There are three ways of installing the Ultralight 2.0 Agent: cloning the GitHub repository, using the RPM or using Docker. Regardless of the installation method, there are some middlewares that must be present, as a prerequisite for the component installation (no installation instructions are provided for these middlewares):
-
A MQTT v3.1 Broker is needed for the MQTT Binding to work. Both Mosquitto and Rabbit MQ (with the MQTT plugin activated) have been tested for this purpose.
-
A MongoDB instance (v3.2+) is required for those IoT Agents configured to have persistent storage. An in-memory storage repository is also provided for testing purposes.
-
The IoT Agent purpose is to connect devices (using a native device protocol on the South Port of the IoT Agent) and NGSI endpoints on the North Port of the IoT Agent - typically a NGSI Context Broker, like Orion), so an accessible Context Broker is also required. IoT Agents were tested with v0.26.0 (higher versions should also work).
Please, follow the links to the official Web Pages to find how can you install each of the middlewares in your environment.
The following sections describe each installation method in detail.
Clone the repository with the following command:
git clone https://github.com/telefonicaid/iotagent-ul.git
Once the repository is cloned, from the root folder of the project execute:
npm install
This will download the dependencies for the project, and let it ready to the execution.
When the component is executed from a cloned GitHub repository, it takes the default config file that can be found in the root of the repository.
To see how to generate the RPM, follow the instructions in Packaging.
To install the RPM, use the YUM tool:
yum localinstall --nogpg <rpm-file_name>
Be aware that the RPM installs linux services that can be used to start the application, instead of directly calling the executable (as explained in the section Usage.
When this option is used, all the files are installed under the /opt/iotaul
folder. There you can find the config.js
file to configure the service. Remember to restart the service each time the config file has changed.
There are automatic builds of the development version of the IOTAgent published in Docker hub. In order to install using the docker version, just execute the following:
docker run -d --link orion:orion --link mosquitto:mosquitto --link mongo:mongo -p 7896:7896 -p 4061:4061 telefonicaiot/iotagent-ul
As you can see, the Ultralight 2.0 (as any other IOTA) requires some docker dependencies to work:
- mongo: Mongo database instance (to store provisioning data).
- orion: Orion Context Broker.
- mosquitto: Mosquitto MQTT broker, to deal with MQTT based requests.
In order to link them, deploy them using docker and use the option --link
as shown in the example. You may also want
to map the external IoT Agent North and South ports, for external calls: 4061 (NGSI Interactions for traffic north of
the IoT Agent) and 7896 (HTTP binding for traffic south of the IoT Agent).
There is also the possibility to build your own local Docker image of the IOTAUL component.
To do it, follow the next steps once you have installed Docker in your machine:
- Navigate to the path where the component repository was cloned.
- Launch a Docker build
- Using the default NodeJS version of the operating system used defined in FROM keyword of Dockerfile:
sudo docker build -f Dockerfile .
- Using an alternative NodeJS version:
sudo docker build --build-arg NODEJS_VERSION=0.10.46 -f Dockerfile .
In order to execute the IOTAgent, just issue the following command from the root folder of the cloned project:
bin/iotagent-ul [config file]
The optional name of a config file is optional and described in the following section.
The RPM installs a linux service that can be managed with the typical instructions:
service iotaul start
service iotaul status
service iotaul stop
In this mode, the log file is written in /var/log/iotaul/iotaul.log
.
The Docker automatically starts listening in the API ports, so there is no need to execute any process in order to have the application running. The Docker image will automatically start.
The only package type allowed is RPM. In order to execute the packaging scripts, the RPM Build Tools must be available in the system.
From the root folder of the project, create the RPM with the following commands:
cd rpm
./create-rpm.sh -v <version-number> -r <release-number>
Where <version-number>
is the version (x.y.z) you want the package to have and <release-number>
is an increasing
number dependent un previous installations.
All the configuration for the IoT Agent resides in the config.js
file, in the root of the application. This file is a
JavaScript file, that contains the following sections:
- config.iota: general IoT Agent configuration. This group of attributes is common to all types of IoT Agents, and is described in the global IoT Agent Library Documentation.
- config.mqtt: configuration for the MQTT transport protocol binding of the IoT Agent (described in the following subsections).
- config.http: configuration for the HTTP transport protocol binding of the IoT Agent (described in the following subsections).
- config.defaultKey: default API Key, for devices lacking a provided Configuration.
- config.defaultTransport: code of the MQTT transport that will be used to resolve incoming commands and lazy attributes in case a transport protocol could not be inferred for the device.
The config.mqtt
section of the config file contains all the information needed to connect to the MQTT Broker from the
IoT Agent. The following attributes are accepted:
- protocol: protocol to use for connecting with the MQTT broker (
mqtt
,mqtts
,tcp
,tls
,ws
,wss
). The default ismqtt
- host: Host where the MQTT Broker is located.
