6.2. Configuring a RHEL VM on Azure with Intel TDX
By using Intel Trusted Domain Extensions (TDX), you can create hardware-assisted isolated VMs known as trusted domains (TDs). It ensures that only the VM has access to its resources, while remaining inaccessible to hypervisors and hosts.
Prerequisites
-
You have installed the
opensshandopenssh-clientspackages. - You have installed the Azure CLI utility. For details, see Installing the Azure CLI on Linux.
- You have launched the RHEL instance from a supported Azure instance type. For details, see Azure Confidential VM options.
Procedure
Log in to Azure by using the
azure cliutility:$ az loginCreate an Azure resource group for the selected availability zone:
$ az group create --name <example_resource_group> --location westeuropeDeploy a RHEL instance with TDX enabled, for example, the
Standard_DC2eds_v5instance type:$ az vm create --resource-group <example_resource_group> \ --name <example_rhel_instance> \ --image <"RedHat:rhel-cvm:9_5_cvm:latest"> \ --size <Standard_DC2eds_v5> \ --admin-username <example_azure_user> \ --generate-ssh-keys \ --security-type ConfidentialVM \ --os-disk-security-encryption-type DiskWithVMGuestStateConnect to the RHEL instance:
$ ssh <example_azure_user>@<example_ip_address_of_the_instance>
Verification
Check kernel logs to verify status of TDX:
$ sudo dmesg | grep -i tdx... [ 0.733613] Memory Encryption Features active: Intel TDX [ 4.320222] systemd[1]: Detected confidential virtualization tdx. [ 5.977432] systemd[1]: Detected confidential virtualization tdx. ...Check metadata of the RHEL instance configuration:
$ az vm show --resource-group <example_resource_group> \ --name <example_rhel_instance> \ --query "securityProfile.enableTrustedDomainExtensions" \ --output json