You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/setup_installation/aws/getting_started.md
+5-6
Original file line number
Diff line number
Diff line change
@@ -8,21 +8,20 @@ SageMaker and KubeFlow. This guide shows how to set up the Hopsworks platform in
8
8
9
9
To follow the instruction on this page you will need the following:
10
10
11
-
- Kubernetes Version: Hopsworks can be deployed on AKS clusters running Kubernetes >= 1.27.0.
11
+
- Kubernetes Version: Hopsworks can be deployed on EKS clusters running Kubernetes >= 1.27.0.
12
12
-[aws-cli](https://aws.amazon.com/cli/) to provision the AWS resources
13
13
-[eksctl](https://eksctl.io/) to interact with the AWS APIs and provision the EKS cluster
14
14
-[helm](https://helm.sh/) to deploy Hopsworks
15
15
16
-
## ECR Registry
16
+
###ECR Registry
17
17
18
18
Hopsworks allows users to customize the images used by Python jobs, Jupyter Notebooks and (Py)Spark applications running in their projects. The images are stored in ECR. Hopsworks needs access to an ECR repository to push the project images.
19
19
20
-
## Permissions
20
+
###Permissions
21
21
22
-
By default, the deployment requires cluster admin level access to be able to create a set of ClusterRoles, ServiceAccounts and ClusterRoleBindings. If you don’t have cluster admin level access, you can ask your administrator to provision the necessary ClusterRoles, ServiceAccounts and ClusterRoleBindings as described in the section below.
23
-
24
-
A namespace is required to deploy the Hopsworks stack. If you don’t have permissions to create a namespace you should ask your K8s administrator to provision one for you.
22
+
- The deployment requires cluster admin access to create ClusterRoles, ServiceAccounts, and ClusterRoleBindings.
25
23
24
+
- A namespace is required to deploy the Hopsworks stack. If you don’t have permissions to create a namespace, ask your EKS administrator to provision one.
Copy file name to clipboardexpand all lines: docs/setup_installation/gcp/getting_started.md
+33-37
Original file line number
Diff line number
Diff line change
@@ -9,15 +9,11 @@ SageMaker and KubeFlow. This guide shows how to set up the Hopsworks platform in
9
9
10
10
To follow the instruction on this page you will need the following:
11
11
12
-
- Kubernetes Version: Hopsworks can be deployed on AKS clusters running Kubernetes >= 1.27.0.
13
-
- The [gcloud CLI](https://cloud.google.com/sdk/gcloud)
14
-
- The [gsutil tool](https://cloud.google.com/storage/docs/gsutil)
15
-
- kubectl (to manage the AKS cluster)
16
-
- helm (to deploy Hopsworks)
12
+
- Kubernetes Version: Hopsworks can be deployed on GKE clusters running Kubernetes >= 1.27.0.
13
+
-[gcloud CLI](https://cloud.google.com/sdk/gcloud) to provision the GCP resources
14
+
-[gke-gcloud-auth-plugin](https://cloud.google.com/blog/products/containers-kubernetes/kubectl-auth-changes-in-gke) to manage authentication with the GKE cluster
15
+
-[helm](https://helm.sh/) to deploy Hopsworks
17
16
18
-
## GCR Registry
19
-
20
-
Hopsworks allows users to customize images for Python jobs, Jupyter Notebooks, and (Py)Spark applications. These images should be stored in Google Container Registry (GCR). The GKE cluster needs access to a GCR repository to push project images.
Create a file named hopsworksai_role.yaml with the following content:
37
+
Create a file named `hopsworksai_role.yaml` with the following content:
42
38
43
39
```bash
44
40
title: Hopsworks AI Instances
@@ -67,56 +63,54 @@ includedPermissions:
67
63
Execute the following gcloud command to create a custom role from the file. Replace $PROJECT_ID with your GCP project id:
68
64
69
65
```bash
70
-
gcloud iam roles create hopsworksai_instances --project=$PROJECT_ID --file=hopsworksai_role.yaml
66
+
gcloud iam roles create hopsworksai_instances \
67
+
--project=$PROJECT_ID \
68
+
--file=hopsworksai_role.yaml
71
69
```
72
70
73
-
Create a service account:
74
-
75
71
Execute the following gcloud command to create a service account for Hopsworks AI instances. Replace $PROJECT_ID with your GCP project id:
76
72
77
73
```bash
78
-
gcloud iam service-accounts create hopsworksai_instances --project=$PROJECT_ID --description="Service account for Hopsworks AI instances" --display-name="Hopsworks AI instances"
74
+
gcloud iam service-accounts create hopsworksai_instances \
75
+
--project=$PROJECT_ID \
76
+
--description="Service account for Hopsworks AI instances" \
77
+
--display-name="Hopsworks AI instances"
79
78
```
80
79
81
80
Execute the following gcloud command to bind the custom role to the service account. Replace all occurrences $PROJECT_ID with your GCP project id:
Hopsworks allows users to customize images for Python jobs, Jupyter Notebooks, and (Py)Spark applications. These images should be stored in Google Container Registry (GCR). The GKE cluster needs access to a GCR repository to push project images.
113
107
114
-
## Step 2: Configure kubectl
108
+
Enable Artifact Registry and create a GCR repository to store images:
0 commit comments