Skip to content

Commit aa5ca93

Browse files
authored
Merge pull request #94278 from bscott-rh/OSDOCS-14620
OSDOCS-14620 adding confidential compute GCP parameters
2 parents ec0f230 + 6f66195 commit aa5ca93

File tree

1 file changed

+43
-13
lines changed

1 file changed

+43
-13
lines changed

modules/installation-configuration-parameters.adoc

Lines changed: 43 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2428,8 +2428,18 @@ When running your cluster on GCP 64-bit ARM infrastructures, ensure that you use
24282428
gcp:
24292429
defaultMachinePlatform:
24302430
confidentialCompute:
2431-
|Whether to use Confidential VMs for all machines in the cluster. Confidential VMs provide encryption for data during processing. For more information on Confidential computing, see Google's documentation on link:https://cloud.google.com/confidential-computing[Confidential computing].
2432-
|`Enabled` or `Disabled`. The default value is `Disabled`.
2431+
|Whether to use Confidential VMs for all machines in the cluster. Confidential VMs provide encryption for data during processing. For more information on Confidential computing, see Google's documentation about link:https://cloud.google.com/confidential-computing[Confidential Computing].
2432+
2433+
Supported values are:
2434+
2435+
* `Enabled`, which automatically selects a Confidential Computing platform
2436+
* `Disabled`, which disables Confidential Computing
2437+
* `AMDEncryptedVirtualization`, which enables Confidential Computing with AMD Secure Encrypted Virtualization (AMD SEV)
2438+
* `AMDEncryptedVirtualizationNestedPaging`, which enables Confidential Computing with AMD Secure Encrypted Virtualization Secure Nested Paging (AMD SEV-SNP)
2439+
* `IntelTrustedDomainExtensions`, which enables Confidential Computing with Intel Trusted Domain Extensions (Intel TDX)
2440+
2441+
If you specify any value other than `Disabled`, you must set `platform.gcp.defaultMachinePlatform.onHostMaintenance` to `Terminate`, and you must specify a region and machine type that support Confidential Computing. For more information, see Google's documentation about link:https://cloud.google.com/confidential-computing/confidential-vm/docs/supported-configurations#machine-type-cpu-zone[Supported configurations].
2442+
|String.
24332443

24342444
|platform:
24352445
gcp:
@@ -2540,8 +2550,18 @@ When running your cluster on GCP 64-bit ARM infrastructures, ensure that you use
25402550
platform:
25412551
gcp:
25422552
confidentialCompute:
2543-
|Whether to enable Confidential VMs for control plane machines. Confidential VMs provide encryption for data while it is being processed. For more information on Confidential VMs, see Google's documentation on link:https://cloud.google.com/confidential-computing[Confidential Computing].
2544-
|`Enabled` or `Disabled`. The default value is `Disabled`.
2553+
|Whether to use Confidential VMs for control plane machines. Confidential VMs provide encryption for data during processing. For more information on Confidential computing, see Google's documentation about link:https://cloud.google.com/confidential-computing[Confidential Computing].
2554+
2555+
Supported values are:
2556+
2557+
* `Enabled`, which automatically selects a Confidential Computing platform
2558+
* `Disabled`, which disables Confidential Computing
2559+
* `AMDEncryptedVirtualization`, which enables Confidential Computing with AMD Secure Encrypted Virtualization (AMD SEV)
2560+
* `AMDEncryptedVirtualizationNestedPaging`, which enables Confidential Computing with AMD Secure Encrypted Virtualization Secure Nested Paging (AMD SEV-SNP)
2561+
* `IntelTrustedDomainExtensions`, which enables Confidential Computing with Intel Trusted Domain Extensions (Intel TDX)
2562+
2563+
If you specify any value other than `Disabled`, you must set `controlPlane.platform.gcp.defaultMachinePlatform.onHostMaintenance` to `Terminate`.
2564+
|String.
25452565

25462566
|controlPlane:
25472567
platform:
@@ -2663,8 +2683,18 @@ When running your cluster on GCP 64-bit ARM infrastructures, ensure that you use
26632683
platform:
26642684
gcp:
26652685
confidentialCompute:
2666-
|Whether to enable Confidential VMs for compute machines. Confidential VMs provide encryption for data while it is being processed. For more information on Confidential VMs, see Google's documentation on link:https://cloud.google.com/confidential-computing[Confidential Computing].
2667-
|`Enabled` or `Disabled`. The default value is `Disabled`.
2686+
|Whether to use Confidential VMs for compute machines. Confidential VMs provide encryption for data during processing. For more information on Confidential computing, see Google's documentation on link:https://cloud.google.com/confidential-computing[Confidential computing].
2687+
2688+
Supported values are:
2689+
2690+
* `Enabled`, which automatically selects a Confidential Computing platform
2691+
* `Disabled`, which disables Confidential Computing
2692+
* `AMDEncryptedVirtualization`, which enables Confidential Computing with AMD Secure Encrypted Virtualization (AMD SEV)
2693+
* `AMDEncryptedVirtualizationNestedPaging`, which enables Confidential Computing with AMD Secure Encrypted Virtualization Secure Nested Paging (AMD SEV-SNP)
2694+
* `IntelTrustedDomainExtensions`, which enables Confidential Computing with Intel Trusted Domain Extensions (Intel TDX)
2695+
2696+
If you specify any value other than `Disabled`, you must set `compute.platform.gcp.onHostMaintenance` to `Terminate`.
2697+
|String.
26682698

26692699
|compute:
26702700
platform:
@@ -2869,9 +2899,9 @@ endif::vsphere[]
28692899
failureDomains:
28702900
region:
28712901
|If you define multiple failure domains for your cluster, you must attach the tag to each vCenter data center. To define a region, use a tag from the `openshift-region` tag category. For a single vSphere data center environment, you do not need to attach a tag, but you must enter an alphanumeric value, such as `datacenter`, for the parameter.
2872-
If you want base your failure domains on host groups, attach these tags to your vSphere clusters instead of your data centers.
2902+
If you want to base your failure domains on host groups, attach these tags to your vSphere clusters instead of your data centers.
28732903

2874-
:FeatureName: Openshift zones support for vSphere host groups
2904+
:FeatureName: Openshift zones support for vSphere host groups
28752905
include::snippets/technology-preview.adoc[]
28762906

28772907
|String
@@ -2880,9 +2910,9 @@ include::snippets/technology-preview.adoc[]
28802910
vsphere:
28812911
failureDomains:
28822912
regionType:
2883-
|Specifies the `ComputeCluster` region type to enable host groups.
2913+
|Specifies the `ComputeCluster` region type to enable host groups.
28842914

2885-
:FeatureName: Openshift zones support for vSphere host groups
2915+
:FeatureName: Openshift zones support for vSphere host groups
28862916
include::snippets/technology-preview.adoc[]
28872917

28882918
|String
@@ -2899,7 +2929,7 @@ include::snippets/technology-preview.adoc[]
28992929
failureDomains:
29002930
zone:
29012931
|If you define multiple failure domains for your cluster, you must attach a tag to each vCenter cluster. To define a zone, use a tag from the `openshift-zone` tag category. For a single vSphere data center environment, you do not need to attach a tag, but you must enter an alphanumeric value, such as `cluster`, for the parameter.
2902-
If you want to base your failure domains on host groups, define zones that correspond to your host groups instead of your clusters. Use these tags to associate each ESXi host with its host group.
2932+
If you want to base your failure domains on host groups, define zones that correspond to your host groups instead of your clusters. Use these tags to associate each ESXi host with its host group.
29032933

29042934
:FeatureName: Openshift zones support for vSphere host groups
29052935
include::snippets/technology-preview.adoc[]
@@ -2910,7 +2940,7 @@ include::snippets/technology-preview.adoc[]
29102940
vsphere:
29112941
failureDomains:
29122942
zoneType:
2913-
|Specifies the `HostGroup` zone type to enable host groups.
2943+
|Specifies the `HostGroup` zone type to enable host groups.
29142944

29152945
:FeatureName: Openshift zones support for vSphere host groups
29162946
include::snippets/technology-preview.adoc[]
@@ -2980,7 +3010,7 @@ endif::vsphere[]
29803010
|Specifies the vSphere host group to associate with the failure domain.
29813011

29823012
:FeatureName: Openshift zones support for vSphere host groups
2983-
include::snippets/technology-preview.adoc[]
3013+
include::snippets/technology-preview.adoc[]
29843014

29853015
|String
29863016

0 commit comments

Comments
 (0)