Before You Begin
| ✅ Checklist | Description |
|---|---|
| dstack installed | Finished Installation guide |
| Environment configured | Finished Environment Setup guide |
| Services healthy | KMS, Gateway & VMM report status: healthy |
| TDX enabled | Host CPU supports Intel TDX and BIOS/Kernel options are enabled |
| Management UI up | http://localhost:9080 reachable |
Deploying Applications on dstack
🧭 Quick Path to Success with our Mini GuidesSkim the table, pick up at Step 1, and continue straight through Step 7.
Step What You’ll Do Link 1 Pull & inspect the example container image Pull & inspect the example container image2 Write the dstack deployment manifest Write the dstack deployment manifest3 Sign & push the image to your private registry Sign & push the image to your private registry4 Access the dstack dashboard & monitor deployments Access the dstack dashboard & monitor deployments5 Verify attestation & remote‑prove trust Verify attestation & remote‑prove trust6 Expose an API endpoint via the Gateway Expose an API endpoint via the Gateway7 Update, roll back, and tear down safely Update, roll back, and tear down safely
🎉 Milestone: by the end of Step 7 you will have a fully attested, externally reachable application running under hardware‑enforced confidentiality.
note: estimated time depends on your setup and experience; no specific time allotted.
Next Steps & Further Reading
Start here: Step 1 — Pull the Example Application After each mini-guide, follow the Next Step banner to proceed in order. Skipping steps may leave your deployment unverified or insecure. Further reading:- System Architecture – How all components fit together
- Security Model – Threat model & enclave guarantees
- Read to Go Deployment Guides –

