You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Quickstart: Deploy an AKS cluster with confidential computing nodes by using the Azure CLI
13
+
# Quickstart: Deploy an AKS cluster with confidential computing Intel SGX agent nodes by using the Azure CLI
14
14
15
15
In this quickstart, you'll use the Azure CLI to deploy an Azure Kubernetes Service (AKS) cluster with enclave-aware (DCsv2/DCSv3) VM nodes. You'll then run a simple Hello World application in an enclave. You can also provision a cluster and add confidential computing nodes from the Azure portal, but this quickstart focuses on the Azure CLI.
16
16
@@ -24,51 +24,52 @@ Features of confidential computing nodes include:
24
24
- Intel SGX DCAP Driver preinstalled on the confidential computing nodes. For more information, see [Frequently asked questions for Azure confidential computing](./confidential-nodes-aks-faq.yml).
25
25
26
26
> [!NOTE]
27
-
> DCsv2/DCsv3 VMs use specialized hardware that's subject to higher pricing and region availability. For more information, see the [available SKUs and supported regions](virtual-machine-solutions-sgx.md). DCsv3 VM's are currently in preview in limited regions. Please refer to above mentioned page for details.
27
+
> DCsv2/DCsv3 VMs use specialized hardware that's subject region availability. For more information, see the [available SKUs and supported regions](virtual-machine-solutions-sgx.md).
28
28
29
29
30
30
## Prerequisites
31
31
32
32
This quickstart requires:
33
33
34
34
- An active Azure subscription. If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
35
-
- Azure CLI version 2.0.64 or later installed and configured on your deployment machine.
35
+
- Azure CLI version 2.0.64 or later installed and configured on your deployment machine.
36
36
37
37
Run `az --version` to find the version. If you need to install or upgrade, see [Install the Azure CLI](../container-registry/container-registry-get-started-azure-cli.md).
38
-
- A minimum of six DCsv2 cores available in your subscription.
38
+
- A minimum of eight DCsv2/DCSv3/DCdsv3 cores available in your subscription.
39
39
40
-
By default, the quota for confidential computing per Azure subscription is eight VM cores. If you plan to provision a cluster that requires more than eight cores, follow [these instructions](../azure-portal/supportability/per-vm-quota-requests.md) to raise a quota-increase ticket.
40
+
By default, there is no pre-assigned quota for Intel SGX VM sizes for your Azure subscriptions. You should follow [these instructions](../azure-portal/supportability/per-vm-quota-requests.md) to request for VM core quota for your subscriptions.
41
41
42
-
## Create an AKS cluster with enclave-aware confidential computing nodes and add-on
42
+
## Create an AKS cluster with enclave-aware confidential computing nodes and Intel SGX add-on
43
43
44
-
Use the following instructions to create an AKS cluster with the confidential computing add-on enabled, add a node pool to the cluster, and verify what you created.
44
+
Use the following instructions to create an AKS cluster with the Intel SGX add-on enabled, add a node pool to the cluster, and verify what you created with hello world enclave application.
45
45
46
46
### Create an AKS cluster with a system node pool
47
47
48
48
> [!NOTE]
49
49
> If you already have an AKS cluster that meets the prerequisite criteria listed earlier, [skip to the next section](#add-a-user-node-pool-with-confidential-computing-capabilities-to-the-aks-cluster) to add a confidential computing node pool.
50
50
51
-
First, create a resource group for the cluster by using the [az group create][az-group-create] command. The following example creates a resource group named *myResourceGroup* in the *westus2* region:
51
+
First, create a resource group for the cluster by using the [az group create][az-group-create] command. The following example creates a resource group named *myResourceGroup* in the *eastus2* region:
52
52
53
53
```azurecli-interactive
54
-
az group create --name myResourceGroup --location westus2
54
+
az group create --name myResourceGroup --location eastus2
55
55
```
56
56
57
57
Now create an AKS cluster, with the confidential computing add-on enabled, by using the [az aks create][az-aks-create] command:
58
58
59
59
```azurecli-interactive
60
60
az aks create -g myResourceGroup --name myAKSCluster --generate-ssh-keys --enable-addons confcom
61
61
```
62
+
The above command will deploy a new AKS cluster with system node pool of non confidential computing node. Confidential computing Intel SGX nodes are not recommended for system node pools.
62
63
63
-
### Add a user node pool with confidential computing capabilities to the AKS cluster
64
+
### Add an user node pool with confidential computing capabilities to the AKS cluster<aid="add-a-user-node-pool-with-confidential-computing-capabilities-to-the-aks-cluster"></a>
64
65
65
-
Run the following command to add a user node pool of `Standard_DC2s_v2` size with three nodes to the AKS cluster. You can choose another larger sized SKU from the [list of supported DCsv2/Dcsv3 SKUs and regions](../virtual-machines/dcv2-series.md).
66
+
Run the following command to add a user node pool of `Standard_DC4s_v3` size with three nodes to the AKS cluster. You can choose another larger sized SKU from the [list of supported DCsv2/DCsv3 SKUs and regions](../virtual-machines/dcv3-series.md).
66
67
67
68
```azurecli-interactive
68
-
az aks nodepool add --cluster-name myAKSCluster --name confcompool1 --resource-group myResourceGroup --node-vm-size Standard_DC2s_v2
69
+
az aks nodepool add --cluster-name myAKSCluster --name confcompool1 --resource-group myResourceGroup --node-vm-size Standard_DC4s_v3 --node-count 2
69
70
```
70
71
71
-
After you run the command, a new node pool with DCsv2 should be visible with confidential computing add-on DaemonSets ([SGX device plug-in](confidential-nodes-aks-overview.md#confidential-computing-add-on-for-aks)).
