Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
MLOps with Red Hat OpenShift

You're reading from   MLOps with Red Hat OpenShift A cloud-native approach to machine learning operations

Arrow left icon
Product type Paperback
Published in Jan 2024
Publisher Packt
ISBN-13 9781805120230
Length 238 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Ross Brigoli Ross Brigoli
Author Profile Icon Ross Brigoli
Ross Brigoli
Faisal Masood Faisal Masood
Author Profile Icon Faisal Masood
Faisal Masood
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Part 1: Introduction FREE CHAPTER
2. Chapter 1: Introduction to MLOps and OpenShift 3. Part 2: Provisioning and Configuration
4. Chapter 2: Provisioning an MLOps Platform in the Cloud 5. Chapter 3: Building Machine Learning Models with OpenShift 6. Part 3: Operating ML Workloads
7. Chapter 4: Managing a Model Training Workflow 8. Chapter 5: Deploying ML Models as a Service 9. Chapter 6: Operating ML Workloads 10. Chapter 7: Building a Face Detector Using the Red Hat ML Platform 11. Index 12. Other Books You May Enjoy

Securing model endpoints

When exposing models as APIs, you will want to limit the access to your APIs to certain clients. You will also want to ensure that the APIs are not vulnerable to known Common Vulnerabilities and Exposures (CVE). When you store your model containers in Red Hat Quay, it will scan the containers to find out any CVE in the libraries and the runtime of your code. Quay is outside the scope of this book but there is plenty of information available on Quay. Packt’s OpenShift Multi-Cluster Management Handbook contains details about Quay, if you want to know more about it.

The API you deployed earlier in this chapter can be accessed via the HTTPS protocol. This means that OpenShift is already encrypting the traffic using the certificates that have been configured to expose the applications. The configuration of these certificates is outside the scope of this book.

The first step is to restrict access to the API through an authentication mechanism. RHODS...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image