Clone Templates
Compute and Service profiles are based on environment templates powered by Rafay's Environment Manager. We will be using Rafay's curated and pre-created system templates available from the catalog in our compute and service profiles. The Org Admin for the user's Rafay Org has the privileges to share the system templates from Rafay's Catalog to specific/all projects.
Compute Template¶
As an Org Admin, navigate to "System->Template Catalog". On the "Multi-tenancy on K8s" item/card,
- Click on "Get Started" and follow the wizard
- Provide a name, version and select the name of the project you created in the previous step (e.g. gpu-paas)
- Save as Draft
Configure Compute Template¶
Specify Agent¶
The agent will receive the IaC, credentials and policies from the Rafay Platform and implement it on the behalf of the user.
- Under the "Agents" tab, click on "Add Agent"
- Select the name of the agent you configured in the prior step
- Save your changes
Config Context¶
The config context will typically hold credentials and environment variables required for the agent to do its job.
Navigate to the menu item "Config Context" and click on "New"
API Key for Org
Create a new Env Variable with the following details
- Key = RCTL_API_KEY
- Value = Copy the API Key + Secret credentials
To get the API Key + Secret for programmatic access, navigate to "My Tools -> Manage Keys" and click on "New API Key".
Info
Click here to learn more about API Key & Secret for programmatic access.
- Set the variable options as "sensitive" and overrides as "Not Allowed". This means that downstream end users will not see this or be able to manipulate it.
Controller API Endpoint
Create a new Env Variable with the following details
- Key = RCTL_REST_ENDPOINT
- Value = console.rafay.dev
Ensure you set override as "Not Allowed" because we do not want any downstream users of the template to see it or have access to it.
Important
Please replace "console.rafay.dev" with your customized URL if you have been setup for white labeling.
Once saved, the config context should look like the image below.
Jupyter Notebook Template¶
Jupyter Notebooks are web based applications. When these are deployed on your cluster, they will be exposed to users via Kubernetes based Ingress. So, please ensure that you have a properly configured Ingress Controller in your host cluster by following the infrastructure related instructions. The Ingress for the notebook will be exposed via a https URL on a domain.
As an Org Admin, navigate to "System->Template Catalog". On the "Jupyter Notebook" item/card,
- Click on "Get Started" and follow the wizard
- Provide a name, version and select the name of the project you created in the previous step (e.g. gpu)
- Save as Draft
Info
To aid with testing and evaluation, the Rafay platform provides the option to automatically publish the DNS and inject a certificate for the https URL on a Rafay managed domain. We will use this option for our exercise.
Configure Notebook Template¶
Select Agent¶
The agent will receive the IaC, credentials and policies from the Rafay Platform and implement it on the behalf of the user.
- Under the "Agents" tab, click on "Add Agent"
- Select the name of the agent you configured in the prior step
- Save your changes
Config Context¶
Add the previously created config context to the template.
- Under the "Config Contexts" tab, click on "Add Config Context"
- Select the name of the context you configured in previously
- Save your changes