Skip to content

Commit 769dd6c

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 53959ab + 5ae0992 commit 769dd6c

File tree

5 files changed

+125
-5
lines changed

5 files changed

+125
-5
lines changed

articles/azure-monitor/logs/basic-logs-configure.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: guywi-ms
55
ms.author: guywild
66
ms.reviewer: adi.biran
77
ms.topic: how-to
8-
ms.date: 11/09/2022
8+
ms.date: 04/17/2023
99
---
1010

1111
# Set a table's log data plan to Basic or Analytics
@@ -52,6 +52,7 @@ Configure a table for Basic logs if:
5252
| Container Insights | [ContainerLogV2](/azure/azure-monitor/reference/tables/containerlogv2) |
5353
| Communication Services | [ACSCallAutomationIncomingOperations](/azure/azure-monitor/reference/tables/ACSCallAutomationIncomingOperations)<br>[ACSCallRecordingSummary](/azure/azure-monitor/reference/tables/acscallrecordingsummary)<br>[ACSRoomsIncomingOperations](/azure/azure-monitor/reference/tables/acsroomsincomingoperations) |
5454
| Confidential Ledgers | [CCFApplicationLogs](/azure/azure-monitor/reference/tables/CCFApplicationLogs) |
55+
| Dedicated SQL Pool | [SynapseSqlPoolSqlRequests](/azure/azure-monitor/reference/tables/synapsesqlpoolsqlrequests)<br>[SynapseSqlPoolRequestSteps](/azure/azure-monitor/reference/tables/synapsesqlpoolrequeststeps)<br>[SynapseSqlPoolExecRequests](/azure/azure-monitor/reference/tables/synapsesqlpoolexecrequests)<br>[SynapseSqlPoolDmsWorkers](/azure/azure-monitor/reference/tables/synapsesqlpooldmsworkers)<br>[SynapseSqlPoolWaits](/azure/azure-monitor/reference/tables/synapsesqlpoolwaits) |
5556
| Dev Center | [DevCenterDiagnosticLogs](/azure/azure-monitor/reference/tables/DevCenterDiagnosticLogs) |
5657
| Firewalls | [AZFWFlowTrace](/azure/azure-monitor/reference/tables/AZFWFlowTrace) |
5758
| Health Data | [AHDSMedTechDiagnosticLogs](/azure/azure-monitor/reference/tables/AHDSMedTechDiagnosticLogs) |

articles/container-instances/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,8 @@
7777
href: container-instances-virtual-network-concepts.md
7878
- name: Confidential container groups
7979
href: container-instances-confidential-overview.md
80+
- name: Attestation in Confidential container
81+
href: confidential-containers-attestation-concepts.md
8082
- name: How-to guides
8183
items:
8284
- name: Deploy
Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,104 @@
1+
---
2+
title: Attestation in Confidential containers on Azure Containers Instances
3+
description: full attestation of container groups in confidential containers on Azure Container Instances
4+
ms.topic: conceptual
5+
ms.author: tomcassidy
6+
author: pkhandavilli
7+
ms.service: container-instances
8+
services: container-instances
9+
ms.date: 04/20/2023
10+
---
11+
12+
# What is attestation?
13+
14+
Attestation is an essential part of confidential computing and appears in the definition by the Confidential Computing Consortium “Confidential Computing is the protection of data in use by performing computation in a hardware-based, attested Trusted Execution Environment."
15+
16+
According to the [Remote ATtestation procedureS (RATS) Architecture](https://www.ietf.org/rfc/rfc9334.html) In remote attestation, “one peer (the "Attester") produces believable information about itself ("Evidence") to enable a remote peer (the "Relying Party") to decide whether to consider that Attester a trustworthy peer. Remote attestation procedures are facilitated by an additional vital party (the "Verifier").” In simpler terms, attestation is a way of proving that a computer system is trustworthy.
17+
18+
In Confidential Containers on ACI you can use an attestation token to verify that the container group
19+
20+
- Is running on confidential computing hardware. In this case AMD SEV-SNP.
21+
- Is running on an Azure compliant utility VM.
22+
- Is enforcing the expected confidential computing enforcement policy (cce) that was generated using [tooling](https://github.com/Azure/azure-cli-extensions/blob/main/src/confcom/azext_confcom/README.md).
23+
24+
## Full attestation in confidential containers on Azure Container Instances
25+
26+
Expanding upon this concept of attestation. Full attestation captures all the components that are part of the Trusted Execution Environment that is remotely verifiable. To achieve full attestation, in Confidential Containers, we have introduced the notion of a cce policy, which defines a set of rules, which is enforced in the utility VM. The security policy is encoded in the attestation report as an SHA-256 digest stored in the HostData attribute, as provided to the PSP by the host operating system during the VM boot-up. This means that the security policy enforced by the utility VM is immutable throughout the lifetime of the utility VM.
27+
28+
The exhaustive list of attributes that are part of the SEV-SNP attestation can be found [here](https://www.amd.com/system/files/TechDocs/SEV-SNP%20PSP%20API%20Specification.pdf).
29+
30+
Some important fields to consider in an attestation token returned by [Microsoft Azure Attestation ( MAA )](../attestation/overview.md)
31+
32+
| Claim | Sample value | Description |
33+
|---------------------------|-------------------------------------------------------------|-------------|
34+
| x-ms-attestation-type | sevsnpvm | String value that describes the attestation type. For example, in this scenario sevsnp hardware |
35+
| x-ms-compliance-status | azure-compliant-uvm | Compliance status of the utility VM that runs the container group. |
36+
| x-ms-sevsnpvm-hostdata | 670fff86714a650a49b58fadc1e90fedae0eb32dd51e34931c1e7a1839c08f6f | Hash of the cce policy that was generated during deployment. |
37+
| x-ms-sevsnpvm-is-debuggable | false | Flag to indicate whether the underlying hardware is running in debug mode |
38+
39+
## Sample attestation token generated by MAA
40+
41+
```json
42+
{
43+
"header": {
44+
"alg": "RS256",
45+
"jku": "https://sharedeus2.eus2.test.attest.azure.net/certs",
46+
"kid": "3bdCYJabzfhISFtb3J8yuEESZwufV7hhh08N3ZflAuE=",
47+
"typ": "JWT"
48+
},
49+
"payload": {
50+
"exp": 1680259997,
51+
"iat": 1680231197,
52+
"iss": "https://sharedeus2.eus2.test.attest.azure.net",
53+
"jti": "d288fef5880b1501ea70be1b9366840fd56f74e666a23224d6de113133cbd8d5",
54+
"nbf": 1680231197,
55+
"nonce": "3413764049005270139",
56+
"x-ms-attestation-type": "sevsnpvm",
57+
"x-ms-compliance-status": "azure-compliant-uvm",
58+
"x-ms-policy-hash": "9NY0VnTQ-IiBriBplVUpFbczcDaEBUwsiFYAzHu_gco",
59+
"x-ms-runtime": {
60+
"keys": [
61+
{
62+
"e": "AQAB",
63+
"key_ops": [
64+
"encrypt"
65+
],
66+
"kid": "Nvhfuq2cCIOAB8XR4Xi9Pr0NP_9CeMzWQGtW_HALz_w",
67+
"kty": "RSA",
68+
"n": "v965SRmyp8zbG5eNFuDCmmiSeaHpujG2bC_keLSuzvDMLO1WyrUJveaa5bzMoO0pA46pXkmbqHisozVzpiNDLCo6d3z4TrGMeFPf2APIMu-RSrzN56qvHVyIr5caWfHWk-FMRDwAefyNYRHkdYYkgmFK44hhUdtlCAKEv5UQpFZjvh4iI9jVBdGYMyBaKQLhjI5WIh-QG6Za5sSuOCFMnmuyuvN5DflpLFz595Ss-EoBIY-Nil6lCtvcGgR-IbjUYHAOs5ajamTzgeO8kx3VCE9HcyKmyUZsiyiF6IDRp2Bpy3NHTjIz7tmkpTHx7tHnRtlfE2FUv0B6i_QYl_ZA5Q"
69+
}
70+
]
71+
},
72+
"x-ms-sevsnpvm-authorkeydigest": "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
73+
"x-ms-sevsnpvm-bootloader-svn": 3,
74+
"x-ms-sevsnpvm-familyId": "01000000000000000000000000000000",
75+
"x-ms-sevsnpvm-guestsvn": 2,
76+
"x-ms-sevsnpvm-hostdata": "670fff86714a650a49b58fadc1e90fedae0eb32dd51e34931c1e7a1839c08f6f",
77+
"x-ms-sevsnpvm-idkeydigest": "cf7e12541981e6cafd150b5236785f4364850e2c4963825f9ab1d8091040aea0964bb9a8835f966bdc174d9ad53b4582",
78+
"x-ms-sevsnpvm-imageId": "02000000000000000000000000000000",
79+
"x-ms-sevsnpvm-is-debuggable": false,
80+
"x-ms-sevsnpvm-launchmeasurement": "a1e1a4b64e8de5c664ceee069010441f74cf039065b5b847e82b9d1a7629aaf33d5591c6b18cee48a4dde481aa88d0fb",
81+
"x-ms-sevsnpvm-microcode-svn": 115,
82+
"x-ms-sevsnpvm-migration-allowed": false,
83+
"x-ms-sevsnpvm-reportdata": "7ab000a323b3c873f5b81bbe584e7c1a26bcf40dc27e00f8e0d144b1ed2d14f10000000000000000000000000000000000000000000000000000000000000000",
84+
"x-ms-sevsnpvm-reportid": "a489c8578fb2f54d895fc8d000a85b2ff4855c015e4fb7216495c4dba4598345",
85+
"x-ms-sevsnpvm-smt-allowed": true,
86+
"x-ms-sevsnpvm-snpfw-svn": 8,
87+
"x-ms-sevsnpvm-tee-svn": 0,
88+
"x-ms-sevsnpvm-uvm-endorsement": {
89+
"x-ms-sevsnpvm-guestsvn": "100",
90+
"x-ms-sevsnpvm-launchmeasurement": "a1e1a4b64e8de5c664ceee069010441f74cf039065b5b847e82b9d1a7629aaf33d5591c6b18cee48a4dde481aa88d0fb"
91+
},
92+
"x-ms-sevsnpvm-vmpl": 0,
93+
"x-ms-ver": "1.0"
94+
}
95+
}
96+
```
97+
## Generating an attestation token
98+
99+
We have open-sourced sidecar container implementations that provide an easy rest interface to get a raw SNP (Secure Nested Paging) report produced by the hardware or a MAA token. The sidecar is available at this [repository](https://github.com/microsoft/confidential-sidecar-containers) and can be deployed with your container group.
100+
101+
## Next steps
102+
103+
- [Learn how to use attestation to release a secret to your container group](../confidential-computing/skr-flow-confidential-containers-azure-container-instance.md)
104+
- [Deploy a confidential container group with Azure Resource Manager](./container-instances-tutorial-deploy-confidential-containers-cce-arm.md)

articles/networking/fundamentals/networking-overview.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: template-concept, engagement-fy23
1414
# Azure networking services overview
1515

1616
The networking services in Azure provide a variety of networking capabilities that can be used together or separately. Select any of the following key capabilities to learn more about them:
17-
- [**Connectivity services**](#connect): Connect Azure resources and on-premises resources using any or a combination of these networking services in Azure - Virtual Network (VNet), Virtual WAN, ExpressRoute, VPN Gateway, Virtual network NAT Gateway, Azure DNS, Peering service, Route Server, and Azure Bastion.
17+
- [**Connectivity services**](#connect): Connect Azure resources and on-premises resources using any or a combination of these networking services in Azure - Virtual Network (VNet), Virtual WAN, ExpressRoute, VPN Gateway, Virtual network NAT Gateway, Azure DNS, Peering service, Azure Virtual Network Manager, Route Server, and Azure Bastion.
1818
- [**Application protection services**](#protect): Protect your applications using any or a combination of these networking services in Azure - Load Balancer, Private Link, DDoS protection, Firewall, Network Security Groups, Web Application Firewall, and Virtual Network Endpoints.
1919
- [**Application delivery services**](#deliver): Deliver applications in the Azure network using any or a combination of these networking services in Azure - Content Delivery Network (CDN), Azure Front Door Service, Traffic Manager, Application Gateway, Internet Analyzer, and Load Balancer.
2020
- [**Network monitoring**](#monitor): Monitor your network resources using any or a combination of these networking services in Azure - Network Watcher, ExpressRoute Monitor, Azure Monitor, or VNet Terminal Access Point (TAP).
@@ -26,7 +26,7 @@ This section describes services that provide connectivity between Azure resource
2626
### <a name="vnet"></a>Virtual network
2727
Azure Virtual Network (VNet) is the fundamental building block for your private network in Azure. You can use VNets to:
2828
- **Communicate between Azure resources**: You can deploy virtual machines, and several other types of Azure resources to a virtual network, such as Azure App Service Environments, the Azure Kubernetes Service (AKS), and Azure Virtual Machine Scale Sets. To view a complete list of Azure resources that you can deploy into a virtual network, see [Virtual network service integration](../../virtual-network/virtual-network-for-azure-services.md).
29-
- **Communicate between each other**: You can connect virtual networks to each other, enabling resources in either virtual network to communicate with each other, using virtual network peering. The virtual networks you connect can be in the same, or different, Azure regions. For more information, see [Virtual network peering](../../virtual-network/virtual-network-peering-overview.md).
29+
- **Communicate between each other**: You can connect virtual networks to each other, enabling resources in either virtual network to communicate with each other, using virtual network peering or Azure Virtual Network Manager. The virtual networks you connect can be in the same, or different, Azure regions. For more information, see [Virtual network peering](../../virtual-network/virtual-network-peering-overview.md) and [Azure Virtual Network Manager](../../virtual-network-manager/overview.md).
3030
- **Communicate to the internet**: All resources in a VNet can communicate outbound to the internet, by default. You can communicate inbound to a resource by assigning a public IP address or a public Load Balancer. You can also use [Public IP addresses](../../virtual-network/ip-services/virtual-network-public-ip-address.md) or public [Load Balancer](../../load-balancer/load-balancer-overview.md) to manage your outbound connections.
3131
- **Communicate with on-premises networks**: You can connect your on-premises computers and networks to a virtual network using [VPN Gateway](../../vpn-gateway/vpn-gateway-about-vpngateways.md) or [ExpressRoute](../../expressroute/expressroute-introduction.md).
3232

@@ -78,6 +78,10 @@ For more information, see [What is virtual network NAT gateway?](../../virtual-n
7878

7979
:::image type="content" source="./media/networking-overview/flow-map.png" alt-text="Virtual network NAT gateway":::
8080

81+
### <a name="avnm"></a>Azure Virtual Network Manager
82+
83+
Azure Virtual Network Manager is a management service that enables you to group, configure, deploy, and manage virtual networks globally across subscriptions. With Virtual Network Manager, you can define network groups to identify and logically segment your virtual networks. Then you can determine the connectivity and security configurations you want and apply them across all the selected virtual networks in network groups at once. For more information, see [What is Azure Virtual Network Manager?](../../virtual-network-manager/overview.md).
84+
8185
### <a name="routeserver"></a>Route Server
8286

8387
Azure Route Server simplifies dynamic routing between your network virtual appliance (NVA) and your virtual network. It allows you to exchange routing information directly through Border Gateway Protocol (BGP) routing protocol between any NVA that supports the BGP routing protocol and the Azure Software Defined Network (SDN) in the Azure Virtual Network (VNet) without the need to manually configure or maintain route tables. For more information, see [What is Azure Route Server?](../../route-server/overview.md)

articles/networking/fundamentals/toc.yml

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,12 @@
5656
- name: Route network traffic
5757
href: ../../virtual-network/virtual-networks-udr-overview.md?toc=/azure/networking/fundamentals/toc.json
5858
- name: Connect virtual networks
59-
href: ../../virtual-network/virtual-network-peering-overview.md?toc=/azure/networking/fundamentals/toc.json
59+
items:
60+
- name: Virtual network peering
61+
href: ../../virtual-network/virtual-network-peering-overview.md?toc=/azure/networking/fundamentals/toc.json
62+
- name: Virtual network manager
63+
href: ../../virtual-network-manager/overview.md?toc=/azure/networking/fundamentals/toc.json
64+
6065
- name: Private access to resources
6166
href: ../../private-link/private-endpoint-overview.md?toc=/azure/networking/fundamentals/toc.json
6267
- name: Connect on-premises to Azure - VPN encryption
@@ -119,7 +124,11 @@
119124
- name: Route traffic using route tables
120125
href: ../../virtual-network/tutorial-create-route-table-portal.md?toc=/azure/networking/fundamentals/toc.json
121126
- name: Connect virtual networks
122-
href: ../../virtual-network/tutorial-connect-virtual-networks-portal.md?toc=/azure/networking/fundamentals/toc.json
127+
items:
128+
- name: Connect virtual networks with peering
129+
href: ../../virtual-network/tutorial-connect-virtual-networks-portal.md?toc=/azure/networking/fundamentals/toc.json
130+
- name: Create a hub and spoke topology with Virtual Network Manager
131+
href: ../../virtual-network-manager/how-to-create-hub-and-spoke.md?toc=/azure/networking/fundamentals/toc.json
123132
- name: Private access to resources
124133
href: ../../private-link/create-private-endpoint-portal.md?toc=/azure/networking/fundamentals/toc.json
125134
- name: Connect on-premises network to a virtual network - VPN encryption

0 commit comments

Comments
 (0)