You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Reference for commands you will encounter when interacting with Confidential VMs.
10
13
11
14
## Restarting VMs
@@ -46,11 +49,17 @@ You can also view logs in the Google Cloud Console by navigating to the Logging
46
49
47
50
:::
48
51
49
-
## Deploying AMD SEV Confidential VMs
52
+
## Deploying Confidential VMs
53
+
54
+
This guide shows commands for deploying Confidential VMs using either AMD SEV or Intel TDX.
55
+
Select the appropriate tab for your configuration, and click "Show breakdown" to see more details.
56
+
57
+
<Tabs>
58
+
<TabItemvalue="amd-sev"label="AMD SEV">
59
+
60
+
### Deploying AMD SEV Confidential VMs
50
61
51
-
This command creates a Confidential Computing VM instance using AMD SEV ([Secure Encrypted Virtualization](https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/memory-encryption-white-paper.pdf)), with a specific image, network configuration, and security settings.
52
-
The metadata section is critical for configuring the Trusted Execution Environment (TEE).
53
-
The command is broken down in the following sections.
62
+
This command creates a Confidential Computing VM instance using AMD SEV ([Secure Encrypted Virtualization](https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/memory-encryption-white-paper.pdf)) with specific image, network, and security settings. The metadata section is critical for configuring the Trusted Execution Environment (TEE).
-`--project=verifiable-ai-hackathon`: Specifies the Google Cloud project where the VM will be created.
104
116
-`--zone=us-central1-c`: Defines the zone within the `us-central1` region where the instance will reside. Choosing a zone is important for latency and resource availability.
-`tee-container-log-redirect=true`: Enables redirecting container logs to both Cloud Logging and serial logging, which can be helpful for debugging.
129
141
-`tee-env-<ENV_VAR_NAME1>=<ENV_VAR_VALUE1>,tee-env-<ENV_VAR_NAME2>=<ENV_VAR_VALUE2>`: Sets environment variables within the TEE environment. Replace `<ENV_VAR_NAME1>`, `<ENV_VAR_VALUE1>`, `<ENV_VAR_NAME2>`, and `<ENV_VAR_VALUE2>` with your desired environment variable names and values. This is how you would pass secrets or other configuration data to the application running inside the TEE.
-`--reservation-affinity=any`: If you have reservations, this allows the VM to use any available reservation.
189
201
-`--confidential-compute-type=SEV`: Enables AMD SEV (Secure Encrypted Virtualization) Confidential Computing. This is the core flag that makes this instance a confidential VM.
This command creates a Confidential Computing VM instance using Intel TDX ([Trust Domain Extensions](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/documentation.html)), with a specific image, network configuration, and security settings.
194
209
The command instructions differing from [Deploying AMD SEV Confidential VMs](#deploying-amd-sev-confidential-vms) are highlighted.
@@ -226,6 +241,9 @@ type=pd-balanced \
226
241
--confidential-compute-type=TDX
227
242
```
228
243
244
+
</TabItem>
245
+
</Tabs>
246
+
229
247
**Differences:**
230
248
231
249
- Use the `c3-standard-*` series of machines running on Intel Sapphire Rapids
0 commit comments