Intel® Smart Edge Open (SE-O) Developer Experience Kit (DEK)
Configuration
Create a
# double check the required variables # should not be empty echo $host # run the following commands as a whole cat <<EOF > inventory.yml --- all: vars: cluster_name: demo deployment: dek single_node_deployment: true limit: controller_group: hosts: controller: ansible_host: $host ansible_user: $USER edgenode_group: hosts: node01: ansible_host: $host ansible_user: $USER EOF
Customize features as needed:
# run the following commands as a whole cat <<EOF >> inventory/default/group_vars/all/10-default.yml # Customized vars iommu_enabled: false sriov_network_operator_enable: false sriov_network_operator_configure_enable: false e810_driver_enable: false platform_attestation_node: false sgx_enabled: false install_hwe_kernel_enable: false docker_registry_mirrors: - https://hub-mirror.c.163.com proxy_env: http_proxy: "$http_proxy" https_proxy: "$https_proxy" ftp_proxy: "$ftp_proxy" no_proxy: "$no_proxy" all_proxy: "$all_proxy" EOF
For Security Features
If you want to enable platform attestation with Intel® SecL - DC and application security with Intel® SGX, the following prerequisites should be satisfied:
A dedicated cluster that hosts IsecL and SGX control plane services
SGX is enabled in BIOS
And then customize following configuration items accordingly:
Check details in
platform_attestation_node: true
isecl_control_plane_ip
isecl_cms_tls_hash
sgx_enabled: true
install_hwe_kernel_enable: true (should not be enabled for Ubuntu 22.04)
sgx_pccs_ip
pccs_user_password
CAUTION: You should adjust