Linux: /etc/exports add a line /home/vogler *(rw,no_subtree_check,insecure) exports -a In this example we do it very insecure...
Windows: mount -o anon <hostname>:/home/vogler z:
Linux: /etc/exports add a line /home/vogler *(rw,no_subtree_check,insecure) exports -a In this example we do it very insecure...
Windows: mount -o anon <hostname>:/home/vogler z:
Add a label object into your screen and add some lines of code to get a QR image. In this example a mobile phone app will scan the QR code and send username and password via a GraphQL server to WinCC OA and set it on datapoints (username and password should additionally be encrypted).
#uses "CtrlQRCode"
string g_code;
main()
{
g_code = createUuid();
strreplace(g_code,"{", "");
strreplace(g_code,"}", "");
DebugTN(g_code);
string fpath = PROJ_PATH+"/pictures/";
string fname = "login_qr_code_"+myUiNumber();
int ret = createQRCodeFile(g_code, fpath+fname);
this.image=fname+".png";
dpConnect("work", false, "QRLogin.code", "QRLogin.usr", "QRLogin.pwd");
}
void work(string dp, string code, string dp1, string usr, string dp2, string pwd)
{
if (code == g_code)
{
setInputFocus(myModuleName(), myPanelName(), txt_username.name());
txt_username.text = usr;
setInputFocus(myModuleName(), myPanelName(), txt_password.name());
txt_password.text = pwd;
m_loginFrameworkController.doContinue();
}
}
A GraphQL server can also be queried with a simple GET request:
wget -O - "https://server.rocworks.at/graphql?query=query { getTag(name: \"Input\") { tag { current { value time } } } }"
Lot of times my ssh session get broken because I didn’t do anything for a while. Sometimes I have started “top” just that the connection does not get broken because of inactivity. But this is not really what I wanna do everytime. Luckily the SSH client can be configured to send alive telegrams for every session so that you do not need to pass arguments every time you open a SSH conneciton.
Following settings will make the SSH client to send alive telegrams to the other side every 60 seconds, and give up if it doesn’t receive any response after 2 tries.
~/.ssh/config Host * ServerAliveInterval 60 ServerAliveCountMax 2
Initially you have to init the certbot and get the certificate manually.
# Directories used:
/var/www
/var/www/certbot # handshake sites from certbot
/etc/letsencrypt # certificates are stored here
# Initialize Certbot:
docker run --rm -ti \
-v /var/www:/var/www \
-v /etc/letsencrypt:/etc/letsencrypt \
certbot/certbot certonly --webroot -w /var/www/certbot -d <yor-domain-name> --email your.email@something.com
The letsencrypt and the www directory must be mounted on both containers. Certbot will check the certificates every 12h and nginx must reload the configuration periodically.
nginx:
image: nginx:1.17.8
ports:
- 80:80
- 443:443
volumes:
- /var/www:/var/www
- /etc/nginx.conf:/etc/nginx/nginx.conf
- /etc/letsencrypt:/etc/letsencrypt
command: "/bin/sh -c 'while :; do sleep 6h & wait $${!}; nginx -s reload; done & nginx -g \"daemon off;\"'"
certbot:
image: certbot/certbot
restart: unless-stopped
volumes:
- /var/www:/var/www
- /etc/letsencrypt:/etc/letsencrypt
entrypoint: "/bin/sh -c 'trap exit TERM; while :; do certbot renew --webroot -w /var/www/certbot; sleep 12h & wait $${1}; done;'"
Nginx must be configured to publish the certbots well-known sites for the handshake and your sites must be configured to use the certificates from letsencrypt.
server {
listen 80;
server_name <your-domain-name>;
server_tokens off;
location /.well-known/acme-challenge/ {
root /var/www/certbot;
}
location / {
return 301 https://$host$request_uri;
}
}
server {
listen 443 ssl;
server_name vcm.winccoa.at;
ssl_certificate /etc/letsencrypt/live/<your-domain-name>/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/<your-domain-name>/privkey.pem;
root /var/www;
index index.html;
location / {
try_files $uri $uri/ =404;
}
This repository on Github contains Dockerfiles and samples to build Docker images for WinCC OA products.
Download and unzip the CentOS WinCC OA rpm’s to the centos/software directory.
Only put those WinCC OA rpm’s into the directory which you want to have installed in your image. For a minimum image you only need the base packag of WinCC OA.
WinCC_OA_3.16-base-rhel-0-17.x86_64.rpm
Build your WinCC OA Docker image with:
docker build -t winccoa:3.16 .
The project should be mounted on /proj/start as a volume to your docker container.
And you may also mount a shield file to your docker container.
Example how to startup a WinCC OA project in a container:
docker run -d
--name winccoa
--hostname winccoa-server
-v ~/shield.txt:/opt/WinCC_OA/3.16/shield.txt
-v /proj/DemoApplication_3.16:/proj/start
-p 5678:5678
winccoa:3.16
To start a WinCC OA client application like a Gedi or a User-Interface you have to adapt your config file so that the proxy settings point to the WinCC OA server container. You can just create a copy of your config file (e.g. config.ui) and adapt the settings.
[general]
data = "winccoa-server"
event = "winccoa-server"
mxProxy = "winccoa-server <your-docker-host-name>:5678 cert"
Then you can startup a Gedi/Ui with:
docker run --rm
-e DISPLAY=$DISPLAY
-v /tmp/.X11-unix:/tmp/.X11-unix
-v /proj/DemoApplication_3.16:/proj/default
-v /proj/DemoApplication_3.16/config/config.ui:/proj/default/config/config
winccoa:3.16
WCCOAui -autoreg -m gedi -proj default
Sure you can also use a copy of your project directory (or a git checkout if you use git) and adapt the config file.
With the Project Administration you can create a new project in the /proj directory.
docker run -ti --rm
-e DISPLAY=$DISPLAY
-v /tmp/.X11-unix:/tmp/.X11-unix
-v /proj:/proj
winccoa:3.16
WCCOAui -projAdmin
For sure what we have done with the Gedi can also be done with Control-Managers and Drivers. And in theory that can also be done with Kubernetes and so you can run your SCADA project in a Kubernetes Cluster.
This is a simple example how to query a GraphQL server from WinCC OA ctrl via HTTP.
{
string url = "https://server.rocworks.at/graphql";
string query = "query($tag: String!){getTag(name: $tag){tag{current{value}}}}";
mapping variables = makeMapping("tag", "Input");
mapping content = makeMapping("query", query, "variables", variables);
mapping data = makeMapping(
"headers", makeMapping("Content-Type", "application/json"),
"content", jsonEncode(content)
);
mapping result;
netPost(url, data, result);
if (result["httpStatusText"]=="OK") {
DebugTN(result["content"]);
}
else {
return "Error";
}
}
Output:
{
"data": {
"getTag": {
"tag": {
"current": {
"value": 280.87696028711866
}
}
}
}
}
The subdomain server.rocworks.at is redirected by my provider to my IP at home where Nginx (with Letsencrypt Certificate) is running and it forwards /grafana to my Grafana Docker Instance. Access to Grafana is possible via https://server.rocworks.at/grafana.
Nginx Configuration (sites-enabled/default)
server {
listen 80 default_server;
listen [::]:80 default_server;
root /var/www/html;
index index.html index.htm index.nginx-debian.html;
server_name server.rocworks.at;
location / {
try_files $uri $uri/ =404;
}
location /grafana/ {
proxy_pass http://docker1:3000/;
}
}
Grafana Configuration (/etc/grafana/grafana.ini)
[server]
# Protocol (http or https)
protocol = http
# The http port to use
http_port = 3000
# The public facing domain name used to access grafana from a browser
domain = server.rocworks.at
# Root Url (NOTE: there is not Port in the URL)
root_url = %(protocol)s://%(domain)s/grafana
enforce_domain = false
[root@avcentos ~]# cat pgbackup.sh
cn=postgres # set container name
db=${1:-mydb}
docker exec -t $cn pg_dump -c -U postgres $db > dump_`date +%d-%m-%Y"-"%H%M`.sql
[root@avcentos ~]# cat pgrestore.sh
if [ ! -f "$1" ]
then
echo File does not exist.
else
cn=postgres # set container name
db=${2:-mydb}
echo Restore to $db...
cat $1 | docker exec -i $cn psql -U postgres -d $db
fi
# First kill connected sessions
SELECT pg_terminate_backend(pg_stat_activity.pid)
FROM pg_stat_activity
WHERE pg_stat_activity.datname = 'mydb';
# Drop your database
DROP DATABASE mydb;
I have used Ubuntu Server 18.04 LTS.
Install one Master-Node and 3 Worker-Nodes.
! Don’t clone the Ubuntu-VMs. I had troubles with networking when I have used cloned VMs. Even though the Mac-Addresses of the interfaces were different there were troubles with networking in Kubernetes.
! Each node needs to have internet access! Because they will pull the docker images….
! You may setup your Master-Node also as Docker-Registry, so that the Nodes can pull images (self made images) from the Master.
We use 10.0.15.x as cluster network on a host-only vm network. In that case we set two IPs. The 192.168.163.x is the vm network, so that the VMs are accesible from your host (where the VMs are hosted on). The 10.0.15.x is the internal cluster network. Additionally we have a second interface with DHCP enabled, this interface should get a network in your public network with internet connection.
vi /etc/netplan/50-cloud-init.yaml
network:
ethernets:
ens33:
dhcp4: true
optional: true
ens38:
dhcp4: false
addresses: [10.0.15.10/24, 192.168.163.10/24]
> netplan apply
> vi /etc/hosts
10.0.15.10 master
10.0.15.21 worker01
10.0.15.22 worker02
10.0.15.23 worker02
> hostnamectl set-hostname master
> reboot
> apt install docker.io -y
Systemd must be used for cgroupdriver in docker
> cat > /etc/docker/daemon.json <<EOF
{
"exec-opts": ["native.cgroupdriver=systemd"],
"log-driver": "json-file",
"log-opts": {
"max-size": "100m"
},
"storage-driver": "overlay2",
"insecure-registries" : ["master:5000"]
}
EOF
> mkdir -p /etc/systemd/system/docker.service.d
> systemctl daemon-reload
> systemctl restart docker
> docker run -d -p 5000:5000 --restart=always --name registry registry:2
add your Registry server as insecure registry to /etc/docker/daemon.json, if you haven’t it done in one of the previous steps.
{
"insecure-registries" : ["master:5000"]
}
push an image to your Registry server:
> docker tag <image> master:5000/<image> # tag your image
> docker push master:5000/<image> # push your image
Disable Swap
> swapon -s
> swapoff -a
> vim /etc/fstab # comment out line with swap device
> reboot
> apt install -y apt-transport-https
> curl -s https://packages.cloud.google.com/apt/doc/apt-key.gpg | apt-key add -
> echo "deb http://apt.kubernetes.io/ kubernetes-xenial main" > /etc/apt/sources.list.d/> kubernetes.list
> apt update
> apt install -y kubeadm kubelet kubectl
> kubeadm config images pull
> kubeadm init --pod-network-cidr=10.244.10.0/16 --apiserver-advertise-address=10.0.15.10
Your Kubernetes control-plane has initialized successfully!
To start using your cluster, you need to run the following as a regular user:
> mkdir -p $HOME/.kube
> sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
> sudo chown $(id -u):$(id -g) $HOME/.kube/config
You should now deploy a pod network to the cluster (use a regular user)
> kubectl apply -f https://raw.githubusercontent.com/coreos/flannel/master/Documentation/kube-flannel.yml
or
> kubectl apply -f "https://cloud.weave.works/k8s/net?k8s-version=$(kubectl version | base64 | tr -d 'n')"
Check the state
> kubectl get nodes
> kubectl get pods --all-namespaces
Then you can join any number of worker nodes by running the following on each as root at the worker nodes (copy this from the outpout kubeadm init)
> kubeadm join 10.0.15.10:6443 --token w8vr52.wtful961u754ev8b
--discovery-token-ca-cert-hash sha256:b07d512632b0117bfe81716b57d0c00b64cabd8222c5ffae04f447291a7c16f8
check if the nodes have been joined:
> kubectl get nodes