forked from opea-project/GenAIComps
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Refine Guardrails README and update model (opea-project#393)
* Refine Guardrails README and update model Signed-off-by: lvliang-intel <[email protected]> * [pre-commit.ci] auto fixes from pre-commit.com hooks for more information, see https://pre-commit.ci * upate model Signed-off-by: lvliang-intel <[email protected]> * revert back to guard-2 model Signed-off-by: lvliang-intel <[email protected]> * update readme Signed-off-by: lvliang-intel <[email protected]> * fix ci issue Signed-off-by: lvliang-intel <[email protected]> --------- Signed-off-by: lvliang-intel <[email protected]> Co-authored-by: pre-commit-ci[bot] <66853113+pre-commit-ci[bot]@users.noreply.github.com>
- Loading branch information
1 parent
c1887ed
commit 7749ce3
Showing
9 changed files
with
138 additions
and
130 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,122 +1,10 @@ | ||
# Guardrails Microservice | ||
# Trust and Safety with LLM | ||
|
||
To fortify AI initiatives in production, this microservice introduces guardrails designed to encapsulate LLMs, ensuring the enforcement of responsible behavior. With this microservice, you can secure model inputs and outputs, hastening your journey to production and democratizing AI within your organization, building Trustworthy, Safe, and Secure LLM-based Applications. | ||
The Guardrails service enhances the security of LLM-based applications by offering a suite of microservices designed to ensure trustworthiness, safety, and security. | ||
|
||
These guardrails actively prevent the model from interacting with unsafe content, promptly signaling its inability to assist with such requests. With these protective measures in place, you can expedite production timelines and alleviate concerns about unpredictable model responses. | ||
| MicroService | Description | | ||
| ------------------------------------------ | ------------------------------------------------------------------------------------------ | | ||
| [Llama Guard](./llama_guard/README.md) | Provides guardrails for inputs and outputs to ensure safe interactions | | ||
| [PII Detection](./pii_detection/README.md) | Detects Personally Identifiable Information (PII) and Business Sensitive Information (BSI) | | ||
|
||
The Guardrails Microservice now offers two primary types of guardrails: | ||
|
||
- Input Guardrails: These are applied to user inputs. An input guardrail can either reject the input, halting further processing. | ||
- Output Guardrails: These are applied to outputs generated by the LLM. An output guardrail can reject the output, preventing it from being returned to the user. | ||
|
||
We offer content moderation support utilizing Meta's [Llama Guard](https://huggingface.co/meta-llama/LlamaGuard-7b) model. | ||
|
||
Any content that is detected in the following categories is determined as unsafe: | ||
|
||
- Violence and Hate | ||
- Sexual Content | ||
- Criminal Planning | ||
- Guns and Illegal Weapons | ||
- Regulated or Controlled Substances | ||
- Suicide & Self Harm | ||
|
||
# 🚀1. Start Microservice with Python (Option 1) | ||
|
||
To start the Guardrails microservice, you need to install python packages first. | ||
|
||
## 1.1 Install Requirements | ||
|
||
```bash | ||
pip install -r requirements.txt | ||
``` | ||
|
||
## 1.2 Start TGI Gaudi Service | ||
|
||
```bash | ||
export HF_TOKEN=${your_hf_api_token} | ||
export LANGCHAIN_TRACING_V2=true | ||
export LANGCHAIN_API_KEY=${your_langchain_api_key} | ||
export LANGCHAIN_PROJECT="opea/gaurdrails" | ||
volume=$PWD/data | ||
model_id="meta-llama/Meta-Llama-Guard-2-8B" | ||
docker pull ghcr.io/huggingface/tgi-gaudi:2.0.1 | ||
docker run -p 8088:80 -v $volume:/data --runtime=habana -e HABANA_VISIBLE_DEVICES=all -e OMPI_MCA_btl_vader_single_copy_mechanism=none --cap-add=sys_nice --ipc=host -e HTTPS_PROXY=$https_proxy -e HTTP_PROXY=$https_proxy -e HF_TOKEN=$HF_TOKEN ghcr.io/huggingface/tgi-gaudi:2.0.1 --model-id $model_id --max-input-length 1024 --max-total-tokens 2048 | ||
``` | ||
|
||
## 1.3 Verify the TGI Gaudi Service | ||
|
||
```bash | ||
curl 127.0.0.1:8088/generate \ | ||
-X POST \ | ||
-d '{"inputs":"How do you buy a tiger in the US?","parameters":{"max_new_tokens":32}}' \ | ||
-H 'Content-Type: application/json' | ||
``` | ||
|
||
## 1.4 Start Guardrails Service | ||
|
||
Optional: If you have deployed a Guardrails model with TGI Gaudi Service other than default model (i.e., `meta-llama/LlamaGuard-7b`) [from section 1.2](## 1.2 Start TGI Gaudi Service), you will need to add the eviornment variable `SAFETY_GUARD_MODEL_ID` containing the model id. For example, the following informs the Guardrails Service the deployed model used LlamaGuard2: | ||
|
||
```bash | ||
export SAFETY_GUARD_MODEL_ID="meta-llama/Meta-Llama-Guard-2-8B" | ||
``` | ||
|
||
```bash | ||
export SAFETY_GUARD_ENDPOINT="http://${your_ip}:8088" | ||
python langchain/guardrails_tgi_gaudi.py | ||
``` | ||
|
||
# 🚀2. Start Microservice with Docker (Option 2) | ||
|
||
If you start an Guardrails microservice with docker, the `docker_compose_guardrails.yaml` file will automatically start a TGI gaudi service with docker. | ||
|
||
## 2.1 Setup Environment Variables | ||
|
||
In order to start TGI and LLM services, you need to setup the following environment variables first. | ||
|
||
```bash | ||
export HUGGINGFACEHUB_API_TOKEN=${your_hf_api_token} | ||
export SAFETY_GUARD_ENDPOINT="http://${your_ip}:8088" | ||
export LLM_MODEL_ID=${your_hf_llm_model} | ||
export LANGCHAIN_TRACING_V2=true | ||
export LANGCHAIN_API_KEY=${your_langchain_api_key} | ||
export LANGCHAIN_PROJECT="opea/gen-ai-comps:gaurdrails" | ||
``` | ||
|
||
## 2.2 Build Docker Image | ||
|
||
```bash | ||
cd ../../ | ||
docker build -t opea/guardrails-tgi:latest --build-arg https_proxy=$https_proxy --build-arg http_proxy=$http_proxy -f comps/guardrails/langchain/docker/Dockerfile . | ||
``` | ||
|
||
## 2.3 Run Docker with CLI | ||
|
||
```bash | ||
docker run -d --name="guardrails-tgi-server" -p 9090:9090 --ipc=host -e http_proxy=$http_proxy -e https_proxy=$https_proxy -e no_proxy=$no_proxy -e SAFETY_GUARD_ENDPOINT=$SAFETY_GUARD_ENDPOINT -e HUGGINGFACEHUB_API_TOKEN=$HUGGINGFACEHUB_API_TOKEN opea/guardrails-tgi:latest | ||
``` | ||
|
||
## 2.4 Run Docker with Docker Compose | ||
|
||
```bash | ||
cd langchain/docker | ||
docker compose -f docker_compose_guardrails.yaml up -d | ||
``` | ||
|
||
# 🚀3. Consume Guardrails Service | ||
|
||
## 3.1 Check Service Status | ||
|
||
```bash | ||
curl http://localhost:9090/v1/health_check\ | ||
-X GET \ | ||
-H 'Content-Type: application/json' | ||
``` | ||
|
||
## 3.2 Consume Guardrails Service | ||
|
||
```bash | ||
curl http://localhost:9090/v1/guardrails\ | ||
-X POST \ | ||
-d '{"text":"How do you buy a tiger in the US?","parameters":{"max_new_tokens":32}}' \ | ||
-H 'Content-Type: application/json' | ||
``` | ||
Additional safety-related microservices will be available soon. |
Empty file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,119 @@ | ||
# Guardrails Microservice | ||
|
||
To fortify AI initiatives in production, this microservice introduces guardrails designed to encapsulate LLMs, ensuring the enforcement of responsible behavior. With this microservice, you can secure model inputs and outputs, hastening your journey to production and democratizing AI within your organization, building Trustworthy, Safe, and Secure LLM-based Applications. | ||
|
||
These guardrails actively prevent the model from interacting with unsafe content, promptly signaling its inability to assist with such requests. With these protective measures in place, you can expedite production timelines and alleviate concerns about unpredictable model responses. | ||
|
||
The Guardrails Microservice now offers two primary types of guardrails: | ||
|
||
- Input Guardrails: These are applied to user inputs. An input guardrail can either reject the input, halting further processing. | ||
- Output Guardrails: These are applied to outputs generated by the LLM. An output guardrail can reject the output, preventing it from being returned to the user. | ||
|
||
We offer content moderation support utilizing Meta's [Llama Guard](https://huggingface.co/meta-llama/Meta-Llama-Guard-2-8B) model. | ||
|
||
Any content that is detected in the following categories is determined as unsafe: | ||
|
||
- Violence and Hate | ||
- Sexual Content | ||
- Criminal Planning | ||
- Guns and Illegal Weapons | ||
- Regulated or Controlled Substances | ||
- Suicide & Self Harm | ||
|
||
# 🚀1. Start Microservice with Python (Option 1) | ||
|
||
To start the Guardrails microservice, you need to install python packages first. | ||
|
||
## 1.1 Install Requirements | ||
|
||
```bash | ||
pip install -r requirements.txt | ||
``` | ||
|
||
## 1.2 Start TGI Gaudi Service | ||
|
||
```bash | ||
export HF_TOKEN=${your_hf_api_token} | ||
export LANGCHAIN_TRACING_V2=true | ||
export LANGCHAIN_API_KEY=${your_langchain_api_key} | ||
export LANGCHAIN_PROJECT="opea/gaurdrails" | ||
volume=$PWD/data | ||
model_id="meta-llama/Meta-Llama-Guard-2-8B" | ||
docker pull ghcr.io/huggingface/tgi-gaudi:2.0.1 | ||
docker run -p 8088:80 -v $volume:/data --runtime=habana -e HABANA_VISIBLE_DEVICES=all -e OMPI_MCA_btl_vader_single_copy_mechanism=none --cap-add=sys_nice --ipc=host -e HTTPS_PROXY=$https_proxy -e HTTP_PROXY=$https_proxy -e HF_TOKEN=$HF_TOKEN ghcr.io/huggingface/tgi-gaudi:2.0.1 --model-id $model_id --max-input-length 1024 --max-total-tokens 2048 | ||
``` | ||
|
||
## 1.3 Verify the TGI Gaudi Service | ||
|
||
```bash | ||
curl 127.0.0.1:8088/generate \ | ||
-X POST \ | ||
-d '{"inputs":"How do you buy a tiger in the US?","parameters":{"max_new_tokens":32}}' \ | ||
-H 'Content-Type: application/json' | ||
``` | ||
|
||
## 1.4 Start Guardrails Service | ||
|
||
Optional: If you have deployed a Guardrails model with TGI Gaudi Service other than default model (i.e., `meta-llama/Meta-Llama-Guard-2-8B`) [from section 1.2](## 1.2 Start TGI Gaudi Service), you will need to add the eviornment variable `SAFETY_GUARD_MODEL_ID` containing the model id. For example, the following informs the Guardrails Service the deployed model used LlamaGuard2: | ||
|
||
```bash | ||
export SAFETY_GUARD_MODEL_ID="meta-llama/Meta-Llama-Guard-2-8B" | ||
``` | ||
|
||
```bash | ||
export SAFETY_GUARD_ENDPOINT="http://${your_ip}:8088" | ||
python langchain/guardrails_tgi.py | ||
``` | ||
|
||
# 🚀2. Start Microservice with Docker (Option 2) | ||
|
||
If you start an Guardrails microservice with docker, the `docker_compose_guardrails.yaml` file will automatically start a TGI gaudi service with docker. | ||
|
||
## 2.1 Setup Environment Variables | ||
|
||
In order to start TGI and LLM services, you need to setup the following environment variables first. | ||
|
||
```bash | ||
export HUGGINGFACEHUB_API_TOKEN=${your_hf_api_token} | ||
export SAFETY_GUARD_ENDPOINT="http://${your_ip}:8088" | ||
export LLM_MODEL_ID=${your_hf_llm_model} | ||
``` | ||
|
||
## 2.2 Build Docker Image | ||
|
||
```bash | ||
cd ../../ | ||
docker build -t opea/guardrails-tgi:latest --build-arg https_proxy=$https_proxy --build-arg http_proxy=$http_proxy -f comps/guardrails/llama_guard/docker/Dockerfile . | ||
``` | ||
|
||
## 2.3 Run Docker with CLI | ||
|
||
```bash | ||
docker run -d --name="guardrails-tgi-server" -p 9090:9090 --ipc=host -e http_proxy=$http_proxy -e https_proxy=$https_proxy -e no_proxy=$no_proxy -e SAFETY_GUARD_ENDPOINT=$SAFETY_GUARD_ENDPOINT -e HUGGINGFACEHUB_API_TOKEN=$HUGGINGFACEHUB_API_TOKEN opea/guardrails-tgi:latest | ||
``` | ||
|
||
## 2.4 Run Docker with Docker Compose | ||
|
||
```bash | ||
cd langchain/docker | ||
docker compose -f docker_compose_guardrails.yaml up -d | ||
``` | ||
|
||
# 🚀3. Consume Guardrails Service | ||
|
||
## 3.1 Check Service Status | ||
|
||
```bash | ||
curl http://localhost:9090/v1/health_check\ | ||
-X GET \ | ||
-H 'Content-Type: application/json' | ||
``` | ||
|
||
## 3.2 Consume Guardrails Service | ||
|
||
```bash | ||
curl http://localhost:9090/v1/guardrails\ | ||
-X POST \ | ||
-d '{"text":"How do you buy a tiger in the US?","parameters":{"max_new_tokens":32}}' \ | ||
-H 'Content-Type: application/json' | ||
``` |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters