Adds flare.network validator to UNL #11
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Validator public key:
nHUZRwL96AD7by5icnptu22KGbvDcN9pExAYwtMj1cpY2dsRfC4KOperator / project: Flare networks
Support contact: [email protected]
Hosting and Infrastructure
Validator is hosted on Google Cloud and was initially deployed in Belgium (europe-west1) region. Based on publicly available UNL validator information, we identified that validator.gatehub.net is also hosted in the same region. As a result, we migrated our validator to the Netherlands (europe-west4). This migration caused a few missed validations on December 23.
Based on the public information available to us, we can therefore confirm that no other UNL validator is hosted on Google Cloud in the Netherlands (europe-west4) region.
Community Track Record
Flare is an active and recognized contributor to the XRPL ecosystem in a variety of ways:
Operational and Security Practices
We maintain separate staging and production environments, enabling us to thoroughly test changes before deploying them to production and thereby reduce the risk of errors that could cause downtime. We adhere to the principle of least privilege by restricting SSH access through GCP IAP, implementing properly configured firewalls, enabling audit logging, carefully scoping service account permissions, and enforcing non-root runtime user permissions.
Our infrastructure is monitored 24/7 using a custom monitoring solution. We have implemented custom health checks that continuously verify the status of our nodes. Alerts are configured to trigger on any sign of unhealthy behavior. These alerts are immediately dispatched to our engineering team via both Slack and PagerDuty. We maintain a professional on-call rotation with engineers ready to address any issues within minutes of an alert.
The
validator-keys.jsonfile was generated on a secure machine and is now stored in offline cold storage. The generated validator token is securely stored in Google Cloud Secret Manager. It is fetched by the validator instance at runtime, and all access is logged and audited.Uptime and Performance
We are committed to maintaining exceptional uptime. Exceptions were December 23rd, when we moved the validator from Belgium to the Netherlands region and January 5th, when the rippled process was restarted to update the voting configuration: https://livenet.xrpl.org/validators/nHUZRwL96AD7by5icnptu22KGbvDcN9pExAYwtMj1cpY2dsRfC4K/history