform and allows you to manage them.

The Credentials table comprises the following columns:

The name of the credential

A description of the credential

The type of credential, e.g., Docker registry

The different lifecycle phases and representation of the credential's condition

The scope of this compute resource within the organizational tree. Click the name of the scope to view the organizational tree diagram

The unique name of the credential's Kubernetes name as it appears in the cluster

The environment(s) that are associated with the credential

The private data source(s) that are accessed using the credential

The user who created the credential

The timestamp of when the credential were created

The cluster with which the credential are associated

The following table describes the credentials’ condition and whether they were created successfully for the selected scope.

No issues were found while creating the credential (this status may change while propagating the credential to the selected scope)

Issues found while propagating the credential

Failed to access the cluster

Credential is being created

Credential is being deleted

When the credential's scope is an account, or the current version of the cluster is not up to date, the status cannot be displayed

Customizing the Table View

Creating credentials is limited to specific roles.

To add a new credential:

  1. Go to the Credentials table

  2. Select the credential type from the list Follow the step-by-step guide for each credential type:

Docker registry

These credentials allow users to authenticate and pull images from a Docker registry, enabling access to containerized applications and services.

After creating the credential, it is used automatically when pulling images.

  1. Enter a name for the credential. The name must be unique.

  2. Optional: Provide a description of the credential

  3. Set how the credential is created

After the credential is created, check the status to monitor proper creation across the selected scope.

Access key

These credentials are unique identifiers used to authenticate and authorize access to cloud services or APIs, ensuring secure communication between applications. They typically consist of two parts:

The purpose of this credential type is to allow access to restricted data.

  1. Enter a name for the credential. The name must be unique.

  2. Optional: Provide a description of the credential

  3. Set how the credential is created

After the credential is created, check the status to monitor proper creation across the selected scope.

Username & password

These credentials require a username and corresponding password to access various resources, ensuring that only authorized users can log in.

The purpose of this credential type is to allow access to restricted data.

  1. Enter a name for the credential. The name must be unique.

  2. Optional: Provide a description of the credential

  3. Set how the credential is created

After the credential is created, check the status to monitor proper creation across the selected scope.

Generic secret

These credentials are a flexible option that consists of multiple keys & values and can store various sensitive information, such as API keys or configuration data, to be used securely within applications.

The purpose of this credential type is to allow access to restricted data.

  1. Enter a name for the credential. The name must be unique.

  2. Optional: Provide a description of the credential

  3. Set how the credential is created

To rename a credential:

  1. Select the credential from the table

  2. Click Rename to edit its name and description

To delete a credential:

  1. Select the credential you want to delete

  2. In the dialog, click DELETE to confirm

Note

Credentials cannot be deleted if they are being used by a workload and template.

You can use credentials (secrets) in various ways within the system

Access Private Data Sources

To access private data sources, attach credentials to data sources of the following types: Git, S3 Bucket

Use Directly Within the Container

To use the secret directly from within the container, you can choose between the following options

  1. Get the secret mounted to the file system by using the Generic secret data source

  2. Get the secret as an environment variable injected into the container. There are two equivalent ways to inject the environment variable.

    a. By adding it to the Environment asset. b. By adding it ad-hoc as part of the workload.

Creating Secrets in Advance

Add secrets in advance to be used when creating credentials via the NVIDIA Run:ai UI. Follow the steps below for each required scope:

  1. Create the secret in the NVIDIA Run:ai namespace (runai)

  2. To authorize NVIDIA Run:ai to use the secret, label it: run.ai/cluster-wide: "true"

  3. Label the secret with the correct credential type:

    1. Docker registry - run.ai/resource: "docker-registry"

    2. Access key - run.ai/resource: "access-key"

    3. Username and password - run.ai/resource: "password"

    4. Generic secret - run.ai/resource: "generic"

The secret is now displayed for that scope in the list of existing secrets.

  1. Create the secret in the NVIDIA Run:ai namespace (runai)

  2. To authorize NVIDIA Run:ai to use the secret, label it: run.ai/department: "<department_id>"

  3. Label the secret with the correct credential type:

    1. Docker registry - run.ai/resource: "docker-registry"

    2. Access key - run.ai/resource: "access-key"

    3. Username and password - run.ai/resource: "password"

    4. Generic secret - run.ai/resource: "generic"

The secret is now displayed for that scope in the list of existing secrets.

  1. Create the secret in the project’s namespace

  2. Label the secret with the correct credential type:

    1. Docker registry - run.ai/resource: "docker-registry"

    2. Access key - run.ai/resource: "access-key"

    3. Username and password - run.ai/resource: "password"

    4. Generic secret - run.ai/resource: "generic"

To view the available actions, go to the Credentials API reference


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4