-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Confidential Compute CLI Change Request - VM / VMSS Create #22199
Comments
Compute |
@zhoxing-ms - Added Compute Swagger JSON link reference. |
Hi @AjKundnani , When I test |
@PARADISSEEKR - Currently Confidential VMSS supports PMK / CMK with Azure Compute Gallery (or Shared Image Gallery), please test with image from ACG / SIG. Support for Platform images will be added in future API release. |
@AjKundnani May I ask why does |
|
@zhoxing-ms , As per our discussions on other thread:
|
@AjKundnani The resource group used by DES is from |
@zhoxing-ms - There will be scenarios where DES will be in different resource group then disk created in. if we can handle it similarly it is handled for existing |
@AjKundnani In this case, the user can only pass in the ID, and we cannot support the name from different resource group
|
@AjKundnani The |
@zhoxing-ms - Correct, it's not needed when value for |
@AjKundnani , test with image from ACG / SIG still error : |
@PARADISSEEKR - Please confirm if |
So, CMK and PMK scenarios is supported for VMSS with --os-disk-security-encryption-type with value DiskWithVMGuestState from specialized SIG images having SecurityType of the image set as ConfidentialVM. But the CMK for DiskWithVMGuestState for VMSS is blocked in the current CRP changes present in Canary and Prod, and should be enabled in next rollout, as the changes are checked-in. Else you can test it in EastUS2EUAP slice 5 around this time tomorrow, and it should be supported for CMK scenarios too. EastUS2EUAP slice 5 is our daily deployment slice. I replied to your mail, with a subId that maps to this slice. |
@AjKundnani , using |
@ms-saypaul May I ask what is the approximate rollout time? If CLI has exposed this feature before rollout, is it in line with your expectations? |
@zhoxing-ms - It is in line with expectations, yes. As these capabilities will be enabled in near future. We will have to document in such way that end user knows for VMSS what the available deployment options are. |
Is your feature request related to a problem? Please describe
No, feature request to add new parameters and add values into existing parameters for following commands to support Confidential VM - Planned GA by end of June CY22:
Feature request is to support customer with:
Describe the solution you'd like
Customer to use
az vm create
command with parameter --security-type to set VM security type. For confidential VM, accepted security type should be ConfidentialVMCustomer to use
az vmss create
command with parameter --security-type to set VMSS security type. For confidential VM, additional accepted security type should be ConfidentialVMExisting Parameters
--security-type
Currently --security-type supports value of TrustedLaunch. Post change, following values will be accepted:
New Parameters
Request to include below new parameters into commands
az vm create
andaz vmss create
--os-disk-security-encryption-type
New Parameter --os-disk-security-encryption-type:
--os-disk-secure-vm-disk-encryption-set
New Parameter --os-disk-secure-vm-disk-encryption-set:
End to End Usage
Scenario 1 - Create New VM
Store Subnet ID in variable:
subnetId=$(az network vnet subnet show -g $rgName -n MySubnet --vnet-name $vNetName --query [id] -o tsv)
Store Disk Encryption Set ID in variable:
diskEncryptionSetId=$(az disk-encryption-set show -n $diskEncryptionSetName -g $rgName --query [id] -o tsv)
Create Virtual Machine with ConfidentialVM Security Type
Scenario 2 - Create new VMSS
Store Subnet ID in variable:
subnetId=$(az network vnet subnet show -g $rgName -n MySubnet --vnet-name $vNetName --query [id] -o tsv)
Store Disk Encryption Set ID in variable:
diskEncryptionSetId=$(az disk-encryption-set show -n $diskEncryptionSetName -g $rgName --query [id] -o tsv)
Create Virtual Machine Scale Set with ConfidentialVM Security Type
Describe alternatives you've considered
Not Applicable, new product feature request.
Additional context
Request for Confidential VM - Planned GA by end of June CY22
Additional Checks
When --security-type is set to ConfidentialVM:
Contacts
The text was updated successfully, but these errors were encountered: