89b5a1a5c2 | ||
---|---|---|
DeviceBridge | ||
DeviceBridgeTests | ||
Docs | ||
Samples/SampleTypeScriptAdapter | ||
.gitignore | ||
DeviceBridge.sln | ||
Dockerfile | ||
LICENSE | ||
README.md | ||
azuredeploy.json |
README.md
Azure IoT Central Device Bridge
The Device Bridge enables the connection of devices to Azure IoT Central in scenarios where it's not possible to use the Azure IoT Device SDKs. The solution in this repository deploys a set of resources to your Azure Subscription. Once deployed, it exposes a simple, yet powerful, HTTP interface that can be used for sending and receiving data between devices and Azure IoT. The solution can be used as is or customized with additional components, such as data transformation and protocol adapter modules.
- Deployment instructions
- What is being provisioned
- HTTP API
- Load and performance
- Monitoring
- Encryption key rotation
- Custom adapters
Deployment instructions
To use the device bridge solution, you will need the following:
- an Azure account. You can create a free Azure account from here
- an Azure IoT Central application to connect the devices. Create a free app by following these instructions
1 - Build and push the Docker image
First, using the Docker CLI, run the docker build .
command in the solution folder to build the Device Bridge image. Second, you'll need to
tag and push the image to a private container registry, such as Azure Container Registry (ACR). Instructions on how to build, tag, and push an
image to ACR can be found here.
Note the image name and the ACR credentials, which are necessary in the next steps.
2 - Open the deployment template in Azure Portal
Open the template deployment page in the Azure Portal, click Build your own template in the editor
.
In the edit template page, paste the contents of the azuredeploy.json
file in this repository in the editor window and click save.
3 - Deployment parameters
3.1 Bridge name
In the Bridge-name
parameter, enter the name for the new Bridge instance. This name will be part of the HTTPS endpoint
for your instance, so it may only contain letters, numbers, and dashes.
3.2 IoTC SAS key and Id scope
These parameters link your new Bridge instance to a specific Azure IoT Central application. Go to your IoT Central
application and navigate to the Administration > Device Connection area. Copy the ID Scope
field and paste it into
the iotc-id-scope
parameter in the template.
In the same page, under Enrollment groups, open the SAS-IoT-Devices
group. In the group page, copy either the Primary key
or
Secondary key
and paste it in the Iotc-dps-sas-key
parameter of the template (this key will be stored in a Key Vault provisioned with the solution).
3.3 API key
In the Api-key
parameter, define a strong (and preferably randomly generated) API key. This key will be used to protect the HTTP API and must be included in the
x-api-key
header of every request to the Bridge.
3.4 SQL credentials
In the Sql-username
and Sql-password
parameters, enter an admin login and password for the Azure SQL instance that will be provisioned
by the solution. The password must follow the SQL Server password policy.
3.5 Log Analytics workspace credentials
By default, the Bridge will publish logs to a Log Analytics workspace of your choice. In the Log-analytics-workspace-id
and Log-analytics-workspace-key
parameters, provide the credentials of your workspace (instructions to obtain the credentials of your Log Analytics workspace can be found here).
3.6 Image and Azure Container Registry credentials
In this step you need to grant the solution access to the Docker image that you built and pushed in step 1.
In the Bridge-image
enter the name of the image that you pushed to your private ACR. In the Acr-server
,
Acr-username
, and Acr-password
parameters provide the credentials of your ACR instance.
4 - Create resources
After providing all necessary parameters, click the Review+create
button. The deployment may take a few minutes. Once finished,
you can find the newly provisioned resources in the target resource group.
What is being provisioned
The template in this solution will provision the following resources to your Azure subscription:
- Key Vault - to store all secrets
- Azure SQL - to store device and subscription data
- Azure container instance - main solution
- Azure container instance - setup - (only runs during the solution setup phase)
Pricing
The main pricing components for the resources published by the ARM template in this repository are the Azure Container Instance that hosts the core Bridge (1 CPU and 3 GB of memory - see Container Instances pricing for an estimate) and the Azure SQL Database (Basic tier, 5 DTUs - see Azure SQL pricing for more details).
