Este contenido no está disponible en el idioma seleccionado.

Chapter 2. New features and enhancements


This section describes new features and enhancements introduced in OpenShift sandboxed containers 1.12.

Confidential containers on bare metal

In this update, OpenShift sandboxed containers on bare-metal servers now support encrypted persistent volumes, providing a secure, durable storage solution for sensitive workloads. This enhancement addresses the demand for data persistence within sandboxed environments while ensuring that data remains encrypted at rest.

Key enhancements in this release include:

  • Encrypted block volumes: You can now encrypt, decrypt and mount block volumes directly within the confidential container using raw block volumes. This ensures that encryption and decryption happen inside the Trusted Execution Environment (TEE) rather than at the worker node level, maintaining data confidentiality throughout the storage lifecycle.
  • Red Hat build of Trustee 1.1.0 is now generally available and is the recommended version for use with OpenShift sandboxed containers 1.12.
  • Simplified Trustee configuration: Deployment of Red Hat build of Trustee is significantly simplified through the new TrusteeConfig custom resource. Key features include:

    • Automated resource generation: Automatically generates required secrets, config maps, and the KbsConfig resource.
    • Profile-based configuration: Offers a Permissive profile for quick-start development and a Restricted profile for production-grade security.
    • Service exposure options: Support for ClusterIP, NodePort, and LoadBalancer by using the kbsServiceType field.
    • Platform-specific extensions: Native support for IBM Secure Execution, Intel TDX, and disconnected (air-gapped) environments.
  • Pre-built initramfs: Initial RAM File System (initramfs) images are now pre-built and provide known Measurement Hashes. Hardware evaluates initramfs contents before booting the confidential virtual machine, making initramfs a critical link in the chain of trust. Pre-built images eliminate the need for runtime builds that could be compromised.

    These improvements aim at simplifying the deployment and management of storage and security resources so that end users can manage their confidential container workloads on bare metal more effectively.

Jira:KATA-4394

Red Hat logoGithubredditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de la documentación de Red Hat

Legal Notice

Theme

© 2026 Red Hat
Volver arriba