You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Additional configurations for reference values, client secrets, resource access policies, and attestation policies.
69
75
70
-
1. Create the KbsConfig custom resource: Create the KbsConfig customresource (CR) to launch Trustee and check the Trustee pods and pod logs to verify the configuration.
76
+
1. [Create the KbsConfig custom resource](#create-the-kbsconfig-custom-resource).
71
77
72
-
1. Verify the attestation process: Create a test pod and retrieve its secret to verify the attestation process.
78
+
1. Create the KbsConfig custom resource to launch Trustee.
79
+
1. Check the Trustee pods and pod logs to verify the configuration.
80
+
81
+
1. [Verify the attestation process](#verify-the-attestation-process).
82
+
83
+
Create a test pod and retrieve its secret to verify the attestation process.
73
84
74
85
## Part 1: Deploy OpenShift sandboxed containers
75
86
@@ -266,7 +277,7 @@ By default, the OpenShift sandboxed containers Operator creates the secret based
266
277
- `AZURE_INSTANCE_SIZES` lists all of the instance sizes you can specify when creating the pod. This allows you to define smaller instance sizes for workloads that need less memory and fewer CPUs or larger instance sizes for larger workloads.
267
278
- Specify the `AZURE_SUBNET_ID` value that you retrieved.
268
279
- Specify the `AZURE_NSG_ID` value that you retrieved.
269
-
- `AZURE_IMAGE_ID` is optional. By default, this value is populated when you run the KataConfig CR, using an Azure image ID based on your cluster credentials. If you create your own Azure image, specify the correct image ID.
280
+
- `AZURE_IMAGE_ID` is optional. By default, this value is populated when you run the KataConfig custom resource, using an Azure image ID based on your cluster credentials. If you create your own Azure image, specify the correct image ID.
270
281
- Specify the `AZURE_REGION` value you retrieved.
271
282
- Specify the `AZURE_RESOURCE_GROUP` value you retrieved.
272
283
@@ -399,7 +410,7 @@ Create a secure route with edge TLS termination for Trustee. External ingress tr
399
410
400
411
### Enable the Confidential Containers feature gate
401
412
402
-
1. Create a cc-feature-gate.yaml manifest file:
413
+
1. Create a `cc-feature-gate.yaml` manifest file:
403
414
404
415
```
405
416
apiVersion: v1
@@ -471,7 +482,7 @@ Create a secure route with edge TLS termination for Trustee. External ingress tr
471
482
- `AZURE_INSTANCE_SIZES` lists all of the instance sizes you can specify when creating the pod. This allows you to define smaller instance sizes for workloads that need less memory and fewer CPUs or larger instance sizes for larger workloads.
472
483
- Specify the `AZURE_SUBNET_ID` value that you retrieved.
473
484
- Specify the `AZURE_NSG_ID` value that you retrieved.
474
-
- `AZURE_IMAGE_ID` (Optional): By default, this value is populated when you run the KataConfig CR, using an Azure image ID based on your cluster credentials. If you create your own Azure image, specify the correct image ID.
485
+
- `AZURE_IMAGE_ID` (Optional): By default, this value is populated when you run the KataConfig custom resource, using an Azure image ID based on your cluster credentials. If you create your own Azure image, specify the correct image ID.
475
486
- Specify the `AZURE_REGION` value you retrieved.
476
487
- Specify the `AZURE_RESOURCE_GROUP` value you retrieved.
477
488
- `AA_KBC_PARAMS` specifies the host name of the Trustee route.
@@ -508,11 +519,11 @@ Create a secure route with edge TLS termination for Trustee. External ingress tr
508
519
509
520
Optional: If you have applied node labels to install kata-remote on specific nodes, specify the key and value, for example, cc: 'true'.
510
521
511
-
1. Create the KataConfig CR by running the following command:
522
+
1. Create the KataConfig custom resource by running the following command:
512
523
513
524
`$ oc apply -f example-kataconfig.yaml`
514
525
515
-
The new KataConfig CR is created and installs kata-remote as a runtime class on the worker nodes.
526
+
The new KataConfig custom resource is created and installs kata-remote as a runtime class on the worker nodes.
516
527
517
528
> [!NOTE]
518
529
> Wait for the kata-remote installation to complete and the worker nodes to reboot before verifying the installation.
@@ -778,7 +789,7 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
778
789
779
790
### Create the KbsConfig custom resource
780
791
781
-
You must create the KbsConfig custom resource (CR) to launch Trustee. Then, you check the Trustee pods and pod logs to verify the configuration.
792
+
You must create the KbsConfig custom resource to launch Trustee. Then, you check the Trustee pods and pod logs to verify the configuration.
782
793
783
794
1. Create a `kbsconfig-cr.yaml` manifest file:
784
795
@@ -803,7 +814,7 @@ You must create the KbsConfig custom resource (CR) to launch Trustee. Then, you
803
814
kbsResourcePolicyConfigMapName: resource-policy
804
815
```
805
816
806
-
1. Create the KbsConfig CR by running the following command:
817
+
1. Create the KbsConfig custom resource by running the following command:
0 commit comments