You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/installation-configuration-parameters.adoc
+43-13Lines changed: 43 additions & 13 deletions
Original file line number
Diff line number
Diff line change
@@ -2428,8 +2428,18 @@ When running your cluster on GCP 64-bit ARM infrastructures, ensure that you use
2428
2428
gcp:
2429
2429
defaultMachinePlatform:
2430
2430
confidentialCompute:
2431
-
|Whether to use Confidential VMs for all machines in the cluster. Confidential VMs provide encryption for data during processing. For more information on Confidential computing, see Google's documentation on link:https://cloud.google.com/confidential-computing[Confidential computing].
2432
-
|`Enabled` or `Disabled`. The default value is `Disabled`.
2431
+
|Whether to use Confidential VMs for all machines in the cluster. Confidential VMs provide encryption for data during processing. For more information on Confidential computing, see Google's documentation about link:https://cloud.google.com/confidential-computing[Confidential Computing].
2432
+
2433
+
Supported values are:
2434
+
2435
+
* `Enabled`, which automatically selects a Confidential Computing platform
2436
+
* `Disabled`, which disables Confidential Computing
2437
+
* `AMDEncryptedVirtualization`, which enables Confidential Computing with AMD Secure Encrypted Virtualization (AMD SEV)
2438
+
* `AMDEncryptedVirtualizationNestedPaging`, which enables Confidential Computing with AMD Secure Encrypted Virtualization Secure Nested Paging (AMD SEV-SNP)
2439
+
* `IntelTrustedDomainExtensions`, which enables Confidential Computing with Intel Trusted Domain Extensions (Intel TDX)
2440
+
2441
+
If you specify any value other than `Disabled`, you must set `platform.gcp.defaultMachinePlatform.onHostMaintenance` to `Terminate`, and you must specify a region and machine type that support Confidential Computing. For more information, see Google's documentation about link:https://cloud.google.com/confidential-computing/confidential-vm/docs/supported-configurations#machine-type-cpu-zone[Supported configurations].
2442
+
|String.
2433
2443
2434
2444
|platform:
2435
2445
gcp:
@@ -2540,8 +2550,18 @@ When running your cluster on GCP 64-bit ARM infrastructures, ensure that you use
2540
2550
platform:
2541
2551
gcp:
2542
2552
confidentialCompute:
2543
-
|Whether to enable Confidential VMs for control plane machines. Confidential VMs provide encryption for data while it is being processed. For more information on Confidential VMs, see Google's documentation on link:https://cloud.google.com/confidential-computing[Confidential Computing].
2544
-
|`Enabled` or `Disabled`. The default value is `Disabled`.
2553
+
|Whether to use Confidential VMs for control plane machines. Confidential VMs provide encryption for data during processing. For more information on Confidential computing, see Google's documentation about link:https://cloud.google.com/confidential-computing[Confidential Computing].
2554
+
2555
+
Supported values are:
2556
+
2557
+
* `Enabled`, which automatically selects a Confidential Computing platform
2558
+
* `Disabled`, which disables Confidential Computing
2559
+
* `AMDEncryptedVirtualization`, which enables Confidential Computing with AMD Secure Encrypted Virtualization (AMD SEV)
2560
+
* `AMDEncryptedVirtualizationNestedPaging`, which enables Confidential Computing with AMD Secure Encrypted Virtualization Secure Nested Paging (AMD SEV-SNP)
2561
+
* `IntelTrustedDomainExtensions`, which enables Confidential Computing with Intel Trusted Domain Extensions (Intel TDX)
2562
+
2563
+
If you specify any value other than `Disabled`, you must set `controlPlane.platform.gcp.defaultMachinePlatform.onHostMaintenance` to `Terminate`.
2564
+
|String.
2545
2565
2546
2566
|controlPlane:
2547
2567
platform:
@@ -2663,8 +2683,18 @@ When running your cluster on GCP 64-bit ARM infrastructures, ensure that you use
2663
2683
platform:
2664
2684
gcp:
2665
2685
confidentialCompute:
2666
-
|Whether to enable Confidential VMs for compute machines. Confidential VMs provide encryption for data while it is being processed. For more information on Confidential VMs, see Google's documentation on link:https://cloud.google.com/confidential-computing[Confidential Computing].
2667
-
|`Enabled` or `Disabled`. The default value is `Disabled`.
2686
+
|Whether to use Confidential VMs for compute machines. Confidential VMs provide encryption for data during processing. For more information on Confidential computing, see Google's documentation on link:https://cloud.google.com/confidential-computing[Confidential computing].
2687
+
2688
+
Supported values are:
2689
+
2690
+
* `Enabled`, which automatically selects a Confidential Computing platform
2691
+
* `Disabled`, which disables Confidential Computing
2692
+
* `AMDEncryptedVirtualization`, which enables Confidential Computing with AMD Secure Encrypted Virtualization (AMD SEV)
2693
+
* `AMDEncryptedVirtualizationNestedPaging`, which enables Confidential Computing with AMD Secure Encrypted Virtualization Secure Nested Paging (AMD SEV-SNP)
2694
+
* `IntelTrustedDomainExtensions`, which enables Confidential Computing with Intel Trusted Domain Extensions (Intel TDX)
2695
+
2696
+
If you specify any value other than `Disabled`, you must set `compute.platform.gcp.onHostMaintenance` to `Terminate`.
2697
+
|String.
2668
2698
2669
2699
|compute:
2670
2700
platform:
@@ -2869,9 +2899,9 @@ endif::vsphere[]
2869
2899
failureDomains:
2870
2900
region:
2871
2901
|If you define multiple failure domains for your cluster, you must attach the tag to each vCenter data center. To define a region, use a tag from the `openshift-region` tag category. For a single vSphere data center environment, you do not need to attach a tag, but you must enter an alphanumeric value, such as `datacenter`, for the parameter.
2872
-
If you want base your failure domains on host groups, attach these tags to your vSphere clusters instead of your data centers.
2902
+
If you want to base your failure domains on host groups, attach these tags to your vSphere clusters instead of your data centers.
2873
2903
2874
-
:FeatureName: Openshift zones support for vSphere host groups
2904
+
:FeatureName: Openshift zones support for vSphere host groups
|If you define multiple failure domains for your cluster, you must attach a tag to each vCenter cluster. To define a zone, use a tag from the `openshift-zone` tag category. For a single vSphere data center environment, you do not need to attach a tag, but you must enter an alphanumeric value, such as `cluster`, for the parameter.
2902
-
If you want to base your failure domains on host groups, define zones that correspond to your host groups instead of your clusters. Use these tags to associate each ESXi host with its host group.
2932
+
If you want to base your failure domains on host groups, define zones that correspond to your host groups instead of your clusters. Use these tags to associate each ESXi host with its host group.
2903
2933
2904
2934
:FeatureName: Openshift zones support for vSphere host groups
0 commit comments