You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/confidential-containers-deploy.md
+46-14Lines changed: 46 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
-
title: Deploy Confidential Containers in an Azure Red Hat OpenShift (ARO) cluster
2
+
title: Deploy Confidential Containers in an Azure Red Hat OpenShift (ARO) cluster (Preview)
3
3
description: Discover how to deploy Confidential Containers in Azure Red Hat OpenShift (ARO)
4
4
author: johnmarco
5
5
ms.author: johnmarc
6
6
ms.service: azure-redhat-openshift
7
7
keywords: confidential containers, aro, deploy, openshift, red hat
8
8
ms.topic: how-to
9
-
ms.date: 10/18/2024
9
+
ms.date: 10/24/2024
10
10
ms.custom: template-how-to
11
11
---
12
12
@@ -85,21 +85,25 @@ This article describes the steps required to deploy Confidential Containers for
85
85
86
86
Before beginning the deployment process, make sure the following prerequisites are met:
87
87
88
-
- An existing ARO cluster (version 1.14 or later) with at least one worker node
88
+
- An existing ARO cluster (version 4.15 or later) with at least one worker node
89
89
90
90
- Access to the cluster with the `cluster-admin` role
91
91
92
92
- The [OpenShift CLI installed](howto-create-private-cluster-4x.md#install-the-openshift-cli)
93
93
94
+
> [!IMPORTANT]
95
+
> For each pod in an application, there is a one-to-one mapping with a corresponding Confidential Virtual Machine (CVM). This means that every new pod requires a separate CVM, ensuring isolation between pods.
96
+
>
94
97
95
98
## Part 1: Deploy OpenShift sandboxed containers
96
99
97
-
> [!NOTE]
98
-
> In order to deploy sandboxed containers, you must have access to the cluster with the cluster-admin role.
99
-
>
100
-
101
100
### Install the OpenShift sandboxed containers Operator
102
101
102
+
The OpenShift sandboxed containers operator can be installed through the CLI or the OpenShift web console.
103
+
104
+
105
+
::: zone pivot="aro-azurecli"
106
+
103
107
1. Create an `osc-namespace.yaml` manifest file:
104
108
105
109
```
@@ -156,7 +160,7 @@ Before beginning the deployment process, make sure the following prerequisites a
156
160
`$ oc get csv -n openshift-sandboxed-containers-operator`
157
161
158
162
> [!NOTE]
159
-
> This command can take several minutes to complete.
163
+
> This command can take several minutes to complete.
160
164
161
165
1. Watch the process by running the following command:
162
166
@@ -168,11 +172,35 @@ Before beginning the deployment process, make sure the following prerequisites a
1. In the web console, navigate to **Operators → OperatorHub**.
180
+
181
+
1. In the **Filter by keyword** field, type OpenShift sandboxed containers.
182
+
183
+
1. Select the **OpenShift sandboxed containers Operator** tile and click **Install**.
184
+
185
+
1. On the **Install Operator** page, select **stable** from the list of available **Update Channel** options.
186
+
187
+
1. Verify that **Operator recommended Namespace** is selected for **Installed Namespace**. This installs the Operator in the mandatory `openshift-sandboxed-containers-operator` namespace. If this namespace does not yet exist, it's automatically created.
188
+
189
+
> [!NOTE]
190
+
> Attempting to install the OpenShift sandboxed containers Operator in a namespace other than openshift-sandboxed-containers-operator causes the installation to fail.
191
+
>
192
+
193
+
1. Verify that **Automatic** is selected for **Approval Strategy**. **Automatic** is the default value, and enables automatic updates to OpenShift sandboxed containers when a new z-stream release is available.
194
+
195
+
1. Click **Install**.
196
+
197
+
1. Navigate to **Operators → Installed Operators** to verify that the Operator is installed.
198
+
171
199
### Create the peer pods secret
172
200
173
201
You must create the peer pods secret for OpenShift sandboxed containers. The secret stores credentials for creating the pod virtual machine (VM) image and peer pod instances.
174
202
175
-
By default, the OpenShift sandboxed containers Operator creates the secret based on the credentials used to create the cluster. However, you can manually create a secret that uses different credentials.
203
+
By default, the OpenShift sandboxed containers operator creates the secret based on the credentials used to create the cluster. However, you can manually create a secret that uses different credentials.
176
204
177
205
178
206
1. Retrieve the Azure subscription ID by running the following command:
@@ -323,10 +351,13 @@ You must create an SSH key secret, which Azure uses to create virtual machines.
323
351
324
352
1. Create a trustee-namespace.yaml manifest file:
325
353
326
-
apiVersion: v1
327
-
kind: Namespace
328
-
metadata:
329
-
name: trustee-operator-system
354
+
```
355
+
apiVersion: v1
356
+
kind: Namespace
357
+
metadata:
358
+
name: trustee-operator-system
359
+
```
360
+
330
361
331
362
1. Create the trustee-operator-system namespace by running the following command:
332
363
@@ -650,7 +681,8 @@ Do not confuse the Trustee policy engine with the Attestation Service policy eng
650
681
**Attestation policy**
651
682
652
683
Optional: You can overwrite the default attestation policy by creating your own attestation policy.
653
-
Provisioning Certificate Caching Service for TDX
684
+
685
+
**Provisioning Certificate Caching Service for TDX**
654
686
655
687
If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provisioning Certificate Caching Service (PCCS). The PCCS retrieves Provisioning Certification Key (PCK) certificates and caches them in a local database.
Copy file name to clipboardExpand all lines: articles/openshift/confidential-containers-overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
-
title: Confidential Containers with Azure Red Hat OpenShift
2
+
title: Confidential Containers with Azure Red Hat OpenShift (Preview)
3
3
description: Discover how to utilize Confidential Containers with Azure Red Hat OpenShift to protect sensitive data.
4
4
author: johnmarco
5
5
ms.author: johnmarc
6
6
ms.service: azure-redhat-openshift
7
7
ms.topic: conceptual
8
-
ms.date: 10/17/2024
8
+
ms.date: 10/24/2024
9
9
---
10
10
# Confidential Containers with Azure Red Hat OpenShift
11
11
@@ -49,7 +49,7 @@ Azure Red Hat OpenShift serves as the orchestrator, overseeing the sandboxing of
49
49
The diagram above shows the three main steps for using Confidential Containers on an ARO cluster:
50
50
1. The OpenShift Sandboxed Containers Operator is deployed on the ARO cluster.
51
51
1. Kata Runtime container on an ARO worker node uses the cloud-api-adapter to create a peer pod on a confidential VM.
52
-
1. The remote attestation agent on the peer pod initiates the attestation of the container image before the data-agent deploys it, ensuring the integrity of the image.
52
+
1. The remote attestation agent on the peer pod initiates the attestation of the container image before the kata-agent deploys it, ensuring the integrity of the image.
0 commit comments