|
| 1 | +--- |
| 2 | +title: Confidential VM node pools support on AKS with AMD SEV-SNP confidential VMs - Preview |
| 3 | +description: Learn about confidential node pool support on AKS with AMD SEV-SNP confidential VMs |
| 4 | +services: container-service |
| 5 | +author: ananyagarg |
| 6 | +ms.topic: article |
| 7 | +ms.date: 8/1/2022 |
| 8 | +ms.author: ananyagarg |
| 9 | +ms.service: container-service |
| 10 | +ms.custom: inspire-fall-2022 |
| 11 | +--- |
| 12 | + |
| 13 | +# Confidential VM node pool support on AKS with AMD SEV-SNP confidential VMs - Preview |
| 14 | + |
| 15 | +[Azure Kubernetes Service (AKS)](../aks/index.yml) makes it simple to deploy a managed Kubernetes cluster in Azure. In AKS, nodes of the same configuration are grouped together into node pools. These node pools contain the underlying VMs that run your applications. |
| 16 | + |
| 17 | +AKS now supports confidential VM node pools with Azure confidential VMs. These confidential VMs are the [generally available DCasv5 and ECasv5 confidential VM-series](https://aka.ms/AMD-ACC-VMs-GA-Inspire-2022) utilizing 3rd Gen AMD EPYC<sup>TM</sup> processors with Secure Encrypted Virtualization-Secure Nested Paging ([SEV-SNP](https://www.amd.com/en/technologies/infinity-guard)) security features. To read more about this offering, head to our [announcement](https://aka.ms/ACC-AKS-AMD-SEV-SNP-Preview-Blog). |
| 18 | + |
| 19 | +## Benefits |
| 20 | +Confidential node pools leverage VMs with a hardware-based Trusted Execution Environment (TEE). AMD SEV-SNP confidential VMs deny the hypervisor and other host management code access to VM memory and state, and add defense in depth protections against operator access. |
| 21 | + |
| 22 | +In addition to the hardened security profile, confidential node pools on AKS also enable: |
| 23 | + |
| 24 | +- Lift and Shift with full AKS feature support - to enable a seamless lift-and-shift of Linux container workloads |
| 25 | +- Heterogenous Node Pools - to store sensitive data in a VM-level TEE node pool with memory encryption keys generated from the chipset itself |
| 26 | + |
| 27 | +:::image type="content" source="media/confidential-vm-node-pools-on-aks/snp-on-aks-architecture-image.png" alt-text="Graphic of VM nodes in AKS with encrypted code and data in confidential VM node pools 1 and 2, on top of the hypervisor"::: |
| 28 | + |
| 29 | +Get started and add confidential node pools to existing AKS cluster with [this quick start guide](../aks/use-multiple-node-pools.md#add-a-confidential-vm-with-amd-sev-snp-support-node-pool-preview). |
| 30 | + |
| 31 | +## Questions? |
| 32 | + |
| 33 | +If you have questions about container offerings, please reach out to <[email protected]>. |
| 34 | + |
| 35 | +## Next steps |
| 36 | + |
| 37 | +- [Deploy a confidential node pool in your AKS cluster](../aks/use-multiple-node-pools.md#add-a-confidential-vm-with-amd-sev-snp-support-node-pool-preview) |
| 38 | +- Learn more about sizes and specs for [general purpose](../virtual-machines/dcasv5-dcadsv5-series.md) and [memory-optimized](../virtual-machines/ecasv5-ecadsv5-series.md) confidential VMs. |
0 commit comments