{"id":594,"date":"2025-07-17T14:42:04","date_gmt":"2025-07-17T14:42:04","guid":{"rendered":"https:\/\/www.newsbeep.com\/au\/594\/"},"modified":"2025-07-17T14:42:04","modified_gmt":"2025-07-17T14:42:04","slug":"6-design-principles-for-edge-computing-systems","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/au\/594\/","title":{"rendered":"6 Design Principles for Edge Computing Systems"},"content":{"rendered":"<p>Edge computing is defined by a wide diversity of use cases.<\/p>\n<p>To illustrate, the <a href=\"https:\/\/thenewstack.io\/wordpress-turmoil-and-the-fair-package-manager\/\" class=\"local-link\" rel=\"nofollow noopener\" target=\"_blank\">2025 Open Source Summit<\/a> brought together two edge experts with experience in two vastly different types of <a href=\"https:\/\/thenewstack.io\/edge-computing\/\" class=\"local-link\" rel=\"nofollow noopener\" target=\"_blank\">edge systems<\/a> to explain some rules they\u2019ve learned for <a href=\"https:\/\/ossna2025.sched.com\/event\/23B1V\/keynote-living-on-the-edge-from-chicken-sandwiches-to-the-danger-zone-brian-chambers-chief-architect-chick-fil-a-michael-henry-chief-of-information-technology-secretariat-of-the-air-force-studies-and-analysis?iframe=no\" class=\"ext-link\" rel=\"external  nofollow noopener\" onclick=\"this.target=&#039;_blank&#039;;\" target=\"_blank\">building an edge computing system<\/a>.<\/p>\n<p>One was from <a href=\"https:\/\/www.chick-fil-a.com\/menu\" class=\"ext-link\" rel=\"external  nofollow noopener\" onclick=\"this.target=&#039;_blank&#039;;\" target=\"_blank\">Chick-fil-A<\/a>, a popular chicken sandwich chain, which runs a <a href=\"https:\/\/thenewstack.io\/from-cold-fries-to-broken-code-why-agile-testing-matters-at-chick-fil-a\/\" class=\"local-link\" rel=\"nofollow noopener\" target=\"_blank\">Kubernetes-based edge computing platform<\/a> for its 3,000+ outlets across the U.S. The other expert was from the U.S. Air Force, which has among its other duties delivering connectivity and associated core services to remote parts of the world.<\/p>\n<p>\u201cThe edge all depends on who you need to serve, how many people you need to serve, what you\u2019re serving,\u201d explained <a href=\"https:\/\/www.linkedin.com\/in\/michaelehenry\/\" class=\"ext-link\" rel=\"external  nofollow noopener\" onclick=\"this.target=&#039;_blank&#039;;\" target=\"_blank\">Michael Henry<\/a>, chief of information technology for the Secretariat of the Air Force, studies and analysis.<\/p>\n<p>Edge is all about bringing \u201ccompute to where the action is,\u201d further explained <a href=\"https:\/\/www.linkedin.com\/in\/brian-chambers\/\" class=\"ext-link\" rel=\"external  nofollow noopener\" onclick=\"this.target=&#039;_blank&#039;;\" target=\"_blank\">Brian Chambers<\/a>, chief architect for Chick-fil-A.<\/p>\n<p>The two speakers are also members of <a href=\"https:\/\/edgemonsters.dev\/#about-edgemonster\" class=\"ext-link\" rel=\"external  nofollow noopener\" onclick=\"this.target=&#039;_blank&#039;;\" target=\"_blank\">Edge Monsters<\/a>, a group of edge architects who meet on the regular to discuss best practices around this unique form of computing.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-22795135\" class=\"wp-image-22795135 size-full\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/07\/16cb2c44-edge-sample.png\" alt=\"slide of Chik Fil-A's tech stack. \" width=\"939\" height=\"527\"\/><\/p>\n<p id=\"caption-attachment-22795135\" class=\"wp-caption-text\">Chick-fil-A\u2019s tech stack, built largely on open source.<\/p>\n<p>The Edge Is Defined by Constraints<\/p>\n<p>Henry said, \u201cThe edge is something you need to live in, in order to deploy it.\u201d Although there are commercial and open source solutions to help build a stack, each edge system is something unique, defined by both its restraints and requirements.<\/p>\n<p>Chick-fil-A was driven to build an edge platform to support the heavy business some of its stores were seeing, which was leading to unnecessary capacity and logistics challenges.<\/p>\n<p>At least the restaurants stayed put.<\/p>\n<p>The Air Force\u2019s edge systems had to be deployed all over the world on a moment\u2019s notice.<\/p>\n<p>\u201cWe need to be able to pack it up, start it up and get our network connectivity and our core services up and running at a moment\u2019s notice,\u201d Henry said.<\/p>\n<p>The two organizations\u2019 operations are different in other ways as well. The Air Force has a lot of legacy equipment to support, whereas Chick-fil-A makes it a point to <a href=\"https:\/\/thenewstack.io\/how-to-treat-servers-and-software-as-cattle-not-pets\/\" class=\"local-link\" rel=\"nofollow noopener\" target=\"_blank\">standardize the hardware<\/a> across all its locations.<\/p>\n<p>Nonetheless, there are commonalities across most <a href=\"https:\/\/thenewstack.io\/how-to-build-smarter-factories-with-edge-computing\/\" class=\"local-link\" rel=\"nofollow noopener\" target=\"_blank\">edge systems<\/a>.<\/p>\n<p>The chief characteristic of an edge system is that it has pretty serious constraints of one type or another. Unlike the cloud, with its unlimited scalability (in theory), the edge is practically defined by constraints: physical constraints, network constraints and power constraints.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22794996 size-large\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/07\/2299554e-edge-02-1024x574.png\" alt=\"\" width=\"1024\" height=\"574\"\/><\/p>\n<p>Edge locations may not have on-site tech support. Space is usually at a premium at most locations. So is power. And then there are financial constraints. One solution may work well for 1 or 10 locations, but does it get unduly expensive for 1,000 or 100,000 locations?<\/p>\n<p>Different systems also have differing requirements.<\/p>\n<p>The Air Force, for instance, requires multiple levels of connectivity for its remote outposts. It also has some \u201cdeep security concerns,\u201d in terms of preventing hostile actors from compromising the system, Henry said.<\/p>\n<p>The requirement is to \u201cdeploy the edge such that we know what is running on this box. And there is absolutely nothing that\u2019s unintentional being able to push patches to this thing,\u201d he said, explaining the server itself is probably an unmanned relay station and \u201czip-tied\u201d to a tree or powerline somewhere.<\/p>\n<p>Cluster configuration is also a huge deal for the military service. The armed service needs to push an update to an edge node and have that go live across the fleet.<\/p>\n<p>All of which comes down to one thing, according to the duo: You own the entire stack.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-22795004\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/07\/fd9db505-edge-03.png\" alt=\"\" width=\"1256\" height=\"701\"\/><\/p>\n<p>6 Principles for Building Edge Systems<\/p>\n<p>In their keynote talk, the engineering duo shared what they called \u201csix principles for crushing it at the edge.\u201d<\/p>\n<p>1. Do the Differentiated Heavy Lifting<\/p>\n<p>When building an edge system, \u201cNo one is going to do the work for you,\u201d Henry said. There may be some \u201cturnkey solutions\u201d that can help along the way, but in the end, the system you will design will be unique to your operating characteristics.<\/p>\n<p>What will the infrastructure be? How will it \u201cfan out\u201d across all the end nodes? What are your end points? How are you booting? What is your content delivery network?<\/p>\n<p>Also, keep in mind, you can\u2019t bring every service from the cloud over to the edge: They won\u2019t fit.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-22795130\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/07\/975546e8-edge-04.png\" alt=\"\" width=\"933\" height=\"526\"\/><\/p>\n<p>2. Build a \u2018North Star\u2019 Edge Controller<\/p>\n<p>A considerable chunk of your time will be dedicated to sorting out the edge controller.<\/p>\n<p>\u201cThere are just so many edge controllers out there that you can play with. But they all have their quirks. They all have their problems. Maybe it\u2019s this<a href=\"https:\/\/thenewstack.io\/the-new-2gb-raspberry-pi-5-another-option-for-linux-sysadmins\/\" class=\"local-link\" rel=\"nofollow noopener\" target=\"_blank\"> Raspberry Pi 5,<\/a> but you got the wrong board, or, like, the board itself doesn\u2019t really work for you exactly right. Am I going to power it correctly?\u201d Henry said.<\/p>\n<p>You have to figure out how to \u201ckick-start\u201d the controller if it goes out, especially if the engineering team is 3,000 miles away.\u00a0 A microSD card can be used to reimage a system, which saves the cost and time of sending an engineer to the remote location; a local operator can do the reboot.<\/p>\n<p>\u201cBecause if you have thousands of these things, getting a pre-burn-in contract so that you delay it gives you a supply chain problem,\u201d Henry said.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-22795131\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/07\/c4aa9181-edge-05.png\" alt=\"\" width=\"936\" height=\"526\"\/><\/p>\n<p>3. Use Declarative Infrastructure<\/p>\n<p>\u201cIf it\u2019s not declarative, it doesn\u2019t exist,\u201d Chambers said. One rule of Chick-fil-A is that all deployments must follow the practice of <a href=\"https:\/\/thenewstack.io\/infrastructure-as-code-in-2024-why-its-still-so-terrible\/\" class=\"local-link\" rel=\"nofollow noopener\" target=\"_blank\">Infrastructure as Code (IaC)<\/a>, where all software configuration is predefined so it can be rolled out automatically.<\/p>\n<p>Chambers knew from the beginning that, given the number of Chick-fil-A outlets, IaC would be necessary. Once developers started to make changes to their applications, deploying that software had to be done in a uniform and documented manner, lest each system \u201cdrift\u201d into its own unique configuration, making the fleet harder to manage as a whole.<\/p>\n<p>Declarative infra allows for versioning: Managers can see which stores have which versions of the software. It allows for rolling back of changes if a fix or upgrade doesn\u2019t quite work as planned.<\/p>\n<p>Chick-fil-A has used <a href=\"https:\/\/thenewstack.io\/how-to-make-git-a-developers-bff\/\" class=\"local-link\" rel=\"nofollow noopener\" target=\"_blank\">Git<\/a> as its repository and version control system for the past several years. Chambers said, \u201cGit made a lot of sense for us,\u201d given its cleanly defined API. Since Chick-fil-A uses <a href=\"https:\/\/thenewstack.io\/k3s-expanded-ranchers-leadership-and-will-be-crucial-for-suses-kubernetes-success\/\" class=\"local-link\" rel=\"nofollow noopener\" target=\"_blank\">Suse\u2019s K3 platform<\/a>, its Kubernetes Manifest files are stored in Git.<\/p>\n<p>Every location gets its own repo.<\/p>\n<p>\u201cIt\u2019s fairly simple to build and maintain a solution that has a bunch of Git repos,\u201d Chambers said. It \u201cassigns something location-specific to an agent that lives at the edge that pulls that stuff down and applies changes, and then closes the loop back via an API.\u201d<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-22795138\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/07\/ff781a4a-edge-06.png\" alt=\"\" width=\"948\" height=\"532\"\/><\/p>\n<p>4. Secure for a Hostile Environment<\/p>\n<p>Unlike data center computing, your edge device may be in an unfriendly environment, and so you must take extra precautions to guard against breaches.<\/p>\n<p>If necessary, you need a way to kill and erase the contents of a device, through <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/hardware-security\/tpm\/trusted-platform-module-overview\" class=\"ext-link\" rel=\"external  nofollow noopener\" onclick=\"this.target=&#039;_blank&#039;;\" target=\"_blank\">Trusted Platform Module<\/a> (TPM)- or <a href=\"https:\/\/go.entrust.com\/why-use-an-hsm-white-paper\" class=\"ext-link\" rel=\"external  nofollow noopener\" onclick=\"this.target=&#039;_blank&#039;;\" target=\"_blank\">Hardware Security Module<\/a> (HSM)-based devices, Henry suggested.<\/p>\n<p>Most importantly, you have to figure out how to send out the kill signal \u201cwithout making it a vulnerability,\u201d Henry said. This should also be done in a way that doesn\u2019t brick the device itself, unless you want to be traveling to some remote location to install replacement units.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-22795137\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/07\/0a22c4b1-edge-07.png\" alt=\"\" width=\"934\" height=\"519\"\/><\/p>\n<p>5. Use Telemetry Sparingly<\/p>\n<p>Telemetry is vital for understanding your remote system, but it can also be a bandwidth hog.<\/p>\n<p>Chick-fil-A had an incident where the credit card payment system stopped working across about 100 stores, Chambers recalled. The culprit was edge applications that were \u201cconsuming all of the available bandwidth,\u201d by just updating their logs, he shared.<\/p>\n<p>So, when designing the telemetry for your remote system, you have to figure out what data you truly need, and what the network constraints are for sending that data.<\/p>\n<p>During routine operations, when everything is running fine, you probably won\u2019t need all the logging data.<\/p>\n<p>Chick-fil-A has a number of apps that run on a store server, as well as a number of edge-connected devices, such as fryers. It collects telemetry data for all of these resources and sends it back to the cloud, where it is dispersed to the appropriate management apps in the cloud.<\/p>\n<p>\u201cOur edge is a platform for many different software engineering teams that build different applications, and so they may have their own preferences about what monitoring tools they use to troubleshoot their app, whether it\u2019s <a href=\"https:\/\/aws.amazon.com\/?utm_content=inline+mention\" class=\"ext-link\" target=\"_blank\" rel=\"external  nofollow noopener\" onclick=\"this.target=&#039;_blank&#039;;\">AWS<\/a>\u2018 CloudWatch or Datadog, Grafana or Splunk,\u201d Chambers said.<\/p>\n<p>Use tools that can help deliver the data only when you need it. <a href=\"https:\/\/www.datadoghq.com\/?utm_content=inline+mention\" class=\"ext-link\" target=\"_blank\" rel=\"external  nofollow noopener\" onclick=\"this.target=&#039;_blank&#039;;\">Datadog<\/a>\u2018s open source <a href=\"https:\/\/opensource.datadoghq.com\/projects\/vector\/\" class=\"ext-link\" rel=\"external  nofollow noopener\" onclick=\"this.target=&#039;_blank&#039;;\" target=\"_blank\">Vector<\/a> tool helped Chick-fil-A excerpt data only when it is needed, such as for a short duration of debugging. The app team can, for instance, get all the data for a 30-minute time window and switch it off afterwards.<\/p>\n<p>\u201cWe love our logs in the Air Force,\u201d Henry agreed. \u201cOur logs completely consume things.\u201d<\/p>\n<p>But sending everything back to a data center can be expensive from remote locations.<\/p>\n<p>\u201cYou need to push things back across the wire as minimally as possible, but yet still understand the operation,\u201d Henry said.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-22795136\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/07\/6f0aab8a-edge-08.png\" alt=\"\" width=\"943\" height=\"530\"\/><br \/>\n6. Sort Your Storage<\/p>\n<p>Edge devices require multiple forms of storage, Henry advised.<\/p>\n<p>Of course, every edge setup has its own needs, so you need to determine what kind of storage is best, be it block, file or object storage. What is your file system, and what requirements does it have? <a href=\"https:\/\/thenewstack.io\/ceph-20-years-of-cutting-edge-storage-at-the-edge\/\" class=\"local-link\" rel=\"nofollow noopener\" target=\"_blank\">Ceph<\/a>, for instance, requires multiple disks.<\/p>\n<p>You also need to figure out a disaster recovery plan. You need to answer, \u201cWhat happens when things go wrong?\u201d Henry said. Does the data need to be retrieved, or can you just swap it out for a new unit?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-22795139\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/07\/9221f7b0-edge-09.png\" alt=\"\" width=\"935\" height=\"523\"\/><\/p>\n<p>\u00a0<\/p>\n<p>You can enjoy the entire talk here:<\/p>\n<\/p>\n<p>\t<a class=\"row youtube-subscribe-block\" href=\"https:\/\/youtube.com\/thenewstack?sub_confirmation=1\" target=\"_blank\" rel=\"nofollow noopener\"><\/p>\n<p>\n\t\t\t\tYOUTUBE.COM\/THENEWSTACK\n\t\t\t<\/p>\n<p>\n\t\t\t\tTech moves fast, don&#8217;t miss an episode. Subscribe to our YouTube<br \/>\n\t\t\t\tchannel to stream all our podcasts, interviews, demos, and more.\n\t\t\t<\/p>\n<p>\t\t\t\tSUBSCRIBE<\/p>\n<p>\t<\/a><\/p>\n<p>    Group<br \/>\n    Created with Sketch.<\/p>\n<p>\t\t<a href=\"https:\/\/thenewstack.io\/author\/joab\/\" class=\"author-more-link\" rel=\"nofollow noopener\" target=\"_blank\"><\/p>\n<p>\t\t\t\t\t<img decoding=\"async\" class=\"post-author-avatar\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/07\/327440bd-joab-jackson_avatar_1495152980.-600x600.jpeg\"\/><\/p>\n<p>\n\t\t\t\t\t\t\tJoab Jackson is a senior editor for The New Stack, covering cloud native computing and system operations. He has reported on IT infrastructure and development for over 25 years, including stints at IDG and Government Computer News. Before that, he&#8230;\t\t\t\t\t\t<\/p>\n<p>\t\t\t\t\t\tRead more from Joab Jackson\t\t\t\t\t\t<\/p>\n<p>\t\t<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Edge computing is defined by a wide diversity of use cases. To illustrate, the 2025 Open Source Summit&hellip;\n","protected":false},"author":2,"featured_media":595,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[64,63,257,105],"class_list":{"0":"post-594","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-au","9":"tag-australia","10":"tag-computing","11":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/comments?post=594"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/594\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media\/595"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media?parent=594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/categories?post=594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/tags?post=594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}