HTTP API
Once deployed, the solution will expose an HTTPS endpoint at https://<bridge-name>.<region>.azurecontainer.io
. This endpoint can also be found by navigating to
the Device Bridge container group deployed to your subscription > Properties
> FQDN
.
The HTTP endpoints are protected by the API key provided when the solution was provisioned. For every request, include an x-api-key
header containing the key.
In what follows we give a quick overview of the functionalities available through the API. For a full description of the
endpoints and data types as well as sample requests and responses, refer to the API swagger under Docs/swagger.json
.
Device to cloud messages
The Bridge can send messages to Azure IoT on behalf of a device.
The main component of a message is the data
field. Optionally, the request can include componentName
, properties
, and a creationTimeUtc
.
Here's an example of a request to send a message:
POST /devices/{deviceId}/messages/events
{
"data": {
"temperature": 4.8,
"humidity": 31
},
"properties": {
"prop1": "abc"
},
}
Get device twin
The device twin will include the latest version of desired and reported properties of a device. Below is an example of the response returned by the service when fetching the latest twin for a device:
{
"twin": {
"properties": {
"desired": {
"fanSpeed": 30,
"$version": 2
},
"reported": {
"threshold": 4.8,
"LastReported": "2021-01-10T00:35:00.388Z",
"$version": 5
}
}
}
}
Update reported properties
To update reported properties in a device twin, include a patch in the request body, as the example below:
PATCH /devices/{deviceId}/properties/reported
{
"patch": {
"fanSpeed": 35,
"serial": "ABC"
}
}
Subscribing to events
You can subscribe to get notified of cloud-to-device events (methods, C2D messages, and desired property updates). To create a subscription,
you need to provide the callback URL that the service will send a POST
request to when a notification is available. Only one subscription of each type can exist at a time
(e.g., issuing a new subscription creation request of the same type will update the callback URL of the existing subscription).
Methods
Method subscriptions will emit an event whenever a new direct method invocation is issues by the cloud. The following is an example of a method invocation event:
{
"eventType": "DirectMethodInvocation",
"deviceId": "my-device",
"deviceReceivedAt": "2020-12-04T01:06:14.251Z",
"methodName": "increaseTemperature",
"requestData": {
"celsius" : 2
}
}
The callback may return an optional response body, which will be sent to IoTHub as the method response. Below is an example of a response:
{
"status": 200,
"payload": {
"newTemperature": 24
}
}
C2D messages
When the device receives a new C2D message from IoTHub, the service will send an event to the desired callback URL as in the example below:
{
"eventType": "C2DMessage",
"deviceId": "my-device",
"deviceReceivedAt": "2020-12-04T01:06:14.251Z",
"messageBody": {
"someField": 20.2
},
"properties": {
"prop1": "val1",
"prop2": "val2",
},
"messageId": "abc",
"expirtyTimeUtC": "2020-12-04T01:06:14.251Z"
}
The response status code of the callback URL will determine how the service will acknowledge a message:
- Response code between 200 and 299: the service will
complete
the message. - Response code between 400 and 499: the service will
reject
the message. - Any other response status: the service will
abandon
the message, causing IotHub to redeliver it.
For a detailed overview of C2D messages, see https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-devguide-messages-c2d.
Desired property updates
When the device receives a new desired property change from IoT Hub, the service will send an event to the desired callback URL. Example event:
{
"eventType": "DesiredPropertyUpdate",
"deviceId": "my-device",
"deviceReceivedAt": "2020-12-04T01:06:14.251Z",
"desiredProperties": {
"prop1": "string",
"prop2": 12,
"prop3": {},
}
}
NOTE: desired property updates are only received while the device is connected to IoT Hub. For this reason, property updates might not be received while, for instance, the device is internally reconnecting due to a transient network error. To mitigate scenarios like this, you can listen to internal connection events, as described in the next section, and get the latest device twin whenever the
Connected
event is received.
Device connection status
Internally, the Device Bridge connects devices to Azure IoT through AMQP using connection multiplexing. It transparently manages the life cycle of all connections (i.e., connecting, disconnecting, and retrying on transient errors). When you issue a command, such as sending a message or getting the device twin, the Bridge opens a temporary connection for the device that is set to live between 9 to 11 minutes and is renewed as requests come. For subscriptions, the Bridge will open a permanent connection for the device. This connection will last until the last subscription is deleted.
Depending on the connection status of a device, it's subscriptions may have one of the following status:
Starting
: initial status after a subscription is created and before the device has been connected internally. This status may also represent that the Bridge is reconnecting the device after the service restarts.Running
: the device is connected and events are flowing.Stopped
: the device is disconnected due to a permanent failure and events are not flowing. Permanent failure scenarios can include: the device has been disabled in the IoT Hub, credentials are no longer valid, the automatic connection retries expired due to a long period without network connectivity, etc.
Subscribing to connection status change events
In many situations it may be useful to react to changes in the underlying device connection status. For instance, you may want to fetch the latest device twin whenever the device reconnects internally. Alternatively, you may want to be notified when a device experiences a permanent failure, such as credentials expired. For these scenarios you can subscribe to connection status changes.
Whenever the device internally connects or reconnects, a Connected
event will be sent. If the device fails to connect permanently,
a Disconnected
event will be emitted, including an associated failure reason. Other possible statuses are Disabled
(the connection has
been closed properly) and Disconnected_Retrying
(the service is retrying to connect the device).
For a detailed description of all status and reasons, see https://docs.microsoft.com/en-us/dotnet/api/microsoft.azure.devices.client.connectionstatus?view=azure-dotnet.
Restarting stopped subscriptions and forcing device reconnection
Issuing a call to the resync
endpoint will cause the Bridge to attempt to reconnect any device previously in a permanent failure state.
If the device reconnection is successful, all stopped subscriptions will be back to a running state. You may want to issue this command, for instance,
after re-enabling a device in IoT Hub.
Device provisioning
By default, issuing a command to the Bridge on behalf of a device will cause it to be automatically provisioned. The device is provisioned using the SAS key provided during the solution deployment and will not be assigned to any particular model. The Bridge provides an endpoint to optionally provision a device to a specific model ahead of time. The registration result is internally cached to be used in future connections.
To access advanced registration features, including sending custom registration payload and getting the assigned hub, please use the DPS REST API (https://docs.microsoft.com/en-us/rest/api/iot-dps/).
NOTE: DPS registration is a long-running operation, so calls to this route may take a long time to return (in the order of seconds). If this is a concern, use the DPS REST API directly, which provides support for long-running operation status lookup.
Subscription callback retries
The solution will automatically retry if a transient error happens when calling a subscription callback endpoint. By default, it will
retry 5 times with an exponentially increasing interval (total 30 seconds). This number can be customized by overriding the HTTP_RETRY_LIMIT
environment variable in the provisioning template. For HTTP 429s
, the service will respect the Retry-After
header, if one is available.
NOTE: if needed, the solution code can be modified to add HTTP circuit-breaking be following the instructions on https://docs.microsoft.com/en-us/dotnet/architecture/microservices/implement-resilient-applications/implement-circuit-breaker-pattern.
Load and performance
The default setup provisioned by the ARM template in this repository was tested with up to 50,000 devices simultaneously connected. In this scenario, we were able to send 10,000 device to cloud messages (telemetry) per minute through the Bridge. For cloud to device events (including C2D messages, method invocations, and desired property updates combined), the Bridge was able to receive and forward 5,000 events per minute.
This test was performed in a constant-rate scenario, where all devices were already internally connected. Numbers may greatly vary depending on different usage patterns, such as how often devices send or subscribe to events, which affects how often they are internally reconnected. The specific setup being provisioned (e.g., different container sizes) will also directly influence the results. When deploying a new setup, make sure you evaluate the performance considerations described in the following sections.
