LogoLogo
Contact Uscybus.io
Connectware 1.8.0
Connectware 1.8.0
  • Getting Started
    • Introduction
    • Installing Connectware
      • System Requirements
      • Acquiring your License Key
      • Installing Connectware on Docker
      • Installing Connectware on Kubernetes
    • Connectware Admin UI
    • Basic Components of Connectware
    • Connecting your First Machine
      • Your First Service Commissioning File
  • Documentation
    • Services
      • Service Commissioning Files
        • Structure of Service Commissioning Files
          • description
          • metadata
          • parameters
          • definitions
          • resources
            • Cybus::Connection
            • Cybus::Endpoint
            • Cybus:Mapping
            • Cybus::Container
              • Docker problem with network changes
            • Cybus::Link
            • Cybus::IngressRoute
            • Cybus::User
            • Cybus::Role
            • Cybus::Volume
            • Cybus::File
            • Cybus::Server
            • Cybus::Node
        • Sample Service Commissioning Files
          • Modbus
            • “Bearbeitungszentrum BAZ” - Single File
            • “Bearbeitungszentrum BAZ” - Multiple Files
            • “Bearbeitungszentrum BAZ” - Single File and Custom Topics
            • “Bearbeitungszentrum BAZ” - Agent Mode
          • Machine Condition Monitoring : OPC UA + InfluxDB + Grafana Dashboard
            • “Machine Condition Monitoring Example” - Single File
          • Machine Utilization Example (Multi file service composition) : Modbus TCP + InfluxDB + Grafana + MSS
            • “Machine Utilization Example” - Machine Connectivity
            • “Machine Utilization Example” - Dashboards with role based access permission
            • “Machine Utilization Example” - Push data to MSSQL Database
      • Services View
      • Setting Up and Configuring Services
        • Installing Services
        • Enabling Services
        • Updating Services
        • Disabling Services
        • Deleting Services
      • Service Details View
      • ServiceID
      • Inter-Service Referencing
      • Deviation
      • Service Logs
        • Logs of Individual Services
        • Logs of All Services
      • Rule Engine
        • Data Processing Rules
        • Rule Sandbox
      • API Definition
    • Resources
      • Servers
      • Containers
      • Volumes
      • Connections
      • Endpoints
      • Mappings
      • Nodes
      • API Definition
    • User Management
      • Users and Roles View
      • Users
      • Roles
      • Permissions
      • Password Policy Rules
      • Default Admin User
      • MQTT Users
      • Adding a MQTT Publish Prefix for Users
      • Multi-Factor Authentication
      • Long lived JSON Web Tokens
      • Access Permissions for Admin-UI
        • UI Access
        • Minimum Access Role Pages
      • API Definition
    • Client Registry
      • Implicit Flow
      • Explicit Flow
      • Granting Access
      • API Definition
    • Certificates
    • Monitoring
      • Data Explorer
      • Live Data
    • Workbench
      • Flows in Git Repositories
    • System Status
      • Info
      • Metrics
      • Status
      • Retrieving More System Information
      • System Health
      • API Definition
    • Backup and Restore
      • Volumes
      • User Database
    • Configuration
      • Environment Variables
      • LDAP Configuration
      • MFA Configuration
    • Agents
      • Agents View
      • Installing Agents
        • Installing Agents via Docker
        • Installing Agents via Docker Compose
        • Installing Agents via Kubernetes
        • Using Mutual TLS for Agents
      • Registering Agents in Connectware
      • Using Agents
      • Monitoring Agents
      • Troubleshooting Agents
    • Industry Protocol Details
      • ADS
        • AdsConnection
        • AdsEndpoint
      • BACnet
        • BacnetConnection
        • BacnetEndpoint
      • EtherNet/IP
        • EthernetIpConnection
        • EthernetIpEndpoint
      • Focas
        • FocasConnection
        • FocasEndpoint
      • Generic VRPC
        • GenericVrpcConnection
        • GenericVrpcEndpoint
      • Hottinger Baldwin Messtechnik (HBM)
        • HbmdaqConnection
        • HbmdaqEndpoint
      • Heidenhain DNC
        • HeidenhainConnection
        • HeidenhainEndpoint
      • HTTP/REST
        • HttpConnection
        • HttpEndpoint
      • HTTP Server
        • HttpServer
        • HttpNode
      • InfluxDB
        • InfluxdbConnection
        • InfluxdbEndpoint
      • Kafka
        • KafkaConnection
        • KafkaEndpoint
      • Modbus/TCP
        • ModbusConnection
        • ModbusEndpoint
      • MQTT
        • MqttConnection
        • MqttEndpoint
      • MSSQL
        • MssqlConnection
        • MssqlEndpoint
      • OPC DA
        • OpcdaConnection
        • OpcdaEndpoint
      • OPC UA
        • OPC UA Client
          • OpcuaConnection
          • OpcuaEndpoint
        • OPC UA Server
          • OpcuaServer
          • OpcuaNode
        • OPC UA Object Types
        • OPC UA Server References
          • OpcuaReferenceNode
          • OpcuaObjectNode
      • Siemens SIMATIC S7
        • S7Connection
        • S7Endpoint
      • Shdr
        • ShdrConnection
        • ShdrEndpoint
      • Sinumerik
        • SinumerikConnection
        • SinumerikEndpoint
      • Sopas
        • SopasConnection
        • SopasEndpoint
      • SQL
        • SqlConnection
        • SqlEndpoint
      • Werma WIN Ethernet
        • WermaConnection
        • WermaEndpoint
      • Systemstate
        • SystemstateConnection
        • SystemstateEndpoint
      • API Definition
    • Connectware Licensing
    • Changelog
      • General changes from 0.x to 1.0
        • Upgrading from 0.x to 1.0
    • Upgrade Guide
      • Upgrading from 1.x to 1.7.0
      • Upgrading from 1.x to 1.5.0
Powered by GitBook
LogoLogo

Cybus

  • Terms and Condition
  • Imprint
  • Data Privacy

© Copyright 2025, Cybus GmbH

On this page
  • Orchestration
  • Environment Variables
  • Persisting Agent Data
  • Alternative to Local Credentials
  • Setting the Hostname
  • Running Agents with Root Permissions
  • Enabling Mutual TLS (mTLS)
  • Mounting Certificates for Agents
  • Network Requirements
  • Agent Container
  • Outbound Connections from Agent to Connectware
  • Connectware Server

Was this helpful?

  1. Documentation
  2. Agents

Installing Agents

PreviousAgents ViewNextInstalling Agents via Docker

Last updated 6 months ago

Was this helpful?

To install an agent, you must start a Docker container. The container image that is used is the same as the Connectware protocol mapper image. The version (or image tag) of the container must match the Connectware version exactly, otherwise the agent will not be able to communicate with Connectware.

Orchestration

You can deploy agents using various orchestration tools:

  • Docker CLI: Run a docker run command.

  • Docker Compose: Use docker compose with a docker-compose.yml configuration file.

  • Kubernetes: Deploy to a Kubernetes cluster using appropriate manifests.

In all cases, you must configure the agent using environment variables that are passed to the container. This ensures consistent configuration across different deployment methods, allowing you to customize the agent's behavior regardless of the orchestration tool.

Select the orchestration tool that best suits your infrastructure and operational requirements.

  • Docker

    • Use the docker run command for simple, single-container deployments. See

  • Docker Compose

    • Create a docker-compose.yml file for multi-container applications or more complex configurations. See

  • Kubernetes

    • Deploy agents to a Kubernetes cluster for advanced orchestration and scaling capabilities. See

Choose the method that best suits your infrastructure and operational requirements.

Environment Variables

You can configure agent containers using environment variables that allow you to customize agent behavior and connection settings. How to set these variables depends on your deployment method:

  • For a Docker Compose setup, we recommend specifying the environment variable values in an .env file, placed in the same directory as the docker-compose.yml file. These files are located in your Connectware installation directory, which is /opt/connectware if the default installation values were used.

  • For Kubernetes, we provide a Helm Chart that includes a values.yaml file to configure environment variables.

Here are the environment variables that are used for agent configuration:

Required Environment Variables

Environment Variable
Description

CYBUS_AGENT_MODE=distributed

Configures the protocol-mapper to operate in agent mode.

CYBUS_AGENT_NAME=<agentName>

Defines a unique identifier for the current agent instance.

CYBUS_MQTT_HOST=<connectwareHost>

Specifies the IP address or hostname of the Connectware server.

Optional Environment Variables

Environment Variable
Description

CYBUS_MQTT_USERNAME=<userName>

Authentication username for Connectware. Default value: <agentName>

CYBUS_MQTT_SCHEME=<scheme>

MQTT connection scheme (mqtts or mqtt). Default value: mqtt

CYBUS_MQTT_PORT=<port>

Port number for MQTT connection. Default values: MQTT 1883, MQTTS 8883

Persisting Agent Data

To ensure your agent's credentials persist across container restarts and system reboots, we recommend implementing credential persistence.

  1. Create a Docker volume and mount it to the agent container.

  2. Configure the volume to be mounted at the /data path within the container.

Once completed, the agent will automatically:

  • Store its credentials on the mounted volume.

  • Retrieve and reuse these credentials during subsequent startups.

If multiple agents are running on the same machine, each agent must use its own volume mount. Otherwise, the agents will overwrite each other's data, including username and password credentials.

Alternative to Local Credentials

As an alternative to generating credentials locally, you can set a password for the protocol-mapper agent using the CYBUS_PROTOCOL_MAPPER_PASSWORD environment variable. This is useful if the agent deployment is managed by the same orchestration tool as the central Connectware instance.

Setting the Hostname

  • To display a custom hostname, set the hostname property of your Docker container to match the hostname of the local host.

Depending on your operating system, the appropriate value for the hostname may be available as a ${HOSTNAME} environment variable, or it can be specified manually, as shown in the example below.

Running Agents with Root Permissions

By default, agents run as an unprivileged user. However, certain protocols or features, such as USB access or promiscuous network mode, require root privileges.

  • To use a feature that requires root access, run the agent as the root user.

Enabling Mutual TLS (mTLS)

If you want to use mutual TLS, you must enable it for the broker and for the protocol-mapper:

  • Environment variable for the broker: CYBUS_BROKER_USE_MUTUAL_TLS="yes" (Default value: no)

  • Environment variable for the protocol-mapper: USE_MUTUAL_TLS="true" (Default value: false)

Mounting Certificates for Agents

You should mount your certificates as regular volumes. By default, Connectware will look for your certificates in specific locations, which you can configure using these environment variables:

Environment Variable
Description

AGENT_KEY=<key>

Specifies the path to your key file. Default value: /connectware/certs/client/tls.key

AGENT_CERT=<cert>

Specifies the path to your certificate file. Default value: /connectware/certs/client/tls.crt

CA=<caChain>

Specifies the path to your CA chain file. Default value: /connectware/certs/ca/ca-chain.pem

If you do not set these environment variables, Connectware will use the default paths listed above. Ensure your certificates are mounted at these locations or update the environment variables to match your specific certificate paths.

Network Requirements

Unidirectional communication from the agent to the Connectware server simplifies firewall rules and increases security by not requiring inbound ports to be opened on the agent side.

Agent Container

The agent container does not require any incoming TCP/IP ports to be opened. Instead, it initiates all necessary connections outbound to the Connectware server.

Outbound Connections from Agent to Connectware

For the agent to communicate with the central Connectware instance, ensure that the following outbound TCP/IP connections are allowed from the agent's network:

  • 443/tcp (HTTPS): For secure web communication

  • One of the following:

    • 1883/tcp (MQTT): If using unencrypted MQTT

    • 8883/tcp (MQTTS): If using encrypted MQTT

The choice between MQTT and MQTTS depends on your CYBUS_MQTT_SCHEME setting in the Connectware configuration.

Connectware Server

No special inbound firewall rules are required on the Connectware server for agent communication, as the agent initiates all connections.

For more information on setting up environment variables, see

In most other cases, we recommend to allow the agent to generate local credentials that are stored in a volume and authorized through the process.

The hostname of the local host is displayed in the . By default, the Docker container ID (e.g. d172c8c3667b) is displayed.

For more information on setting up environment variables, see

Installing Agents via Docker
Installing Agents via Docker Compose
Installing Agents on Kubernetes
Environment Variables
client registration
Connectware UI
Environment Variables