Validated patterns explained

Learn the basics of validated patterns, a type of flexible code architecture that allows you to go from concept to production using the same stack configuration.

This learning path is for operations teams or system administrators

Developers may want to check out the Developer Sandbox to get started with validated patterns. 

Get started on developers.redhat.com

Examples of validated patterns

5 mins

Explore several example validated patterns that you can deploy for your specific use case.

This learning path deploys the Multicloud GitOps validated pattern, but there are a variety of use cases available to suit your needs. All of the validated patterns follow the same basic deployment process found in the previous resource.

What will you learn?

  • Information about the RAG LLM, Zero Trust, Hypershift, and OpenShift AI validated patterns

What do you need before starting?

  • None

Example validated patterns

There are a variety of validated patterns available to deploy and use for your own use cases. 

AI generation with RAG and LLM

This pattern showcases a chatbot LLM application augmented with data from Red Hat product documentation running on Red Hat OpenShift. It deploys an LLM application that connects to multiple LLM providers such as OpenAI, Hugging Face, and NVIDIA NIM. The application generates a project proposal for a Red Hat product. It can be deployed with multiple variants and partners, as seen in the interactive experience below, where the pattern is deployed on Microsoft Azure Red Hat OpenShift. 

This is a tested tier pattern. Learn more about it here.

Layered zero trust

Zero trust is an approach to security architecture based on the idea that every interaction starts in an untrusted state. The Layered Zero Trust pattern shows how to implement zero trust in a Red Hat OpenShift Container Platform environment. The pattern identifies specific transactions between an actor and a resource. For these transactions, you can determine the context and enforce policies.

The pattern addresses the shortcomings of traditional cybersecurity methods, such as defensive hardening and reactive detection. It is particularly effective for the following types of systems and environments:

  • Distributed systems, such as cloud and edge environments.
  • Autonomous and artificial intelligence (AI) or machine learning (ML) based systems, including robotic process automation.
  • Large, composite systems that integrate third-party or legacy components.

This is a sandbox tier pattern. Learn about it here.

HyperShift (hosted control planes)

This pattern simplifies the deployment of a hosted control plane (HCP) or hosted control plane cluster. You can use this pattern to create HCP clusters.

This is a sandbox tier pattern. Learn more about it here.

Red Hat OpenShift AI

OpenShift AI is a platform for managing the lifecycle of predictive and generative AI (gen AI) models, at scale, across hybrid cloud environments. This pattern is deployed using OpenShift GitOps and is comprised of OpenShift AI and OpenShift Pipelines. This pattern deploys the minimum capabilities necessary for consumers to quickly start implementing their MLOps or AI workloads in an automated way. It is effective for the following use cases:

  • Use a GitOps approach to manage hybrid and multi-cloud deployments across both public and private clouds
  • Enable cross-cluster governance and application lifecycle management
  • Securely manage secrets across the deployment

This is a sandbox tier pattern. Learn more about it here.

Get more support

*Red Hat supports subscribed Red Hat products used in validated patterns. The codified patterns are distributed as community projects and no additional support beyond subscribed Red Hat products is implied.

Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2026 Red Hat
맨 위로 이동