SSL certificate limits
The Caddy webserver deployed in the solution uses Let's Encrypt to automatically obtain an HTTPS certificate. This service is free, but has a current limit of SSL 5 certificates per week per endpoint. Because the containers used by this solution deploy non-persistent volumes, if the container group is manually restarted more than 5 times in a week (for instance during development phase), SSL certificate acquisition will fail and a new solution with a new endpoint will need to be deployed.
To avoid this limitation, you may choose to modify the solution to use persistent storage, use a different certificate authority and webserver configuration, or use Let's Encrypt staging environment during development (see https://letsencrypt.org/docs/rate-limits/ for more information).
Instance restarts and reconnection speed
If the service instance restarts, the Bridge will automatically reconnect any devices with an active subscription. During this period,
all subscriptions will have a Starting
status. The speed at which the Bridge reconnects devices is set by default to 150 connections per second.
This means that, in the event of a container restart, it would take around one minute to reconnect 10,000 devices.
NOTE: this number can be customized through
DEVICE_RAMPUP_BATCH_SIZE
andDEVICE_RAMPUP_BATCH_INTERVAL_MS
environment variables. However, before adjusting this values it's important to perform a load test to make sure that the service can support the desired reconnection speed. Factors that may influence this speed is the size of the hosting container, number of devices, and desired number of connections in the multiplexing pool.
Multiplexing and connection pool
By default, the Bridge is configured to use a pool of 50 active AMQP connections. This amount allows around 50K devices to be connected
simultaneously. This number can be configured through the MAX_POOL_SIZE
environment variable, however increasing this value may require
decreasing the default device reconnection speed, or else the Bridge may fail to reconnect devices in the event of a container restart.
For more details about connection pooling and multiplexing, see https://github.com/Azure/azure-iot-sdk-csharp/blob/master/iothub/device/devdoc/amqpstack.md.
NOTE: this solution is meant to run as a single instance. Deploying more than one instance of the service pointing to the same Azure IoT Central application will potentially cause duplicate device connections, as instances are not aware of each other. This will result in connection drops, as each device can only have a single active AMQP link to IoT Hub at all times.
Monitoring
Service logs are emitted to the Log Analytics Workspace provided during deployment. You can use the logs to query device events as well as build monitors for specific scenarios. Below is an example query that shows all device events in the past hour:
ContainerInstanceLog_CL
| where TimeGenerated >= ago(1h)
| where ContainerGroup_s == "<container-group-name>"
| extend log = parse_json(Message)
| extend deviceId = tostring(log.deviceId)
| extend _message = tostring(log.message)
| where deviceId != ""
| distinct TimeGenerated, deviceId, _message
Encryption key rotation
When a new subscription is created, the provided callback URL is stored in the database in an encrypted format. This provides an extra layer of security, as these URLs may contain sensitive data, such as access keys or tokens in the query parameters. The encryption key used in this scenario is automatically generated when the solution is deployed and stored in the Key Vault.
To rotate this encryption key, simply start the setup container provisioned to the same resource group (the container group name
starts with iotc-container-groups-setup-
). Once started, the setup container will automatically generate a new encryption key and
use it to reencrypt all subscriptions stored in the database (you can follow the progress in the container logs Container group > Containers > Logs
).
Once reencryption has finished, you can restart the main Bridge container (the container group name starts with iotc-container-groups-
)
to make sure that it starts using the new key for new subscriptions.
Custom adapters
One of the possible ways to extend the functionality of this Bridge is through a custom adapter deployed as a sidecar container.
With this type of adapter, which can be written in the language and runtime of your choice, you can for instance transform
the data before it reaches or leaves the Bridge and connect to different data sources. Under the Samples/SampleTypeScriptAdapter
folder we provide an example of a custom adapter written in TypeScript that forwards cloud-to-device messages to an EventHub.
This adapter uses a client automatically generated with AutoRest using the Bridge swagger available
under Docs/swagger.json
. The example also contains the necessary ARM template to deploy it as a sidecar with the Bridge.
The diagrams below illustrate the original Bridge architecture and how a custom adapter fits into it: