Uploaded image for project: 'CoreOS OCP'
  1. CoreOS OCP
  2. COS-1794

Confidential Computing: Phase 0: Mark GCP images as AMD SEV-capable

XMLWordPrintable

    • CC: GCP SEV Support
    • BU Product Work
    • False
    • Hide

      None

      Show
      None
    • False
    • Not Selected
    • To Do
    • OCPSTRAT-614 - Add support to Confidential Computing on GCP (Technology Preview)
    • OCPSTRAT-614Add support to Confidential Computing on GCP (Technology Preview)
    • 0% To Do, 0% In Progress, 100% Done
    • 0
    • 0

      Background

      Google Cloud Platform supports "Confidential Compute Instances" which are run on AMD SEV hardware nodes.

      In order to fully support this VM option for cluster installs, the images need to be marked as SEV-capable.

      Note: RHEL supports SEV as a guest in current releases of 8.4.z and 8.6.z.

      This is the first step to enable Confidential Computing for RHCOS. See also https://issues.redhat.com/browse/OCPBU-142?focusedCommentId=21387196&page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-21387196.

        There are no Sub-Tasks for this issue.

            walters@redhat.com Colin Walters
            rhn-support-mrussell Mark Russell
            CoreOS OS Integration & Delivery
            Votes:
            0 Vote for this issue
            Watchers:
            15 Start watching this issue

              Created:
              Updated:
              Resolved: