Skip to content

Commit 392ad30

Browse files
authored
Merge pull request #153836 from agowdamsft/patch-3
Changes to deployment resources and basic edits
2 parents 8f91fc3 + e210c05 commit 392ad30

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

articles/confidential-computing/confidential-nodes-aks-get-started.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: agowdamsft
55
ms.service: container-service
66
ms.subservice: confidential-computing
77
ms.topic: quickstart
8-
ms.date: 03/18/2020
8+
ms.date: 04/08/2021
99
ms.author: amgowda
1010
ms.custom: contentperf-fy21q3
1111
---
@@ -20,9 +20,8 @@ Features of confidential computing nodes include:
2020

2121
- Linux worker nodes supporting Linux containers.
2222
- Generation 2 virtual machine (VM) with Ubuntu 18.04 VM nodes.
23-
- Intel SGX-based CPU with Encrypted Page Cache Memory (EPC). For more information, see [Frequently asked questions for Azure confidential computing](./faq.md).
24-
- Support for Kubernetes version 1.16+.
25-
- Intel SGX DCAP Driver preinstalled on the AKS nodes. For more information, see [Frequently asked questions for Azure confidential computing](./faq.md).
23+
- Intel SGX capable CPU to help run your containers in confidentiality protected enclave leveraging Encrypted Page Cache Memory (EPC). For more information, see [Frequently asked questions for Azure confidential computing](./faq.md).
24+
- Intel SGX DCAP Driver preinstalled on the confidential computing nodes. For more information, see [Frequently asked questions for Azure confidential computing](./faq.md).
2625

2726
> [!NOTE]
2827
> DCsv2 VMs use specialized hardware that's subject to higher pricing and region availability. For more information, see the [available SKUs and supported regions](virtual-machine-solutions.md).
@@ -160,7 +159,7 @@ spec:
160159
image: oeciteam/sgx-test:1.0
161160
resources:
162161
limits:
163-
kubernetes.azure.com/sgx_epc_mem_in_MiB: 5 # This limit will automatically place the job into a confidential computing node. Alternatively, you can target deployment to node pools
162+
sgx.intel.com/epc: 5Mi # This limit will automatically place the job into a confidential computing node and mount the required driver volumes. Alternatively, you can target deployment to node pools with node selector.
164163
restartPolicy: Never
165164
backoffLimit: 0
166165
```
@@ -201,7 +200,7 @@ Enclave called into host to print: Hello World!
201200
To remove the confidential computing node pool that you created in this quickstart, use the following command:
202201

203202
```azurecli-interactive
204-
az aks nodepool delete --cluster-name myAKSCluster --name myNodePoolName --resource-group myResourceGroup
203+
az aks nodepool delete --cluster-name myAKSCluster --name confcompool1 --resource-group myResourceGroup
205204
```
206205

207206
To delete the AKS cluster, use the following command:
@@ -219,4 +218,4 @@ az aks delete --resource-group myResourceGroup --name myAKSCluster
219218
<!-- LINKS -->
220219
[az-group-create]: /cli/azure/group#az_group_create
221220
[az-aks-create]: /cli/azure/aks#az_aks_create
222-
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get_credentials
221+
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get_credentials

0 commit comments

Comments
 (0)