Validated patterns explained

Learn the basics of validated patterns, a type of flexible code architecture that allows you to go from concept to production using the same stack configuration.

This learning path is for operations teams or system administrators

Developers may want to check out the Developer Sandbox to get started with validated patterns. 

Get started on developers.redhat.com

What is a validated pattern?

5 mins

In this resource, we will learn about what validated patterns are, why they’re valuable, how they work, and what kinds of patterns are available to Red Hat® customers. 

What do you need before starting?

  • Nothing—you can start here

What is a validated pattern?

Red Hat’s validated patterns are codified use cases based on real-world customer and partner example deployments. They are focused on solving a business problem and tested as a complete use case deployment.

Validated patterns are maintained across three different tiers:

  • Sandbox tier: These patterns are operational models that are developed and tested in the upstream community using GitOps principles. They are maintained by their creators, or are still in process of being developed. As they are not included in an automated continuous integration (CI), their code should be used with discretion, but might be helpful in developing your own pattern.
  • Tested tier: These validated patterns are tested on at least a quarterly basis. There are additional artifacts developed like demo videos, documentation and presentations. Testing is done on major cloud providers and is on the last two extended life Red Hat OpenShift versions at a minimum.
  • Maintained tier: These patterns are deemed essential to multiple customers, so they are tested further for wider use. They must be deployed at a customer site, are maintained over time and have their own lifecycle, include a demo of the use case that uses the API connections between products, are designed as modular, and are tested on the three major clouds supported in the validated patterns initiative (AWS, Google Cloud, and Microsoft Azure), as well as bare metal testing. From there, the pattern is included in Red Hat’s CI, and testing is done on both currently available versions as well as pre-general availability bits.

Why use validated patterns?

Unlike a reference architecture, validated patterns are based on actual customer deployments and are actively maintained over time. They are also validated not only through continuous integration (CI), but via the support of product teams and solutions architects. By using GitOps to deliver configuration as code, validated patterns leverage upstream repositories for open collaboration. 

In other words, validated patterns are reliable and less risky because they are maintained and deployed in the real world. They provide a quick proof of concept (PoC) for deploying complex workloads and can be quickly implemented into your streamlined GitOps framework. They have many opportunities for customization and innovation, and also include a demo to show an example workload use case.

How do validated patterns work?

At a high level, a validated pattern uses Helm charts to create templates of the code architecture for a given use case. This template is a well-defined workflow that contains values and secrets files that manage overrides, making the deployment specific to your use case. Sub-patterns are then applied to multiple layers of the architecture, helping to deploy the components reliably and according to best practices.

Deploying the pattern will follow these general steps:

  1. Find a pattern for a use case that fits your needs and fork the pattern repository.
  2. Change secrets and/or values files in the local clone to specify overrides for your use case.
  3. Deploy the pattern workflow, which will first deploy Red Hat OpenShift® GitOps. OpenShift GitOps will deploy the application(s) and make sure all the components of the pattern are working correctly, including operators and application code.
  4. Most patterns will also have a Red Hat Advanced Cluster Management operator deployed so that multi-cluster deployments can be managed.
The validated pattern workflow begins with the pattern’s git repository which is then cloned and updated via changes to values files. The pattern operator then deploys all of the needed operators for the workload using OpenShift GitOps.
The validated pattern workflow begins with the pattern’s git repository which is then cloned and updated via changes to values files. The pattern operator then deploys all of the needed operators for the workload using OpenShift GitOps.

Where can I find out more?

If you’re still wanting to learn more about validated patterns, here are a few additional resources:

Get more support

*Red Hat supports subscribed Red Hat products used in validated patterns. The codified patterns are distributed as community projects and no additional support beyond subscribed Red Hat products is implied.

Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2026 Red Hat
맨 위로 이동