Chapter 5. Feature Store integration with workbenches


The integration of Feature Store with Red Hat workbenches resolves the competing demands of agility and security. This capability removes the friction of manual configuration and script copying, accelerating workflows and enabling seamless feature management directly within Jupyter notebooks. A governance framework ensures efficiency, scalable, role-based access control (RBAC), and secure authentication. This safeguards sensitive data and mitigates vulnerabilities enterprise-wide.

5.1. Connecting a workbench to a Feature Store

You can connect your workbench to a Feature Store instance to avoid manual configuration and immediately access features for your models.

Prerequisites

  • You have logged in to the Red Hat dashboard.
  • You have the necessary system permissions to view the specific Feature Store instances you intend to connect.
  • A Feature Store instance is deployed and available in your OpenShift cluster.

You can avoid manual scripting by selecting a preconfigured Feature Store during the workbench provisioning process.

Procedure

  • Log in to the Red Hat Red Hat dashboard, and click Data Science Projects.
  • Click the name of the project that contains the workbench you want to configure.
  • Perform one of the following actions:

    • Create a new workbench: In the workbenches section, click Create workbench.
    • Edit an existing workbench: In the workbenches section, click the More options icon (⋮) beside the workbench name and click Edit workbench.
  • Scroll to the Feature Store Configuration section.
  • Select one or more available Feature Store instances from the Select Feature Store list.
Note

The Select Feature Store list displays only the Feature Store instances that your user account is authorized to access.

  • Click Create workbench or Update workbench. The workbench starts with the Feature Store configuration files automatically mounted, enabling you to efficiently integrate features into your notebooks.

Verification

Verify the success of the procedure by creating a Python object that uses the Feature Store client configuration. Copy and paste the following code:

fs_banking = FeatureStore(fs_yaml_file=’ /opt/app-root/config/feast_configs/fs_banking.yaml’)
fs_banking.list_feature_views()
fs_banking.get_historical_features(. . . . .)
fs_banking.get_online_features(. . . . .)
Copy to Clipboard Toggle word wrap

Additional resources

You must ensure that access to Feature Stores is restricted based on defined roles and permissions.

To maintain regulatory compliance and safeguard sensitive data, the system uses role-based access control (RBAC) to determine which Feature Stores are visible to specific users. This mechanism mitigates potential vulnerabilities by preventing unauthorized users from discovering or selecting restricted Feature Stores.

Prerequisites

  • You must be logged into the Red Hat dashboard.
  • You must have the feast-configs-registry ConfigMap present in your infrastructure namespace (e.g., opendatahub or redhat-ods-applications).

Procedure

  • Define the specific user groups, namespaces or data science projects, requiring access to a Feature Store instance in your Data science projects permissions tab.
  • Assign the appropriate RBAC permissions to user groups or data science projects in the Feature Store configuration maps.

Verification

Verify the configuration by logging in as a user with restricted permissions to a specific feature store:

  • Attempt to create a workbench.
  • Confirm that the Select Feature Store list displays only the instances the user is authorized to access.
  • You can also log in as a user with no permissions and confirm that no Feature Stores are selectable.

Your data access is now protected, ensuring that different personas access only the features appropriate for their role.

Additional resources

For more information about RBAC, see the following: Setting Up Kubernetes RBAC for Feast

Note

The RBAC document displays all policies available in the Feast upstream. However, Red Hat supports Group and Namespace/Data_Science_Project based authorization policies only. Role-based policies are NOT supported.

5.3. Feature Store configuration reference

Understand how the system mounts configuration files to enable you to create and use features in your code.

Expand
Configuration elementDescription

Configuration path

The system mounts the necessary Feature Store client configuration files to the following Feast configuration file: /opt/app-root/src/feast-config/my_project.yaml

Python instantiation

Initialize Feature Store with the path to the mounted configuration file: fs_obj = FeatureStore(fs_yaml_file='/usr/app-root/config/feast/my_project.yaml')

Troubleshooting access

If you cannot view a specific Feature Store in the workbench dropdown menu, an administrator must verify a couple items for you. They need to verify that you have the correct role-based access control (RBAC) based on your group/namespace access and that your authentication token is valid and permits viewing a specific config map associated with that Feature Store instance.

Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top