-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Meeting 28/06/23 #66
Comments
Adding discussion items to the "architecture" part for upcoming changes:
|
adding items to the Kubernetization part:
on the client-side sharding proposal:
|
@mheese Let's discuss tomorrow: the fact of the matter is that |
Attendees
Time: 27/06/23 15:30 BST (https://www.timeanddate.com/worldclock/fixedtime.html?msg=Keylime+Meeting&iso=20230627T1530&p1=136&ah=1)
Link: https://ibm.webex.com/ibm/j.php?MTID=m75a71317639649f0b924f04d69027b56
Topics
* Ongoing effort to make Measured Boot Attestation (MBA) more flexible with support for plugins (mba: making MBA policy parser and checker pluggable keylime#1410)
* Fixes for
keylime_tenant
(tenant: log cleanup and output improvements keylime#1409)* Initial version of a (non-scale out)
helm
chart available at https://github.com/keylime/attestation-operator.git* A somewhat functional, end-to-end "scale out" deployment in available under the "hack" directory
* Client-side (i.e.,
keylime_tenant
) "sharding": the code, as it is written currently, requires that "add", "delete", "update" and "reactivate" operations over anagent
to be directed to a specificverifier
. While it would be possible to have a less than conventional load balancer algorithm to to ensure this behavior (e.g., consistent hashing using thekeylime_tenant
requests URI, which contains theagent
UUID) I would like to at least explore the possibility to have client-side consistent hashing (using the--uuid
/-u
as the key)Actions
7.3
Meeting notes
The text was updated successfully, but these errors were encountered: