These steps should be completed after receiving access to a Trainy k8s cluster via a kubeconfig file after which you can inspect your cluster using k8s tooling likeDocumentation Index
Fetch the complete documentation index at: https://docs.trainy.ai/llms.txt
Use this file to discover all available pages before exploring further.
kubectl and through the konduktor CLI tool.
For instructions on how to get access to your cluster see Authentication.
Installation
We maintain a nightly build of our latest client on PyPikonduktor-nightly
(Optional) Setup Cloud Storage Credentials
We currently support the following cloud object stores for syncing files —> workloads with more incoming!- Google Cloud Storage
gs- Supported ✅ - Amazon S3
s3- Supported ✅ - Cloudflare R2
r2- Coming soon 🚧
Google Cloud Storage Requirements
- Install with
pip install konduktor-nightly - Check that your GCP user or service account has the minimal GCP permissions.
- Ensure that
~/.konduktor/config.yamlis configured correctly for GS:
- Use local credentials OR set env variables: Coming soon 🚧
- Confirm your GS credentials and setup with:
Amazon S3 Requirements
- Install with
pip install konduktor-nightly[s3] - Check that your AWS user has the minimal AWS user permissions.
- Ensure that
~/.konduktor/config.yamlis configured correctly for S3:
- Use local
~/.aws/credentials OR set env variables:
~/.aws/config
~/.aws/credentials
- Confirm your S3 credentials and setup with:
(Optional) Setup Private Container Registry Credentials
To have your Trainy jobs use images from private container registries (k8s docs), you must create one or more Kubernetesdocker-registry secrets containing your registry credentials. Each secret stores the authentication needed for a specific registry (Docker Hub or GCR). Konduktor will use these secrets when pulling your job images.
After creating the secret(s), reference them in your Konduktor config (~/.konduktor/config.yaml) so they are automatically attached to your pods.
imagePullSecrets must match the secrets you create below.
Create a Docker Hub Registry Secret
- Create your secret
- Verify that the secret was created
Create a Google Container / Artifact Registry Secret
- Create a GCP Service Account for registry access
- Grant read permissions for container images
- Generate a JSON key for that service account
- Create your secret
- Verify that the secret was created