You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -138,9 +138,9 @@ Device Start End Sectors Size Type
138
138
...raw3 3145728 4192255 1046528 511M Linux filesystem
139
139
```
140
140
141
-
- The first partition is the EFI boot partition
142
-
- The second partition contains the read-only rootfs filesystem
143
-
- The third partition contains the persistent filesystem
141
+
- The first partition is the EFI boot partition.
142
+
- The second partition contains the read-only rootfs filesystem.
143
+
- The third partition contains the persistent filesystem.
144
144
145
145
UKI (Unified Kernel Image) is an EFI executable that bundles several components, reducing
146
146
the number of artifacts and making updates to the operating system easier to manage.
@@ -195,8 +195,8 @@ The `layout.env` defines the `tmpfs` and persistent bind mounts for the image. B
195
195
/etc/otelcol
196
196
```
197
197
198
-
- The `/var` directory requires to be writable as its content changes during normal operation (logs, cache, OS runtime data, persistent application data and temporary files)
199
-
- The `/etc/lp` holds assets and configuration for the system's printing subsystem
198
+
- The `/var` directory requires to be writable as its content changes during normal operation (logs, cache, OS runtime data, persistent application data and temporary files).
199
+
- The `/etc/lp` holds assets and configuration for the system's printing subsystem.
200
200
- The `/etc/node-agent` and `/etc/cluster-agent` and `/etc/health-check` are required for the Open Edge Platform's baremetal agents for configuration data.
201
201
- The `/etc/telegraf` and `/etc/otelcol` are for telemetry data and configuration for the `telemetry-agent` and `observability-agent` required by the Open Edge Platform.
202
202
-`/etc/caddy` is the ephemeral data required by the reverse-proxy required by the Open Edge Platform to communicate with the backend service(s).
@@ -225,8 +225,8 @@ PERSISTENT_BIND_PATHS="
225
225
/var/lib/rancher"
226
226
```
227
227
228
-
- Several key directories required for the OS to be writable for normal system operations are kept as persistent bind paths such as `/etc/fstab`, `/etc/environemnt`, `/etc/hosts`, `/etc/pki`, `/etc/ssh`, `/etc/systemd`, `/etc/udev`, `/etc/sysconfig`, `/etc/netplan`
229
-
- The Kubernetes distribution used for Open Edge platform uses Rancher's RKE2 and requires additional bind mounts such as `/etc/rancher`, `/etc/cni`, `/etc/kubernetes`, `/var/lib/rancher`
228
+
- Several key directories required for the OS to be writable for normal system operations are kept as persistent bind paths such as `/etc/fstab`, `/etc/environemnt`, `/etc/hosts`, `/etc/pki`, `/etc/ssh`, `/etc/systemd`, `/etc/udev`, `/etc/sysconfig`, `/etc/netplan`.
229
+
- The Kubernetes distribution used for Open Edge platform uses Rancher's RKE2 and requires additional bind mounts such as `/etc/rancher`, `/etc/cni`, `/etc/kubernetes`, `/var/lib/rancher`.
230
230
231
231
## Bare Metal Agents
232
232
@@ -275,10 +275,14 @@ One partition is designated as active and is used during system boot via EFI and
275
275
When a new update is available, the following steps occur:
276
276
277
277
- The new image is downloaded and then verified for integrity and authenticity.
278
-
Once verified, the new image is written to the inactive partition.
278
+
279
+
Once verified, the new image is written to the inactive partition.
280
+
279
281
- The bootloader (systemd-boot) is then reconfigured to boot from this updated partition, which will become the new active partition upon the next reboot.
282
+
280
283
- Rollback Capability:
281
-
Integrated within systemd-boot is the ability to detect boot failures. If the system fails to boot from the new image, the bootloader can automatically rollback to the previous, stable partition, ensuring continuous system availability.
284
+
285
+
Integrated within systemd-boot is the ability to detect boot failures. If the system fails to boot from the new image, the bootloader can automatically rollback to the previous, stable partition, ensuring continuous system availability.
Copy file name to clipboardExpand all lines: docs/developer-guide/contribution.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,9 @@ community to support adding new features, optimizing, and improving security.
