如今,众多的硬件设备和软件应用程序令人望而生畏--这给IoT 应用程序开发人员和 IT 团队带来了昂贵而繁琐的挑战。但是,有一种方法可以利用轻量级、可移植的应用程序容器来简化这些流程。

请花一点时间填写下面的表格,并立即获得本次网络研讨会的录音。
 封面页

网络研讨会录音

Digi Containers:构建、部署和管理定制应用程序的最佳方法

Jun 23, 2023 | Length: 38:01

如今,众多的硬件设备和软件应用程序令人望而生畏--这给IoT 应用程序开发人员和 IT 团队带来了昂贵而繁琐的挑战。但是,有一种方法可以利用轻量级、可移植的应用程序容器来简化这些流程。

The Digi Containers service is available on all Digi DAL-OS routers as an add-on service through Digi Remote Manager®. This service enables you to containerize your custom applications and manage them through Digi RM to reduce cost and complexity. Watch our video with experts from Digi and Sierra Nevada Corporation, makers of Binary Armor, to learn more about Digi Containers.

与 Digi 联系

想进一步了解 Digi 如何为您提供帮助?以下是接下来的一些步骤:

网络研讨会后续问答

Thank you again for attending our session with Informa and Sierra Nevada Corporation on using Digi Containers to build, deploy and manage custom applications. Here are the questions that followed the presentation and their answers. If you have additional questions, be sure to reach out.

Moderator: Tad Munroe, Director of Sales, Informa

演讲者 

  • Kyle Shepard, Chief Engineer of Cyber Programs, Sierra Nevada Corporation
  • Nate Pleasant, Senior Product Manager, Digi International

Are containers completely customizable, or are they are built on pre-built templates?Are containers completely customizable, or are they are built on pre-built templates?

Nate: That's a really good question. We offer the ability for both. On the Digi Containers SDK page, we have a list of pre-built template containers that can get you started, using some common containerized applications that customers or users have requested. So, that's a good way to get started. Those same templates can be also loaded in Digi Remote Manager®. So, when you look at your device for the first time, if you're getting the device first set up in Remote Manager, it can show you those templates to select from, and you can get started with that. But the more common use case we see is a lot of people have custom applications, or they want to get started with using their own application and container.

So, they want to completely customize it. So again, that SDK tool can help you get started with a step-by-step walkthrough of getting your application compiled if needed. Or if you already have a Docker or LXC containerized application, you can get that loaded and started, using that on your Digi device.

How portable are the containers across different products in Digi's line?

Nate: Digi devices run the gamut as far as size of product. So, we have a product with a single Ethernet port and a single serial port, with a cell connection, all the way to, like Kyle mentioned earlier, we have console servers that have 48 serial ports and multiple Ethernet and cellular connections together, and meant to be installed in a server rack. So, fairly large products. And with that, there are many different types of CPU architectures and memory and disk space available on each of those products from the small size to the large.

The majority of them run similar CPU architectures. The benefit of that is, if you have an LXC container, and you have a custom binary application that's compiled to run on an Arm PC, that can then be ported and run across multiple Digi device types that have the same CPU and internal inside of it. It makes it very portable across multiple Digi products. And furthermore, the LXC containerized technology itself doesn't have any CPU-specific calls. So, unless you have a custom application that is built for a certain CPU architecture, if you're just using this for extra scripting or Python capabilities or other applications like that, the container itself can then be ported across any of the Digi devices because the LXC container itself is just a way to port that onto any device.

Are you allowed to have multiple users with access to set up any changes on the Binary Armor?

Kyle: Yes. So, Binary Armor has full individual user accounts, so you can set up as many as you need, and you can assign them individual permissions. If you want someone able to change settings of the Binary Armor itself, but not change operation settings, you have the controls to be able to fine-tune to meet your organization's needs.

What type of external notifications do you get from Binary Armor where an event is detected, or authorization is needed, and so forth?

