LXC Agent (Insys)
The LXC Agent is a specialized version of the Heisenware Agent designed specifically for edge computing on INSYS icom industrial routers and gateways (such as the MRX, MRO, ECR, and SCR series). It runs as an isolated Linux System Container (LXC) directly within the router's icom SmartBox environment.
Key Differences
Native Edge Integration: It runs directly on the router's firmware, providing deep edge connectivity without needing a separate Industrial PC or Raspberry Pi.
Pre-packaged format: Unlike Docker images, this agent is distributed as a self-contained
.tar"update packet" that the INSYS router natively understands.Resource Optimized: The container is strictly optimized for edge hardware, automatically capping memory usage (128 MB heap) to ensure the router's core networking functions are never interrupted.
Automatic Persistence: It seamlessly maps standard container volumes to the router's internal flash memory, ensuring configurations survive firmware updates.
Where to get it?
Our LXC agent is available as a downloadable .tar archive from our public release server. You will need to select the correct architecture for your specific INSYS gateway:
ARMv7 (Standard for most MRX/MRO/SCR gateways):
heisenware-insys-<version>-armv7.tarARM64:
heisenware-insys-<version>-arm64.tar
You can for example use wget to directly download the required file:
wget "https://downloads.heisenware.cloud/public/heisenware-insys-v91-arm64.tar"(Note: Check your INSYS router's datasheet if you are unsure which architecture it uses).
How to use it
Because the LXC Agent runs on a hardware appliance, you do not use command-line tools to deploy it. Instead, you configure it directly through the INSYS icom web interface.
Upload the Update Packet
Log into your INSYS router's web interface and navigate to the Container menu. Upload the .tar file you downloaded. Assign the container an Instance Name (e.g., heisenware-agent).
Configure Networking
In the container's network settings, map it to an internal network bridge (e.g., net2 or lan). Assign it a dedicated IPv4 address, subnet mask, and gateway.
Port 8883 Required Just like the Native Agent, the LXC container requires outbound internet access on port 8883 to connect to the Heisenware Cloud. Ensure the router's firewall allows this traffic for the container's IP address.
Set Environment Variables
Unlike the Native Agent, the LXC Agent does not have credentials baked in. In the INSYS container configuration menu, locate the Environment Variables section and add the following keys to connect the agent to your workspace:
HW_DOMAIN:<account>.<workspace>HW_BROKER:mqtts://<account>.heisenware.cloudHW_USERNAME:<your-vrpc-username>HW_PASSWORD:<your-vrpc-password>HW_AGENT_ID:<a-unique-id-for-this-gateway>
(Note: You can generate the username and password by creating a VRPC Integration in the App Manager).
Activate Profile
Click Activate Profile in the INSYS UI. The router will boot the LXC container. Once the connection is successfully established, the agent will appear in your Functions Library.
Persisting Data
To ensure your data and configurations persist across container restarts or router reboots, the agent needs a safe place to write files.
This is handled automatically. Behind the scenes, the LXC Agent automatically symlinks its internal /shared directory directly to the INSYS router's persistent /data partition.
Any configurations or instances created by the agent are safely stored in the router's flash memory.
If you ever update the agent by uploading a newer
.tarfile to the same instance, your data will remain completely intact and automatically re-attach to the new version.Backing up the router's profile via the INSYS web interface will automatically include the agent's configuration state.
Last updated
Was this helpful?