5.9 KiB
title |
---|
Docker-Compose - Hosted Server |
:::important Enterprise Feature The Application Gateway is available under the ClearML Enterprise plan. :::
The AI Application Gateway enables external access to ClearML tasks, and applications running on workload nodes that require HTTP or TCP access. The gateway is configured with an endpoint or external address, making these services accessible from the user's machine, outside the workload nodes’ network.
This guide details the installation of the ClearML AI Application Gateway for ClearML users who use ClearML’s SaaS control plane while hosting their own workload nodes.
Requirements
- Linux OS (x86) machine with root access
- The machine needs to be reachable from your user network
- The machine needs to have network reachability to workload nodes
- Credentials for the ClearML docker repository
- A valid ClearML Server installation
Additionally, for a secure connection, it is recommended to have a DNS entry and a valid SSL Certificate assigned to the machine IP.
Host Configuration
Docker Installation
Installing docker
and docker-compose
might vary depending on the specific operating system you're using. Here is an
example for AmazonLinux:
sudo dnf -y install docker
DOCKER_CONFIG="/usr/local/lib/docker"
sudo mkdir -p $DOCKER_CONFIG/cli-plugins
sudo curl -SL https://github.com/docker/compose/releases/download/v2.17.3/docker-compose-linux-x86_64 -o $DOCKER_CONFIG/cli-plugins/docker-compose
sudo chmod +x $DOCKER_CONFIG/cli-plugins/docker-compose
sudo systemctl enable docker
sudo systemctl start docker
sudo docker login
Use the ClearML docker hub credentials when prompted by docker
login.
Docker-compose File
This is an example of the docker-compose
file you will need to create:
version: '3.5'
services:
task_traffic_webserver:
image: clearml/ai-gateway-proxy:${PROXY_TAG:?err}
network_mode: "host"
restart: unless-stopped
container_name: task_traffic_webserver
volumes:
- ./task_traffic_router/config/nginx:/etc/nginx/conf.d:ro
- ./task_traffic_router/config/lua:/usr/local/openresty/nginx/lua:ro
task_traffic_router:
image: clearml/ai-gateway-router:${ROUTER_TAG:?err}
restart: unless-stopped
container_name: task_traffic_router
volumes:
- /var/run/docker.sock:/var/run/docker.sock
- ./task_traffic_router/config/nginx:/etc/nginx/conf.d:rw
- ./task_traffic_router/config/lua:/usr/local/openresty/nginx/lua:rw
environment:
- LOGGER_LEVEL=INFO
- ROUTER__WEBSERVER__SERVER_PORT="8010"
- ROUTER_NAME=${ROUTER_NAME:?err}
- ROUTER_URL=${ROUTER_URL:?err}
- CLEARML_API_HOST=${CLEARML_API_HOST:?err}
- CLEARML_API_ACCESS_KEY=${CLEARML_API_ACCESS_KEY:?err}
- CLEARML_API_SECRET_KEY=${CLEARML_API_SECRET_KEY:?err}
- AUTH_COOKIE_NAME=${AUTH_COOKIE_NAME:?err}
- AUTH_SECURE_ENABLED=${AUTH_SECURE_ENABLED}
- TCP_ROUTER_ADDRESS=${TCP_ROUTER_ADDRESS}
- TCP_PORT_START=${TCP_PORT_START}
- TCP_PORT_END=${TCP_PORT_END}
Configuration File
You will be provided with a prefilled runtime.env
file containing the following entries:
# PREFILLED SECTION, PROVIDED BY CLEARML
PROXY_TAG=
ROUTER_TAG=
CLEARML_API_HOST=https://api.
AUTH_COOKIE_NAME=
# TO BE FILLED BY USER
ROUTER_NAME=main-router
ROUTER_URL=http://<ROUTER-HOST-PUBLIC-IP>:8010
CLEARML_API_ACCESS_KEY=
CLEARML_API_SECRET_KEY=
AUTH_SECURE_ENABLED=true
TCP_ROUTER_ADDRESS=<ROUTER-HOST-PUBLIC-IP>
TCP_PORT_START=
TCP_PORT_END=
Edit it according to the following guidelines:
ROUTER_NAME
: Unique name for this router.CLEARML_API_ACCESS_KEY, CLEARML_API_SECRET_KEY:
API credentials for Admin user or Service Account with admin privileges created in the ClearML web UI. Make sure to label these credentials clearly, so that they will not be revoked by mistake.ROUTER_URL
: The URL for this router. This URL will be shown in the UI of any application for users to access (e.g. hosted Jupyter or LLM UI).TCP_ROUTER_ADDRESS
: Router external address, can be an IP or the host machine or a load balancer hostname, depends on network configuration.TCP_PORT_START
: Start port for the TCP Tasks, chosen by the customer. Ensure that ports are open and can be allocated on the host.TCP_PORT_END
: End port for the TCP Tasks, chosen by the customer. Ensure that ports are open and can be allocated on the host.
Installation
Run the following command to start the router:
sudo docker compose --env-file runtime.env up -d
Advanced
Running without Certificates
When running on docker-compose
with an HTTP interface and without certificates, set the following entry in the runtime.env
:
AUTH_SECURE_ENABLED=false
Install Multiple Routers for the Same Tenant
To deploy multiple routers within the same tenant, you must configure each router to handle specific workloads.
Using this setting, each router will only route tasks that originated from its assigned queues. This is important in case you have multiple networks with different agents. For example:
- Tasks started by Agent A can only be reached by Router A (within the same network), but cannot be reached by Router B
- Agent B will handle a separate set of tasks which can only be reached by Router B
The assumption in this case is that Agent A and Agent B will service different queues, and routers must be configured to route tasks based on these queue definitions.
Each router in the same tenant must have:
- A unique
ROUTER_NAME
- Distinct set of queues listed in
LISTEN_QUEUE_NAME
. It supports wildcards.
For example:
-
Router-A
runtime.env
ROUTER_NAME=router-a LISTEN_QUEUE_NAME=queue1,queue2
-
Router-B
runtime.env
ROUTER_NAME=router-b LISTEN_QUEUE_NAME=queue3,queue4
Ensure that LISTEN_QUEUE_NAME
is included in the docker-compose
environment variables for each router
instance.