You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Creation of patterns browser v2
Includes:
* New filtering mechanism that uses patterns params from JSON file
* Adding AND and OR operators to filters used with taxonomies that allow multiple terms
* Sorting functions (alphabetical and date)
* Fixes to some of the creation dates for some patterns
Copy file name to clipboardExpand all lines: content/patterns/coco-pattern/_index.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ A core goal of confidential computing is to use this technology to isolate the w
31
31
image::coco-pattern/isolation.png[Schematic describing the isolation of confidential contains from the hosting system]
32
32
33
33
34
-
This pattern uses https://docs.redhat.com/en/documentation/openshift_sandboxed_containers/1.7/html/user_guide/deploying-on-azure#deploying-cc_azure-cc[Red Hat OpenShift sandbox containers] to deploy and configure confidential containers on Microsoft Azure.
34
+
This pattern uses https://docs.redhat.com/en/documentation/openshift_sandboxed_containers/1.7/html/user_guide/deploying-on-azure#deploying-cc_azure-cc[Red Hat OpenShift sandbox containers] to deploy and configure confidential containers on Microsoft Azure.
35
35
36
36
It deploys three copies of 'Hello OpenShift' to demonstrate some of the security boundaries that enforced with confidential containers.
37
37
@@ -46,7 +46,7 @@ It deploys three copies of 'Hello OpenShift' to demonstrate some of the security
46
46
**This pattern is a demonstration only and contains configuration that is not best practice**
47
47
48
48
- The default configuration deploys everything in a single cluster for testing purposes. The https://www.ietf.org/archive/id/draft-ietf-rats-architecture-22.html[RATS] architecture mandates that the Key Broker Service (e.g. https://github.com/confidential-containers/trustee[Trustee]) is in a trusted security zone.
49
-
- The https://github.com/confidential-containers/trustee/tree/main/attestation-service[Attestation Service] has wide open security policies.
49
+
- The https://github.com/confidential-containers/trustee/tree/main/attestation-service[Attestation Service] has wide open security policies.
Copy file name to clipboardExpand all lines: content/patterns/multicloud-gitops-Portworx/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Multicloud GitOps with Portworx Enterprise
3
-
date: 2023-18-05
3
+
date: 2023-05-18
4
4
tier: sandbox
5
5
summary: This pattern helps you develop and deploy applications on an open hybrid cloud in a stable, simple, and secure way. It includes persistent storage for stateful applications.
0 commit comments