You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/confidential-containers-deploy.md
+16-51Lines changed: 16 additions & 51 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,73 +14,38 @@ ms.custom: template-how-to
14
14
15
15
This article describes the steps required to deploy Confidential Containers for an ARO cluster. This process involves two main parts and multiple steps:
16
16
17
-
**Part 1: Deploy OpenShift Sandboxed Containers**
17
+
First, you'll deploy OpenShift Sandboxed Containers, which involves the following steps:
18
18
19
-
1.[Install the OpenShift Sandboxed Containers Operator](#install-the-openshift-sandboxed-containers-operator).
19
+
1. Install the OpenShift Sandboxed Containers Operator.
20
20
21
-
Create manifest files and run commands to install and verify the Operator.
21
+
1.Create the peer pods secret.
22
22
23
-
1.[Create the peer pods secret](#create-the-peer-pods-secret).
24
-
1. Gather necessary Azure credentials.
25
-
1. Generate and record RBAC content.
26
-
1. Create peer pods secret manifest file.
23
+
1. Create the peer pods config map.
27
24
28
-
1.[Create the peer pods config map](#create-the-peer-pods-config-map).
29
-
1. Create the peer pods config file.
30
-
1. Create the ConfigMap.
25
+
1. Create the Azure secret.
31
26
32
-
1.[Create the Azure secret](#create-the-azure-secret).
33
-
1. Generate SSH keys.
34
-
1. Create a secret object.
35
-
1. Delete the generated keys.
27
+
After deploying OpenShift Sandboxed Containers, you'll deploy Confidential Containers. This involves the following steps:
36
28
29
+
1. Install the Trustee Operator.
37
30
38
-
**Part 2: Deploy Confidential Containers**
31
+
1. Create the route for the Trustee.
39
32
40
-
1. [Install the Trustee Operator](#install-the-trustee-operator).
33
+
1. Enable the Confidential Containers feature gate.
41
34
42
-
Create and apply manifests to install the operator.
35
+
1. Update the peer pods config map.
43
36
44
-
1. [Create the route for the Trustee](#create-the-route-for-the-trustee).
45
-
1. Create a secure route with edge TLS termination for the Trustee service.
46
-
1. Set and record the TRUSTEE_HOST variable.
37
+
1. Create the KataConfig custom resource.
47
38
48
-
1. [Enable the Confidential Containers feature gate](#enable-the-confidential-containers-feature-gate).
39
+
1. Create the Trustee authentication secret.
49
40
50
-
Create a config map to enable the Confidential Containers feature.
41
+
1. Create the Trustee config map.
51
42
52
-
1. [Update the peer pods config map](#update-the-peer-pods-config-map).
53
-
1. Retrieve necessary Azure resource information (resource group, VNet name, subnet ID, NSG ID, region) using Azure CLI commands.
54
-
1. Create a YAML file containing the retrieved information and the TRUSTEE_HOST value.
55
-
1. Run a command to apply the updated configuration.
56
-
1. Restart the `peerpodconfig-ctrl-caa-daemon` daemon set.
43
+
1. Configure attestation policies (optional).
57
44
58
-
1. [Create the KataConfig custom resource](#create-the-kataconfig-custom-resource).
59
-
1. Create a YAML file defining the KataConfig configuration.
60
-
1. Run a command to apply the configuration.
61
-
1. Monitor and verify the installation process.
45
+
1. Create the KbsConfig custom resource.
62
46
63
-
1. [Create the Trustee authentication secret](#create-the-trustee-authentication-secret).
64
-
1. Generate private and public keys
65
-
1. Create a secret object.
47
+
1. Verify the attestation process.
66
48
67
-
1. [Create the Trustee config map](#create-the-trustee-config-map).
68
-
1. Create a YAML file containing the Trustee configuration.
0 commit comments