The adoption of Ray for scalable AI and ML workloads has skyrocketed. The Ray framework is powerful, but as the official documentation emphasizes, developers or platform providers are responsible for their own security.

With Red Hat OpenShift AI, we are committed to providing a production-ready environment for complex AI workloads, and we recognize that robust security is important. That's why we're enhancing the existing controlled network environment (CNE) for Ray Clusters in OpenShift AI 3.0 and delivering that natively with KubeRay. CNE is an opinionated, platform-enforced policy that streamlines Ray's recommended security best practices to protect your clusters by default.

The 3 pillars of the controlled network environment

Three images illustrating controlled network best practices: isolation, authentication, and access

Figure 1: Different aspects of secure system design, focusing on network isolation, authenticated data flow, and controlled user access.

The controlled network environment is built on 3 essential, platform-enforced, security features automatically applied to every Ray Cluster you create in OpenShift AI 3.0.

1. Network isolation

We have streamlined the mechanism for network isolation by automatically applying Kubernetes-native network policies via the KubeRay Operator. This configuration strictly limits network traffic to within the Ray Cluster itself, effectively blocking access from other pods in the network and creating a secure perimeter around your workload.

2. Authenticated backend (mTLS)

Security in OpenShift AI now includes an enforced authenticated backend using mTLS (mutual transport layer security). This critical feature authenticates and encrypts all internal communication within the Ray Cluster. The re-architecture of this feature uses cert-manager to automatically manage the necessary certificates and secrets, simplifying deployment. For users of the codeflare-sdk client, your existing workflows remain unchanged.

3. Controlled access

OpenShift AI 3.0 also improves the user experience and security for accessing the Ray dashboard. The controlled access feature now integrates with the platform's broader authentication redesign using the Gateway API.

The platform now uses the existing OpenShift AI session for authentication, delivering a consistent and uniform user experience (UX) without requiring repeated login actions.

Simplifying and strengthening the platform

In addition to the security benefits, these changes have also led to platform improvements.

  • Simplified design: The main driver of these changes was to simplify the overall architecture. Moving core security logic—like network isolation and mTLS configuration—directly into the KubeRay Reconciler helped reduce complexity, paving the way for faster updates and feature delivery in the future.
  • Improved UX: The new controlled access uses a broader platform authentication redesign, providing smoother, more secure UX.
  • Platform enforcement policy: The entire CNE configuration automatically applies the necessary configuration to any Ray Cluster created within an OpenShift AI environment. This approach strengthens cluster security by default.

Contributing upstream

The re-architecture wasn't just about simplification, it also helped lay the groundwork for future collaboration. We are already beginning the process of contributing these changes to the upstream KubeRay community.

Next steps

Red Hat OpenShift AI 3.0 delivers a production-ready Ray experience by making robust security the default. Get started with your Ray workloads today.

Want to learn more about Ray and Kueue integration (currently in Technical Preview) on OpenShift AI 3? See technical deep dive: Tame Ray workloads on OpenShift AI with KubeRay and Kueue.


À propos des auteurs

UI_Icon-Red_Hat-Close-A-Black-RGB

Parcourir par canal

automation icon

Automatisation

Les dernières nouveautés en matière d'automatisation informatique pour les technologies, les équipes et les environnements

AI icon

Intelligence artificielle

Actualité sur les plateformes qui permettent aux clients d'exécuter des charges de travail d'IA sur tout type d'environnement

open hybrid cloud icon

Cloud hybride ouvert

Découvrez comment créer un avenir flexible grâce au cloud hybride

security icon

Sécurité

Les dernières actualités sur la façon dont nous réduisons les risques dans tous les environnements et technologies

edge icon

Edge computing

Actualité sur les plateformes qui simplifient les opérations en périphérie

Infrastructure icon

Infrastructure

Les dernières nouveautés sur la plateforme Linux d'entreprise leader au monde

application development icon

Applications

À l’intérieur de nos solutions aux défis d’application les plus difficiles

Virtualization icon

Virtualisation

L'avenir de la virtualisation d'entreprise pour vos charges de travail sur site ou sur le cloud