You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For some services between LASR nodes, we'll need support for TLS certificates. These should be signed by a CA, but don't need to signed by a public CA. The simplest approach here might be to reuse some of @mattgeddes ' existing code to deploy a Versatus CA, and to then have all the nodes trust it, and to generate a Versatus certificate for each node. That will allow any Versatus alphanet services to be able to use TLS to communicate with services on any other Versatus alphanet machine. This could apply to Prometheus, MongoDB, Nginx, Kubo, and any other services that are used within the LASR alphanet network.
The text was updated successfully, but these errors were encountered:
For some services between LASR nodes, we'll need support for TLS certificates. These should be signed by a CA, but don't need to signed by a public CA. The simplest approach here might be to reuse some of @mattgeddes ' existing code to deploy a Versatus CA, and to then have all the nodes trust it, and to generate a Versatus certificate for each node. That will allow any Versatus alphanet services to be able to use TLS to communicate with services on any other Versatus alphanet machine. This could apply to Prometheus, MongoDB, Nginx, Kubo, and any other services that are used within the LASR alphanet network.
The text was updated successfully, but these errors were encountered: