Skip to content

Commit ab2e1a1

Browse files
authored
Table Change
1 parent 3aa7082 commit ab2e1a1

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/security/fundamentals/trusted-hardware-identity-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -112,9 +112,9 @@ Follow the steps below for requesting AMD collateral in a confidential container
112112
kubectl get nodes
113113
```
114114
The following output example shows the single node created in the previous steps. Make sure the node status is Ready:
115-
| NAME | STATUS | ROLES | AGE | VERSION |
116-
|--|--|--|--|--|
117-
| aks-nodepool1-31718369-0 | Ready | agent | 6m44s | v1.12.8 |
115+
| NAME | STATUS | ROLES | AGE | VERSION |
116+
| ---- | ------ | ----- | --- | ------- |
117+
| aks-nodepool1-31718369-0 | Ready | agent | 6m44s | v1.12.8 |
118118
119119
2. Once the AKS cluster is created, create a curl.yaml file with the following content. It defines a job that runs a curl container to fetch AMD collateral from the THIM endpoint. For more information about Kubernetes Jobs, please see [Kuberenetes documentation](https://kubernetes.io/docs/concepts/workloads/controllers/job/).
120120

0 commit comments

Comments
 (0)