Installation section is not longer needed because of the latest default kata kernel supports Intel SGX. Include QEMU to the list of supported hypervisors. fixes #3911 Signed-off-by: Julio Montes <julio.montes@intel.com>
3.7 KiB
Kata Containers with SGX
Intel Software Guard Extensions (SGX) is a set of instructions that increases the security of applications code and data, giving them more protections from disclosure or modification.
This document guides you to run containers with SGX enclaves with Kata Containers in Kubernetes.
Preconditions
- Intel SGX capable bare metal nodes
- Host kernel Linux 5.13 or later with SGX and SGX KVM enabled:
$ grep SGX /boot/config-`uname -r`
CONFIG_X86_SGX=y
CONFIG_X86_SGX_KVM=y
- Kubernetes cluster configured with:
kata-deploybased Kata Containers installation- Intel SGX Kubernetes device plugin
Note: Kata Containers supports creating VM sandboxes with Intel® SGX enabled using cloud-hypervisor and QEMU VMMs only.
Kata Containers Configuration
Before running a Kata Container make sure that your version of crio or containerd
supports annotations.
For containerd check in /etc/containerd/config.toml that the list of pod_annotations passed
to the sandbox are: ["io.katacontainers.*", "sgx.intel.com/epc"].
Usage
With the following sample job deployed using kubectl apply -f:
Note: Change the
runtimeClassNameoption accordingly, onlykata-clhandkata-qemusupport Intel® SGX.
apiVersion: batch/v1
kind: Job
metadata:
name: oesgx-demo-job
labels:
jobgroup: oesgx-demo
spec:
template:
metadata:
labels:
jobgroup: oesgx-demo
spec:
runtimeClassName: kata-clh
initContainers:
- name: init-sgx
image: busybox
command: ['sh', '-c', 'mkdir /dev/sgx; ln -s /dev/sgx_enclave /dev/sgx/enclave; ln -s /dev/sgx_provision /dev/sgx/provision']
volumeMounts:
- mountPath: /dev
name: dev-mount
restartPolicy: Never
containers:
-
name: eosgx-demo-job-1
image: oeciteam/oe-helloworld:latest
imagePullPolicy: IfNotPresent
securityContext:
readOnlyRootFilesystem: true
capabilities:
add: ["IPC_LOCK"]
resources:
limits:
sgx.intel.com/epc: "512Ki"
volumes:
- name: dev-mount
hostPath:
path: /dev
You'll see the enclave output:
$ kubectl logs oesgx-demo-job-wh42g
Hello world from the enclave
Enclave called into host to print: Hello World!
Notes
- The Kata VM's SGX Encrypted Page Cache (EPC) memory size is based on the sum of
sgx.intel.com/epcresource requests within the pod. init-sgxcan be removed from the YAML configuration file if the Kata rootfs is modified with the necessary udev rules. See the note on SGX backwards compatibility.- Intel SGX DCAP attestation is known to work from Kata sandboxes but it comes with one limitation: If
the Intel SGX
aesmdaemon runs on the bare metal node and DCAPout-of-procattestation is used, containers within the Kata sandbox cannot get the access to the host's/var/run/aesmd/aesm.sockbecause socket passthrough is not supported. An alternative is to deploy theaesmdaemon as a side-car container. - Projects like Gramine Shielded Containers (GSC) are
also known to work. For GSC specifically, the Kata guest kernel needs to have the
CONFIG_NUMA=yenabled and at least one CPU online when running the GSC container.