The adoption of Ray for scalable AI and ML workloads has skyrocketed. The Ray framework is powerful, but as the official documentation emphasizes, developers or platform providers are responsible for their own security.

With Red Hat OpenShift AI, we are committed to providing a production-ready environment for complex AI workloads, and we recognize that robust security is important. That's why we're enhancing the existing controlled network environment (CNE) for Ray Clusters in OpenShift AI 3.0 and delivering that natively with KubeRay. CNE is an opinionated, platform-enforced policy that streamlines Ray's recommended security best practices to protect your clusters by default.

The 3 pillars of the controlled network environment

Three images illustrating controlled network best practices: isolation, authentication, and access

Figure 1: Different aspects of secure system design, focusing on network isolation, authenticated data flow, and controlled user access.

The controlled network environment is built on 3 essential, platform-enforced, security features automatically applied to every Ray Cluster you create in OpenShift AI 3.0.

1. Network isolation

We have streamlined the mechanism for network isolation by automatically applying Kubernetes-native network policies via the KubeRay Operator. This configuration strictly limits network traffic to within the Ray Cluster itself, effectively blocking access from other pods in the network and creating a secure perimeter around your workload.

2. Authenticated backend (mTLS)

Security in OpenShift AI now includes an enforced authenticated backend using mTLS (mutual transport layer security). This critical feature authenticates and encrypts all internal communication within the Ray Cluster. The re-architecture of this feature uses cert-manager to automatically manage the necessary certificates and secrets, simplifying deployment. For users of the codeflare-sdk client, your existing workflows remain unchanged.

3. Controlled access

OpenShift AI 3.0 also improves the user experience and security for accessing the Ray dashboard. The controlled access feature now integrates with the platform's broader authentication redesign using the Gateway API.

The platform now uses the existing OpenShift AI session for authentication, delivering a consistent and uniform user experience (UX) without requiring repeated login actions.

Simplifying and strengthening the platform

In addition to the security benefits, these changes have also led to platform improvements.

  • Simplified design: The main driver of these changes was to simplify the overall architecture. Moving core security logic—like network isolation and mTLS configuration—directly into the KubeRay Reconciler helped reduce complexity, paving the way for faster updates and feature delivery in the future.
  • Improved UX: The new controlled access uses a broader platform authentication redesign, providing smoother, more secure UX.
  • Platform enforcement policy: The entire CNE configuration automatically applies the necessary configuration to any Ray Cluster created within an OpenShift AI environment. This approach strengthens cluster security by default.

Contributing upstream

The re-architecture wasn't just about simplification, it also helped lay the groundwork for future collaboration. We are already beginning the process of contributing these changes to the upstream KubeRay community.

Next steps

Red Hat OpenShift AI 3.0 delivers a production-ready Ray experience by making robust security the default. Get started with your Ray workloads today.

Want to learn more about Ray and Kueue integration (currently in Technical Preview) on OpenShift AI 3? See technical deep dive: Tame Ray workloads on OpenShift AI with KubeRay and Kueue.


Sugli autori

UI_Icon-Red_Hat-Close-A-Black-RGB

Ricerca per canale

automation icon

Automazione

Novità sull'automazione IT di tecnologie, team e ambienti

AI icon

Intelligenza artificiale

Aggiornamenti sulle piattaforme che consentono alle aziende di eseguire carichi di lavoro IA ovunque

open hybrid cloud icon

Hybrid cloud open source

Scopri come affrontare il futuro in modo più agile grazie al cloud ibrido

security icon

Sicurezza

Le ultime novità sulle nostre soluzioni per ridurre i rischi nelle tecnologie e negli ambienti

edge icon

Edge computing

Aggiornamenti sulle piattaforme che semplificano l'operatività edge

Infrastructure icon

Infrastruttura

Le ultime novità sulla piattaforma Linux aziendale leader a livello mondiale

application development icon

Applicazioni

Approfondimenti sulle nostre soluzioni alle sfide applicative più difficili

Virtualization icon

Virtualizzazione

Il futuro della virtualizzazione negli ambienti aziendali per i carichi di lavoro on premise o nel cloud