Skip to content

Commit bb5f12a

Browse files
Merge branch 'main' into 2026-upgrade
2 parents 3a8819f + e62965a commit bb5f12a

File tree

29 files changed

+775
-44
lines changed

29 files changed

+775
-44
lines changed

docs/deployment_guide/on_prem_deployment/on_prem_deployment_profiles/on_prem_oxm_profile.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,9 @@ A sample network topology is presented in the diagram below:
5151
#. Most of Edge Orchestrator services are accessible via ``TRAEFIK_IP``, a Virtual IP reserved in the local subnet.
5252

5353
#. The Edge Orchestrator must be configured with two more Virtual IPs that are reserved in the local subnet. ``ARGO_IP`` is used to access
54-
ArgoCD server, while ``NGINX_IP`` exposes installation artifacts that are downloaded by Edge Nodes during OS provisioning.
54+
ArgoCD server, while ``HAPROXY_IP`` exposes installation artifacts that are downloaded by Edge Nodes during OS provisioning.
5555

56-
#. Note that one of ``TRAEFIK_IP``, ``NGINX_IP`` and ``ARGO_IP`` can be same as the physical interface's IP address (``ARGO_IP`` in the example).
56+
#. Note that one of ``TRAEFIK_IP``, ``HAPROXY_IP`` and ``ARGO_IP`` can be same as the physical interface's IP address (``ARGO_IP`` in the example).
5757

5858
#. Only the PXE server is attached to the host networking and binds to the IP address of the physical network interface to listen to DHCP requests.
5959

@@ -156,7 +156,7 @@ Post-installation steps
156156
.. code-block:: shell
157157
158158
address=/[on.prem.domain.name]/[traefik-external-ip]
159-
address=/tinkerbell-nginx.[on.prem.domain.name]/[ingress-nginx-external-ip]
159+
address=/tinkerbell-haproxy.[on.prem.domain.name]/[ingress-nginx-external-ip]
160160
161161
#. Retrieve the self-signed Edge Orchestrator certificate and install it to the trust store.
162162

docs/deployment_guide/on_prem_deployment/on_prem_get_started/index.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Firewall Configuration
8585
The following table lists the network endpoints for Edge Orchestrator and edge nodes, which you can use to configure firewall rules tailored to your network environment.
8686

8787
* ArgoCD Admin UI at ``argo.{domain}``. Intel recommends that you restrict the incoming traffic to a subset of known source IPs because this is an administrator interface.
88-
* BIOS Onboarding accesses ``tinkerbell-nginx.{domain}``.
88+
* BIOS Onboarding accesses ``tinkerbell-haproxy.{domain}``.
8989
* You can access all other services from edge nodes agents, UI, and APIs of Edge Orchestrator.
9090

9191
.. list-table:: Network Endpoints for Edge Orchestrator and Edge Nodes
@@ -252,7 +252,7 @@ The following table lists the network endpoints for Edge Orchestrator and edge n
252252
- 443
253253
- Edge infrastructure management
254254
* - Edge node
255-
- tinkerbell-nginx.{domain}
255+
- tinkerbell-haproxy.{domain}
256256
- TCP
257257
- 443
258258
- BIOS onboarding

docs/deployment_guide/on_prem_deployment/on_prem_get_started/on_prem_install.rst

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,10 @@ Core Deployment Configuration
103103
- ``registry-rs.edgeorchestration.intel.com``
104104
* - ``DEPLOY_VERSION``
105105
- Version of Edge Orchestrator to deploy
106-
- ``v2025.2.0``
106+
- ``v2026.0.0``
107+
* - ``DEPLOY_REPO_BRANCH``
108+
- Git tag or branch for deployment repository (overrides default commit)
109+
- ``v2026.0.0``
107110
* - ``ORCH_INSTALLER_PROFILE``
108111
- Deployment profile for Edge Orchestrator
109112
- ``onprem``
@@ -144,8 +147,8 @@ Network Configuration
144147
* - ``TRAEFIK_IP``
145148
- MetalLB IP address for Traefik
146149
- (empty)
147-
* - ``NGINX_IP``
148-
- MetalLB IP address for NGINX
150+
* - ``HAPROXY_IP``
151+
- MetalLB IP address for HAProxy
149152
- (empty)
150153
151154
Container Registry Configuration
@@ -787,7 +790,7 @@ An example of the `dnsmasq` config file:
787790
address=/vnc.[on.prem.domain.name]/[traefik-external-ip]
788791
address=/web-ui.[on.prem.domain.name]/[traefik-external-ip]
789792
address=/ws-app-service-proxy.[on.prem.domain.name]/[traefik-external-ip]
790-
address=/tinkerbell-nginx.[on.prem.domain.name]/[ingress-nginx-external-ip]
793+
address=/tinkerbell-haproxy.[on.prem.domain.name]/[ingress-nginx-external-ip]
791794
address=/mps.[on.prem.domain.name]/[traefik-external-ip]
792795
address=/rps.[on.prem.domain.name]/[traefik-external-ip]
793796
address=/mps-wss.[on.prem.domain.name]/[traefik-external-ip]

docs/deployment_guide/on_prem_deployment/on_prem_how_to/on_prem_upgrade.rst

Lines changed: 24 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
On-Prem Upgrade Guide
22
=========================
33

4-
**Upgrade Path:** EMF On-Prem v3.1.3v2025.2.0
4+
**Upgrade Path:** EMF On-Prem v2025.2.0v2026.0.0
55

66
**Document Version:** 1.0
77

88
Overview
99
--------
1010

1111
This document provides step-by-step instructions to upgrade
12-
On-Prem Edge Manageability Framework (EMF) from version v3.1.3 to v2025.2.0.
12+
On-Prem Edge Manageability Framework (EMF) from version v2025.2.0 to v2026.0.0
1313

1414
Prerequisites
1515
-------------
1616

1717
System Requirements
1818
~~~~~~~~~~~~~~~~~~~
1919

20-
- Current EMF On-Prem installation version 3.1.3 or later
20+
- Current EMF On-Prem installation version v2025.2.0 or later
2121
- Root/sudo privileges on orchestrator node
2222
- PostgreSQL service running and accessible
2323
- Sufficient disk space for backups (~200GB minimum)
@@ -53,7 +53,7 @@ Step 1: Download the Latest On-Prem Upgrade Script
5353
REGISTRY_URL='registry-rs.edgeorchestration.intel.com'
5454
RS_PATH='edge-orch/common/files/on-prem'
5555
ORAS_VERSION='1.1.0'
56-
ORCH_VERSION='v2025.2.0'
56+
ORCH_VERSION='v2026.0.0'
5757
5858
# Install oras if not already installed
5959
if ! command -v oras &> /dev/null; then
@@ -135,7 +135,10 @@ Core Deployment Configuration
135135
- ``registry-rs.edgeorchestration.intel.com``
136136
* - ``DEPLOY_VERSION``
137137
- Version of Edge Orchestrator to deploy
138-
- ``v2025.2.0``
138+
- ``v2026.0.0``
139+
* - ``DEPLOY_REPO_BRANCH``
140+
- Git tag or branch for edge-manageability-framework deployment repository
141+
- ``v2026.0.0``
139142
* - ``ORCH_INSTALLER_PROFILE``
140143
- Deployment profile for Edge Orchestrator
141144
- ``onprem``
@@ -176,10 +179,14 @@ Network Configuration
176179
* - ``TRAEFIK_IP``
177180
- MetalLB IP address for Traefik
178181
- (empty)
179-
* - ``NGINX_IP``
180-
- MetalLB IP address for NGINX
182+
* - ``HAPROXY_IP``
183+
- MetalLB IP address for HAProxy
181184
- (empty)
182185
186+
.. note::
187+
In **v2026.0.0 (latest release)**, the ingress controller was **replaced from NGINX to HAProxy**.
188+
Please check whether the DNS entry for HAProxy is present after installation .
189+
183190
Container Registry Configuration
184191
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
185192
@@ -335,6 +342,7 @@ Update the following sections:
335342
- **CORE DEPLOYMENT CONFIGURATION:**
336343
- RELEASE_SERVICE_URL
337344
- DEPLOY_VERSION
345+
- DEPLOY_REPO_BRANCH
338346
- ORCH_INSTALLER_PROFILE
339347
340348
- **AUTHENTICATION & SECURITY:**
@@ -343,7 +351,7 @@ Update the following sections:
343351
344352
- **NETWORK CONFIGURATION:**
345353
- CLUSTER_DOMAIN
346-
- ARGO_IP, TRAEFIK_IP, NGINX_IP
354+
- ARGO_IP, TRAEFIK_IP, HAPROXY_IP
347355
348356
- **CONTAINER REGISTRY:**
349357
- GITEA_IMAGE_REGISTRY
@@ -367,8 +375,10 @@ Update the following sections:
367375
kubectl get svc traefik -n orch-gateway
368376
kubectl get svc ingress-nginx-controller -n orch-boots
369377
370-
# Set deployment version (replace with your actual upgrade version tag)
371-
export DEPLOY_VERSION=v2025.2.0
378+
# Set deployment version (replace with your actual upgrade version tag)
379+
export DEPLOY_VERSION=v2026.0.0
380+
#Set the deploy repo release tag/branch (Gitea commit/tag/branch from EMF repo)
381+
export DEPLOY_REPO_BRANCH=v2026.0.0
372382
373383
# Set non-interactive mode to true to skip prompts
374384
export PROCEED=true
@@ -427,7 +437,7 @@ Before confirming in Terminal 1, open **Terminal 2** and update configurations:
427437
# Check current LoadBalancer IPs
428438
kubectl get svc argocd-server -n argocd
429439
kubectl get svc traefik -n orch-gateway
430-
kubectl get svc ingress-nginx-controller -n orch-boots
440+
kubectl get svc ingress-haproxy-kubernetes-ingress -n orch-boots
431441
432442
# Verify LB IP configurations are updated
433443
nano repo_archives/tmp/edge-manageability-framework/orch-configs/clusters/onprem.yaml
@@ -451,7 +461,7 @@ Step 7: Monitor Upgrade Progress
451461
452462
The upgrade process includes:
453463
454-
- Upgrade RKE2 to 1.34.1 versions
464+
- Upgrade RKE2 to 1.34.4 versions
455465
- OS Configuration upgrade
456466
- Gitea upgrade
457467
- ArgoCD upgrade
@@ -575,8 +585,8 @@ Verify that the ``signed_ipxe.efi`` image is downloaded using the freshly downlo
575585
# Delete both files before downloading
576586
rm -rf Full_server.crt signed_ipxe.efi
577587
export CLUSTER_DOMAIN=cluster.onprem
578-
wget https://tinkerbell-nginx.$CLUSTER_DOMAIN/tink-stack/keys/Full_server.crt --no-check-certificate --no-proxy -q -O Full_server.crt
579-
wget --ca-certificate=Full_server.crt https://tinkerbell-nginx.$CLUSTER_DOMAIN/tink-stack/signed_ipxe.efi -q -O signed_ipxe.efi
588+
wget https://tinkerbell-haproxy.$CLUSTER_DOMAIN/tink-stack/keys/Full_server.crt --no-check-certificate --no-proxy -q -O Full_server.crt
589+
wget --ca-certificate=Full_server.crt https://tinkerbell-haproxy.$CLUSTER_DOMAIN/tink-stack/signed_ipxe.efi -q -O signed_ipxe.efi
580590
581591
Once the above steps are successful, the orchestrator (Orch) is ready for onboarding new Edge Nodes (EN).
582592

docs/index.rst

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,22 @@ you can find details about the high-level design and submit patches of your own.
116116
APIs offer Create, Read, Update, and Delete capabilities.
117117

118118

119+
Modular Workflows
120+
-----------------
121+
Device management workflows from EMF that showcase Intel Architecture capabilities,
122+
designed to be evaluated independently and seamlessly integrated into partner
123+
device-management solutions to extend their functionality.
124+
125+
.. grid:: 3
126+
127+
.. grid-item-card:: Modular Workflows
128+
:link: modular_workflows/index
129+
:link-type: doc
130+
:link-alt: clickable cards
131+
132+
Explore modular device management workflows that extend partner solutions with Intel Architecture capabilities.
133+
134+
119135
.. toctree::
120136
:hidden:
121137

@@ -125,5 +141,6 @@ you can find details about the high-level design and submit patches of your own.
125141
developer_guide/index
126142
api/index
127143
system_requirements/index
144+
modular_workflows/index
128145

129146

docs/modular_workflows/index.rst

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
Modular Workflows
2+
=================
3+
4+
Device management workflows from EMF that showcase Intel Architecture
5+
capabilities, designed to be evaluated independently and seamlessly integrated
6+
into partner device-management solutions to extend their functionality.
7+
8+
.. grid:: 3
9+
10+
.. grid-item-card:: Modular vPro Workflow
11+
:link: vpro-amt-ism/index
12+
:link-type: doc
13+
:link-alt: clickable cards
14+
15+
End-to-end activation and device management using Intel® vPro AMT and ISM.
16+
17+
.. toctree::
18+
:hidden:
19+
20+
vpro-amt-ism/index
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
Modular vPro Workflow Architecture
2+
==================================
3+
4+
Architecture Diagram
5+
--------------------
6+
7+
The modular vPro workflow makes use of components from the Edge Infrastructure
8+
Manager to provide an out-of-band (OOB) management pipeline for edge devices.
9+
The high level architecture of the workflow is shown in the following diagram:
10+
11+
.. figure:: images/modular-vpro-architecture.png
12+
:alt: High-Level Architecture of the modular vPro workflow
13+
14+
Key Components
15+
--------------
16+
17+
To enable the vPro device management for edge devices, the modular workflow
18+
uses the following Edge Infrastructure Manager services on the orchestrator:
19+
20+
`Inventory <https://github.com/open-edge-platform/infra-core/tree/main/inventory>`_ is the state store
21+
in Edge Infrastructure Manager. The modular vPro workflow uses the inventory service to store the
22+
status of edge devices, including the current state of the device as well as the desired state.
23+
24+
`API <https://github.com/open-edge-platform/infra-core/tree/main/apiv2>`_ provides a northbound REST based
25+
API that users and services can use to access Open Edge Platform services.
26+
27+
`Orchestrator Command Line Interface (CLI) <https://github.com/open-edge-platform/orch-cli>`_ is a utility
28+
which provides a command line interface that allows users to interact and manage the Orchestrator services
29+
using the REST API.
30+
31+
`Host Manager <https://github.com/open-edge-platform/infra-managers/tree/main/host>`_ is a service used to
32+
manager an edge node's hardware information. For the modular vPro workflow, this includes the status of the
33+
edge node device and the agents running there. The manager stores this information to inventory along with
34+
other information to identify the edge node.
35+
36+
`Device Management Manager <https://github.com/open-edge-platform/infra-external/tree/main/dm-manager>`_ is a service
37+
that provides integration between the Intel® vPro™ Active Management Technology (AMT) and Intel® Standard Manageability (ISM)
38+
on the edge node and the services provided by the Device Management Toolkit outlined below. This includes enabling
39+
remote management of edge node devices, allowing for remote power management and system configuration.
40+
41+
On the edge node device, the workflow requires the following agents:
42+
43+
`Device Discovery Agent <https://github.com/open-edge-platform/edge-node-agents/tree/main/device-discovery-agent>`_ is an
44+
agent deployed on the edge node that is responsible for discovering and registering that edge node with the Edge Infrastructure
45+
Manager during onboarding. This includes collecting system information from the edge node and handling authentication with
46+
the orchestrator. The agent can be run in either an interactive or non-interactive mode.
47+
48+
`Node Agent <https://github.com/open-edge-platform/edge-node-agents/tree/main/node-agent>`_ is an agent deployed on the edge node
49+
that is responsible for creating and refreshing any authentication tokens for agents running on the edge node. It also
50+
monitors the status of the edge node and the agents running on the node which it frequently reports to the Host Manager
51+
service in the Edge Infrastructure Manager.
52+
53+
`Platform Manageability Agent <https://github.com/open-edge-platform/edge-node-agents/tree/main/platform-manageability-agent>`_ manages
54+
platform level manageability features on the edge node. It integrates the Remote Provisioning Client service from the Device
55+
Management Toolkit and Intel® vPro™ to enable OOB device management capabilities on the edge node.
56+
57+
The vPro modular workflow also uses the following components from the `Device Management Toolkit (DMT) <https://device-management-toolkit.github.io/docs/2.31/Reference/architectureOverview/>`_
58+
on the orchestrator and edge node:
59+
60+
`Management Presence Server (MPS) <https://device-management-toolkit.github.io/docs/2.31/Reference/MPS/configuration/>`_ allows
61+
edge nodes which have support for Intel® AMT to connect securely to remote manageability services.
62+
63+
`Remote Provisioning Server (RPS) <https://device-management-toolkit.github.io/docs/2.31/Reference/RPS/configuration/>`_ is
64+
used to remotely connected to the Remote Provisioning Client service on an edge node device which supports Intel® AMT. It
65+
provides the required configuration profiles and settings needed to enable Intel® AMT for remote manageability of
66+
the device by MPS.
67+
68+
`Remote Prvosioning Client (RPC) <https://device-management-toolkit.github.io/docs/2.31/Reference/RPC/overview/>`_ is a
69+
lightweight application written in Go that is installed on the edge node device and interacts directly with
70+
Intel® AMT. It communicates with the RPS service and activates and manages Intel® AMT based on the
71+
configuration profiles and settings sent by RPS.

0 commit comments

Comments
 (0)