5
5
6
6
There are many areas in which you can contribute, such as:
7
7
8
-
1.the build infrastructure pipeline
9
-
1. new features and functionality in new or existing microvisor image definitions
10
-
1. support for new edge platforms
8
+
1.The build infrastructure pipeline.
9
+
2. New features and functionality in new or existing microvisor image definitions.
10
+
3. Support for new edge platforms.
11
11
12
12
## New Features
13
13
@@ -28,33 +28,33 @@ General contribution guidelines to Open Edge platform can be found [TODO]
28
28
29
29
### Update of Edge Node Agents
30
30
31
-
1. If a new package has to be released, follow below steps to ensure the package is available in the artifactory.
31
+
1. If a new package has to be released, follow these steps to ensure the package is available in the artifactory:
32
32
33
-
1. Checkout the tag for your agent which has to be released
34
-
1. cd into your agent's directory
35
-
1. Invoke `make tarball`
36
-
1. Upload tarball from `build/artifacts` to the tarball repository
33
+
a. Checkout the tag for your agent which has to be released.
34
+
b. cd into your agent's directory.
35
+
c. Invoke `make tarball`.
36
+
d. Upload tarball from `build/artifacts` to the tarball repository.
37
37
38
-
1. Update the respective spec file in SPECS/<agent-name> directory. Example : `SPECS/node-agent`.
38
+
2. Update the respective .spec file in SPECS/<agent-name> directory. Example : `SPECS/node-agent`.
39
39
40
-
1. Bump the release number declared in the top section of the spec file if on the same version. Else, update the release version and set the number to 1.
40
+
3. Bump the release number declared in the top section of the .spec file if on the same version. Else, update the release version and set the number to 1.
41
41
42
-
1. Update `env_wrapper.sh` and the spec file if there are new configurations to be added or installation changes.
42
+
4. Update `env_wrapper.sh` and the .spec file if there are new configurations to be added or installation changes.
43
43
44
-
1. Update the changelog to ensure the version and release number are mentioned correctly as well.
44
+
5. Update the changelog to ensure the version and release number are mentioned correctly as well.
45
45
Example :
46
46
47
47
```bash
48
48
* Tue Mar 25 2025 Andrea Campanella <andrea.campanella@intel.com> - 1.5.11-2
49
49
- Move from RSTYPE to RS_TYPE in wrapper for node-agent
50
50
```
51
51
52
-
1. Generate sha256sum of all files that have been updated.
52
+
6. Generate sha256sum of all files that have been updated.
53
53
Example : `sha256sum ./SPECS/node-agent/env_wrapper.sh`
54
54
55
-
1. Update the signature file name `<agent-name>.signatures.json`. Example : `node-agent.signatures.json`.
55
+
7. Update the signature file name `<agent-name>.signatures.json`. Example : `node-agent.signatures.json`.
56
56
57
-
1. Update `cgmanifest.json`. You can use a script to do it, if you have an rpm environment. Else, update the version and download the URL manually. Example commands to update using a manifest:
57
+
8. Update `cgmanifest.json`. You can use a script to do it, if you have an rpm environment. Else, update the version and download the URL manually. Example commands to update using a manifest:
Edge Microvisor Toolkit can be used for standalone edge node deployments or with Edge
18
-
Orchestrator, a complete integrated system providing full lifecycle management for your edge
19
-
devices, including remote deployment and management of Kubernetes applications.
20
-
21
15
This section outlines the key usage models intended for the initial release of
22
16
Edge Microvisor Toolkit.
23
17
18
+
It can be used for standalone edge node deployments or with Edge
19
+
Orchestrator, a complete integrated system providing full lifecycle management for your edge
20
+
devices, including remote deployment and management of Kubernetes applications.
21
+
24
22
### Standalone Developer Edge Node
25
23
26
24
To create a custom developer build of Edge Microvisor Toolkit, follow the steps below:
27
25
28
26
- Install the mutable OS via ISO image that includes only essential pre-installed packages, providing a ready-to-use base environment.
29
27
- Install additional RPM packages, using DNF to tailor the OS to your specific needs.
