Subscribe to the feed

Over the last few years, edge computing has become just as common as cloud computing, hybrid cloud, and Internet of Things (IoT). Edge computing's growth in popularity means more companies are offering edge computing solutions that provide control of your edge devices, edge networks, containers, and more. But what does edge computing mean to you and your environment? Here are three things sysadmins need to know about edge computing.

[ Download now: A system administrator's guide to IT automation. ]

1. You decide what edge means to you

Like most computing concepts, the edge is not one size fits all. To a power company, the edge might be a remote sensor monitoring a solar panel array; to an advertising company, the edge might be an IoT device controlling an electronic billboard; and to a trucking company, the edge might be a GPS tracking device on a semi-truck.

While these are all great examples of edge computing, they aren't things most system administrators encounter in their environment. To most system administrators, edge computing is something as simple as a remote office with a firewall, a managed switch, a wireless access point, a few laptops and desktops, a printer, and maybe a security camera. It's not glamorous, exciting, or always connected on a 5G network, but it's what they consider edge computing to be. The most important takeaway is that you define what edge computing is to you and your environment. Once you understand, you will know what it will take to deploy and maintain those edge devices.

2. Edge devices could be easy access to your network for attackers

Edge computing devices can take virtually any form, and these endpoints are almost everywhere. That means the risk of intrusion increases with each new device introduced.

It's important to protect your devices from potential threats by restricting access to your network, updating your devices with the latest security patches, and ensuring that they always connect to your network using encrypted channels. Read Edge security for sysadmins: 6 issues to watch for more tips.

The more edge devices you have, the more difficult it can be to maintain all of them. To make this easier, consider utilizing a configuration management tool that can work with your devices, such as Ansible. These automation tools allow you to maintain a consistent configuration on each edge device. Doing so will enable you to apply the same security settings and quickly adapt to any new threats by simply updating and running your playbook.

[ Learn more about automation at the edge. ]

3. As edge use cases grow, so do support and maintenance requirements

Many system administrators have the standard remote office or remote datacenter that they consider to be on the edge. In these situations, standard enterprise systems are considered edge devices that they have been managing for years. But as technology evolves, new devices are needed to perform specific tasks, and with new use cases for these devices comes the added complexity of designing, implementing, and maintaining these solutions.

Don't plan your edge strategy for the present; you should also consider future use cases. While the edge might be a remote office today, it could very well expand to numerous IoT devices in the future. It's easy to quickly become overwhelmed and behind on your ability to deploy and manage these devices.

Live on the edge

With all the talk about edge computing, it's easy to get caught up in the marketing hype and feel overwhelmed by it and how it applies to you. That's why defining what edge computing is in your environment is important. Make sure your edge devices use best practices and an easy-to-use automation tool and that they can adapt and grow with the complexities that come with edge computing.

[ Boost security, flexibility, and scale at the edge with Red Hat Enterprise Linux. ]


About the author

Morgan Peterman is a Senior Partner Technical Account Manager for Red Hat OpenShift. He is a Red Hat Certified Engineer (RHCE) and a Red Hat Certified Specialist in OpenShift. Before joining Red Hat, Morgan spent 15 years as a Linux Engineer and Systems Administrator, deploying a wide variety of technologies and delivering cost-cutting IT solutions within the healthcare and travel industries.

Read full bio
UI_Icon-Red_Hat-Close-A-Black-RGB

Browse by channel

automation icon

Automation

The latest on IT automation for tech, teams, and environments

AI icon

Artificial intelligence

Updates on the platforms that free customers to run AI workloads anywhere

open hybrid cloud icon

Open hybrid cloud

Explore how we build a more flexible future with hybrid cloud

security icon

Security

The latest on how we reduce risks across environments and technologies

edge icon

Edge computing

Updates on the platforms that simplify operations at the edge

Infrastructure icon

Infrastructure

The latest on the world’s leading enterprise Linux platform

application development icon

Applications

Inside our solutions to the toughest application challenges

Original series icon

Original shows

Entertaining stories from the makers and leaders in enterprise tech