Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Chapter 2. New features and enhancements


This section describes new features and enhancements introduced in OpenShift sandboxed containers 1.12.

Confidential containers on bare metal

In this update, OpenShift sandboxed containers on bare-metal servers now support encrypted persistent volumes, providing a secure, durable storage solution for sensitive workloads. This enhancement addresses the demand for data persistence within sandboxed environments while ensuring that data remains encrypted at rest.

Key enhancements in this release include:

  • Encrypted block volumes: You can now encrypt, decrypt and mount block volumes directly within the confidential container using raw block volumes. This ensures that encryption and decryption happen inside the Trusted Execution Environment (TEE) rather than at the worker node level, maintaining data confidentiality throughout the storage lifecycle.
  • Red Hat build of Trustee 1.1.0 is now generally available and is the recommended version for use with OpenShift sandboxed containers 1.12.
  • Simplified Trustee configuration: Deployment of Red Hat build of Trustee is significantly simplified through the new TrusteeConfig custom resource. Key features include:

    • Automated resource generation: Automatically generates required secrets, config maps, and the KbsConfig resource.
    • Profile-based configuration: Offers a Permissive profile for quick-start development and a Restricted profile for production-grade security.
    • Service exposure options: Support for ClusterIP, NodePort, and LoadBalancer by using the kbsServiceType field.
    • Platform-specific extensions: Native support for IBM Secure Execution, Intel TDX, and disconnected (air-gapped) environments.
  • Pre-built initramfs: Initial RAM File System (initramfs) images are now pre-built and provide known Measurement Hashes. Hardware evaluates initramfs contents before booting the confidential virtual machine, making initramfs a critical link in the chain of trust. Pre-built images eliminate the need for runtime builds that could be compromised.

    These improvements aim at simplifying the deployment and management of storage and security resources so that end users can manage their confidential container workloads on bare metal more effectively.

Jira:KATA-4394

Red Hat logoGithubredditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat Dokumentation

Legal Notice

Theme

© 2026 Red Hat
Nach oben