b6a67ffdb8f433cc7bf644b0b0d7088dadf2d1d1

Remove apparmor annotations. With k8s 1.36+ apparmor is implemented via security_context instead of annotations. Users are expected to add the appropriate values downstream. The htk snippets are in place. Change-Id: Ifd4ecd3220432e33bd9914e02f228dd933ca32ca Signed-off-by: Ritchie, Frank (fr801x) <fr801x@att.com>
Divingbell
Introduction
Divingbell is a lightweight solution for:
1. Bare metal configuration management for a few very targeted use cases via the following modules:
- apparmor
- ethtool
- exec (run arbitrary scripts)
- system limits
- mounts
- permissions (perm)
- sysctl values
- basic user account management (uamlite)
- Bare metal package manager orchestration using apt module
What problems does it solve?
The needs identified for Divingbell were:
- To plug gaps in day 1 tools (e.g., Drydock) for node configuration
- To provide a day 2 solution for managing these configurations going forward
- [Future] To provide a day 2 solution for system level host patching
Documentation
Find more documentation for Divingbell on Read the Docs.
Further Reading
Description
Languages
Shell
56.2%
Smarty
42.2%
Makefile
1%
Python
0.6%