Skip to main content

Documentation Index

Fetch the complete documentation index at: https://arize-ax.mintlify.dev/docs/llms.txt

Use this file to discover all available pages before exploring further.

The previous steps explain how to install Arize AX and access the UI with a local port-forward. To expose Arize AX to the broader organization, create a secure HTTPS endpoint.
HostPrefixServiceTarget Port
arize-app.<my-organization-domain>/internalendpoints-app443
Pick the tab that matches your environment. For NGINX, Istio, Kong, and Traefik manifests, see Other controllers.
First review the Terraform documentation in ./terraform/README.md as it includes parameters required to create static IP addresses. Re-apply Terraform if you change those resources. Static IP addresses are preferred as they allow a future rebuild of the cluster without impacting DNS entries.Make a copy of the example file.
$ cp ./examples/endpoints/gcp/app-services.yaml my-app-services.yaml
Review the following annotation to confirm it aligns with the desired static IP. If you use the Terraform modules from the distribution, these names already align with the values in Terraform outputs.
annotations:
  kubernetes.io/ingress.global-static-ip-name: arize-app-services
Replace the placeholder hostname/domain name with the domain available in your organization. This domain name must be added to your DNS server and map to the static IP addresses mentioned above.
'{{CUSTOMER_APP_DOMAIN}}' --> 'arize-app.<my-organization-domain>'
If configured correctly, the DNS server will resolve the domain to the correct IP address. Use nslookup to verify.
$ nslookup arize-app.<my-organization-domain>
Apply the manifest.
$ kubectl -n arize apply -f my-app-services.yaml
Wait for a few minutes and verify the state of the ingress.
$ kubectl -n arize describe ingress arize-app-services
The ingressMode parameter may need to be set correctly in values.yaml to work with certain ingress controllers or if a user desires to port-forward to the service for testing. Further details are in the Ingress Controllers table below.From a web browser enter https://arize-app.<my-organization-domain> to verify access. GCP may initially return an SSL error until the HTTPS certificate has been validated; if so, check back 30 minutes later. Add these parameters to values.yaml and apply the changes.
appBaseUrl: "https://arize-app.<my-organization-domain>"
expBaseUrl: "arize-app.<my-organization-domain>"

Ingress Controllers

For gRPC protocols like OTLP and flightserver, the ingressMode parameter may need to be set correctly in values.yaml to work with certain ingress controllers or if a user desires to port-forward to the service for testing. Recommended settings:
Controller / Load BalanceringressModeinternalEndpointsAppTlsCert / internalEndpointsAppTlsKey
GCPtls (default)N/A
AWS ALBtls (default)N/A
Azure NLBtls (default)Custom certificate
Nginxtls (default)N/A
Kongtls (default)N/A
TraefiknotlsN/A
IstioistioN/A
OpenShift — EdgeopenshiftN/A
OpenShift — Pass-throughtlsCustom certificate
Local port-forwardnotlsN/A
TLS Termination at Arize AX Pods (NLB)tlsCustom certificate
More details on working with an OpenShift ingress controller are in the OpenShift tab above.