A practical walkthrough for deploying secure applications on your dstack infrastructure
✅ Checklist | Description |
---|---|
dstack installed | Finished Installation guide |
Environment configured | Finished Environment Setup guide |
Services healthy | KMS, Gateway & VMM report status: healthy |
TDX enabled | Host CPU supports Intel TDX and BIOS/Kernel options are enabled |
Management UI up | http://localhost:9080 reachable |
🧭 Quick Path to Success with our Mini GuidesSkim the table, pick up at Step 1, and continue straight through Step 7.
Step What You’ll Do Link 1 Pull & inspect the example container image Pull & inspect the example container image
2 Write the dstack deployment manifest Write the dstack deployment manifest
3 Sign & push the image to your private registry Sign & push the image to your private registry
4 Access the dstack dashboard & monitor deployments Access the dstack dashboard & monitor deployments
5 Verify attestation & remote‑prove trust Verify attestation & remote‑prove trust
6 Expose an API endpoint via the Gateway Expose an API endpoint via the Gateway
7 Update, roll back, and tear down safely Update, roll back, and tear down safely
🎉 Milestone: by the end of Step 7 you will have a fully attested, externally reachable application running under hardware‑enforced confidentiality.
note: estimated time depends on your setup and experience; no specific time allotted.