You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In order to reduce the need for customers to give access to their storage backends; volumes, node host paths, S3 , GCS, Azure blob, Minio,... to the end users, the platform should provide a uploader session using the service runtime.
Currenlty Polyaxon only provides full management for the artifacts store, while the platform provides a set of tools for loading artifacts from several artifacts kinds.
Feature description
We need to provide a set of proxies using pre-defined and customizable components, that users can schedule and upload their data to. The service runtime will provision the required secrets or mount the required volumes and proxy the upload of the artifacts to correct backend.
By using the service runtime, we guarantee that only users who have access (RBAC/ACL) can perform such operations, this will reduce the work from the OPs teams while giving autonomy to the end users using the predefined rules and access/restriction configurations.
The text was updated successfully, but these errors were encountered:
Use case
In order to reduce the need for customers to give access to their storage backends; volumes, node host paths, S3 , GCS, Azure blob, Minio,... to the end users, the platform should provide a uploader session using the service runtime.
Currenlty Polyaxon only provides full management for the artifacts store, while the platform provides a set of tools for loading artifacts from several artifacts kinds.
Feature description
We need to provide a set of proxies using pre-defined and customizable components, that users can schedule and upload their data to. The service runtime will provision the required secrets or mount the required volumes and proxy the upload of the artifacts to correct backend.
By using the service runtime, we guarantee that only users who have access (RBAC/ACL) can perform such operations, this will reduce the work from the OPs teams while giving autonomy to the end users using the predefined rules and access/restriction configurations.
The text was updated successfully, but these errors were encountered: