Intel® Smart Edge Open (SE-O) Developer Experience Kit (DEK)

ID Date Version Classification
739680 04/30/2024 1.4 Public

Configuration

Create a inventory.yml for the intended deployment:

# double check the required variables
# should not be empty
echo $host

# run the following commands as a whole
cat <<EOF > inventory.yml
---
all:
  vars:
    cluster_name: demo
    deployment: dek
    single_node_deployment: true
    limit:
controller_group:
  hosts:
    controller:
      ansible_host: $host
      ansible_user: $USER
edgenode_group:
  hosts:
    node01:
      ansible_host: $host
      ansible_user: $USER
EOF

Customize features as needed:

# run the following commands as a whole
cat <<EOF >> inventory/default/group_vars/all/10-default.yml

# Customized vars
iommu_enabled: false
sriov_network_operator_enable: false
sriov_network_operator_configure_enable: false
e810_driver_enable: false
platform_attestation_node: false
sgx_enabled: false
install_hwe_kernel_enable: false
docker_registry_mirrors:
  - https://hub-mirror.c.163.com
proxy_env:
  http_proxy: "$http_proxy"
  https_proxy: "$https_proxy"
  ftp_proxy: "$ftp_proxy"
  no_proxy: "$no_proxy"
  all_proxy: "$all_proxy"
EOF

For Security Features

If you want to enable platform attestation with Intel® SecL - DC and application security with Intel® SGX, the following prerequisites should be satisfied:

  • A dedicated cluster that hosts IsecL and SGX control plane services

  • SGX is enabled in BIOS

And then customize following configuration items accordingly:

Check details in inventory/default/group_​vars/all/10-default.yml

  • platform_​attestation_​node: true

  • isecl_​control_​plane_​ip

  • isecl_​cms_​tls_​hash

  • sgx_​enabled: true

  • install_​hwe_​kernel_​enable: true (should not be enabled for Ubuntu 22.04)

  • sgx_​pccs_​ip

  • pccs_​user_​password

CAUTION: You should adjust no_​proxy for sgx_​pccs_​ip and isecl_​control_​plane_​ip if these hosts are in the internal network.