You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Reference for commands you will encounter when interacting with Confidential VMs.
13
10
14
11
## Restarting VMs
@@ -49,17 +46,11 @@ You can also view logs in the Google Cloud Console by navigating to the Logging
49
46
50
47
:::
51
48
52
-
## Deploying Confidential VMs
53
-
54
-
This guide shows commands for deploying Confidential VMs using either AMD SEV or Intel TDX.
55
-
Select the appropriate tab for your configuration, and click "Show breakdown" to see more details.
56
-
57
-
<Tabs>
58
-
<TabItemvalue="amd-sev"label="AMD SEV">
59
-
60
-
### Deploying AMD SEV Confidential VMs
49
+
## Deploying AMD SEV Confidential VMs
61
50
62
-
This command creates a Confidential Computing VM instance using AMD SEV ([Secure Encrypted Virtualization](https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/memory-encryption-white-paper.pdf)) with specific image, network, and security settings. The metadata section is critical for configuring the Trusted Execution Environment (TEE).
51
+
This command creates a Confidential Computing VM instance using AMD SEV ([Secure Encrypted Virtualization](https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/memory-encryption-white-paper.pdf)), with a specific image, network configuration, and security settings.
52
+
The metadata section is critical for configuring the Trusted Execution Environment (TEE).
53
+
The command is broken down in the following sections.
-`--project=verifiable-ai-hackathon`: Specifies the Google Cloud project where the VM will be created.
116
104
-`--zone=us-central1-c`: Defines the zone within the `us-central1` region where the instance will reside. Choosing a zone is important for latency and resource availability.
-`tee-container-log-redirect=true`: Enables redirecting container logs to both Cloud Logging and serial logging, which can be helpful for debugging.
141
129
-`tee-env-<ENV_VAR_NAME1>=<ENV_VAR_VALUE1>,tee-env-<ENV_VAR_NAME2>=<ENV_VAR_VALUE2>`: Sets environment variables within the TEE environment. Replace `<ENV_VAR_NAME1>`, `<ENV_VAR_VALUE1>`, `<ENV_VAR_NAME2>`, and `<ENV_VAR_VALUE2>` with your desired environment variable names and values. This is how you would pass secrets or other configuration data to the application running inside the TEE.
-`--reservation-affinity=any`: If you have reservations, this allows the VM to use any available reservation.
201
189
-`--confidential-compute-type=SEV`: Enables AMD SEV (Secure Encrypted Virtualization) Confidential Computing. This is the core flag that makes this instance a confidential VM.
This command creates a Confidential Computing VM instance using Intel TDX ([Trust Domain Extensions](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/documentation.html)), with a specific image, network configuration, and security settings.
209
194
The command instructions differing from [Deploying AMD SEV Confidential VMs](#deploying-amd-sev-confidential-vms) are highlighted.
@@ -241,9 +226,6 @@ type=pd-balanced \
241
226
--confidential-compute-type=TDX
242
227
```
243
228
244
-
</TabItem>
245
-
</Tabs>
246
-
247
229
**Differences:**
248
230
249
231
- Use the `c3-standard-*` series of machines running on Intel Sapphire Rapids
0 commit comments