--no-cache, --transfer-pool).Services enable you to expose microservices, agents, Kubernetes services, or external endpoints through the Router's TCP bridge mechanism. Services create TCP connectors on Router instances, allowing microservices to reach these endpoints via a service mesh. Services are distributed to Agents based on tags, enabling flexible and scalable service discovery across your Edge Compute Network.
Find out more! and check out the YAML specification!
Secrets provide a secure way to store and manage sensitive data such as passwords, API keys, and TLS certificates. ioFog supports Opaque secrets for general-purpose data storage and TLS secrets for certificate management. Secrets can be referenced by microservices and other resources, ensuring sensitive information is handled securely throughout your ECN.
Find out more! and check out the YAML specification!
Certificate and CertificateAuthority resources enable comprehensive TLS certificate management for your Edge Compute Network. You can generate self-signed certificates, create Certificate Authorities, and sign certificates using existing CAs from your ioFog cluster or Kubernetes secrets. This feature simplifies SSL/TLS configuration across your edge infrastructure, ensuring secure communication between components.
Find out more! and check out the YAML specification!
ConfigMaps allow you to store and manage non-sensitive configuration data in key-value pairs. ConfigMaps can be used to store application configuration, environment variables, or configuration files. They support both mutable and immutable modes, providing flexibility for different use cases. ConfigMaps can be mounted to microservices as volumes or referenced directly in your deployment configurations.
Find out more! and check out the YAML specification!
VolumeMounts provide a convenient way to attach ConfigMaps or Secrets to Agents as volumes. Once attached, these volumes are available on the Agent and can be easily mounted to running microservices. This feature simplifies configuration and secret management by allowing you to create volumes from ConfigMaps or Secrets and attach them to multiple Agents, enabling consistent configuration across your edge infrastructure.
Find out more! and check out the YAML specification!
OfflineImage enables you to deploy container images to edge nodes that cannot access the internet for pulling images. This feature is essential for air-gapped or network-restricted edge deployments. iofogctl pulls the images on your local machine (where iofogctl is installed), transfers them to remote edge hosts via SSH, loads them into Docker on each host, and automatically creates catalog items with registry ID 2 (from_cache). This allows microservices to use these pre-loaded images without requiring internet access on the edge nodes.
Find out more! and check out the YAML specification!
Secure debugging is now available across the entire ECN:
Attach and exec into a microservice (application or system):
# Application microservice
iofogctl attach exec <app>/<microservice>
iofogctl exec <app>/<microservice>
# System microservice
iofogctl attach exec <sys-app>/<sys-microservice>
iofogctl exec <sys-app>/<sys-microservice>Attach and exec into an Agent (with optional custom debugger image):
iofogctl attach exec agent <agent-name> [debuggerImage:tag]
iofogctl exec agent <agent-name>If no image is provided, the cluster’s catalog debugger image is deployed automatically. Debugger containers run with the required host, pid, ipc, and net privileges, giving you SSH-like access without distributing key pairs.
The browser-based ECN Viewer now provides operational parity with iofogctl for day-2 workflows. You can deploy and manage applications, edit any resource YAML, configure registries and catalogs, open exec sessions into Agents or microservices, and call the Controller REST API without leaving the UI. Only the installation of Controllers and Agents still requires iofogctl.
The Events endpoint provides comprehensive tracking and auditing of all Controller API calls. Administrators can filter events by type, endpoint, status, method, resource type, actor, and time range. Export event logs for compliance reporting or delete old events to manage storage. This feature is essential for enterprise deployments requiring audit trails and compliance with security policies.