This is a cache of https://developer.ibm.com/tutorials/configure-hpvs-onpremises-redhat/. It is a snapshot of the page as it appeared on 2025-11-14T13:04:27.764+0000.
Build a confidential computing environment on-premises with Red Hat - IBM Developer
Hyper Protect Services uses IBM Secure Execution for Linux (SEL) to create a Confidential Computing enclave where sensitive workloads run with assurance that the entire compute lifecycle is protected. Protecting data-at-rest and data-in-motion is common, but protecting data-in-use must also be a key part of a data protection strategy.
A Confidential Computing enclave is similar to a Secure Compartmented Information Facility (SCIF), often used in national security to handle top-secret documents or discussions. The principle is simple: what happens in a SCIF stays in a SCIF.
Access to a Red Hat Enterprise Linux (RHEL) logical parition (LPAR) on LinuxONE with sudo access. Secure Execution must be enabled with Feature Code 115.
Step 4. Extract the Hyper Protect Virtual Server image file
Log in to the LinuxONE RHEL LPAR and run the following command:
cd /opt/hpcr-files
gunzip IBM_HPCR_RHVS_v1.1_EN.tar.gz
tar -xvf IBM_HPCR_RHVS_v1.1_EN.tar
tar -xvzf M0SK4EN.tar.gz
cp images/ibm-hyper-protect-container-runtime-rhvs-1.1.0.qcow2 /var/lib/libvirt/images/hpcr
Copy codeCopied!
Note: File names can differ depending on the Hyper Protect Virtual Server version.
Step 5. Create the contract parts
Create the /var/lib/libvirt/images/hpcr/meta-data file with the following content:
local-hostname: myhost
Copy codeCopied!
Create /var/lib/libvirt/images/hpcr/vendor-data with the following content:
#cloud-configusers:-default
Copy codeCopied!
Copy the sample environment file (hpvs-sample-env.yaml) to /var/lib/libvirt/images/hpcr/env.yaml.
Edit env.yaml and update these entries:
${HOSTNAME}: hostname or IP of the SYSLOG server (change the port if needed).
${CA}: YAML scalar value of the CA certificate (for example:
server: "-----BEGIN CERTIFICATE-----\nMIIFCTCCAvEC...").
${CLIENT_CERTIFICATE}: YAML scalar value of the client certificate.
${CLIENT_PRIVATE_KEY}: YAML scalar value of the client private key (PKCS8).
Edit network.xml and update the network details for your environment.
Step 10. Start HPCR
Run the following commands to start the Hyper Protect Container Runtime (HPCR) confidential computing environment:
virsh define hpcr.xmlvirshstart hpcr --console
Copy codeCopied!
Conclusion and next steps
You have successfully set up Hyper Protect Container Runtime (HPCR) on IBM Z LinuxONE. The next step is to deploy critical workloads to enable data-in-use protection. The following article, tutorial, and demo video can help you get started.
About cookies on this siteOur websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising.For more information, please review your cookie preferences options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.