-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Detect confidential computing capabilities of the cluster node #24
Comments
How we do this with SGX is that our Would this pattern work for |
fyi, for Secure Execution there also a NFD PR to detect it: kubernetes-sigs/node-feature-discovery#790 |
So, SE, SGX, and TDX are already supported by the NFD. SEV-* support is still missing there, and by the moment it gets added we should rely on NFD for properly labelling the nodes. |
@bpradipt is this issue still relevant or can be closed? |
This issue is still relevant, se the comment from 6 days ago: #24 (comment) I don't think this is material for this coming release, though, so I'm labelling it for the future ones. |
@fidencio should I remove this out of the upcoming V0.3.0 release (22nd of January)? |
Following comments from @fidencio moving to V0.4.0 |
I'll drop this one from v0.8.0, and make sure we get it in as part of v0.9.0. The reason for that being TDX would be the one to benefit the most from this at this point, but our CCv0 CI has a way too old kernel that doesn't help us here. So, I'm postponing this to be part of the |
This issue is to track the work required for operator to detect the node capability w.r.to SEV/TDX/SGXSE/PEF.
Also adding a reference to k8s node-feature-discovery - https://github.com/kubernetes-sigs/node-feature-discovery/
The text was updated successfully, but these errors were encountered: