Skip to content

Commit 11384ec

Browse files
committed
Avita's first round of edits
1 parent 6988fab commit 11384ec

File tree

1 file changed

+15
-7
lines changed

1 file changed

+15
-7
lines changed

articles/openshift/confidential-containers-deploy.md

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ After deploying OpenShift Sandboxed Containers, deploy Confidential Containers.
4040

4141
1. Create the Trustee config map.
4242

43-
1. Configure attestation policies
43+
1. Configure Trustee.
4444

4545
1. Create the KbsConfig custom resource.
4646

@@ -619,9 +619,9 @@ Create a secure route with edge TLS termination for Trustee. External ingress tr
619619
`$ oc apply -f kbs-config-cm.yaml`
620620
621621
622-
### Configure attestation policies
622+
### Configure Trustee
623623
624-
Configure the following attestation policy settings:
624+
Configure the following Trustee settings:
625625
626626
**Configure reference values**
627627
@@ -963,9 +963,9 @@ You must create the container image signature verification policy because signat
963963
}
964964
```
965965
966-
- Specify the image repository for transport, for example, "docker":. For more information, see containers-transports 5.
966+
- Specify the image repository for transport, for example, "docker".
967967
- Specify the container registry and image, for example, "quay.io/my-image".
968-
- Specify the type and tag of the container image signature verification secret that you created, for example, img-sig/pub-key.
968+
- Specify the type and tag of the container image signature verification secret that you created, for example, "img-sig/pub-key".
969969
970970
1. Create the security policy by running the following command:
971971
@@ -1005,15 +1005,23 @@ You must create the KbsConfig custom resource to launch Trustee.
10051005
kbsRvpsRefValuesConfigMapName: rvps-reference-values
10061006
kbsSecretResources: ["kbsres1"]
10071007
kbsResourcePolicyConfigMapName: resource-policy
1008+
# tdxConfigSpec:
1009+
# kbsTdxConfigMapName: tdx-config
1010+
# kbsAttestationPolicyConfigMapName: attestation-policy
1011+
# kbsServiceType: <service_type>
10081012
```
1009-
1013+
- Specify the type value of the container image signature verification secret you created, for example, `img-sig`.
1014+
- `tdxConfigSpec.kbsTdxConfigMapName:` tdx-config is required for Intel Trust Domain Extensions.
1015+
- `kbsAttestationPolicyConfigMapName:` attestation-policy is required if you create a customized attestation policy.
1016+
- `kbsServiceType: <service_type>` is required if you created a service type. Specify NodePort, LoadBalancer, or ExternalName. The default service type is ClusterIP.
1017+
10101018
1. Create the KbsConfig custom resource by running the following command:
10111019
10121020
`$ oc apply -f kbsconfig-cr.yaml`
10131021
10141022
#### Verify the Trustee configuration
10151023
1016-
Verity the Trustee configuration by checking the Trustee pods and logs
1024+
Verify the Trustee configuration by checking the Trustee pods and logs.
10171025
10181026
1. Set the default project by running the following command:
10191027

0 commit comments

Comments
 (0)