Skip to content

Commit dbac01d

Browse files
committed
edit pass: container-instances-tutorial-deploy-confidential-containers-cce-arm
1 parent 6f0747b commit dbac01d

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/container-instances/container-instances-tutorial-deploy-confidential-containers-cce-arm.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,9 @@ In this tutorial, you learn how to:
3030

3131
In this tutorial, you deploy a Hello World application that generates a hardware attestation report. You start by creating an ARM template with a container group resource to define the properties of this application. You then use this ARM template with the Azure CLI confcom tooling to generate a CCE policy for attestation.
3232

33-
This tutorial uses [this ARM template](https://raw.githubusercontent.com/Azure-Samples/aci-confidential-hello-world/main/template.json?token=GHSAT0AAAAAAB5B6SJ7VUYU3G6MMQUL7KKKY7QBZBA). To view the source code for this application, see [Azure Container Instances Confidential Hello World](https://aka.ms/ccacihelloworld).
33+
This tutorial uses [this ARM template](https://raw.githubusercontent.com/Azure-Samples/aci-confidential-hello-world/main/template.json?token=GHSAT0AAAAAAB5B6SJ7VUYU3G6MMQUL7KKKY7QBZBA) as an example. To view the source code for this application, see [Azure Container Instances Confidential Hello World](https://aka.ms/ccacihelloworld).
3434

35-
Two properties are added to the Container Instances resource definition to make the container group confidential:
35+
The example template adds two properties to the Container Instances resource definition to make the container group confidential:
3636

3737
* `sku`: Enables you to select between confidential and standard container group deployments. If you don't add this property to the resource, the container group will be a standard deployment.
3838
* `confidentialComputeProperties`: Enables you to pass in a custom CCE policy for attestation of your container group. If you don't add this object to the resource, the software components that run within the container group won't be validated.
@@ -176,7 +176,7 @@ With the ARM template that you crafted and the Azure CLI confcom extension, you
176176

177177
## Deploy the template
178178

179-
In the following steps, you use the Azure portal to deploy the template. You can also use Azure PowerShell, the Azure CLI, and the REST API. To learn about other deployment methods, see [Deploy templates](../azure-resource-manager/templates/deploy-cli.md).
179+
In the following steps, you use the Azure portal to deploy the template. You can also use Azure PowerShell, the Azure CLI, or the REST API. To learn about other deployment methods, see [Deploy templates](../azure-resource-manager/templates/deploy-cli.md).
180180

181181
1. Select the **Deploy to Azure** button to sign in to Azure and begin a Container Instances deployment.
182182

@@ -228,7 +228,7 @@ In the following steps, you use the Azure portal to review the properties of the
228228

229229
The presence of the attestation report below the Azure Container Instances logo confirms that the container is running on hardware that supports a TEE.
230230

231-
If you deploy to hardware that doesn't support a TEE (for example, by choosing a region where Container Instances Confidential is not available), no attestation report appears.
231+
If you deploy to hardware that doesn't support a TEE (for example, by choosing a region where Container Instances Confidential isn't available), no attestation report appears.
232232

233233
## Related content
234234

includes/container-instances-tutorial-prerequisites-confidential-containers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: include file
3-
description: include file
2+
title: Include file
3+
description: Include file
44
services: container-instances
55
author: tomvcassidy
66

0 commit comments

Comments
 (0)