Uploaded image for project: 'CoreOS OCP'
  1. CoreOS OCP
  2. COS-1794

Confidential Computing: Phase 0: Mark GCP images as AMD SEV-capable

XMLWordPrintable

    • CC: GCP SEV Support
    • Strategic Product Work
    • False
    • Hide

      None

      Show
      None
    • False
    • Not Selected
    • To Do
    • OCPSTRAT-614 - Add support to Confidential Computing on GCP (Technology Preview)
    • OCPSTRAT-614Add support to Confidential Computing on GCP (Technology Preview)
    • 0% To Do, 0% In Progress, 100% Done
    • 0
    • 0

      Background

      Google Cloud Platform supports "Confidential Compute Instances" which are run on AMD SEV hardware nodes.

      In order to fully support this VM option for cluster installs, the images need to be marked as SEV-capable.

      Note: RHEL supports SEV as a guest in current releases of 8.4.z and 8.6.z.

      This is the first step to enable Confidential Computing for RHCOS. See also https://issues.redhat.com/browse/OCPBU-142?focusedCommentId=21387196&page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-21387196.

              walters@redhat.com Colin Walters
              rhn-support-mrussell Mark Russell
              CoreOS OS Integration & Delivery
              Votes:
              0 Vote for this issue
              Watchers:
              15 Start watching this issue

                Created:
                Updated:
                Resolved: