Skip to content

Commit 2fbf69e

Browse files
committed
PR review team edits
1 parent cda5097 commit 2fbf69e

File tree

3 files changed

+6
-15
lines changed

3 files changed

+6
-15
lines changed

articles/openshift/confidential-containers-deploy.md

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,6 @@ By default, the OpenShift sandboxed containers operator creates the secret based
209209
AZURE_SUBSCRIPTION_ID: "<azure_subscription_id>"
210210
```
211211
212-
**Notes:**
213212
- Specify the `AZURE_CLIENT_ID value`.
214213
- Specify the `AZURE_CLIENT_SECRET value`.
215214
- Specify the `AZURE_TENANT_ID value`.
@@ -275,7 +274,6 @@ By default, the OpenShift sandboxed containers operator creates the secret based
275274
AZURE_RESOURCE_GROUP: "<azure_resource_group>"
276275
DISABLECVM: "true"
277276
```
278-
**Notes:**
279277
- `AZURE_INSTANCE_SIZE` is the default if an instance size isn't defined in the workload.
280278
- `AZURE_INSTANCE_SIZES` lists all of the instance sizes you can specify when creating the pod. This allows you to define smaller instance sizes for workloads that need less memory and fewer CPUs or larger instance sizes for larger workloads.
281279
- Specify the `AZURE_SUBNET_ID` value that you retrieved.
@@ -483,7 +481,6 @@ Create a secure route with edge TLS termination for Trustee. External ingress tr
483481
AA_KBC_PARAMS: "cc_kbc::https://${TRUSTEE_HOST}"
484482
```
485483
486-
**Notes:**
487484
- `AZURE_INSTANCE_SIZE` is the default if an instance size isn't defined in the workload.
488485
- `AZURE_INSTANCE_SIZES` lists all of the instance sizes you can specify when creating the pod. This allows you to define smaller instance sizes for workloads that need less memory and fewer CPUs or larger instance sizes for larger workloads.
489486
- Specify the `AZURE_SUBNET_ID` value that you retrieved.
@@ -665,8 +662,6 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
665662
]
666663
```
667664
668-
**Notes:**
669-
670665
For `reference-values.json` specify the trusted digests for your hardware platform if required. Otherwise, leave it empty.
671666
672667
1. Create the RVPS config map by running the following command:
@@ -698,7 +693,6 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
698693
input["tee"] != "sample"
699694
}
700695
```
701-
**Notes:**
702696
703697
- The name of the resource policy, `policy.rego`, must match the resource policy defined in the Trustee config map.
704698
- The resource package policy follows the Open Policy Agent specification. This example allows the retrieval of all resources when the TEE isn't the sample attester.
@@ -762,7 +756,6 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
762756
_ = m[k]
763757
}
764758
```
765-
**Notes:**
766759
767760
For `package policy`, The attestation policy follows the Open Policy Agent specification. In this example, the attestation policy compares the claims provided in the attestation report to the reference values registered in the RVPS database. The attestation process is successful only if all the values match.
768761
@@ -785,7 +778,6 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
785778
"pccs_url": "<pccs_url>"
786779
}
787780
```
788-
**Notes:**
789781
790782
For `pccs_url`, specify the PCCS URL, for example, https://localhost:8081/sgx/certification/v4/.
791783
@@ -895,9 +887,8 @@ In a test scenario, you can override the restriction at runtime by adding a poli
895887
seccompProfile:
896888
type: RuntimeDefault
897889
```
898-
899-
Notes:
900-
890+
891+
901892
The pod metada `annotations` overrides the policy that prevents sensitive data from being written to standard I/O.
902893
903894
1. Create the pod by running the following command:

articles/openshift/confidential-containers-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Confidential Containers is a feature of Red Hat OpenShift sandboxed containers,
4444

4545
Azure Red Hat OpenShift serves as the orchestrator, overseeing the sandboxing of workloads (pods) through the utilization of virtual machines. When employing CVMs, Azure Red Hat OpenShift empowers Confidential Container capabilities for your workloads. Once a Confidential Containers workload is created, Azure Red Hat OpenShift deploys it within a CVM executing within the TEE, providing a secure and isolated environment for your sensitive data.
4646

47-
:::image type="content" source="media/confidential-containers-overview/confidential-containers-arch.png" alt-text="Architecture diagram of ARC confidential containers":::
47+
:::image type="content" source="media/confidential-containers-overview/confidential-containers-arch.png" alt-text="Architecture diagram of ARC confidential containers." lightbox="media/confidential-containers-overview/confidential-containers-arch.png":::
4848

4949
The diagram shows the three main steps for using Confidential Containers on an ARO cluster:
5050
1. The OpenShift Sandboxed Containers Operator is deployed on the ARO cluster.
@@ -66,11 +66,11 @@ The Trustee project provides the attestation capabilities essential for Confiden
6666
- Attestation Service (AS): This service validates the TEE evidence.
6767

6868
### The Confidential Compute Attestation Operator
69-
The confidential compute attestation Operator, an integral component of the Azure Red Hat OpenShift Confidential Containers solution, facilitates the deployment and management of Trustee services within an Azure Red Hat OpenShift cluster. It streamlines the configuration of Trustee services and the management of secrets for Confidential Containers workloads.
69+
The Confidential Compute Attestation Operator, an integral component of the Azure Red Hat OpenShift Confidential Containers solution, facilitates the deployment and management of Trustee services within an Azure Red Hat OpenShift cluster. It streamlines the configuration of Trustee services and the management of secrets for Confidential Containers workloads.
7070

71-
### A Unified Perspective
71+
### A Unified perspective
7272

73-
A typical Confidential Containers deployment involves Azure Red Hat OpenShift working in conjunction with the confidential compute attestation operator deployed in a separate, trusted environment. The workload is executed within a CVM operating inside a TEE, benefiting from the encrypted memory and integrity guarantees provided by the TEE. Trustee agents residing within the CVM perform attestation and acquire requisite secrets, safeguarding the security and confidentiality of your data.
73+
A typical Confidential Containers deployment involves Azure Red Hat OpenShift working in conjunction with the Confidential Compute Attestation Operator deployed in a separate, trusted environment. The workload is executed within a CVM operating inside a TEE, benefiting from the encrypted memory and integrity guarantees provided by the TEE. Trustee agents residing within the CVM perform attestation and acquire requisite secrets, safeguarding the security and confidentiality of your data.
7474

7575
## Next steps
7676

-4.03 KB
Loading

0 commit comments

Comments
 (0)