Server automation has become largely popular. Tools like Puppet and Chef manage large data centers and ensure that stability and reliability is guaranteed. But these tools are not developed for small footprint embedded devices. Here devctrl.io steps in and offers similar capabilities with a minimum footprint. Automate and manage your distributed embedded infrastructure with the same quality focus that you are used to from regular server deployments.
We deploy a very small and leightweight agent on your embedded Linux system. It securely bootstraps to our backend platform and chekcs every 5th minute if a new configuration is available. The agent autonomously enforces the last configuration, even if a network connection is lost. This way it can monitor and restart processes even when offline. At the same time security configurations are also kept and enforced.
devctrl.io is developed with focus on minimum resource usage. Therefore we hardly take any CPU time. At the same time we have minimized flash usage. All state information is kept in a small RAM disk in memory. This is sized to not impact your other applications. Please take contact and we can demo our technology to you.
All status information and configuration can be accessed and performed through our REST API. We also offer a sandbox for easy development. This helpts to control your distributed devices from 3rd party software or feed status information back to other systems.
Yes, you can trigger on different tresholds and send sms or mail alarm messages. These tresholds help you to prevent service outages by pro-actively managing high CPU usage or low disk or memory space.
devctrl.io can be used by multiple users. Any change to the system will be recorded and saved in an audit trail. This way you can trace which user deployed what change and to what type of device class.
devctrl.io can do many measures to ensure and increase your security. Easily deploy common firewall rules to all devcies and enforce that the firewall always runs. Manage user access and ssh keys on the devices. Change keys if there has been any compromise. Gain the opportunity to patch the system if a Linux library is causing security concerns.