This page refers to version 1.7. You might want to use the current stable version.
The MQTT protocol adapter exposes an MQTT topic hierarchy for publishing telemetry data and events to downstream consumers and for receiving commands from applications and sending back responses.
The MQTT adapter is not a general purpose MQTT broker. In particular the adapter
0, regardless of the value of the clean session flag provided in a client’s CONNECT packet.1 then the corresponding AMQP 1.0 message being sent downstream by the adapter will contain an x-opt-retain message annotation containing the boolean value true. A downstream consumer may then react according to the presence of this annotation.The MQTT adapter by default requires clients (devices or gateway components) to authenticate during connection establishment. The adapter supports both the authentication based on the username/password provided in an MQTT CONNECT packet as well as client certificate based authentication as part of a TLS handshake for that purpose.
The adapter tries to authenticate the device using these mechanisms in the following order
When a device uses a client certificate for authentication during the TLS handshake, the adapter tries to determine the tenant
that the device belongs to based on the issuer DN contained in the certificate.
In order for the lookup to succeed, the tenant’s trust anchor needs to be configured by means of registering the
trusted certificate authority. The device’s client certificate will then be
validated using the registered trust anchor, thus implicitly establishing the tenant that the device belongs to.
In a second step, the adapter uses the Credentials API’s get operation to retrieve the credentials on record, including the client
certificate’s subject DN as the auth-id, x509-cert as the type of secret and the MQTT client identifier as client-id in the
request payload.
NB The adapter needs to be configured for TLS in order to support this mechanism.
When a device wants to authenticate using this mechanism, it needs to provide a username and a password in the MQTT CONNECT packet
it sends in order to initiate the connection. The username must have the form auth-id@tenant, e.g. sensor1@DEFAULT_TENANT.
The adapter verifies the credentials provided by the client against the credentials that the
configured Credentials service has on record for the client.
The adapter uses the Credentials API’s get operation to retrieve the credentials on record, including the tenant and auth-id provided
by the client in the username, hashed-password as the type of secret and the MQTT client identifier as client-id in the request payload.
The examples below refer to devices 4711 and gw-1 of tenant DEFAULT_TENANT using auth-ids sensor1 and gw1 and corresponding passwords.
The example deployment as described in the Deployment Guides comes pre-configured with the corresponding entities in its device registry component.
NB There is a subtle difference between the device identifier (device-id) and the auth-id a device uses for authentication. See Device Identity for a discussion of the concepts.
The adapter performs additional checks regarding resource limits when a client tries to connect and/or send a message to the adapter.
The adapter rejects a client’s connection attempt with return code
0x03 (Connection Refused: server unavailable), if the maximum number of connections per protocol adapter instance is reached0x05 (Connection Refused: not authorized), if the maximum number of simultaneously connected devices for the tenant is reached.The adapter rejects a client’s connection attempt with return code 0x05 (Connection Refused: not authorized), if the
connection duration limit that has been configured for the client’s tenant is exceeded.
The adapter
0x05 (Connection Refused: not authorized),if the message limit that has been configured for the device’s tenant is exceeded.
The adapter can emit Connection Events for client connections being established and/or terminated. Please refer to the common configuration options for details regarding how to enable this behavior.
The adapter includes the client identifier from the client’s MQTT CONNECT packet as the Connection Event’s remote-id.
The MQTT adapter supports the publishing of telemetry data by means of MQTT PUBLISH packets using either QoS 0 or QoS 1. Using QoS 1 will result in the adapter sending an MQTT PUBACK packet to the client once the message has been settled with the accepted outcome by the AMQP 1.0 Messaging Network.
This requires that
The protocol adapter checks the configured message limit before accepting any telemetry messages. An exceeded message limit will cause an error.
Any kind of error when processing an incoming telemetry message will be reported back to the client if the client has subscribed on a dedicated error topic. See Error Reporting via Error Topic for details.
If such an error subscription by the client exists, the error will by default be ignored after it got published on the error topic, otherwise the connection to the client will be closed. The handling of errors can further be controlled by means of an on-error property bag parameter set on the telemetry message topic. Refer to Error Handling for details.
The devices can optionally indicate the content type of the payload by setting the content-type property explicitly in the property-bag. The property-bag is an optional collection of properties intended for the receiver of the message. A property bag is only allowed at the very end of a topic. It always starts with a /? character, followed by pairs of URL encoded property names and values that are separated by &. For example, a property bag containing two properties seqNo and importance looks like this: /topic/name/?seqNo=10034&importance=high.
telemetry or tThis is the preferred way for devices to publish telemetry data. It is available only if the protocol adapter is configured to require devices to authenticate (which is the default). When using this topic, the MQTT adapter determines the device’s tenant and device identity as part of the authentication process.
Example
Publish some JSON data for device 4711:
mosquitto_pub -u 'sensor1@DEFAULT_TENANT' -P hono-secret -t telemetry -m '{"temp": 5}'
Publish some JSON data for device 4711 using a client certificate for authentication:
# in base directory of Hono repository:
mosquitto_pub -p 8883 -t telemetry -m '{"temp": 5}' --cert demo-certs/certs/device-4711-cert.pem --key demo-certs/certs/device-4711-key.pem --cafile demo-certs/certs/trusted-certs.pem
NB The example above assumes that the MQTT adapter is configured for TLS and the secure port is used.
telemetry/${tenant-id}/${device-id} or t/${tenant-id}/${device-id}This topic can be used by devices that have not authenticated to the protocol adapter. Note that this requires the
HONO_MQTT_AUTHENTICATION_REQUIRED configuration property to be explicitly set to false.
Examples
Publish some JSON data for device 4711:
mosquitto_pub -t telemetry/DEFAULT_TENANT/4711 -m '{"temp": 5}'
telemetry/${tenant-id}/${device-id} or t/${tenant-id}/${device-id}This topic can be used by gateway components to publish data on behalf of other devices which do not connect to a protocol adapter directly but instead are connected to the gateway, e.g. using some low-bandwidth radio based technology like SigFox or LoRa. In this case the credentials provided by the gateway during connection establishment with the protocol adapter are used to authenticate the gateway whereas the parameters from the topic name are used to identify the device that the gateway publishes data for.
The protocol adapter checks the gateway’s authority to publish data on behalf of the device implicitly by means of retrieving a registration assertion for the device from the configured Device Registration service.
Examples
Publish some JSON data for device 4712 via gateway gw-1:
mosquitto_pub -u 'gw@DEFAULT_TENANT' -P gw-secret -t telemetry/DEFAULT_TENANT/4712 -m '{"temp": 5}'
NB The example above assumes that a gateway device with ID gw-1 has been registered with hashed-password credentials with auth-id gw and password gw-secret.
The MQTT adapter supports the publishing of events by means of MQTT PUBLISH packets using QoS 1 only. The adapter will send an MQTT PUBACK packet to the client once the event has been settled with the accepted outcome by the AMQP 1.0 Messaging Network.
This requires that
The protocol adapter checks the configured message limit before accepting any event messages. An exceeded message limit will cause an error.
Any kind of error when processing an incoming event message will be reported back to the client if the client has subscribed on a dedicated error topic. See Error Reporting via Error Topic for details.
If such an error subscription by the client exists, the error will by default be ignored after it got published on the error topic, otherwise the connection to the client will be closed. The handling of errors can further be controlled by means of an on-error property bag parameter set on the event message topic. Refer to Error Handling for details.
The devices can optionally indicate a time-to-live duration for event messages and the content type of the payload by setting the hono-ttl and content-type properties explicitly in the property-bag. The property-bag is an optional collection of properties intended for the receiver of the message. A property bag is only allowed at the very end of a topic. It always starts with a /? character, followed by pairs of URL encoded property names and values that are separated by &. For example, a property bag containing two properties seqNo and importance looks like this: /topic/name/?seqNo=10034&importance=high.
The MQTT adapter currently does not use any properties except hono-ttl.
event or eThis is the preferred way for devices to publish events. It is available only if the protocol adapter has been configured to require devices to authenticate (which is the default).
Example
Upload a JSON string for device 4711:
mosquitto_pub -u 'sensor1@DEFAULT_TENANT' -P hono-secret -t event -q 1 -m '{"alarm": 1}'
Upload a JSON string for device 4711 with time-to-live as 10 seconds:
mosquitto_pub -u 'sensor1@DEFAULT_TENANT' -P hono-secret -t event/?hono-ttl=10 -q 1 -m '{"alarm": 1}'
event/${tenant-id}/${device-id} or e/${tenant-id}/${device-id}This topic can be used by devices that have not authenticated to the protocol adapter. Note that this requires the
HONO_MQTT_AUTHENTICATION_REQUIRED configuration property to be explicitly set to false.
