Skip to content

Commit 4279b06

Browse files
committed
fix: remove tab feature in cookbook
1 parent 5bd7d33 commit 4279b06

File tree

1 file changed

+13
-31
lines changed

1 file changed

+13
-31
lines changed

docs/hackathon/1-cookbook.mdx

Lines changed: 13 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,6 @@ description: Cookbook commands for managing Confidential VMs.
66
keywords: [flare, ai, confidential-compute, hackathon, google-cloud, onboarding]
77
---
88

9-
import Tabs from "@theme/Tabs";
10-
import TabItem from "@theme/TabItem";
11-
129
Reference for commands you will encounter when interacting with Confidential VMs.
1310

1411
## Restarting VMs
@@ -49,17 +46,11 @@ You can also view logs in the Google Cloud Console by navigating to the Logging
4946

5047
:::
5148

52-
## Deploying Confidential VMs
53-
54-
This guide shows commands for deploying Confidential VMs using either AMD SEV or Intel TDX.
55-
Select the appropriate tab for your configuration, and click "Show breakdown" to see more details.
56-
57-
<Tabs>
58-
<TabItem value="amd-sev" label="AMD SEV">
59-
60-
### Deploying AMD SEV Confidential VMs
49+
## Deploying AMD SEV Confidential VMs
6150

62-
This command creates a Confidential Computing VM instance using AMD SEV ([Secure Encrypted Virtualization](https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/memory-encryption-white-paper.pdf)) with specific image, network, and security settings. The metadata section is critical for configuring the Trusted Execution Environment (TEE).
51+
This command creates a Confidential Computing VM instance using AMD SEV ([Secure Encrypted Virtualization](https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/memory-encryption-white-paper.pdf)), with a specific image, network configuration, and security settings.
52+
The metadata section is critical for configuring the Trusted Execution Environment (TEE).
53+
The command is broken down in the following sections.
6354

6455
```bash
6556
# highlight-next-line
@@ -93,10 +84,7 @@ gcloud compute instances create $INSTANCE_NAME \
9384
--confidential-compute-type=SEV
9485
```
9586

96-
<details>
97-
<summary>Show breakdown of command sections</summary>
98-
99-
#### Core command & instance name
87+
### Core command & instance name
10088

10189
```bash
10290
gcloud compute instances create $INSTANCE_NAME \
@@ -105,7 +93,7 @@ gcloud compute instances create $INSTANCE_NAME \
10593
- `gcloud compute instances create`: This is the base command for creating a new Compute Engine virtual machine (VM) instance.
10694
- `$INSTANCE_NAME`: You need to replace this with the desired name for your VM instance.
10795

108-
#### Project and zone
96+
### Project and zone
10997

11098
```bash
11199
--project=verifiable-ai-hackathon \
@@ -115,7 +103,7 @@ gcloud compute instances create $INSTANCE_NAME \
115103
- `--project=verifiable-ai-hackathon`: Specifies the Google Cloud project where the VM will be created.
116104
- `--zone=us-central1-c`: Defines the zone within the `us-central1` region where the instance will reside. Choosing a zone is important for latency and resource availability.
117105

118-
#### Machine type & network configuration
106+
### Machine type & network configuration
119107

120108
```bash
121109
--machine-type=n2d-standard-2 \
@@ -129,7 +117,7 @@ gcloud compute instances create $INSTANCE_NAME \
129117
- `stack-type=IPV4_ONLY`: Specifies that the instance will use IPv4 only.
130118
- `subnet=default`: Attaches the instance to the default subnet in the specified zone's VPC network.
131119

132-
#### Metadata (crucial for Confidential Computing)
120+
### Metadata (crucial for Confidential Computing)
133121

134122
```bash
135123
--metadata=tee-image-reference=$TEE_IMAGE_REFERENCE,tee-container-log-redirect=true,tee-env-<ENV_VAR_NAME1>=<ENV_VAR_VALUE1>,tee-env-<ENV_VAR_NAME2>=<ENV_VAR_VALUE2>\
@@ -140,7 +128,7 @@ gcloud compute instances create $INSTANCE_NAME \
140128
- `tee-container-log-redirect=true`: Enables redirecting container logs to both Cloud Logging and serial logging, which can be helpful for debugging.
141129
- `tee-env-<ENV_VAR_NAME1>=<ENV_VAR_VALUE1>,tee-env-<ENV_VAR_NAME2>=<ENV_VAR_VALUE2>`: Sets environment variables within the TEE environment. Replace `<ENV_VAR_NAME1>`, `<ENV_VAR_VALUE1>`, `<ENV_VAR_NAME2>`, and `<ENV_VAR_VALUE2>` with your desired environment variable names and values. This is how you would pass secrets or other configuration data to the application running inside the TEE.
142130

143-
#### Other instance settings
131+
### Other instance settings
144132

145133
```bash
146134
--maintenance-policy=MIGRATE \
@@ -158,7 +146,7 @@ gcloud compute instances create $INSTANCE_NAME \
158146
- `--min-cpu-platform="AMD Milan"`: Ensures that the VM runs on a host with an AMD Milan CPU, which is required for Confidential Computing with SEV.
159147
- `--tags=flare-ai-core,http-server,https-server`: Applies network tags to the VM, which can be used for firewall rules and network routing.
160148

161-
#### Boot disk configuration
149+
### Boot disk configuration
162150

163151
```bash
164152
--create-disk=auto-delete=yes,boot=yes,\
@@ -175,7 +163,7 @@ gcloud compute instances create $INSTANCE_NAME \
175163
- `size=11`: The disk size is 11 GB.
176164
- `type=pd-standard`: Uses a standard persistent disk.
177165

178-
#### Shielded VM options
166+
### Shielded VM options
179167

180168
```bash
181169
--shielded-secure-boot \
@@ -188,7 +176,7 @@ gcloud compute instances create $INSTANCE_NAME \
188176
- `--shielded-vtpm`: Enables virtual Trusted Platform Module (vTPM).
189177
- `--shielded-integrity-monitoring`: Enables integrity monitoring.
190178

191-
#### Labels, reservation affinity, and confidential compute
179+
### Labels, reservation affinity, and confidential compute
192180

193181
```bash
194182
--labels=goog-ec-src=vm_add-gcloud \
@@ -200,10 +188,7 @@ gcloud compute instances create $INSTANCE_NAME \
200188
- `--reservation-affinity=any`: If you have reservations, this allows the VM to use any available reservation.
201189
- `--confidential-compute-type=SEV`: Enables AMD SEV (Secure Encrypted Virtualization) Confidential Computing. This is the core flag that makes this instance a confidential VM.
202190

203-
</details>
204-
</TabItem> <TabItem value="intel-tdx" label="Intel TDX">
205-
206-
### Deploying Intel TDX Confidential VMs
191+
## Deploying Intel TDX Confidential VMs
207192

208193
This command creates a Confidential Computing VM instance using Intel TDX ([Trust Domain Extensions](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/documentation.html)), with a specific image, network configuration, and security settings.
209194
The command instructions differing from [Deploying AMD SEV Confidential VMs](#deploying-amd-sev-confidential-vms) are highlighted.
@@ -241,9 +226,6 @@ type=pd-balanced \
241226
--confidential-compute-type=TDX
242227
```
243228

244-
</TabItem>
245-
</Tabs>
246-
247229
**Differences:**
248230

249231
- Use the `c3-standard-*` series of machines running on Intel Sapphire Rapids

0 commit comments

Comments
 (0)