Validated patterns explained

Learn the basics of validated patterns, a type of flexible code architecture that allows you to go from concept to production using the same stack configuration.

This learning path is for operations teams or system administrators

Developers may want to check out the Developer Sandbox to get started with validated patterns. 

Get started on developers.redhat.com

Examples of validated patterns

5 mins

Explore several example validated patterns that you can deploy for your specific use case.

This learning path deploys the Multicloud GitOps validated pattern, but there are a variety of use cases available to suit your needs. All of the validated patterns follow the same basic deployment process found in the previous resource.

What will you learn?

  • Information about the RAG LLM, Zero Trust, Hypershift, and OpenShift AI validated patterns

What do you need before starting?

  • None

Example validated patterns

There are a variety of validated patterns available to deploy and use for your own use cases. 

AI generation with RAG and LLM

This pattern showcases a chatbot LLM application augmented with data from Red Hat product documentation running on Red Hat OpenShift. It deploys an LLM application that connects to multiple LLM providers such as OpenAI, Hugging Face, and NVIDIA NIM. The application generates a project proposal for a Red Hat product. It can be deployed with multiple variants and partners, as seen in the interactive experience below, where the pattern is deployed on Microsoft Azure Red Hat OpenShift. 

This is a tested tier pattern. Learn more about it here.

Layered zero trust

Zero trust is an approach to security architecture based on the idea that every interaction starts in an untrusted state. The Layered Zero Trust pattern shows how to implement zero trust in a Red Hat OpenShift Container Platform environment. The pattern identifies specific transactions between an actor and a resource. For these transactions, you can determine the context and enforce policies.

The pattern addresses the shortcomings of traditional cybersecurity methods, such as defensive hardening and reactive detection. It is particularly effective for the following types of systems and environments:

  • Distributed systems, such as cloud and edge environments.
  • Autonomous and artificial intelligence (AI) or machine learning (ML) based systems, including robotic process automation.
  • Large, composite systems that integrate third-party or legacy components.

This is a sandbox tier pattern. Learn about it here.

HyperShift (hosted control planes)

This pattern simplifies the deployment of a hosted control plane (HCP) or hosted control plane cluster. You can use this pattern to create HCP clusters.

This is a sandbox tier pattern. Learn more about it here.

Red Hat OpenShift AI

OpenShift AI is a platform for managing the lifecycle of predictive and generative AI (gen AI) models, at scale, across hybrid cloud environments. This pattern is deployed using OpenShift GitOps and is comprised of OpenShift AI and OpenShift Pipelines. This pattern deploys the minimum capabilities necessary for consumers to quickly start implementing their MLOps or AI workloads in an automated way. It is effective for the following use cases:

  • Use a GitOps approach to manage hybrid and multi-cloud deployments across both public and private clouds
  • Enable cross-cluster governance and application lifecycle management
  • Securely manage secrets across the deployment

This is a sandbox tier pattern. Learn more about it here.

Get more support

*Red Hat supports subscribed Red Hat products used in validated patterns. The codified patterns are distributed as community projects and no additional support beyond subscribed Red Hat products is implied.

Red Hat logoGithubredditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。 了解我们当前的更新.

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

Theme

© 2026 Red Hat
返回顶部