30
-
- Update installed RPMs regularly to stay up-to-date in the OS, for package updates, kernel updates, security vulnerability fixes and bug fixes
28
+
- Update installed RPMs regularly to stay up-to-date in the OS, for package updates, kernel updates, security vulnerability fixes and bug fixes.
31
29
- Build a custom OS image, using the OS toolkit and available packages, which enables you to:
32
30
- Configure the system for specialized workloads or environments.
33
31
- Experiment with simplified or enhanced configurations tailored for your specific workloads.
@@ -49,7 +47,9 @@ The supported package repository offers additional `rpm` for tailoring the image
49
47
50
48
### Standalone Edge Node
51
49
52
-
The standalone edge node uses the standard immutable build and provides an ISO image that can be flashed to a USB device and installed on edge nodes. It installs the microvisor and Kubernetes to the edge node with the essential functionality to run a single node cluster. The edge node will serve as both control- and worker node. Additional worker nodes can be added to the cluster through Kubernetes. Future releases will allow standalone edge nodes to join an existing Edge Orchestrator Toolkit backend deployed on-prem or in the cloud to support scale out and management of larger infrastructures. The Standalone Edge Node enables you to quickly get an edge node up and running without deploying backend services, ready to deploy Kubernetes applications through `kubectl`, `helm`, or Kubernetes web dashboard.
50
+
The standalone edge node uses the standard immutable build and provides an ISO image that can be flashed to a USB device and installed on edge nodes. It installs the microvisor and Kubernetes to the edge node with the essential functionality to run a single node cluster. The edge node will serve as both control and worker node. Additional worker nodes can be added to the cluster through Kubernetes.
51
+
52
+
Future releases will enable standalone edge nodes to join an existing Edge Orchestrator Toolkit backend deployed on-prem or in the cloud to support scale out and management of larger infrastructures. The Standalone Edge Node enables you to quickly get an edge node up and running without deploying backend services, ready to deploy Kubernetes applications through `kubectl`, `helm`, or Kubernetes web dashboard.
53
53
54
54
```{admonition} The standalone edge node does not support the real-time version currently.
Copy file name to clipboardExpand all lines: docs/developer-guide/get-started/building-howto.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,13 +6,13 @@ facilitate creating `rpm` based OS images supporting a variety of different imag
6
6
The toolkit has an `imageconfig` construct in the `json` format that defines the resulting
7
7
image characteristics, such as:
8
8
9
-
- Partitioning table type and size
10
-
- The different partitions and their types (such as EFI, rootfs, etc.) and settings, file system (`fat32`, `ext4` etc.) and size
11
-
- Reference to `packagelists` which defines what packages (i.e. `rpms`) should be included in the image
12
-
- Additional configuration files that should be embedded in the image (e.g. network-, systemd configurations)
13
-
- Any required post installation scripts that should be executed once the image has been generated
14
-
- Kernel options and command line
15
-
- Final configuration properties that should be applied (e.g. enable full disc encryption, immutable image, second stage bootloader provider, purge documentation etc.)
9
+
- Partitioning table type and size.
10
+
- The different partitions and their types (such as EFI, rootfs, etc.) and settings, file system (`fat32`, `ext4` etc.) and size.
11
+
- Reference to `packagelists` which defines what packages (i.e. `rpms`) should be included in the image.
12
+
- Additional configuration files that should be embedded in the image (e.g. network-, systemd configurations).
13
+
- Any required post installation scripts that should be executed once the image has been generated.
14
+
- Kernel options and command line.
15
+
- Final configuration properties that should be applied (e.g. enable full disc encryption, immutable image, second stage bootloader provider, purge documentation etc.).
16
16
17
17
18
18
Before you can build OS images you need to build the toolchain and make sure to
@@ -74,7 +74,7 @@ files from the `imageconfig`.
74
74
### Example: Adding Nano
75
75
76
76
The following example shows how to add `nano` as an alternative text editor to the image.
77
-
You can add the packages for which SPEC files already exist. Simply include them in an
77
+
You can add the packages for which .spec files already exist. Simply include them in an
78
78
existing `packagelist` file, or create a new one and add it to the `imageconfig`.
0 commit comments