Jupyterhub¶
https://jupyterhub.github.io/helm-chart/
Create a jupyterhub in the kubernetes cluster.
dedicated node pool for users (taints and tolerations)¶
https://zero-to-jupyterhub.readthedocs.io/en/latest/administrator/optimization.html
helm chart setup¶
https://github.com/jupyterhub/zero-to-jupyterhub-k8s/blob/HEAD/jupyterhub/values.yaml
persistent storage¶
https://kienmn97.medium.com/persistent-storage-in-jupyterhub-on-kubernetes-cluster-running-on-minikube-4b469bdb1b86
https://docs.microsoft.com/en-us/azure/aks/azure-files-volume
https://docs.openshift.com/container-platform/3.10/install_config/persistent_storage/persistent_storage_azure_file
We then need to mount the volume to a path in the hub pod where the database is stored, in volumes and volumeMounts sections.
failed to list *v1beta1.PodDisruptionBudget: the server could not find the requested resource¶
https://discourse.jupyter.org/t/readiness-probe-fails-on-docker-kubernetes-deploy/17517/4
coming from a newer k8s version and a depreciation of v1beta1
policy/v1beta1 PodDisruptionBudget is deprecated in aks v1.21+, unavailable in aks v1.25+; use policy/v1 PodDisruptionBudget
API server or when the requested resource version is not available or supported. check the api server status spawn timeout and solution¶
https://blog.51cto.com/u_15946369/6035967
hook-iamge-puller ImagePullBackOff¶
https://www.modb.pro/db/179200authenticate via rbac¶
403 Forbidden Error when using Azure AD for authentication: https://discourse.jupyter.org/t/403-forbidden-error-when-using-azure-ad-for-authentication/16737/7
When set authentication via rbac, after the app registration secret update, the secret should be updated in the Kubernetes Secret as the Secret has been created by terraform.
User 'user-name' not allowed error¶
https://discourse.jupyter.org/t/403-forbidden-error-when-using-azure-ad-for-authentication/16737/18
Solution: c.AzureAdOAuthenticator.allow_all = True Allow all authenticated users to login.