Skip to content

Commit 03e3332

Browse files
authored
Merge pull request #181674 from agowdamsft/patch-8
fixed the deploy yaml comments
2 parents d2fda9b + 2e57789 commit 03e3332

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/confidential-computing/confidential-enclave-nodes-aks-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ spec:
163163
image: oeciteam/sgx-test:1.0
164164
resources:
165165
limits:
166-
sgx.intel.com/epc: 5Mi # This limit will automatically place the job into a confidential computing node and mount the required driver volumes. Alternatively, you can target deployment to node pools with node selector.
166+
sgx.intel.com/epc: 5Mi # This limit will automatically place the job into a confidential computing node and mount the required driver volumes. sgx limit setting needs "confcom" AKS Addon as referenced above.
167167
restartPolicy: Never
168168
backoffLimit: 0
169169
```
@@ -215,7 +215,7 @@ az aks delete --resource-group myResourceGroup --cluster-name myAKSCluster
215215

216216
## Next steps
217217

218-
* Run Python, Node, or other applications through confidential containers by using the [confidential container samples in GitHub](https://github.com/Azure-Samples/confidential-container-samples).
218+
* Run Python, Node, or other applications through confidential containers using ISV/OSS SGX wrapper software. Review [confidential container samples in GitHub](https://github.com/Azure-Samples/confidential-container-samples).
219219

220220
* Run enclave-aware applications by using the [enclave-aware Azure container samples in GitHub](https://github.com/Azure-Samples/confidential-computing/blob/main/containersamples/).
221221

0 commit comments

Comments
 (0)