On-Premise SDK Usage
Starting with Arize AX Self-Hosted release 10.4.0, a single unified endpoint was introduced to simplify ingress configuration. Support for multiple endpoints remains available as an option.
Single Endpoint
With single endpoints, all services are available through a common host address and port:
arize-app.<domain>
Arize AX UI
SDK panda uploads and logs
OTEL traces with GRPC
OTEL traces with HTTP
Flightserver import/export, datasets.
Example with Arize SDK
arize_client = Client(
space_id=SPACE_ID,
api_key=API_KEY,
uri="https://arize-app.<domain>/v1"
)Example with Arize SDK with Evaluations
arize_client = Client(
space_id=SPACE_ID,
api_key=API_KEY,
uri="https://arize-app.<domain>/v1",
host="arize-app.<domain>"
...
)Example with OTEL traces and GRPC
# gRPC
from arize.otel import register, Transport
tracer_provider = register(
space_id = SPACE_ID,
api_key=API_KEY,
endpoint = "https://arize-app.<domain>/v1",
# transport = Transport.GRPC, # default
...
)Example with OTEL traces and HTTP
from arize.otel import register, Transport
tracer_provider = register(
space_id = SPACE_ID,
api_key=API_KEY,
endpoint = "https://arize-app.<domain>/v1/traces",
transport = Transport.HTTP,
...
)Example with FlightServer Export Client
client = ArizeExportClient(
api_key=API_KEY,
host="arize-app.<domain>",
...
)Example with FlightServer Datasets Client
client = ArizeDatasetsClient(
api_key=API_KEY,
host='arize-app.<domain>',
otlp_endpoint="https://arize-app.<domain>/v1",
...
)Multiple Endpoints
If your deployment is configured with multiple endpoints, it requires different ingress configurations and host addresses:
arize-app.<domain>
Arize AX UI
Auth
Copilot
arize-api.<domain>
SDK panda uploads and logs
arize-otlp.<domain>
OTEL traces (GRPC/HTTP)
arize-flight.<domain>
Flightserver import/export, datasets.
Example with Arize SDK
arize_client = Client(
space_id=SPACE_ID,
api_key=API_KEY,
uri="https://arize-api.<domain>/v1"
)Example with Arize SDK with Evaluations
arize_client = Client(
space_id=SPACE_ID,
api_key=API_KEY,
uri="https://arize-api.<domain>/v1",
host="arize-flight.<domain>"
...
)Example with OTEL traces and GRPC
from arize.otel import register, Transport
tracer_provider = register(
space_id=SPACE_ID,
api_key=API_KEY,
endpoint = "https://arize-otlp.<domain>/v1",
# transport = Transport.GRPC, # default
...
)Example with OTEL traces and HTTP
from arize.otel import register, Transport
tracer_provider = register(
space_id=SPACE_ID,
api_key=API_KEY,
endpoint = "https://arize-otlp.<domain>/v1/traces",
transport = Transport.HTTP,
...
)Example with FlightServer Export Client
client = ArizeExportClient(
api_key=API_KEY,
host='arize-flight.<domain>',
...
)Example with FlightServer Datasets Client
client = ArizeDatasetsClient(
api_key=API_KEY,
host='arize-flight.<domain>',
otlp_endpoint="https://arize-otlp.<domain>/v1",
...
)Using an Enterprise-Issued Certificate
If your deployment uses a certificate signed by your own enterprise private CA or a self-signed certificate, follow the relevant instructions below for your deployment type and use case.
Obtaining the Root CA Certificate
First, obtain the root CA certificate that was used to sign your endpoint's certificate. This root certificate is typically managed by the security team and is common across environments.
Extracting the Certificate(If Root CA Certificate is not available)
If providing the root certificate doesn't resolve the issue or is not an option, an alternative approach is to extract the certificate directly from the endpoint and create the cert.pem file.
echo | openssl s_client -showcerts -state -connect <host>:443 -prexit > cert.pemArize SDK
Temporarily disable certificate validation (not recommended for production):
arize_client = Client(space_id=SPACE_ID, api_key=API_KEY, uri=URI, request_verify=False)Provide the root certificate file:
arize_client = Client(space_id=SPACE_ID, api_key=API_KEY, uri=URI, request_verify="cert.pem")Or
# if root cert has already been added to your system CA bundle import certifi arize_client = Client(space_id=SPACE_ID, api_key=API_KEY, uri=URI, request_verify=certifi.where())
OTEL Traces (GRPC/HTTP)
Set the
OTEL_EXPORTER_OTLP_CERTIFICATEenvironment variable to your root certificate:os.environ["OTEL_EXPORTER_OTLP_CERTIFICATE"] = "cert.pem"Or
# if root cert has already been added to your system CA bundle import certifi os.environ['OTEL_EXPORTER_OTLP_CERTIFICATE'] = certifi.where()
FlightServer Export/Datasets Client
Set the
GRPC_DEFAULT_SSL_ROOTS_FILE_PATHenvironment variable to your root certificate:os.environ['GRPC_DEFAULT_SSL_ROOTS_FILE_PATH'] = "cert.pem"Or
# if root cert has already been added to your system CA bundle import certifi os.environ['GRPC_DEFAULT_SSL_ROOTS_FILE_PATH'] = certifi.where()
Last updated
Was this helpful?

