Wpisy

Docker VPN-based Raspberry Pi Server tutorial

Many developement boards can be used in home and industrial applications to control and manage data. Get secure remote access from anywhere via your own VPN based on Docker containers. Check out latest video from open-tech infuencer, Andreas Spiess, in which he uses Raspberry Pi and Docker, Node-RED, influxDB and Grafana to build custom Raspberry Pi data server.

Docker implementation in CM4 cluster – ClusBerry-2M

The introduction of new Compute Module 4 has opened the possibility to construct and maintain effective hardware matrix solutions with the use of both PCI-Express buses and 1GBps Ethernet. Therefore, the ClusBerry-2M opens up completely new capabilities of utilizing cluster solutions for Industrial Automation and server applications.

ClusBerry-2M can be equipped with multiple expansion cards, e.g. serial RS-232/485 ports, range of digital and analog I/Os, USB, HDMI and Ethernet. Interfaces can be expanded with additional I/Os and opto-isolation, relays, Ethernet, 1-Wire, CAN, M-Bus Master and Slave, accelerometer and many more features like TPM Security Chip & eSIM. The device can also be equipped with additional SuperCap backup power source for continuous work and safe boot/shutdown in case of emergency.

ClusBerry-2M series also offers two M.2 NVMe SSD slots and up to four standard miniPCIe module support for various wireless communication protocols, such as:

  • GSM modem (4G/LTE and fast 5G modem)
  • economic NarrowBand-IoT technology
  • LoRa, ZigBee, Z-Wave, Sigfox, Wireless M-Bus
  • secondary Wi-Fi/Bluetooth interface or Wi-Fi Hi-Power
  • custom wireless interfaces

Software cluster management with Docker and K3s Lightweight Kubernetes

With use of Docker-based and Kubernetes solutions, installation and management of ClusBerry-2M is easy and backed with a large community for further support and development. Kubernetes is a portable, extensible open-source software platform for managing containerized tasks and sites that enables declarative configuration and automation. The Kubernetes ecosystem is large and dynamically developing. Kubernetes services, support and tools are widely available.

Kubernetes provides:

  • Detection of new services and traffic. Kubernetes can balance the load and redirect the network traffic to ensure the stability of the entire installation.
  • Kubernetes data storage management enables you to automatically mount any type of storage system – on-premises, from cloud providers and others.
  • Automatic deployment and rollback. You can describe the expected state of your installation with Kubernetes, which will take care of bringing the actual state to the expected state in a controlled manner. For example, with Kubernetes, you can manage your cluster modules at ease, boot modules from one to another, upgrade firmware crosswise and provide safe operation of each module.
  • Automatic management of available resources. ClusBerry-2M provides a cluster of modules that Kubernetes can use to run tasks in containers. You determine the CPU power and RAM requirements for each container. Kubernetes arranges containers on machines in such a way as to make the best use of provided resources.
  • Self-healing Kubernetes reboots containers that have stopped working, replaces them with new ones, forces disabling containers that are not responding to certain status queries, and does not announce their availability until they are ready to run.
  • Managing confidential information and Kubernetes configuration with TPM Security Chip allows you to store and manage confidential information such as passwords, OAuth tokens and SSH keys. Secured data and configuration information can be provided and changed without having to rebuild the container image and without exposing sensitive data in the overall software configuration.