You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-instances/container-instances-tutorial-deploy-confidential-containers-cce-arm.md
+7-13Lines changed: 7 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,15 +30,15 @@ In this tutorial, you learn how to:
30
30
31
31
In this tutorial, you deploy a Hello World application that generates a hardware attestation report. You start by creating an ARM template with a container group resource to define the properties of this application. You then use this ARM template with the Azure CLI confcom tooling to generate a CCE policy for attestation.
32
32
33
-
This tutorial uses [this ARM template](https://raw.githubusercontent.com/Azure-Samples/aci-confidential-hello-world/main/template.json?token=GHSAT0AAAAAAB5B6SJ7VUYU3G6MMQUL7KKKY7QBZBA) as an example. To view the source code for this application, see [Azure Container Instances Confidential Hello World](https://aka.ms/ccacihelloworld).
33
+
This tutorial uses [this ARM template](https://raw.githubusercontent.com/microsoft/confidential-container-demos/main/hello-world/ACI/arm-template.json) as an example. To view the source code for this application, see [Azure Confidential Container Instances Hello World](https://github.com/microsoft/confidential-container-demos/tree/main/hello-world/ACI).
34
34
35
35
The example template adds two properties to the Container Instances resource definition to make the container group confidential:
36
36
37
37
*`sku`: Enables you to select between confidential and standard container group deployments. If you don't add this property to the resource, the container group will be a standard deployment.
38
38
*`confidentialComputeProperties`: Enables you to pass in a custom CCE policy for attestation of your container group. If you don't add this object to the resource, the software components that run within the container group won't be validated.
39
39
40
40
> [!NOTE]
41
-
> The `ccePolicy` parameter under `confidentialComputeProperties` is blank. You'll fill it in after you generate the policy later in the tutorial.
41
+
> The `ccePolicy` parameter under `confidentialComputeProperties` is blank. You'll fill it in when you generate the policy later in the tutorial.
42
42
43
43
Use your preferred text editor to save this ARM template on your local machine as *template.json*.
44
44
@@ -63,7 +63,7 @@ Use your preferred text editor to save this ARM template on your local machine a
"description": "Container image to deploy. Should be of the form repoName/imagename:tag for images stored in public Docker Hub, or a fully qualified URI for other registries. Images from private registries require additional registry credentials."
69
69
}
@@ -163,16 +163,10 @@ With the ARM template that you crafted and the Azure CLI confcom extension, you
163
163
1. To generate the CCE policy, run the following command by using the ARM template as input:
164
164
165
165
```azurecli-interactive
166
-
az confcom acipolicygen -a .\template.json --print-policy
166
+
az confcom acipolicygen -a .\template.json
167
167
```
168
168
169
-
When this command finishes, a Base64 string generated as output should appear in the following format. This string is the CCE policy that you copy and paste into your ARM template as the value of the `ccePolicy` property.
2. Save the changes to your local copy of the ARM template.
169
+
When this command finishes, a Base64 string generated as output will automatically appear in the `ccePolicy` property of the ARM template.
176
170
177
171
## Deploy the template
178
172
@@ -228,12 +222,12 @@ In the following steps, you use the Azure portal to review the properties of the
228
222
229
223
The presence of the attestation report below the Azure Container Instances logo confirms that the container is running on hardware that supports a TEE.
230
224
231
-
If you deploy to hardware that doesn't support a TEE (for example, by choosing a region where Container Instances Confidential isn't available), no attestation report appears.
225
+
If you deploy to hardware that doesn't support a TEE (for example, by choosing a region where Confidential Container Instances isn't available), no attestation report appears.
232
226
233
227
## Related content
234
228
235
229
Now that you've deployed a confidential container group on Container Instances, you can learn more about how policies are enforced:
236
230
237
231
*[Confidential containers on Azure Container Instances](./container-instances-confidential-overview.md)
Copy file name to clipboardExpand all lines: articles/reliability/availability-zones-service-support.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -197,6 +197,7 @@ Azure offerings are grouped into three categories that reflect their _regional_
197
197
|[Azure SignalR](../azure-signalr/availability-zones.md)||
198
198
|[Azure Spring Apps](reliability-spring-apps.md#availability-zone-support)||
199
199
| Azure Storage: Ultra Disk ||
200
+
|[Azure VMware Services](../azure-vmware/architecture-private-clouds.md)|||
200
201
|[Azure Web PubSub](../azure-web-pubsub/concept-availability-zones.md)||
201
202
|[Microsoft Fabric](reliability-fabric.md#availability-zone-support)||
0 commit comments