Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Doc changes #93

Merged
merged 1 commit into from
Aug 23, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 18 additions & 0 deletions docs/Setup.md
Original file line number Diff line number Diff line change
Expand Up @@ -126,6 +126,8 @@ IPU ES2K target.
```bash
export IFACE=ens801f0d4
```
Make changes to the [infragent config file](#infragent-config-file-update)
for interface and interface type.

For DPDK target, change the interfaceType in config.yaml file to "tap".

Expand All @@ -140,6 +142,7 @@ IPU ES2K target.
before building the images.



8. Make the docker images. This step builds the Kubernetes container images:
```bash
make docker-build
Expand Down Expand Up @@ -176,6 +179,21 @@ IPU ES2K target.
crictl pull localhost:5000/infraagent:latest
```

### infraagent config file update

The config file `deploy/es2k/infraagent-configmap.yaml` is used to inform the
infraagent which interface and interfacetype to use.

The interfaceType should be `cdq` for ES2K and the the interface name is the
base name for PF for PCI device ID 1452

```text
interfaceType : cdq
interface: ens801f0
mtls: true
insecure: false
```

### inframanager config file update

The config file `inframanager/config.yaml` is used to define the parameters
Expand Down
7 changes: 4 additions & 3 deletions inframanager/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -58,13 +58,14 @@ InfraManager:
# ]
# Check https://pkg.go.dev/crypto/tls
# for the list of supported ciphersuites.
# The paths for the secrets are where the running
# instances look for the certs and these paths
# are not on the host where the secrets are
# being generated on

# Not required for dpdk
arp-mac: "00:0f:00:04:03:14"
conn: mtls
server-cert: "/etc/pki/inframanager/certs/server/tls.crt"
server-key: "/etc/pki/inframanager/certs/server/tls.key"
ca-cert: "/etc/pki/inframanager/certs/server/ca.crt"
ciphersuites : [
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_AES_256_GCM_SHA384",
Expand Down