Model registry provides a central repository for model developers to store and manage models, versions, and artifacts metadata.
- Red Hat drives the project's development through Open Source principles, ensuring transparency, sustainability, and community ownership.
- Red Hat values the Kubeflow community and commits to providing a minimum of 12 months' notice before ending project maintenance after the initial release.
Alpha
This Kubeflow component has alpha status with limited support. See the Kubeflow versioning policies. The Kubeflow team is interested in your feedback about the usability of the feature.
- Introduction
- What is Kubeflow Model Registry
- Blog KF 1.9 introducing Model Registry
- Blog KF 1.10 introducing UI for Model Registry, CSI, and other features
- Installation
- installing Model Registry standalone
- installing Model Registry with Kubeflow manifests
- installing Model Registry using ODH Operator
- Concepts
- Python client
- Tutorials
- FAQs
- Development
- introduction to local build and development
- contributing
- Kubeflow community and the Model Registry working group
- REST API
- license scanning
- monitoring image quality
- go >= 1.24
- protoc v24.3 - Protocol Buffers v24.3 Release
- npm >= 10.2.0 - Installing Node.js and npm
- Java >= 11.0
- python 3.9
The model registry proxy server implementation follows a contract-first approach, where the contract is identified by model-registry.yaml OpenAPI specification.
You can also easily display the latest OpenAPI contract for model-registry in a Swagger-like editor directly from this repository; for example, here.
Run the following command to start the OpenAPI proxy server from source:
make run/proxy
The proxy service implements the OpenAPI defined in model-registry.yaml to create a Model Registry specific REST API.
For a high-level documentation of the Model Registry logical model, please check this guide.
The model registry core is the layer which implements the core/business logic by interacting with the underlying datastore internal service. It provides a model registry domain-specific api that is in charge to proxy all, appropriately transformed, requests to the datastore internal service.
For more background on Model Registry Go core library and instructions on using it, please check getting started guide.
When making changes to the database schema, you need to regenerate the GORM structs. This is done using the gen/gorm
target:
make gen/gorm
This target will:
- Start a temporary database
- Run migrations
- Generate GORM structs based on the schema
- Clean up the temporary database
NOTE: The target requires Docker to be running.
Run the following command to build the server binary:
make build
The generated binary uses spf13
cmdline args. More information on using the server can be obtained by running the command:
./model-registry --help
Run the following command to clean the server binary, generated models and etc.:
make clean
Run the following command to trigger all tests:
make test
or, to see the statement coverage:
make test-cover
The following command builds a docker image for the server with the tag model-registry
:
docker build -t model-registry .
Note that the first build will be longer as it downloads the build tool dependencies. Subsequent builds will re-use the cached tools layer.
The following command starts the proxy server:
docker run -d -p <hostname>:<port>:8080 --user <uid>:<gid> --name server model-registry proxy -n 0.0.0.0
Where, <uid>
, <gid>
, and <host-path>
are the same as in the migrate command above.
And <hostname>
and <port>
are the local ip and port to use to expose the container's default 8080
listening port.
The server listens on localhost
by default, hence the -n 0.0.0.0
option allows the server port to be exposed.
NOTE: Docker Compose or Podman Compose must be installed in your environment.
There are two docker-compose
files that make the startup easier:
docker-compose.yaml
- Uses pre-built images from registrydocker-compose-local.yaml
- Builds model registry from source
Both files support MySQL and PostgreSQL databases using profiles.
The easiest way to run the services is using the provided Makefile targets:
# Start with MySQL (using pre-built images)
make compose/up
# Start with PostgreSQL (using pre-built images)
make compose/up/postgres
# Start with MySQL (builds from source)
make compose/local/up
# Start with PostgreSQL (builds from source)
make compose/local/up/postgres
# Stop services
make compose/down # or compose/local/down
# Clean up all volumes and networks
make compose/clean
Alternatively, you can run the compose files directly:
# Using pre-built images with MySQL
docker-compose --profile mysql up
# Using pre-built images with PostgreSQL
DB_TYPE=postgres docker-compose --profile postgres up
# Building from source with PostgreSQL
DB_TYPE=postgres docker-compose -f docker-compose-local.yaml --profile postgres up
The Makefile automatically detects whether to use docker-compose
, podman-compose
, or docker compose
based on what's available on your system.
The following diagram illustrates testing strategy for the several components in Model Registry project:
Go layers components are tested with Unit Tests written in Go, as well as Integration Tests leveraging Testcontainers. This allows to verify the expected "Core layer" of logical data mapping developed and implemented in Go, matches technical expectations.
Python client is also tested with Unit Tests and Integration Tests written in Python.
End-to-end testing is developed with KinD and Pytest; this higher-lever layer of testing is used to demonstrate User Stories from high level perspective.
- Model Catalog Service - Federated model discovery across external catalogs
- Controller - Kubernetes controller for model registry CRDs
- CSI Driver - Container Storage Interface for model artifacts
- UI Backend for Frontend (BFF) - Go-based BFF service for the React UI
- UI Frontend - React-based frontend application
- Async Upload Job - Background job for handling asynchronous model uploads
- Development Environment - Local development setup and tools
- Kubernetes Manifests - Kustomize-based Kubernetes deployment manifests
MR utilizes a common ARCHIVED
status for all types.
To delete something, simply update its status.
Occasionally you may encounter an 'ImagePullBackOff' error when deploying the Model Registry manifests. See example below for the model-registry-db
container.
Failed to pull image “mysql:8.3.0”: rpc error: code = Unknown desc = fetching target platform image selected from image index: reading manifest sha256:f9097d95a4ba5451fff79f4110ea6d750ac17ca08840f1190a73320b84ca4c62 in docker.io/library/mysql: toomanyrequests: You have reached your pull rate limit. You may increase the limit by authenticating and upgrading: https://www.docker.com/increase-rate-limit
This error is triggered by the rate limits from docker.io; in this example specifically about the image mysql:8.3.0
(the expanded reference is docker.io/library/mysql:8.3.0
). To mitigate this error you could authenticate using image pull secrets for local development; or replace the image used with alternative mirrored images, for instance with the following example:
manifests/kustomize/overlays/db/model-registry-db-deployment.yaml file.
spec.template.spec.containers.image: public.ecr.aws/docker/library/mysql:8.3.0