зеркало из https://github.com/Azure/aks-engine.git
51 строка
1.6 KiB
Markdown
51 строка
1.6 KiB
Markdown
|
# Using SGX with Kubernetes
|
||
|
|
||
|
[Intel® Secure Guard Extension](https://software.intel.com/en-us/sgx) (Intel® SGX) is an architecture extension designed to increase the security of application code and data.
|
||
|
Developers may choose [Intel® SGX SDK](https://software.intel.com/en-us/sgx-sdk) or [Open Enclave SDK](https://github.com/Microsoft/openenclave/) to create applications that leverage this technology.
|
||
|
|
||
|
Azure supports provisioning of SGX-enabled VMs under the umbrella of Azure Confidential Compute (ACC). You can create a Kubernetes cluster with one or multiple agent pool(s) running ACC VMs by specifying VM size `Standard_DC*` and distro `acc-16.04`.
|
||
|
```
|
||
|
"agentPoolProfiles": [
|
||
|
{
|
||
|
"name": "agentpool",
|
||
|
"count": 3,
|
||
|
"distro": "acc-16.04",
|
||
|
"availabilityProfile": "AvailabilitySet",
|
||
|
"vmSize": "Standard_DC2s"
|
||
|
}
|
||
|
],
|
||
|
```
|
||
|
|
||
|
The SGX driver is automatically installed on every ACC node in your cluster, so you don't need to do that manually.
|
||
|
|
||
|
## Running a SGX-enabled container
|
||
|
|
||
|
When running an SGX container, you will need to mount the drivers from the host (the kubernetes node) into the container.
|
||
|
|
||
|
On the host, the drivers are installed under `/dev/sgx`.
|
||
|
|
||
|
Here is an example template of Pod YAML file:
|
||
|
|
||
|
```yaml
|
||
|
apiVersion: v1
|
||
|
kind: Pod
|
||
|
metadata:
|
||
|
name: <POD NAME>
|
||
|
spec:
|
||
|
containers:
|
||
|
- name: <NAME>
|
||
|
image: <IMAGE>
|
||
|
command: <COMMAND>
|
||
|
imagePullPolicy: IfNotPresent
|
||
|
volumeDevices:
|
||
|
- devicePath: /dev/sgx
|
||
|
name: dev-sgx
|
||
|
securityContext:
|
||
|
privileged: true
|
||
|
volumes:
|
||
|
- name: dev-sgx
|
||
|
hostPath:
|
||
|
path: /dev/sgx
|
||
|
```
|
||
|
|