72
+
After you run the command, a new node pool with DCsv3 should be visible with confidential computing add-on DaemonSets ([SGX device plug-in](confidential-nodes-aks-overview.md#confidential-computing-add-on-for-aks)).
72
73
73
74
### Verify the node pool and add-on
74
75
@@ -102,15 +103,15 @@ Run the following command to enable the confidential computing add-on:
102
103
az aks enable-addons --addons confcom --name MyManagedCluster --resource-group MyResourceGroup
103
104
```
104
105
105
-
### Add a DCsv2/DCsv3 user node pool to the cluster
106
+
### Add a DCsv3 user node pool to the cluster
106
107
107
108
> [!NOTE]
108
-
> To use the confidential computing capability, your existing AKS cluster needs to have a minimum of one node pool that's based on a DCsv2/DCsv3 VM SKU. To learn more about DCs-v2 VMs SKUs for confidential computing, see the [available SKUs and supported regions](virtual-machine-solutions-sgx.md).
109
+
> To use the confidential computing capability, your existing AKS cluster needs to have a minimum of one node pool that's based on a DCsv2/DCsv3 VM SKU. To learn more about DCs-v2/Dcs-v3 VMs SKUs for confidential computing, see the [available SKUs and supported regions](virtual-machine-solutions-sgx.md).
109
110
110
111
Run the following command to create a node pool:
111
112
112
113
```azurecli-interactive
113
-
az aks nodepool add --cluster-name myAKSCluster --name confcompool1 --resource-group myResourceGroup --node-count 1 --node-vm-size Standard_DC4s_v2
114
+
az aks nodepool add --cluster-name myAKSCluster --name confcompool1 --resource-group myResourceGroup --node-count 2 --node-vm-size Standard_DC4s_v3
114
115
```
115
116
116
117
Verify that the new node pool with the name *confcompool1* has been created:
Copy file name to clipboardExpand all lines: articles/confidential-computing/confidential-nodes-aks-overview.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,24 +6,24 @@ author: agowdamsft
6
6
ms.service: container-service
7
7
ms.subservice: confidential-computing
8
8
ms.topic: overview
9
-
ms.date: 11/04/2021
9
+
ms.date: 05/10/2022
10
10
ms.author: amgowda
11
11
ms.custom: ignite-fall-2021
12
12
---
13
13
14
14
# Confidential computing nodes on Azure Kubernetes Service
15
15
16
-
[Azure confidential computing](overview.md) allows you to protect your sensitive data while it's in use. The underlying confidential computing infrastructure protects this data from other applications, administrators, and cloud providers with a hardware backed trusted execution container environments. Adding confidential computing nodes allow you to target container application to run in an isolated, hardware protected, integrity protected in an attestable environment.
16
+
[Azure confidential computing](overview.md) allows you to protect your sensitive data while it's in use. The underlying confidential computing infrastructure protects this data from other applications, administrators, and cloud providers with a hardware backed trusted execution container environments. Adding confidential computing nodes allow you to target container applications to run in an isolated, hardware protected, integrity protected attestable Trusted Execution Environment(TEE).
17
17
18
18
## Overview
19
19
20
-
Azure Kubernetes Service (AKS) supports adding [DCsv2 confidential computing nodes](confidential-computing-enclaves.md) powered by Intel SGX. These nodes allow you to run sensitive workloads within a hardware-based trusted execution environment (TEE). TEEs allow user-level code from containers to allocate private regions of memory to execute the code with CPU directly. These private memory regions that execute directly with CPU are called enclaves. Enclaves help protect the data confidentiality, data integrity and code integrity from other processes running on the same nodes, as well as Azure operator. The Intel SGX execution model also removes the intermediate layers of Guest OS, Host OS and Hypervisor thus reducing the attack surface area. The *hardware based per container isolated execution* model in a node allows applications to directly execute with the CPU, while keeping the special block of memory encrypted per container. Confidential computing nodes with confidential containers are a great addition to your zero-trust security planning and defense-in-depth container strategy.
20
+
Azure Kubernetes Service (AKS) supports adding [Intel SGX confidential computing VM nodes](confidential-computing-enclaves.md) as agent pools in a cluster. These nodes allow you to run sensitive workloads within a hardware-based TEE. TEEs allow user-level code from containers to allocate private regions of memory to execute the code with CPU directly. These private memory regions that execute directly with CPU are called enclaves. Enclaves help protect the data confidentiality, data integrity and code integrity from other processes running on the same nodes, as well as Azure operator. The Intel SGX execution model also removes the intermediate layers of Guest OS, Host OS and Hypervisor thus reducing the attack surface area. The *hardware based per container isolated execution* model in a node allows applications to directly execute with the CPU, while keeping the special block of memory encrypted per container. Confidential computing nodes with confidential containers are a great addition to your zero-trust, security planning and defense-in-depth container strategy.
21
21
22
22
:::image type="content" source="./media/confidential-nodes-aks-overview/sgx-aks-node.png" alt-text="Graphic of AKS Confidential Compute Node, showing confidential containers with code and data secured inside.":::
23
23
24
24
## AKS Confidential Nodes Features
25
25
26
-
- Hardware based and process level container isolation through Intel SGX trusted execution environment (TEE)
26
+
- Hardware based and process level container isolation through Intel SGX trusted execution environment (TEE)
27
27
- Heterogenous node pool clusters (mix confidential and non-confidential node pools)
28
28
- Encrypted Page Cache (EPC) memory-based pod scheduling (requires add-on)
29
29
- Intel SGX DCAP driver pre-installed
@@ -67,6 +67,5 @@ Confidential computing nodes on AKS also support containers that are programmed
0 commit comments