Skip to content

Commit 8be4d75

Browse files
committed
SME updates
1 parent 657661a commit 8be4d75

File tree

3 files changed

+49
-17
lines changed

3 files changed

+49
-17
lines changed

articles/openshift/confidential-containers-deploy.md

Lines changed: 46 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Deploy Confidential Containers in an Azure Red Hat OpenShift (ARO) cluster
2+
title: Deploy Confidential Containers in an Azure Red Hat OpenShift (ARO) cluster (Preview)
33
description: Discover how to deploy Confidential Containers in Azure Red Hat OpenShift (ARO)
44
author: johnmarco
55
ms.author: johnmarc
66
ms.service: azure-redhat-openshift
77
keywords: confidential containers, aro, deploy, openshift, red hat
88
ms.topic: how-to
9-
ms.date: 10/18/2024
9+
ms.date: 10/24/2024
1010
ms.custom: template-how-to
1111
---
1212

@@ -85,21 +85,25 @@ This article describes the steps required to deploy Confidential Containers for
8585

8686
Before beginning the deployment process, make sure the following prerequisites are met:
8787

88-
- An existing ARO cluster (version 1.14 or later) with at least one worker node
88+
- An existing ARO cluster (version 4.15 or later) with at least one worker node
8989

9090
- Access to the cluster with the `cluster-admin` role
9191

9292
- The [OpenShift CLI installed](howto-create-private-cluster-4x.md#install-the-openshift-cli)
9393

94+
> [!IMPORTANT]
95+
> For each pod in an application, there is a one-to-one mapping with a corresponding Confidential Virtual Machine (CVM). This means that every new pod requires a separate CVM, ensuring isolation between pods.
96+
>
9497
9598
## Part 1: Deploy OpenShift sandboxed containers
9699

97-
> [!NOTE]
98-
> In order to deploy sandboxed containers, you must have access to the cluster with the cluster-admin role.
99-
>
100-
101100
### Install the OpenShift sandboxed containers Operator
102101

102+
The OpenShift sandboxed containers operator can be installed through the CLI or the OpenShift web console.
103+
104+
105+
::: zone pivot="aro-azurecli"
106+
103107
1. Create an `osc-namespace.yaml` manifest file:
104108

105109
```
@@ -156,7 +160,7 @@ Before beginning the deployment process, make sure the following prerequisites a
156160
`$ oc get csv -n openshift-sandboxed-containers-operator`
157161
158162
> [!NOTE]
159-
> This command can take several minutes to complete.
163+
> This command can take several minutes to complete.
160164
161165
1. Watch the process by running the following command:
162166
@@ -168,11 +172,35 @@ Before beginning the deployment process, make sure the following prerequisites a
168172
openshift-sandboxed-containers openshift-sandboxed-containers-operator 1.7.0 1.6.0 Succeeded
169173
```
170174
175+
::: zone-end
176+
177+
::: zone pivot="Web console"
178+
179+
1. In the web console, navigate to **Operators → OperatorHub**.
180+
181+
1. In the **Filter by keyword** field, type OpenShift sandboxed containers.
182+
183+
1. Select the **OpenShift sandboxed containers Operator** tile and click **Install**.
184+
185+
1. On the **Install Operator** page, select **stable** from the list of available **Update Channel** options.
186+
187+
1. Verify that **Operator recommended Namespace** is selected for **Installed Namespace**. This installs the Operator in the mandatory `openshift-sandboxed-containers-operator` namespace. If this namespace does not yet exist, it's automatically created.
188+
189+
> [!NOTE]
190+
> Attempting to install the OpenShift sandboxed containers Operator in a namespace other than openshift-sandboxed-containers-operator causes the installation to fail.
191+
>
192+
193+
1. Verify that **Automatic** is selected for **Approval Strategy**. **Automatic** is the default value, and enables automatic updates to OpenShift sandboxed containers when a new z-stream release is available.
194+
195+
1. Click **Install**.
196+
197+
1. Navigate to **Operators → Installed Operators** to verify that the Operator is installed.
198+
171199
### Create the peer pods secret
172200
173201
You must create the peer pods secret for OpenShift sandboxed containers. The secret stores credentials for creating the pod virtual machine (VM) image and peer pod instances.
174202
175-
By default, the OpenShift sandboxed containers Operator creates the secret based on the credentials used to create the cluster. However, you can manually create a secret that uses different credentials.
203+
By default, the OpenShift sandboxed containers operator creates the secret based on the credentials used to create the cluster. However, you can manually create a secret that uses different credentials.
176204
177205
178206
1. Retrieve the Azure subscription ID by running the following command:
@@ -323,10 +351,13 @@ You must create an SSH key secret, which Azure uses to create virtual machines.
323351
324352
1. Create a trustee-namespace.yaml manifest file:
325353
326-
apiVersion: v1
327-
kind: Namespace
328-
metadata:
329-
name: trustee-operator-system
354+
```
355+
apiVersion: v1
356+
kind: Namespace
357+
metadata:
358+
name: trustee-operator-system
359+
```
360+
330361
331362
1. Create the trustee-operator-system namespace by running the following command:
332363
@@ -650,7 +681,8 @@ Do not confuse the Trustee policy engine with the Attestation Service policy eng
650681
**Attestation policy**
651682
652683
Optional: You can overwrite the default attestation policy by creating your own attestation policy.
653-
Provisioning Certificate Caching Service for TDX
684+
685+
**Provisioning Certificate Caching Service for TDX**
654686
655687
If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provisioning Certificate Caching Service (PCCS). The PCCS retrieves Provisioning Certification Key (PCK) certificates and caches them in a local database.
656688

articles/openshift/confidential-containers-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Confidential Containers with Azure Red Hat OpenShift
2+
title: Confidential Containers with Azure Red Hat OpenShift (Preview)
33
description: Discover how to utilize Confidential Containers with Azure Red Hat OpenShift to protect sensitive data.
44
author: johnmarco
55
ms.author: johnmarc
66
ms.service: azure-redhat-openshift
77
ms.topic: conceptual
8-
ms.date: 10/17/2024
8+
ms.date: 10/24/2024
99
---
1010
# Confidential Containers with Azure Red Hat OpenShift
1111

@@ -49,7 +49,7 @@ Azure Red Hat OpenShift serves as the orchestrator, overseeing the sandboxing of
4949
The diagram above shows the three main steps for using Confidential Containers on an ARO cluster:
5050
1. The OpenShift Sandboxed Containers Operator is deployed on the ARO cluster.
5151
1. Kata Runtime container on an ARO worker node uses the cloud-api-adapter to create a peer pod on a confidential VM.
52-
1. The remote attestation agent on the peer pod initiates the attestation of the container image before the data-agent deploys it, ensuring the integrity of the image.
52+
1. The remote attestation agent on the peer pod initiates the attestation of the container image before the kata-agent deploys it, ensuring the integrity of the image.
5353

5454
### Attestation
5555

0 commit comments

Comments
 (0)