You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/confidential-containers-deploy.md
+2-11Lines changed: 2 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -209,7 +209,6 @@ By default, the OpenShift sandboxed containers operator creates the secret based
209
209
AZURE_SUBSCRIPTION_ID: "<azure_subscription_id>"
210
210
```
211
211
212
-
**Notes:**
213
212
- Specify the `AZURE_CLIENT_ID value`.
214
213
- Specify the `AZURE_CLIENT_SECRET value`.
215
214
- Specify the `AZURE_TENANT_ID value`.
@@ -275,7 +274,6 @@ By default, the OpenShift sandboxed containers operator creates the secret based
275
274
AZURE_RESOURCE_GROUP: "<azure_resource_group>"
276
275
DISABLECVM: "true"
277
276
```
278
-
**Notes:**
279
277
- `AZURE_INSTANCE_SIZE` is the default if an instance size isn't defined in the workload.
280
278
- `AZURE_INSTANCE_SIZES` lists all of the instance sizes you can specify when creating the pod. This allows you to define smaller instance sizes for workloads that need less memory and fewer CPUs or larger instance sizes for larger workloads.
281
279
- Specify the `AZURE_SUBNET_ID` value that you retrieved.
@@ -483,7 +481,6 @@ Create a secure route with edge TLS termination for Trustee. External ingress tr
483
481
AA_KBC_PARAMS: "cc_kbc::https://${TRUSTEE_HOST}"
484
482
```
485
483
486
-
**Notes:**
487
484
- `AZURE_INSTANCE_SIZE` is the default if an instance size isn't defined in the workload.
488
485
- `AZURE_INSTANCE_SIZES` lists all of the instance sizes you can specify when creating the pod. This allows you to define smaller instance sizes for workloads that need less memory and fewer CPUs or larger instance sizes for larger workloads.
489
486
- Specify the `AZURE_SUBNET_ID` value that you retrieved.
@@ -665,8 +662,6 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
665
662
]
666
663
```
667
664
668
-
**Notes:**
669
-
670
665
For `reference-values.json` specify the trusted digests for your hardware platform if required. Otherwise, leave it empty.
671
666
672
667
1. Create the RVPS config map by running the following command:
@@ -698,7 +693,6 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
698
693
input["tee"] != "sample"
699
694
}
700
695
```
701
-
**Notes:**
702
696
703
697
- The name of the resource policy, `policy.rego`, must match the resource policy defined in the Trustee config map.
704
698
- The resource package policy follows the Open Policy Agent specification. This example allows the retrieval of all resources when the TEE isn't the sample attester.
@@ -762,7 +756,6 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
762
756
_ = m[k]
763
757
}
764
758
```
765
-
**Notes:**
766
759
767
760
For `package policy`, The attestation policy follows the Open Policy Agent specification. In this example, the attestation policy compares the claims provided in the attestation report to the reference values registered in the RVPS database. The attestation process is successful only if all the values match.
768
761
@@ -785,7 +778,6 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
785
778
"pccs_url": "<pccs_url>"
786
779
}
787
780
```
788
-
**Notes:**
789
781
790
782
For `pccs_url`, specify the PCCS URL, for example, https://localhost:8081/sgx/certification/v4/.
791
783
@@ -895,9 +887,8 @@ In a test scenario, you can override the restriction at runtime by adding a poli
895
887
seccompProfile:
896
888
type: RuntimeDefault
897
889
```
898
-
899
-
Notes:
900
-
890
+
891
+
901
892
The pod metada `annotations` overrides the policy that prevents sensitive data from being written to standard I/O.
902
893
903
894
1. Create the pod by running the following command:
Copy file name to clipboardExpand all lines: articles/openshift/confidential-containers-overview.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ Confidential Containers is a feature of Red Hat OpenShift sandboxed containers,
44
44
45
45
Azure Red Hat OpenShift serves as the orchestrator, overseeing the sandboxing of workloads (pods) through the utilization of virtual machines. When employing CVMs, Azure Red Hat OpenShift empowers Confidential Container capabilities for your workloads. Once a Confidential Containers workload is created, Azure Red Hat OpenShift deploys it within a CVM executing within the TEE, providing a secure and isolated environment for your sensitive data.
46
46
47
-
:::image type="content" source="media/confidential-containers-overview/confidential-containers-arch.png" alt-text="Architecture diagram of ARC confidential containers":::
47
+
:::image type="content" source="media/confidential-containers-overview/confidential-containers-arch.png" alt-text="Architecture diagram of ARC confidential containers." lightbox="media/confidential-containers-overview/confidential-containers-arch.png":::
48
48
49
49
The diagram shows the three main steps for using Confidential Containers on an ARO cluster:
50
50
1. The OpenShift Sandboxed Containers Operator is deployed on the ARO cluster.
@@ -66,11 +66,11 @@ The Trustee project provides the attestation capabilities essential for Confiden
66
66
- Attestation Service (AS): This service validates the TEE evidence.
67
67
68
68
### The Confidential Compute Attestation Operator
69
-
The confidential compute attestation Operator, an integral component of the Azure Red Hat OpenShift Confidential Containers solution, facilitates the deployment and management of Trustee services within an Azure Red Hat OpenShift cluster. It streamlines the configuration of Trustee services and the management of secrets for Confidential Containers workloads.
69
+
The Confidential Compute Attestation Operator, an integral component of the Azure Red Hat OpenShift Confidential Containers solution, facilitates the deployment and management of Trustee services within an Azure Red Hat OpenShift cluster. It streamlines the configuration of Trustee services and the management of secrets for Confidential Containers workloads.
70
70
71
-
### A Unified Perspective
71
+
### A Unified perspective
72
72
73
-
A typical Confidential Containers deployment involves Azure Red Hat OpenShift working in conjunction with the confidential compute attestation operator deployed in a separate, trusted environment. The workload is executed within a CVM operating inside a TEE, benefiting from the encrypted memory and integrity guarantees provided by the TEE. Trustee agents residing within the CVM perform attestation and acquire requisite secrets, safeguarding the security and confidentiality of your data.
73
+
A typical Confidential Containers deployment involves Azure Red Hat OpenShift working in conjunction with the Confidential Compute Attestation Operator deployed in a separate, trusted environment. The workload is executed within a CVM operating inside a TEE, benefiting from the encrypted memory and integrity guarantees provided by the TEE. Trustee agents residing within the CVM perform attestation and acquire requisite secrets, safeguarding the security and confidentiality of your data.
0 commit comments