- port: Port where the MQTT Broker is listening
- username: Username for the IoT Agent in the MQTT broker, if authentication is activated.
- password: Password for the IoT Agent in the MQTT broker, if authentication is activated.
- ca: ca certificates to use for validating server certificates (optional). Default is to trust the well-known CAs curated by Mozilla. Mozilla's CAs are completely replaced when CAs are explicitly specified using this option.
- cert: cert chains in PEM format to use for authenticating into the MQTT broker (optional). Only used when using
mqtts
,tls
orwss
as connnection protocol. - key: optional private keys in PEM format to use on the client-side for connecting with the MQTT broker
(optional). Only used when using
mqtts
,tls
orwss
as connection protocol. The included CA list will be used to determine if server is authorized. - qos: QoS level: at most once (
0
), at least once (1
), exactly once (2
). (default is0
). - retain: retain flag (default is
false
). - retries: Number of MQTT connection error retries (default is 5).
- retryTime: Time between MQTT connection retries (default is 5 seconds).
- keepalive: Time to keep connection open between client and MQTT broker (default is 60 seconds). If you experience disconnnection problems using 0 (as the one described in this case) a value greater than 0 is recommended.
- rejectUnauthorized whether to reject any connection which is not authorized with the list of supplied CAs. This
option only has an effect when using
mqtts
,tls
orwss
protocols (default istrue
). Set tofalse
if using a self-signed certificate but beware that you are exposing yourself to man in the middle attacks, so it is a configuration that is not recommended for production environments. - avoidLeadingSlash this flag sets whether the agent publishes commands to topics starting with slash (default in order versions) or without the slash. See discussion.
- clean: this flag is by default true, set to false to receive QoS 1 and 2 messages while offline.
- clientId: string ID which identifies client in mqtt broker. By default is using a string composed by a fixed prefix
iotaul_
and a random suffix, i.e.iotaul_43bf8a3a
.
The config.amqp
section of the config file contains all the information needed to connect to the AMQP Broker from the
IoT Agent. The following attributes are accepted:
- host: Host where the AMQP Broker is located.
- port: Port where the AMQP Broker is listening
- username: Username for the IoT Agent in the AMQP broker
- password: Password for the IoT Agent in the AMQP broker
- exchange: Exchange in the AMQP broker
- queue: Queue in the AMQP broker
- durable: durable queue flag (default is
false
). - retries: Number of AMQP connection error retries (default is 5).
- retryTime: Time between AMQP connection retries (default is 5 seconds).
The config.http
section of the config file contains all the information needed to start the HTTP server for the HTTP
transport protocol binding. The following options are accepted:
- port: South Port where the HTTP listener will be listening for information from the devices.
- timeout: HTTP Timeout for the HTTP endpoint (in milliseconds).
- key: Path to your private key for HTTPS binding
- cert: Path to your certificate for HTTPS binding
Some of the more common variables can be configured using environment variables. The ones overriding general parameters
in the config.iota
set are described in the
IoT Agent Library Configuration manual.
The ones relating global configuration described in the following table.
Environment variable | Configuration attribute |
---|---|
IOTA_CONFIG_RETRIEVAL | configRetrieval |
IOTA_DEFAULT_KEY | defaultKey |
IOTA_DEFAULT_TRANSPORT | defaultTransport |
The ones relating specific Ultralight 2.0 bindings are described in the following table.
Environment variable | Configuration attribute |
---|---|
IOTA_MQTT_PROTOCOL | mqtt.protocol |
IOTA_MQTT_HOST | mqtt.host |
IOTA_MQTT_PORT | mqtt.port |
IOTA_MQTT_CA | mqtt.ca |
IOTA_MQTT_CERT | mqtt.cert |
IOTA_MQTT_KEY | mqtt.key |
IOTA_MQTT_REJECT_UNAUTHORIZED | mqtt.rejectUnauthorized |
IOTA_MQTT_USERNAME | mqtt.username |
IOTA_MQTT_PASSWORD | mqtt.password |
IOTA_MQTT_QOS | mqtt.qos |
IOTA_MQTT_RETAIN | mqtt.retain |
IOTA_MQTT_RETRIES | mqtt.retries |
IOTA_MQTT_RETRY_TIME | mqtt.retryTime |
IOTA_MQTT_KEEPALIVE | mqtt.keepalive |
IOTA_MQTT_AVOID_LEADING_SLASH | mqtt.avoidLeadingSlash |
IOTA_MQTT_CLEAN | mqtt.clean |
IOTA_MQTT_CLIENT_ID | mqtt.clientId |
IOTA_MQTT_DISABLED | mqtt.disabled |
IOTA_AMQP_HOST | amqp.host |
IOTA_AMQP_PORT | amqp.port |
IOTA_AMQP_USERNAME | amqp.username |
IOTA_AMQP_PASSWORD | amqp.password |
IOTA_AMQP_EXCHANGE | amqp.exchange |
IOTA_AMQP_QUEUE | amqp.queue |
IOTA_AMQP_DURABLE | amqp.durable |
IOTA_AMQP_RETRIES | amqp.retries |
IOTA_AMQP_RETRY_TIME | amqp.retryTime |
IOTA_AMQP_DISABLED | amqp.disabled |
IOTA_HTTP_HOST | http.host |
IOTA_HTTP_PORT | http.port |
IOTA_HTTP_TIMEOUT | http.timeout |
IOTA_HTTP_KEY | http.key |
IOTA_HTTP_CERT | http.cert |
Node.js is single‑threaded and uses nonblocking I/O, allowing it to scale up to tens of thousands of concurrent operations. Nevertheless, Node.js has a few weak points and vulnerabilities that can make Node.js‑based systems to offer underperformance behaviour, specially when a Node.js web application experiences rapid traffic growth.
Additionally, It is important to know the place in which the node.js server is running, because it has limitations. There are two types of limits on the host: hardware and software. Hardware limits can be easy to spot. Your application might be consuming all of the memory and needing to consume disk to continue working. Adding more memory by upgrading your host, whether physical or virtual, seems to be the right choice.
Moreover, Node.js applications have also a software memory limit (imposed by V8), therefore we cannot forget about these limitations when we execute a service. In this case of 64-bit environment, your application would be running by default at a 1 GB V8 limit. If your application is running in high traffic scenarios, you will need a higher limit. The same is applied to other parameters.
It means that we need to make some changes in the execution of node.js and in the configuration of the system:
-
Node.js flags
-
--use-idle-notification
Turns of the use idle notification to reduce memory footprint.
-
--expose-gc
Use the expose-gc command to enable manual control of the garbage collector from the own node.js server code. In case of the IoTAgent, it is not implemented because it is needed to implement the calls to the garbage collector inside the ser server, nevertheless the recommended value is every 30 seconds.
-
--max-old-space-size=xxxx
In that case, we want to increase the limit for heap memory of each V8 node process in order to use max capacity that it is possible instead of the 1,4Gb default on 64-bit machines (512Mb on a 32-bit machine). The recommendation is at least to use half of the total memory of the physical or virtual instance.
-
-
User software limits
Linux kernel provides some configuration about system related limits and maximums. In a distributed environment with multiple users, usually you need to take into control the resources that are available for each of the users. Nevertheless, when the case is that you have only one available user but this one request a lot of resources due to a high performance application the default limits are not proper configured and need to be changed to resolve the high performance requirements. These are like maximum file handler count, maximum file locks, maximum process count etc.
You can see the limits of your system executing the command:
ulimit -a
You can detine the corresponding limits inside the file limits.conf. This description of the configuration file syntax applies to the
/etc/security/limits.conf
file and *.conf files in the/etc/security/limits.d
directory. You can get more information about the limits.conf in the limits.conf - linux man pages. The recommended values to be changes are the following:-
core
Limits of the core file size in KB, we recommend to change to
unlimited
both hard and soft types.* soft core unlimited * hard core unlimited
-
data
Maximum data size in KB, we recommend to change to
unlimited
both hard and soft types.* soft data unlimited * hard data unlimited
-
fsize
Maximum filesize in KB, we recommend to change to
unlimited
both hard and soft types.* soft fsize unlimited * hard fsize unlimited
-
memlock
Maximum locked-in-memory address space in KB, we recommend to change to
unlimited
both hard and soft types.* memlock unlimited * memlock unlimited
-
nofile
Maximum number of open file descriptors, we recommend to change to
65535
both hard and soft types.* soft nofile 65535 * hard nofile 65535
-
rss
Maximum resident set size in KB (ignored in Linux 2.4.30 and higher), we recommend to change to
unlimited
both hard and soft types.* soft rss unlimited * hard rss unlimited
-
stack
Maximum stack size in KB, we recommend to change to
unlimited
both hard and soft types.* soft stack unlimited * hard stack unlimited
-
nproc
Maximum number of processes, we recommend to change to
unlimited
both hard and soft types.* soft nproc unlimited * hard nproc unlimited
You can take a look to the limits.conf file provided in this folder with all the values provided.
-
-
Configure kernel parameters
sysctl is used to modify kernel parameters at runtime. We plan to modify the corresponding
/etc/sysctl.conf
file. You can get more information in the corresponding man pages of sysctl and sysctl.conf. You can search all the kernel parameters by using the commandsysctl -a
-
fs.file-max
The maximum file handles that can be allocated, the recommended value is
1000000
.fs.file-max = 1000000
-
fs.nr_open
Max amount of file handles that can be opened, the recommended value is
1000000
.fs.nr_open = 1000000
-
net.netfilter.nf_conntrack_max
Size of connection tracking table. Default value is nf_conntrack_buckets value * 4.
net.nf_conntrack_max = 1048576
For more details about any other kernel parameters, take a look to the example sysctl.conf file.
-