Chapter 1. Introduction


Welcome! In this tutorial, you learn how to use data science, artificial intelligence (AI), and machine learning (ML) in an OpenShift development workflow.

You complete the following tasks in Red Hat OpenShift AI without installing any software on your computer:

  • Explore a pre-trained fraud detection model by using a Jupyter notebook.
  • Deploy the model by using OpenShift AI model serving.
  • Refine and train the model by using automated pipelines.
  • Learn how to train the model by using distributed computing frameworks.

1.1. About the example fraud detection model

The example fraud detection model monitors credit card transactions for potential fraudulent activity. It analyzes the following credit card transaction details:

  • The geographical distance from an earlier credit card transaction.
  • The price of the current transaction, compared to the median price of all the transactions.
  • Whether the user completed the transaction by using the hardware chip in the credit card, by entering a PIN number, or by making an online purchase.

Based on this data, the model outputs the likelihood of the transaction being fraudulent.

1.2. Before you begin

You must have access to an OpenShift cluster which has Red Hat OpenShift AI installed.

Note

Due to resource constraints, this v3.2 edition of the tutorial is not supported in the Red Hat Developer Sandbox.

Important

If your cluster uses self-signed certificates, before you begin the tutorial, your OpenShift AI administrator must add self-signed certificates for OpenShift AI as described in Working with certificates (Self-Managed).

If you’re ready, start the tutorial.

Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top