Ingress Controller

Learn how to configure Istio as an ingress controller for Seldon Core, including traffic management and security policies.

An ingress controller functions as a reverse proxy and load balancer, implementing a Kubernetes Ingress. It adds an abstraction layer for traffic routing by receiving traffic from outside the Kubernetes platform and load balancing it to Pods running within the Kubernetes cluster.

Seldon Core 2 works seamlessly with any service mesh or ingress controller, offering flexibility in your deployment setup. This guide provides detailed instructions for installing and configuring Istio with Seldon Core 2.

Istio

Istio implements the Kubernetes ingress resource to expose a service and make it accessible from outside the cluster. You can install Istio in either a self-hosted Kubernetes cluster or a managed Kubernetes service provided by a cloud provider that is running the Seldon Core 2.

Prerequisites

  • Ensure that you install a version of Istio that is compatible with your Kubernetes cluster version. For detailed information on supported versions, refer to the Istio Compatibility Matrix.

Installing Istio ingress controller

Installing Istio ingress controller in a Kubernetes cluster running Seldon Core 2 involves these tasks:

Install Istio

  1. Add the Istio Helm charts repository and update it:

    helm repo add istio https://istio-release.storage.googleapis.com/charts
    helm repo update
  2. Create the istio-system namespace where Istio components are installed:

    kubectl create namespace istio-system
  3. Install the base component:

    helm install istio-base istio/base -n istio-system
  4. Install Istiod, the Istio control plane:

    helm install istiod istio/istiod -n istio-system --wait

Install Istio Ingress Gateway

  1. Install Istio Ingress Gateway:

  2. Verify that Istio Ingress Gateway is installed:

    This should return details of the Istio Ingress Gateway, including the external IP address.

  3. Verify that all Istio Pods are running:

    The output is similar to:

  4. Find the IP address of the Seldon Core 2 instance running with Istio:

    Make a note of the IP address that is displayed in the output. This is the IP address that you require to test the installation.

Expose Seldon mesh service

It is important to expose seldon-service service to enable communication between deployed machine learning models and external clients or services. The Seldon Core 2 inference API is exposed through the seldon-mesh service in the seldon-mesh namespace. If you install Core 2 in multiple namespaces, you need to expose the seldon-mesh service in each of namespace.

  1. Verify if the seldon-mesh service is running for example, in the namespace seldon.

    When the services are running you should see something similar to this:

  2. Create a YAML file to create a VirtualService named iris-route in the namespace seldon-mesh. For example, create the seldon-mesh-vs.yaml file. Use your preferred text editor to create and save the file with the following content:

  3. Create a virtual service to expose the seldon-mesh service.

    When the virtual service is created, you should see this:

Next Steps

Verify the installation

Additional Resources

Last updated

Was this helpful?