Chapter 5. Deploying confidential containers on IBM Z and IBM LinuxONE bare-metal servers
You can deploy confidential containers workloads on a Red Hat OpenShift Container Platform cluster running on IBM Z® and IBM® LinuxONE bare-metal servers.
In the bare metal approach, you launch confidential containers virtual machines (VMs) directly on a logical partition (LPAR) that is booted with Red Hat Enterprise Linux CoreOS (RHCOS). The LPAR acts as a compute node in the cluster, providing a dedicated environment for running confidential workloads.
This approach eliminates the need for intermediate peer pod components, resulting in faster boot times, quicker recovery from failures, and simpler storage integration. As a result, it is suitable for production workloads that require high performance, consistent storage behaviour, and resource management that aligns with Kubernetes standards.
Confidential containers on IBM Z® and IBM® LinuxONE bare-metal servers is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
5.1. Preparation Copy linkLink copied to clipboard!
Review these prerequisites and concepts before you deploy confidential containers on IBM Z® and IBM® LinuxONE bare-metal servers.
5.1.1. Prerequisites Copy linkLink copied to clipboard!
- You have installed the latest version of Red Hat OpenShift Container Platform on the cluster where you are running your confidential containers workload.
- You have deployed Red Hat build of Trustee on an OpenShift Container Platform cluster in a trusted environment. For more information, see Deploying Red Hat build of Trustee.
5.1.2. Initdata Copy linkLink copied to clipboard!
The initdata specification provides a flexible way to initialize a pod with workload-specific data at runtime, avoiding the need to embed such data in the virtual machine (VM) image.
This approach enhances security by reducing the exposure of confidential information and improves flexibility by eliminating custom image builds. For example, initdata can include three configuration settings:
- An X.509 certificate for secure communication.
- A cryptographic key for authentication.
-
An optional Kata Agent
policy.regofile to enforce runtime behavior when overriding the default Kata Agent policy.
The initdata content configures the following components:
- Attestation Agent (AA), which verifies the trustworthiness of the pod by sending evidence for attestation.
- Confidential Data Hub (CDH), which manages secrets and secure data access within the pod VM.
- Kata Agent, which enforces runtime policies and manages the lifecycle of the containers inside the pod VM.
You create an initdata.toml file and convert it to a Base64-encoded, gzip-format string. You add the initdata string as an annotation to a pod manifest, allowing customization for individual workloads.
5.2. Deployment overview Copy linkLink copied to clipboard!
You deploy confidential containers on IBM Z® and IBM® LinuxONE bare-metal servers by performing the following steps:
- Install the OpenShift sandboxed containers Operator.
- Configure auto-detection of TEEs.
- Enable the confidential containers feature gate.
- Create initdata to initialize a peer pod with sensitive or workload-specific data at runtime.
- Upload a Secure Execution image to the container registry.
-
Create the
kata-addon-artifactsconfig map. Create initdata to initialize a pod with sensitive or workload-specific data at runtime.
ImportantDo not use the default permissive Kata Agent policy in a production environment. You must configure a restrictive policy, preferably by creating initdata.
As a minimum requirement, you must disable
ExecProcessRequestto prevent a cluster administrator from accessing sensitive data by running theoc execcommand on a confidential containers pod.- Apply initdata to a pod.
-
Create the
KataConfigCR. - Verify the attestation process.
5.3. Creating MachineConfig config map for TDX Copy linkLink copied to clipboard!
If you use Intel Trust Domain Extensions (TDX), you must create a MachineConfig object before you install the Red Hat build of Trustee Operator.
Procedure
Create a
tdx-machine-config.yamlmanifest file according to the following example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Specify
masterfor single-node OpenShift orkata-ocfor a multi-node cluster.
Create the TDX config map by running the following command:
oc create -f tdx-config.yaml
$ oc create -f tdx-config.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
5.4. Installing and upgrading the OpenShift sandboxed containers Operator Copy linkLink copied to clipboard!
You can install or upgrade the OpenShift sandboxed containers Operator by using the command line interface (CLI).
You must configure the OpenShift sandboxed containers Operator subscription for manual updates by setting the value of installPlanApproval to Manual. Automatic updates are not supported.
Prerequisites
-
You have access to the cluster as a user with the
cluster-adminrole.
Procedure
Create an
osc-namespace.yamlmanifest file:apiVersion: v1 kind: Namespace metadata: name: openshift-sandboxed-containers-operator
apiVersion: v1 kind: Namespace metadata: name: openshift-sandboxed-containers-operatorCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create the namespace by running the following command:
oc apply -f osc-namespace.yaml
$ oc apply -f osc-namespace.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create an
osc-operatorgroup.yamlmanifest file:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the operator group by running the following command:
oc apply -f osc-operatorgroup.yaml
$ oc apply -f osc-operatorgroup.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create an
osc-subscription.yamlmanifest file:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the subscription by running the following command:
oc create -f osc-subscription.yaml
$ oc create -f osc-subscription.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Get the
InstallPlanCR for the OpenShift sandboxed containers Operator by running the following command:oc get installplan -n openshift-sandboxed-containers-operator
$ oc get installplan -n openshift-sandboxed-containers-operatorCopy to Clipboard Copied! Toggle word wrap Toggle overflow Installation example output
NAME CSV APPROVAL APPROVED install-bl4fl sandboxed-containers-operator.v1.11.0 Manual false
NAME CSV APPROVAL APPROVED install-bl4fl sandboxed-containers-operator.v1.11.0 Manual falseCopy to Clipboard Copied! Toggle word wrap Toggle overflow Upgrade example output
NAME CSV APPROVAL APPROVED install-jdzrb sandboxed-containers-operator.v1.11.0 Manual false install-pfk8l sandboxed-containers-operator.v1.10.3 Manual true
NAME CSV APPROVAL APPROVED install-jdzrb sandboxed-containers-operator.v1.11.0 Manual false install-pfk8l sandboxed-containers-operator.v1.10.3 Manual trueCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Approve the manual installation by running the following command:
oc patch installplan <installplan_name> -p '{"spec":{"approved":true}}' --type=merge -n openshift-sandboxed-containers-operator$ oc patch installplan <installplan_name> -p '{"spec":{"approved":true}}' --type=merge -n openshift-sandboxed-containers-operatorCopy to Clipboard Copied! Toggle word wrap Toggle overflow <installplan_name>-
Specify the
InstallPlanresource. For example,install-jdzrb.
Verify that the Operator is correctly installed by running the following command:
oc get csv -n openshift-sandboxed-containers-operator
$ oc get csv -n openshift-sandboxed-containers-operatorCopy to Clipboard Copied! Toggle word wrap Toggle overflow This command can take several minutes to complete.
Watch the process by running the following command:
watch oc get csv -n openshift-sandboxed-containers-operator
$ watch oc get csv -n openshift-sandboxed-containers-operatorCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME DISPLAY VERSION REPLACES PHASE openshift-sandboxed-containers openshift-sandboxed-containers-operator 1.11.0 1.10.3 Succeeded
NAME DISPLAY VERSION REPLACES PHASE openshift-sandboxed-containers openshift-sandboxed-containers-operator 1.11.0 1.10.3 SucceededCopy to Clipboard Copied! Toggle word wrap Toggle overflow
5.5. Configuring auto-detection of TEEs Copy linkLink copied to clipboard!
You must configure your nodes so that the OpenShift sandboxed containers Operator can detect the Trusted Execution Environments (TEEs).
You label the nodes by installing and configuring the Node Feature Discovery (NFD) Operator.
5.5.1. Creating a NodeFeatureDiscovery custom resource Copy linkLink copied to clipboard!
Prerequisites
- You have installed the NFD Operator. For more information, see Node Feature Discovery Operator in the OpenShift Container Platform documentation.
Procedure
Create a
my-nfd.yamlmanifest file according to the following example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the
NodeFeatureDiscoveryCR:oc create -f my-nfd.yaml
$ oc create -f my-nfd.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
5.5.2. Creating the NodeFeatureRule custom resource Copy linkLink copied to clipboard!
Procedure
Create a custom resource manifest named
my-nodefeaturerule.yamlfor your TEE:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Create the
NodeFeatureRuleCR by running the following command:oc create -f my-nodefeaturerule.yaml
$ oc create -f my-nodefeaturerule.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
A relabeling delay of up to 1 minute might occur.
5.6. Creating the osc-feature-gates config map Copy linkLink copied to clipboard!
You enable the confidential containers feature gate by creating the config map.
Bare metal solutions on IBM Z® and IBM® LinuxONE now support only a DaemonSet deployment approach. This method uses the prebuilt image pull process to ensure the virtual machine (VM) runs a Secure Execution-enabled kernel image.
Procedure
Create a
my-feature-gate.yamlmanifest file:Copy to Clipboard Copied! Toggle word wrap Toggle overflow where
<deployment_mode>On OpenShift Container Platform clusters with the Machine Config Operator (MCO), the
deploymentModefield is optional and can be omitted. Specifies the strategy for installing and configuring the Kata runtime. Specify the deployment mode:-
MachineConfigfor clusters that always use the MCO -
DaemonSetfor clusters that never use the MCO -
DaemonSetFallbackfor clusters that sometimes use the MCO
-
Create the
my-feature-gatesconfig map by running the following command:oc create -f my-feature-gate.yaml
$ oc create -f my-feature-gate.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
5.7. Uploading a Secure Execution image to the container registry Copy linkLink copied to clipboard!
You can either use a custom Secure Execution image or an IBM® Hyper Protect Confidential Container (HPCC) image to deploy confidential containers on IBM Z and IBM LinuxONE bare-metal servers.
You must build a Secure Execution image, create a Dockerfile and push the image to your container registry.
Procedure
- Build a Secure Execution image.
Create a
Dockerfilefile for the Secure Execution image:FROM alpine:3.20 RUN mkdir -p /images COPY ./<image_name> /images/<image_name> RUN chmod 644 /images/<image_name>
FROM alpine:3.20 RUN mkdir -p /images COPY ./<image_name> /images/<image_name> RUN chmod 644 /images/<image_name>Copy to Clipboard Copied! Toggle word wrap Toggle overflow <image_name>-
Specify the custom Secure Execution image name. For example,
se.img.
Build a container image with a custom tag from the
Dockerfile:docker build -t <registry_name>/<user_name>/kata-se-artifacts:<image_tag> .
$ docker build -t <registry_name>/<user_name>/kata-se-artifacts:<image_tag> .Copy to Clipboard Copied! Toggle word wrap Toggle overflow Push the container image to your registry:
docker push <registry_name>/<user_name>/kata-se-artifacts:<image_tag>
$ docker push <registry_name>/<user_name>/kata-se-artifacts:<image_tag>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
5.8. Creating the kata-addon-artifacts config map Copy linkLink copied to clipboard!
You must create the kata-addon-artifacts config map to enable the use of custom kernel artifacts from container images when deploying in daemon set mode.
If you are using the IBM® Hyper Protect Confidential Container (HPCC) image, see IBM HPCC documentation for further procedure information.
Procedure
Create the
kata-addon-artifacts.yamlmanifest file:Copy to Clipboard Copied! Toggle word wrap Toggle overflow <container_image_path>-
Specify the path to your container image in the registry. For example,
quay.io/openshift_sandboxed_containers/kata-se-artifacts:v1.0. <kernel_path>-
Specify the kernel path inside the image. For example,
/images/se.img.
Create the
kata-addon-artifactsconfig map by running the following command:oc create -f kata-addon-artifacts.yaml
$ oc create -f kata-addon-artifacts.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
5.9. Creating initdata Copy linkLink copied to clipboard!
You create initdata to securely initialize a pod with sensitive or workload-specific data at runtime, thus avoiding the need to embed this data in a virtual machine image. This approach provides additional security by reducing the risk of exposure of confidential information and eliminates the need for custom image builds.
You can specify initdata in the pods config map, for global configuration, or in a pod manifest, for a specific pod. The initdata value in a pod manifest overrides the value set in the pods config map.
In a production environment, you must create initdata to override the default permissive Kata agent policy.
You can specify initdata in the pod manifest, for a specific pod.
You must delete the kbs_cert setting if you configure insecure_http = true in the kbs-config config map for Red Hat build of Trustee.
Procedure
Obtain the Red Hat build of Trustee IP address by running the following command:
oc get node $(oc get pod -n trustee-operator-system \ -o jsonpath='{.items[0].spec.nodeName}') \ -o jsonpath='{.status.addresses[?(@.type=="InternalIP")].address}'$ oc get node $(oc get pod -n trustee-operator-system \ -o jsonpath='{.items[0].spec.nodeName}') \ -o jsonpath='{.status.addresses[?(@.type=="InternalIP")].address}'Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
192.168.122.22
192.168.122.22Copy to Clipboard Copied! Toggle word wrap Toggle overflow Obtain the port by running the following command:
oc get svc kbs-service -n trustee-operator-system
$ oc get svc kbs-service -n trustee-operator-systemCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE kbs-service NodePort 172.30.116.11 <none> 8080:32178/TCP 12d
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE kbs-service NodePort 172.30.116.11 <none> 8080:32178/TCP 12dCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create the
initdata.tomlfile:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - url
- Specify the Red Hat build of Trustee
- <kbs_certificate>
- Specify the Base64-encoded TLS certificate for the attestation agent.
- kbs_cert
-
Delete the
kbs_certsetting if you configureinsecure_http = truein thekbs-configconfig map for Red Hat build of Trustee. - image_security_policy_uri
-
Optional, only if you enabled the container image signature verification policy. Replace
<secret-policy-name>and<key>with the secret name and key, respectively specified in Creating the KbsConfig custom resource.
Convert the
initdata.tomlfile to a Base64-encoded string in gzip format in a text file by running the following command:cat initdata.toml | gzip | base64 -w0 > initdata.txt
$ cat initdata.toml | gzip | base64 -w0 > initdata.txtCopy to Clipboard Copied! Toggle word wrap Toggle overflow Record this string to use in the pod manifest.
5.10. Applying initdata to a pod Copy linkLink copied to clipboard!
You can override the global INITDATA setting by applying customized initdata to a specific pod for special use cases, such as development and testing with a relaxed policy, or when using different Red Hat build of Trustee configurations. You can customize initdata by adding an annotation to the workload pod YAML.
Prerequisite
- You have created an initdata string.
Procedure
Add the initdata string to the pod manifest:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the pod by running the following command:
oc create -f my-pod.yaml
$ oc create -f my-pod.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
5.11. Creating the KataConfig custom resource Copy linkLink copied to clipboard!
You must create the KataConfig custom resource (CR) to install kata-cc as a runtime class on your worker nodes.
OpenShift sandboxed containers installs kata-cc as a secondary, optional runtime on the cluster and not as the primary runtime.
Creating the KataConfig CR automatically reboots the worker nodes. The reboot can take from 10 to more than 60 minutes. The following factors can increase the reboot time:
- A large OpenShift Container Platform deployment with a greater number of worker nodes.
- Activation of the BIOS and Diagnostics utility.
- Deployment on a hard disk drive rather than an SSD.
- Deployment on physical nodes such as bare metal, rather than on virtual nodes.
- A slow CPU and network.
Procedure
Create an
example-kataconfig.yamlmanifest file according to the following example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Optional: If you have applied node labels to install
kata-ccon specific nodes, specify the key and value, for example,cc: 'true'.
Create the
KataConfigCR by running the following command:oc create -f example-kataconfig.yaml
$ oc create -f example-kataconfig.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow The new
KataConfigCR is created and installskata-ccas a runtime class on the worker nodes.Wait for the
kata-ccinstallation to complete and the worker nodes to reboot before verifying the installation.Monitor the installation progress by running the following command:
watch "oc describe kataconfig | sed -n /^Status:/,/^Events/p"
$ watch "oc describe kataconfig | sed -n /^Status:/,/^Events/p"Copy to Clipboard Copied! Toggle word wrap Toggle overflow When the status of all workers under
kataNodesisinstalledand the conditionInProgressisFalsewithout specifying a reason, thekata-ccis installed on the cluster.Verify the runtime classes by running the following command:
oc get runtimeclass
$ oc get runtimeclassCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME HANDLER AGE kata-cc kata-se 152m
NAME HANDLER AGE kata-cc kata-se 152mCopy to Clipboard Copied! Toggle word wrap Toggle overflow
5.12. Verifying attestation Copy linkLink copied to clipboard!
You can verify the attestation process by creating a test pod to retrieve a specific resource from Red Hat build of Trustee.
This procedure is an example to verify that attestation is working. Do not write sensitive data to standard I/O, because the data can be captured by using a memory dump. Only data written to memory is encrypted.
Procedure
Create a
test-pod.yamlmanifest file:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the pod by running the following command:
oc create -f test-pod.yaml
$ oc create -f test-pod.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Log in to the pod by running the following command:
oc exec -it ocp-cc-pod -- bash
$ oc exec -it ocp-cc-pod -- bashCopy to Clipboard Copied! Toggle word wrap Toggle overflow Fetch the Red Hat build of Trustee resource by running the following command:
curl http://127.0.0.1:8006/cdh/resource/default/attestation-status/status
$ curl http://127.0.0.1:8006/cdh/resource/default/attestation-status/statusCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
success #/
success #/Copy to Clipboard Copied! Toggle word wrap Toggle overflow