Skip to main content

Choose Your Deployment Method

Phala Cloud offers multiple ways to create and deploy a Confidential Virtual Machine (CVM). Learn about Confidential Virtual Machine technology and its enterprise applications.

Option 1: Phala Cloud dashboard

The dashboard walks you through CVM creation with a visual interface. Use it if you are new to Phala Cloud, prefer graphical tooling, or want to deploy without touching the command line. Create with Docker Compose →

Option 2: phala CLI

The CLI is the right tool for automated deployments, CI/CD pipelines, and scriptable infrastructure. Use it if you are comfortable in a terminal and want reproducible deployments. Follow the CLI Guide →

CVM Management Features

After deployment, manage your CVMs from the dashboard or the API.

Monitoring

  • CVM status — track the health and status of your CVMs
  • Resource usage — monitor CPU, memory, and storage consumption
  • Logs — view application logs and system messages

Upgrades

  • Environment variables — update your application’s encrypted secrets
  • Docker images — upgrade your application’s Docker image
  • Resource allocation — adjust CPU, memory, and storage

Scaling

Security

  • Data protection — end-to-end encryption of sensitive data at rest
  • Access control — restrict who can reach your CVMs and their logs

CVM Management API

Phala Cloud provides an API for managing CVMs programmatically.

Next Steps

After creating your CVM, you probably want to: