Publish and subscribe MQTT messages using MQTT broker
Important
Azure IoT Operations Preview – enabled by Azure Arc is currently in preview. You shouldn't use this preview software in production environments.
You'll need to deploy a new Azure IoT Operations installation when a generally available release becomes available. You won't be able to upgrade a preview installation.
For legal terms that apply to Azure features that are in beta, in preview, or otherwise not yet released into general availability, see the Supplemental Terms of Use for Microsoft Azure Previews.
IoT Operations features an enterprise-grade, standards-compliant MQTT broker that is scalable, highly available and Kubernetes-native. It provides the messaging plane for Azure IoT Operations Preview, enables bi-directional edge/cloud communication and powers event-driven applications at the edge.
MQTT compliant
Message Queue Telemetry Transport (MQTT) has emerged as the lingua franca among protocols in the IoT space. MQTT's simple design allows a single broker to serve tens of thousands of clients simultaneously, with a lightweight publish-subscribe topic creation and management. Many IoT devices support MQTT natively out-of-the-box, with the long tail of IoT protocols being rationalized into MQTT by downstream translation gateways.
The MQTT broker underpins the messaging layer in IoT Operations and supports both MQTT v3.1.1 and MQTT v5. For more information about supported MQTT features, see MQTT feature support in MQTT broker.
Highly available and scalable
Kubernetes can horizontally scale workloads to run in multiple instances. This redundancy means additional capacity to serve requests and reliability in case any instance goes down. Kubernetes has self-healing built in, and instances are recovered automatically.
In addition to Kubernetes being an elastic scaling technology, it's also a standard for DevOps. If MQTT is the lingua franca among IoT protocols, Kubernetes is the lingua franca for computing infrastructure layer. By adopting Kubernetes, you can use the same CI/CD pipeline, tools, monitoring, app packaging, employee skilling everywhere. The result is a single end-to-end system from cloud computing, on-premises servers, and smaller IoT gateways on the factory floor. You can spend less time dealing with infrastructure or DevOps and focus on your business.
MQTT broker focuses on the unique edge-native, data-plane value it can provide to the Kubernetes ecosystem while fitting seamlessly into it. It brings high performance and scalable messaging platform plane and seamless integration to other scalable Kubernetes workloads and Azure.
Secure by default
MQTT broker builds on top of battle-tested Azure and Kubernetes-native security and identity concepts making it both highly secure and usable. It supports multiple authentication mechanisms for flexibility along with granular access control mechanisms all the way down to individual MQTT topic level.
Tip
You can only access the default MQTT broker deployment by using the cluster IP, TLS, and a service account token. Clients connecting from outside the cluster need extra configuration before they can connect.
Azure Arc integration
Microsoft's hybrid platform is anchored around Kubernetes with Azure Arc as a single control plane. It provides a management plane that projects existing non-Azure, on-premises, or other-cloud resources into Azure Resource Manager. The result is a single control pane to manage virtual machines, Kubernetes clusters, and databases not running in Azure data centers.
MQTT broker is deployed as an Azure Arc for Kubernetes extension and can be managed via a full featured Azure resource provider (RP) - microsoft/IoTOperationsMQ. This means you can manage it just like native Azure cloud resources such as Virtual Machines, Storage, etc.
Azure Arc technology enables the changes to take effect on MQTT broker services running on the on-premises Kubernetes cluster. Optionally, if you prefer a fully Kubernetes-native approach, you can manage MQTT broker with Kubernetes custom resource definitions (CRDs) locally or using GitOps technologies like Flux.
Cloud connectors
You might have different messaging requirements for your cloud scenario. For example, a bi-directional cloud/edge fast path for high priority data or to power near real-time cloud dashboards and a lower-cost slow path for less time-critical data that can be updated in batches.
To provide flexibility, MQTT broker provides built-in Azure Connectors to Event Hubs (with Kafka endpoint), Event Grid's MQTT broker capability, Microsoft Fabric and Blob Storage. MQTT broker is extensible so that you can choose your preferred cloud messaging solution that works with your solution.
Building on top of Azure Arc allows the connectors to be configured to use Azure Managed Identity for accessing the cloud services with powerful Azure Role-based Access Control (RBAC). No manual, insecure, and cumbersome credential management is required.
Dapr programming model
Dapr simplifies plumbing between distributed applications by exposing common distributed application capabilities, such as state management, service-to-service invocation, and publish-subscribe messaging. Dapr components lie beneath the building blocks and provide the concrete implementation for each capability. You can focus on business logic and let Dapr handle distributed application details.
MQTT broker provides pluggable Dapr publish-subscribe and state store building blocks making development and deployment of event-driven applications on the edge easy and technology agnostic.
Architecture
The MQTT broker has three layers:
- Stateless front-end layer that handles client requests
- Load-balancer that routes requests and connects the broker to others
- Stateful and sharded back-end layer that stores and processes data
The back-end layer partitions data by different keys, such as client ID for client sessions, and topic name for topic messages. It uses chain replication to replicate data within each partition. For data that's shared by all partitions, it uses a single chain that spans all the partitions.
The goals of the architecture are:
- Fault tolerance and isolation: Message publishing continues if back-end nodes fail and prevents failures from propagating to the rest of the system
- Failure recovery: Automatic failure recovery without operator intervention
- No message loss: Delivery of messages if at least one front-end node and one back-end node is running
- Elastic scaling: Horizontal scaling of publishing and subscribing throughput to support edge and cloud deployments
- Consistent performance at scale: Limit message latency overhead due to chain-replication
- Operational simplicity: Minimum dependency on external components to simplify maintenance and complexity
Next steps
Deploy Azure IoT Operations Preview to an Arc-enabled Kubernetes cluster