Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 6 additions & 4 deletions charts/modelharness/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ auth:
# `gateway.networking.k8s.io/gateway-name` label) so North-South
# traffic into the gateway is unaffected.
networkPolicy:
enabled: false
enabled: true

# allowedIngressNamespaces grants cross-namespace ingress to
# non-gateway pods in this workload namespace, matched by the
Expand All @@ -73,6 +73,8 @@ networkPolicy:
# strict per-namespace isolation used by the network-policy e2e
# cases (which assert that label-only spoofing across namespaces is
# always denied).
allowedIngressNamespaces: []
# - keda
# - kaito-system
allowedIngressNamespaces:
- keda
- kaito-system
- kube-system
- monitoring
34 changes: 11 additions & 23 deletions test/e2e/cases.go
Original file line number Diff line number Diff line change
Expand Up @@ -160,22 +160,20 @@ var CaseDeployments = map[string][]utils.ModelDeploymentValues{
},
CaseNetworkPolicyA: {
{
Name: "netpol-a",
Namespace: "e2e-netpol-a",
Model: presetPhi,
Replicas: 1,
InstanceType: "Standard_NV36ads_A10_v5",
NetworkPolicyEnabled: true,
Name: "netpol-a",
Namespace: "e2e-netpol-a",
Model: presetPhi,
Replicas: 1,
InstanceType: "Standard_NV36ads_A10_v5",
},
},
CaseNetworkPolicyB: {
{
Name: "netpol-b",
Namespace: "e2e-netpol-b",
Model: presetPhi,
Replicas: 1,
InstanceType: "Standard_NV36ads_A10_v5",
NetworkPolicyEnabled: true,
Name: "netpol-b",
Namespace: "e2e-netpol-b",
Model: presetPhi,
Replicas: 1,
InstanceType: "Standard_NV36ads_A10_v5",
},
},
CaseScaling: {
Expand All @@ -194,16 +192,6 @@ var CaseDeployments = map[string][]utils.ModelDeploymentValues{
EnableScaling: true,
MaxReplicas: 2,
ScalingThreshold: 10, // low threshold to trigger scaling during tests
// Lock down East-West ingress while still letting
// keda-kaito-scaler (in the `keda` namespace) reach vLLM
// metric endpoints on shadow pods — without that allowance,
// KEDA can't observe vllm:num_requests_waiting and scale-up
// never fires. kaito-system is whitelisted as well so the
// gpu-node-mocker / kaito-workspace controllers retain
// optional direct-pod access for shadow-pod patching paths
// that don't go through the apiserver.
NetworkPolicyEnabled: true,
NetworkPolicyAllowedNamespaces: []string{"keda", "kaito-system"},
},
},
}
Expand Down Expand Up @@ -247,7 +235,7 @@ func InstallCase(caseName string) string {

ctx := context.Background()
first := CaseDeployments[caseName][0]
Expect(utils.EnsureNamespace(ctx, ns, first.AuthAPIKeyEnabled, first.NetworkPolicyEnabled, first.NetworkPolicyAllowedNamespaces)).To(Succeed(),
Expect(utils.EnsureNamespace(ctx, ns, first.AuthAPIKeyEnabled)).To(Succeed(),
"failed to ensure namespace %s for case %s", ns, caseName)

Expect(utils.WaitForGatewayService(ctx, ns, gatewayName, utils.InferenceSetReadyTimeout)).
Expand Down
Loading
Loading