Kyle: There are a few ways that Binary Armor notifies you, depending on if you're in the operations group or in security. Binary Armor has the ability to send out alerts. So, what we saw in the demo, of feeding back to a user interface… That whole user interface is based off of an HTTP API, so we can pull that into a number of different operation toolkits to be able to display that information to wherever the operation users are. Also, if there is an interface such as the Node-RED one that we were running in that demo, we could add in a notification of the mode to Binary Armor into that demonstration itself, as a second data channel.

From a security perspective, our information is all logged out to wherever you have a log collection or a SIEM in security. So, if you are running a security operations center, this information will feed that security operations center, where you're also able to see alerts of what's going on with a little bit more detail so you can dive into the forensics of what actually happened on the network. Is it someone just didn't call, or is it something malicious is potentially happening?

What resources do the containers take on the host device? CPU, NVM, storage, data storage?

Nate: On the Digi device, when you load a container, how much CPU and memory it utilizes is based off the applications that are running inside the container. The LXC container itself is very, very small. We're talking, to have a basic test LXC container that is just the wrapper for your current Linux kernel environment, it's a few kilobytes in size, because it's sharing that host CPU architecture, so there's a lot of ability for it to run really lightweight and lean for getting the LXC container started. So, again, how much CPU and memory you need is based off of what your application is running, and its system requirements.

Beyond that, though, the container itself can share resources on the device beyond just memory and CPU, such as things like the networking. So, you can tie that container within a certain segment of a network that the Digi device has access to. So, it could be a VLAN, it could be part of a Wi-Fi network, or in anything thereof that the Digi device has access to, networking-wise, that can be exposed to the container.

We can also expose serial ports, which is exactly the demo Kyle showed with Binary Armor — giving direct access to the serial ports on the Digi device to the container, so it can control the data flowing into and out of it. And then there's also shared local file system storage. So, whether it's the amount of local file system access on the Digi router itself, or if there's some USB storage that's added to the Digi device, that can also be shared as shared directories, or you can give control over to the container so it has access for expanded disk storage, if needed.

Managing Deployment Complexity
Learn how Digi Remote Manager enables zero touch configuration for rapid implementations.

相关内容

Connected Cybersecurity for Serial Devices with Digi Containers Connected Cybersecurity for Serial Devices with Digi Containers Digi collaborated with Sierra Nevada Corporation’s Binary Armor ® on the Digi Containers solution, enabling lightweight... 观看视频 Digi Containers: Rapidly Deploy, Monitor, and Manage Applications at Scale Digi Containers: Rapidly Deploy, Monitor, and Manage Applications at Scale Digi Containers are available as an add-on service that simplifies and centralizes the process of building, deploying and running custom applications on devices managed with Digi Remote Manager®. 查看 PDF Digi Remote Manager 101: 在 Digi RM 中管理容器 Digi Remote Manager 101: 在 Digi RM 中管理容器 使用 Digi Remote Manager®,您可以通过我们的Digi Containers 增值服务快速轻松地创建自定义应用程序... 观看视频 广域网绑定:增强网络连接性和可靠性 广域网绑定:增强网络连接性和可靠性 广域网绑定将两个或多个独立的互联网连接合并为一个虚拟连接。广域网绑定的目的是... 阅读博客 介绍Digi Containers 介绍Digi Containers 管理日益复杂的IoT 应用程序变得更加容易。Digi Containers 是一项增值服务... 观看视频 Digi Containers 数据表 Digi Containers 数据表 Digi Remote Manager 可通过容器部署自定义应用程序 查看 PDF Digi Containers Digi Containers Digi Remote Manager® 可通过轻量级 Linux 容器部署定制应用程序 查看产品 在 Digi 解决方案中使用Digi Containers 在 Digi 解决方案中使用Digi Containers 容器提供了一种以云为中心的架构,让用户可以上传、创建、管理和部署基于容器的应用程序... 阅读博客 Digi Remote Manager:您的IoT 指挥中心 Digi Remote Manager:您的IoT 指挥中心 IoT 网络的复杂性与日俱增,因此必须有相应的工具来管理这些网络。Digi Remote Manager... 观看视频 Digi Remote Manager Digi Remote Manager 安全配置、部署和管理远程资产 查看产品

有问题?立即联系 Digi 团队成员!