There were some issues with the certs as I have created certs first then I added the DNS name. Now I created DNS first then certs so it's working fine.
Will try to implement some NSG rules and will see how it responds.
DPS with Nested Edge using X.509
Vivek Sagar Pandey
386
Reputation points
Hi There,
If we create 'Parent' Edge layer using DPS and X.509 and 'child' Edge as manual X.509 attestation, then is it possible to create a nested iot-edge architecture using these both Parent and Child edge?
What I am thinking is to make 'Parent' Edge a transparent gateways and then manually create another Edge (say Child) using manual X.509 attestation.
Steps I am following:
- Create 2 ubuntu 18.04 Azure VMS and install the Azure runtime 1.2.5 in them.
- Generate demo certificates for both:
For Parent:
Root CA, Device CA, x.509 (identity cert)
For Child:
using above created Root CA- Device CA, X.509 identity Primary and secondary and their Hexa code. - Verify Root CA in DPS and create group enrollment.
- Provision Parent edge in DPS using certs.
- Create DNS for Parent VM to use as hostname (in parent).
- Add trusted bundle (root CA), Device CA cert and key, Device identity cert and key in config.toml of parent edge.
- Create Child edge in portal using Hex code (x.509) and link it to parent device.
- Put root CA in certificate path of both VMs (sudo cp /home/edgeserver/demo_certs/certs/azure-iot-test-only.root.ca.cert.pem /usr/local/share/ca-certificates/azure-iot-test-only.root.ca.cert.pem.crt, then sudo update-ca-certificates)
- Enter parent's DNS as parent hostname, Add trust bundle(root ca), Primary Identity certificate and it's key in X.509 manual attestation section, device CA cert and it's key in Child Edge's config.toml.
- Proper module deployments.
- and reboot.
Accepted answer
-
Vivek Sagar Pandey 386 Reputation points
2021-11-24T10:36:20.03+00:00