Get Started with Edge Orchestrator#
Set up the following system and hardware configuration before installing Edge Orchestrator:
System Requirements#
Domain#
A domain name is required for Edge Orchestrator installation.
For typical on-premises deployments, where both EMF and edge nodes are on a local network, an internal private domain is sufficient.
If EMF is hosted by a third party for multiple tenants, and access between the end customer, EMF, and edge nodes occurs over the internet, an external public domain is required.
The domain name must be unique and not used by any other service in the network. The domain name must be a fully qualified domain name (FQDN) and not an IP address.
Edge Orchestrator Network Topology#
Warning
Ensure that there are no incorrect configurations while setting up your DNS server for Edge Orchestrator. Incorrect configurations can lead to deployment failures. Specifically, the RKE2 (the kubernetes distribution used for EMF on-prem cluster) might start using the 8.8.8.8 server for DNS resolution, if no other DNS server is configured correctly.
Avoid configuring /etc/resolv.conf and /run/systemd/resolve/resolv.conf to point exclusively to loopback or multicast nameservers. This can cause issues during deployment.
Ensure that the service_cidr subnet specified in the installation guide does not overlap with any existing subnets in your infrastructure. For example, if the k8s service_cidr includes the IP 10.43.0.10, ensure this IP is not used as a DNS server in the OS or for any critical network communications in your environment.

Edge Orchestrator Network Topology with Corporate Proxy#

Edge Orchestrator for Edge Nodes without Direct Internet Access#

Lenovo* Open Cloud Automation (LOC-A) Network Topology (Optional)#
When integrating the Lenovo* Open Cloud Automation (LOC-A) software, you can use the networking settings of your choice.
In general, Edge Orchestrator and LOC-A can share the same subnet, but this might not be desirable for the Baseboard Management Controller (BMC) of the edge devices (or not entirely possible). The following figure shows a simple network topology:

In addition to upstream connectivity, Edge Orchestrator requires connectivity to LOC-A; while the edge node requires connectivity to Edge Orchestrator. LOC-A also has its own network environment requirements to ensure proper communication between the LOC-A Portal and the edge nodes. For details on LOC-A and networking settings, see the Lenovo ISG Support Plan - LOC-A (Lenovo Open Cloud Automation).
This Edge Orchestrator version is compatible with LOC-A version 3.2.
Note
Other configurations are possible, for example, having a separate network for BMC and OS management.
Firewall Configuration#
The following table lists the network endpoints for Edge Orchestrator and edge nodes, which you can use to configure firewall rules tailored to your network environment.
ArgoCD Admin UI at
argo.{domain}
. Intel recommends that you restrict the incoming traffic to a subset of known source IPs because this is an administrator interface.BIOS Onboarding accesses
tinkerbell-nginx.{domain}
.You can access all other services from edge nodes agents, UI, and APIs of Edge Orchestrator.
Source |
Destination |
Protocol |
Port number |
Description |
---|---|---|---|---|
Edge Orchestrator UI and API |
{domain} |
TCP |
443 |
Web UI |
Edge Orchestrator UI and API |
web-ui.{domain} |
TCP |
443 |
Web UI |
Edge Orchestrator API |
api.{domain} |
TCP |
443 |
Tenancy API |
Edge Orchestrator UI and API |
metadata.{domain} |
TCP |
443 |
Web UI |
Edge Orchestrator UI and API |
app-orch.{domain} |
TCP |
443 |
Application orchestration |
Edge Orchestrator UI and API |
app-service-proxy.{domain} |
TCP |
443 |
Application orchestration |
Edge Orchestrator UI and API |
ws-app-service-proxy.{domain} |
TCP |
443 |
Application orchestration |
Edge Orchestrator UI and API |
gitea.{domain} |
TCP |
443 |
Application orchestration |
Edge Orchestrator UI and API |
vnc.{domain} |
TCP |
443 |
Application orchestration |
Edge Orchestrator UI and API |
cluster-orch.{domain} |
TCP |
443 |
Cluster orchestration |
Edge Orchestrator UI and API |
iaas.{domain} |
TCP |
443 |
Edge infrastructure management |
Edge Orchestrator UI and API |
infra.{domain} |
TCP |
443 |
Edge infrastructure management |
Edge Orchestrator UI and API |
onboarding.{domain} |
TCP |
443 |
Edge infrastructure management |
Edge Orchestrator UI and API |
update.{domain} |
TCP |
443 |
Edge infrastructure management |
Edge Orchestrator UI and API |
keycloak.{domain} |
TCP |
443 |
Identity and Access Management |
Edge Orchestrator UI and API |
log-query.{domain} |
TCP |
443 |
Observability |
Edge Orchestrator UI and API |
observability-admin.{domain} |
TCP |
443 |
Observability |
Edge Orchestrator UI and API |
observability-ui.{domain} |
TCP |
443 |
Observability |
Edge Orchestrator UI and API |
telemetry.{domain} |
TCP |
443 |
Observability |
Edge Orchestrator UI and API |
rancher.{domain} |
TCP |
443 |
Rancher’s Fleet UI |
Edge Orchestrator UI and API |
registry.{domain} |
TCP |
443 |
Harbor* UI |
Edge Orchestrator UI and API |
vault.{domain} |
TCP |
443 |
Vault* UI |
Edge node |
cluster-orch-node.{domain} |
TCP |
443 |
Cluster orchestration |
Edge node |
infra-node.{domain} |
TCP |
443 |
Edge infrastructure management |
Edge node |
onboarding-node.{domain} |
TCP |
443 |
Edge infrastructure management |
Edge node |
release.{domain} |
TCP |
443 |
Release service token |
Edge node |
metrics-node.{domain} |
TCP |
443 |
Observability |
Edge node |
telemetry-node.{domain} |
TCP |
443 |
Observability |
Edge node |
logs-node.{domain} |
TCP |
443 |
Observability |
Edge node |
tinkerbell-server.{domain} |
TCP |
443 |
Onboarding |
Edge node |
update-node.{domain} |
TCP |
443 |
Edge infrastructure management |
Edge node |
tinkerbell-nginx.{domain} |
TCP |
443 |
BIOS onboarding |
Edge Orchestrator admin |
argo.{domain} |
TCP |
443 |
ArgoCD UI |
LOC-A Firewall Configuration (Optional)#
When integrating the LOC-A and Edge Orchestrator, you will need an additional entry if you deploy LOC-A on the same network that is served by the same DNS.
Source |
Destination |
Protocol |
Port number |
Description |
---|---|---|---|---|
LOC-A Web UI and API |
loca.{domain} |
TCP |
443 |
Web UI and REST API |
Squid Proxy Firewall Configuration (Optional)#
When deploying Edge Orchestrator with Squid proxy, you will need an additional firewall entry to allow the edge node to reach the Squid proxy. Intel recommends that only the edge node subnet is allowed to access the Squid proxy endpoint.
Source |
Destination |
Protocol |
Port Number |
Description |
---|---|---|---|---|
Edge node |
{IP of Traefik endpoint in Edge Orchestrator} |
TCP |
8080 |
Squid proxy |