-
Notifications
You must be signed in to change notification settings - Fork 135
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document how to run Tinkerbell in production #134
Comments
I think it would make total sense for there to be a "Best Production Practices" document, but to be honest, so much of it is dependent on the environment and what kind of threat vectors you are worried about -- and less so Tinkerbell specific. Here is my wild attempt at answering some of these questions:
You may find this worth reading: Since no activity has happened on this doc, I'm going to try to reword it to see if we get more action on it later. |
That intel document has a nice summary: use uefi https (with mutual authentication) and secure boot. I hope tinkerbell can aid in deploying this somehow :-)
I meant to say that we should perhaps prevent non DHCP server machines from replying to DHCP requests (at the network equipment level I guess). The clients would still be able to make requests (but not replies). Somehow the system should also prevent clients from impersonating other clients I guess. |
There's a holistic documentation effort being tracked by tinkerbell/roadmap#5. Please refer to that issue for more information. |
Can you please provide guidance on how to securely run a tinkbell installation?
For example:
setup.sh
seems nice for development purposes, but for production, we should probably use k8s? Other orchestrator?The text was updated successfully, but these errors were encountered: