Skip to content

Conversation

madmecodes
Copy link
Contributor

✏️ Summary of Changes

Documents the Istio VirtualService conflict issue that occurs when deploying KServe with path-based routing alongside KubeFlow. Adds troubleshooting guidance to resolve 404 errors caused by conflicts between KubeFlow's wildcard VirtualServices and KServe's specific-host VirtualServices. References upstream Istio issue istio/istio#57404 and provides Gateway configuration workaround.

📦 Dependencies

none

🐛 Related Issues

none

✅ Contributor Checklist

  • I have tested these changes with kustomize. See Installation Prerequisites.
  • All commits are signed-off to satisfy the DCO check.
  • I have considered adding my company to the adopters page to support Kubeflow and help the community, since I expect help from the community for my issue (see 1. and 2.).

You can join the CNCF Slack and access our meetings at the Kubeflow Community website. Our channel on the CNCF Slack is here #kubeflow-platform.

@@ -1,5 +1,19 @@
# KServe

For KServe installation and usage, see the [GitHub Actions tests](.github/workflows/kserve_test.yaml) which demonstrate working configurations.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you list all the tests and explain what they are for? I mean we have already a tests for kserve path based access.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You have to find out which ordering makes sense.

@juliusvonkohout
Copy link
Member

Please also merge
kserve_jwt_authentication_test.yaml
kserve_secure_test.yaml
kserve_test.yaml

Into a single file.

@google-oss-prow google-oss-prow bot added size/L and removed size/M labels Sep 30, 2025
@madmecodes
Copy link
Contributor Author

/retest

1 similar comment
@madmecodes
Copy link
Contributor Author

/retest

@juliusvonkohout
Copy link
Member

/lgtm
/approve
thank you

Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: juliusvonkohout

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@google-oss-prow google-oss-prow bot merged commit 5f33881 into kubeflow:master Sep 30, 2025
30 of 32 checks passed
@hahahannes
Copy link

Hi @juliusvonkohout and @madmecodes,

I just saw this. Thanks a lot for covering it!

We noticed now that this workaround will lead to problems with cert-manager and the created Ingress for HTTP-01 acme challenges. The ingress will get picked up by the default istio-ingressgateway. The problem is that through the workaround, all routing rules for the istio-ingressgateway (with the host that was set in the kubeflow-gateway) seem to be ignored now. I am checking now how to handle this.

@hahahannes
Copy link

Just out of curiosity, were you able to reproduce it ? I was trying to get it fixed upstream at Istio, but seems like they were not able to reproduce.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants