Validated pattern for deploying confidential containers on OpenShift using the Validated Patterns framework.
Confidential containers use hardware-backed Trusted Execution Environments (TEEs) to isolate workloads from cluster and hypervisor administrators. This pattern deploys and configures the Red Hat CoCo stack — including the sandboxed containers operator, Trustee (Key Broker Service), and peer-pod infrastructure — on Azure and bare metal.
The pattern provides three deployment topologies:
-
Single cluster (
simpleclusterGroup) — deploys all components (Trustee, Vault, ACM, sandboxed containers, workloads) in one cluster on Azure. This breaks the RACI separation expected in a remote attestation architecture but simplifies testing and demonstrations. -
Multi-cluster (
trusted-hub+spokeclusterGroups) — separates the trusted zone from the untrusted workload zone:- Hub (
trusted-hub): Runs Trustee (KBS + attestation service), HashiCorp Vault, ACM, and cert-manager. This cluster is the trust anchor. - Spoke (
spoke): Runs the sandboxed containers operator and confidential workloads. The spoke is imported into ACM and managed from the hub.
- Hub (
-
Bare metal (
baremetalclusterGroup) — deploys all components on bare metal hardware with Intel TDX or AMD SEV-SNP support. NFD (Node Feature Discovery) auto-detects the CPU architecture and configures the appropriate runtime. Supports SNO (Single Node OpenShift) and multi-node clusters.
The topology is controlled by the main.clusterGroupName field in values-global.yaml.
Azure deployments use peer-pods, which provision confidential VMs (Standard_DCas_v5 family) directly on the Azure hypervisor. Bare metal deployments use layered images and hardware TEE features directly.
Breaking change from v3. This is the first version using GA (Generally Available) releases of the CoCo stack:
- OpenShift Sandboxed Containers 1.11+ (requires OCP 4.17+)
- Red Hat Build of Trustee 1.0 (first GA release; all prior versions were Technology Preview)
- External chart repositories for Trustee, sandboxed-containers, and sandboxed-policies
- Self-signed certificates via cert-manager (Let's Encrypt no longer required)
- Multi-cluster support via ACM
All previous versions used pre-GA (Technology Preview) releases of Trustee:
| Version | Trustee | OSC | Min OCP |
|---|---|---|---|
| 3.* | 0.4.* (Tech Preview) | 1.10.* | 4.16+ |
| 2.* | 0.3.* (Tech Preview) | 1.9.* | 4.16+ |
| 1.0.0 | 0.2.0 (Tech Preview) | 1.8.1 | 4.16+ |
Azure deployments:
- OpenShift 4.17+ cluster on Azure (self-managed via
openshift-installor ARO) - Azure
Standard_DCas_v5VM quota in your target region (these are confidential computing VMs and are not available in all regions). See the note below for more details. - Azure DNS hosting the cluster's DNS zone
Bare metal deployments:
- OpenShift 4.17+ cluster on bare metal with Intel TDX or AMD SEV-SNP hardware
- BIOS/firmware configured to enable TDX or SEV-SNP
- Available block devices for LVMS storage (auto-discovered)
- For Intel TDX: an Intel PCS API key from api.portal.trustedservices.intel.com
Common:
- Tools on your workstation:
podman,yq,jq,skopeo - OpenShift pull secret saved at
~/pull-secret.json(download from console.redhat.com) - Fork the repository — ArgoCD reconciles cluster state against your fork, so changes must be pushed to your remote
These scripts generate the cryptographic material and attestation measurements needed by Trustee and the peer-pod VMs. Run them once before your first deployment.
bash scripts/gen-secrets.sh— generates KBS key pairs, PCCS certificates/tokens (for bare metal), and copiesvalues-secret.yaml.templateto~/values-secret-coco-pattern.yamlbash scripts/get-pcr.sh— retrieves PCR measurements from the peer-pod VM image and stores them at~/.coco-pattern/measurements.json(requirespodman,skopeo, and~/pull-secret.json). Not required for bare metal deployments.- Review and customise
~/values-secret-coco-pattern.yaml— this file is loaded into Vault and provides secrets to the pattern. For bare metal, uncomment the PCCS secrets section and provide your Intel PCS API key.
Note:
gen-secrets.shwill not overwrite existing secrets. Delete~/.coco-pattern/if you need to regenerate.
- Set
main.clusterGroupName: simpleinvalues-global.yaml - Ensure your Azure configuration is populated in
values-global.yaml(seeglobal.azure.*fields) ./pattern.sh make install- Wait for the cluster to reboot all nodes (the sandboxed containers operator triggers a MachineConfig update). Monitor progress in the ArgoCD UI.
- Set
main.clusterGroupName: trusted-hubinvalues-global.yaml - Deploy the hub cluster:
./pattern.sh make install - Wait for ACM (
MultiClusterHub) to reachRunningstate on the hub - Provision a second OpenShift 4.17+ cluster on Azure for the spoke
- Import the spoke into ACM with label
clusterGroup=spoke(see importing a cluster) - ACM will automatically deploy the
spokeclusterGroup applications (sandboxed containers, workloads) to the imported cluster
- Set
main.clusterGroupName: baremetalinvalues-global.yaml - Run
bash scripts/gen-secrets.shto generate KBS keys and PCCS secrets - For Intel TDX: uncomment the PCCS secrets in
~/values-secret-coco-pattern.yamland provide your Intel PCS API key ./pattern.sh make install- Wait for the cluster to reboot nodes (MachineConfig updates for TDX kernel parameters and vsock)
The system auto-detects your hardware:
- NFD discovers Intel TDX or AMD SEV-SNP capabilities and labels nodes
- LVMS auto-discovers available block devices for storage
- RuntimeClass
kata-ccis created automatically pointing to the correct handler (kata-tdxorkata-snp) - Both
kata-tdxandkata-snpRuntimeClasses are deployed; only the one matching your hardware has schedulable nodes - MachineConfigs are deployed for both
masterandworkerroles (safe on SNO where only master exists) - PCCS and QGS services deploy unconditionally; DaemonSets only schedule on Intel nodes via NFD labels
Optional: pin PCCS to a specific node with bash scripts/get-pccs-node.sh and set baremetal.pccs.nodeSelector in the baremetal chart values.
Two sample applications are deployed on the cluster running confidential workloads (the single cluster in simple mode, or the spoke in multi-cluster mode):
-
hello-openshift: Three pods demonstrating CoCo security boundaries:
standard— a regular Kubernetes pod (no confidential computing)secure— a confidential container with a strict policy;oc execis denied even forkubeadmininsecure-policy— a confidential container with a relaxed policy allowingoc exec(useful for testing the Confidential Data Hub)
Each confidential pod runs on its own
Standard_DC2as_v5Azure VM (visible in the Azure portal). Pods useruntimeClassName: kata-remote. -
kbs-access: A web service that retrieves and presents secrets obtained from the Trustee Key Broker Service (KBS) via the Confidential Data Hub (CDH). Useful for verifying end-to-end attestation and secret delivery in locked-down environments.
Confidential computing VM availability on Azure varies by region. Not all regions offer the required VM families, and available sizes differ between regions. Before deploying, verify the following:
-
Check regional availability. Confirm that your target Azure region supports confidential computing VMs. Microsoft's products available by region page lists which services and VM families are offered in each region.
-
Check your subscription quota. Even in supported regions, your subscription may have zero default quota for confidential VM sizes. Go to Azure Portal > Subscriptions > Usage + quotas and filter for the DCas/DCads/ECas/ECads families. Request a quota increase if needed.
-
Select a VM size. The pattern defaults to
Standard_DC2as_v5but supports a configurable list of sizes. The following VM families are relevant for confidential containers on Azure:
| VM Family | CPU | Architecture | Notes |
|---|---|---|---|
Standard_DC2as_v5 |
AMD SEV-SNP | AMD EPYC (Genoa) | Default for this pattern. Smallest CoCo-capable size. |
Standard_DC4as_v5 |
AMD SEV-SNP | AMD EPYC (Genoa) | More vCPUs/memory for larger workloads. |
Standard_DC2ads_v5 |
AMD SEV-SNP | AMD EPYC (Genoa) | Same as DC2as_v5 with a local temp disk. |
Standard_DC2es_v5 |
Intel TDX | Intel Xeon (Sapphire Rapids) | Intel-based confidential VMs. Regional availability is more limited than AMD. |
The available sizes can be configured via the global.coco.azure.VMFlavours field in values-global.yaml and the sandbox-policies chart overrides. The default VM flavour is set in global.coco.azure.defaultVMFlavour.
For Red Hat associates and partners, the pattern includes wrapper scripts that automate cluster provisioning and deployment using RHDP Azure Open Environments.
Required environment variables (provided by your RHDP environment):
export GUID=
export CLIENT_ID=
export PASSWORD=
export TENANT=
export SUBSCRIPTION=
export RESOURCEGROUP=Deployment commands:
- Single cluster:
bash rhdp/wrapper.sh <azure-region>(e.g.bash rhdp/wrapper.sh eastasia) - Multi-cluster:
bash rhdp/wrapper-multicluster.sh <azure-region>
The wrapper scripts handle cluster provisioning via openshift-install, secret generation, PCR retrieval, and pattern installation.