Chapter 5. Feature Store integration with workbenches
The integration of Feature Store with Red Hat workbenches resolves the competing demands of agility and security. This capability removes the friction of manual configuration and script copying, accelerating workflows and enabling seamless feature management directly within Jupyter notebooks. A governance framework ensures efficiency, scalable, role-based access control (RBAC), and secure authentication. This safeguards sensitive data and mitigates vulnerabilities enterprise-wide.
5.1. Connecting a workbench to a Feature Store Copy linkLink copied to clipboard!
You can connect your workbench to a Feature Store instance to avoid manual configuration and immediately access features for your models.
Prerequisites
- You have logged in to the Red Hat dashboard.
- You have the necessary system permissions to view the specific Feature Store instances you intend to connect.
- A Feature Store instance is deployed and available in your OpenShift cluster.
You can avoid manual scripting by selecting a preconfigured Feature Store during the workbench provisioning process.
Procedure
- Log in to the Red Hat Red Hat dashboard, and click Data Science Projects.
- Click the name of the project that contains the workbench you want to configure.
Perform one of the following actions:
- Create a new workbench: In the workbenches section, click Create workbench.
- Edit an existing workbench: In the workbenches section, click the More options icon (⋮) beside the workbench name and click Edit workbench.
- Scroll to the Feature Store Configuration section.
- Select one or more available Feature Store instances from the Select Feature Store list.
The Select Feature Store list displays only the Feature Store instances that your user account is authorized to access.
- Click Create workbench or Update workbench. The workbench starts with the Feature Store configuration files automatically mounted, enabling you to efficiently integrate features into your notebooks.
Verification
Verify the success of the procedure by creating a Python object that uses the Feature Store client configuration. Copy and paste the following code:
fs_banking = FeatureStore(fs_yaml_file=’ /opt/app-root/config/feast_configs/fs_banking.yaml’) fs_banking.list_feature_views() fs_banking.get_historical_features(. . . . .) fs_banking.get_online_features(. . . . .)
fs_banking = FeatureStore(fs_yaml_file=’ /opt/app-root/config/feast_configs/fs_banking.yaml’)
fs_banking.list_feature_views()
fs_banking.get_historical_features(. . . . .)
fs_banking.get_online_features(. . . . .)
Additional resources
5.2. Verifying access control to your Feature Store instances Copy linkLink copied to clipboard!
You must ensure that access to Feature Stores is restricted based on defined roles and permissions.
To maintain regulatory compliance and safeguard sensitive data, the system uses role-based access control (RBAC) to determine which Feature Stores are visible to specific users. This mechanism mitigates potential vulnerabilities by preventing unauthorized users from discovering or selecting restricted Feature Stores.
Prerequisites
- You must be logged into the Red Hat dashboard.
-
You must have the
feast-configs-registryConfigMap present in your infrastructure namespace (e.g., opendatahub or redhat-ods-applications).
Procedure
- Define the specific user groups, namespaces or data science projects, requiring access to a Feature Store instance in your Data science projects permissions tab.
- Assign the appropriate RBAC permissions to user groups or data science projects in the Feature Store configuration maps.
Verification
Verify the configuration by logging in as a user with restricted permissions to a specific feature store:
- Attempt to create a workbench.
- Confirm that the Select Feature Store list displays only the instances the user is authorized to access.
- You can also log in as a user with no permissions and confirm that no Feature Stores are selectable.
Your data access is now protected, ensuring that different personas access only the features appropriate for their role.
Additional resources
For more information about RBAC, see the following: Setting Up Kubernetes RBAC for Feast
The RBAC document displays all policies available in the Feast upstream. However, Red Hat supports Group and Namespace/Data_Science_Project based authorization policies only. Role-based policies are NOT supported.
5.3. Feature Store configuration reference Copy linkLink copied to clipboard!
Understand how the system mounts configuration files to enable you to create and use features in your code.
| Configuration element | Description |
|---|---|
| Configuration path |
The system mounts the necessary Feature Store client configuration files to the following Feast configuration file: |
| Python instantiation |
Initialize Feature Store with the path to the mounted configuration file: |
| Troubleshooting access |
If you cannot view a specific Feature Store in the workbench dropdown menu, an administrator must verify a couple items for you. They need to verify that you have the correct role-based access control (RBAC) based on your |