You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/hackathon/1-cookbook.mdx
+16-6Lines changed: 16 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,19 @@ import ConfidentialVMBuilder from "@site/src/components/ConfidentialVMBuilder";
10
10
11
11
Reference for commands you will encounter when interacting with Confidential VMs.
12
12
13
-
## Command Builder
13
+
## Confidential Space command builder
14
14
15
-
Use this interactive builder to generate the exact command you need:
15
+
Use this interactive builder to generate the exact Confidential Space VM deploy command you need.
16
+
17
+
:::warning[Source your .env file]
18
+
19
+
Before running the following gcloud command don't forget to source your `.env` file:
20
+
21
+
```bash
22
+
source .env
23
+
```
24
+
25
+
:::
16
26
17
27
<ConfidentialVMBuilder />
18
28
@@ -54,9 +64,9 @@ You can also view logs in the Google Cloud Console by navigating to the Logging
54
64
55
65
:::
56
66
57
-
## Deploying AMD SEV Confidential VMs
67
+
## Deploying on AMD SEV
58
68
59
-
This command creates a Confidential Computing VM instance using AMD SEV ([Secure Encrypted Virtualization](https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/memory-encryption-white-paper.pdf)), with a specific image, network configuration, and security settings.
69
+
This command creates a Confidential Space VM instance using AMD SEV ([Secure Encrypted Virtualization](https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/memory-encryption-white-paper.pdf)), with a specific image, network configuration, and security settings.
60
70
The metadata section is critical for configuring the Trusted Execution Environment (TEE).
61
71
The command is broken down in the following sections.
-`--reservation-affinity=any`: If you have reservations, this allows the VM to use any available reservation.
197
207
-`--confidential-compute-type=SEV`: Enables AMD SEV (Secure Encrypted Virtualization) Confidential Computing. This is the core flag that makes this instance a confidential VM.
198
208
199
-
## Deploying Intel TDX Confidential VMs
209
+
## Deploying on Intel TDX
200
210
201
-
This command creates a Confidential Computing VM instance using Intel TDX ([Trust Domain Extensions](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/documentation.html)), with a specific image, network configuration, and security settings.
211
+
This command creates a Confidential Space VM instance using Intel TDX ([Trust Domain Extensions](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/documentation.html)), with a specific image, network configuration, and security settings.
202
212
The command instructions differing from [Deploying AMD SEV Confidential VMs](#deploying-amd-sev-confidential-vms) are highlighted.
0 commit comments