Examples
Publish some JSON data for device 4711:
mosquitto_pub -t event/DEFAULT_TENANT/4711 -q 1 -m '{"alarm": 1}'
Publish some JSON data for device 4711 with time-to-live as 15 seconds:
mosquitto_pub -t event/DEFAULT_TENANT/4711/?hono-ttl=15 -q 1 -m '{"alarm": 1}'
event/${tenant-id}/${device-id} or e/${tenant-id}/${device-id}This topic can be used by gateway components to publish data on behalf of other devices which do not connect to a protocol adapter directly but instead are connected to the gateway, e.g. using some low-bandwidth radio based technology like SigFox or LoRa. In this case the credentials provided by the gateway during connection establishment with the protocol adapter are used to authenticate the gateway whereas the parameters from the topic name are used to identify the device that the gateway publishes data for.
The protocol adapter checks the gateway’s authority to publish data on behalf of the device implicitly by means of retrieving a registration assertion for the device from the configured Device Registration service.
Examples
Publish some JSON data for device 4712 via gateway gw-1:
mosquitto_pub -u 'gw@DEFAULT_TENANT' -P gw-secret -t event/DEFAULT_TENANT/4712 -q 1 -m '{"temp": 5}'
NB The example above assumes that a gateway device with ID gw-1 has been registered with hashed-password credentials with auth-id gw and password gw-secret.
The MQTT adapter enables devices to receive commands that have been sent by business applications by means of sending an MQTT SUBSCRIBE packet containing a device specific topic filter as described below. Devices can subscribe with QoS 1 or QoS 0. The adapter indicates the outcome of the subscription request by sending back a corresponding SUBACK packet. The SUBACK packet will contain Success - QoS 0 (0x00) or Success - QoS 1 (0x01) for a valid command topic filter indicating QoS 0 or 1 and will contain the Failure (0x80) value for an invalid or unsupported filter. When a device no longer wants to receive commands anymore, it can send an MQTT UNSUBSCRIBE packet to the adapter, including the same topic filter that has been used to subscribe.
When a device has successfully subscribed, the adapter sends an empty notification on behalf of the device to the downstream AMQP 1.0 Messaging Network with the ttd header set to -1, indicating that the device will be ready to receive commands until further notice. Analogously, the adapter sends an empty notification with the ttd header set to 0 when a device unsubscribes from commands.
Commands can be sent following a request/response pattern or being one-way.
For Request/Response commands, devices send their responses to commands by means of sending an MQTT PUBLISH message to a topic that is specific to the command that has been executed. The MQTT adapter accepts responses being published using either QoS 0 or QoS 1.
The MQTT adapter checks the configured message limit before accepting any command requests and responses. In case of incoming command requests from business applications, if the message limit is exceeded, the Adapter rejects the message with the reason amqp:resource-limit-exceeded. And for the incoming command responses from devices, the Adapter rejects the message and closes the connection to the client.
The following sections define the topic filters/names to use for subscribing to and responding to commands. The following shorthand versions of topic path segments are supported:
c instead of commandq instead of reqs instead of resThe following variables are used:
${command} : An arbitrary string that indicates the command to execute, e.g. setBrightness. The command is provided by the application that sends the command.${req-id} (only for Request/Response commands) : The unique identifier of the command execution request. The identifier is passed to the device as part of the name of the topic that the command is published to. The device needs to publish its response to the command to a topic which includes this identifier, thus allowing the adapter to correlate the response with the request.${status} : The HTTP status code indicating the outcome of executing the command. This status code is passed on to the application in the AMQP message’s status application property.An authenticated device MUST use the following topic filter for subscribing to commands:
command/[${tenant-id}]/[${device-id}]/req/#
Both the tenant and the device ID are optional. If specified, they MUST match the authenticated device’s tenant and/or device ID. Note that the authentication identifier used in the device’s credentials is not necessarily the same as the device ID.
The protocol adapter will publish commands for the device to the following topic names
command/${tenant-id}/${device-id}/req//${command}command/${tenant-id}/${device-id}/req/${req-id}/${command}The tenant-id and/or device-id will be included in the topic name if the tenant and/or device ID had been included in the topic filter used for subscribing to commands.
command/+/+/req/# for subscribing to commands.
This old topic filter is deprecated. Devices MAY still use it until support for it will be removed in a future Hono version.Examples
The following command can be used to subscribe to commands resulting in command messages being published to a topic that does not include tenant nor device ID:
mosquitto_sub -v -u 'sensor1@DEFAULT_TENANT' -P hono-secret -t command///req/#
A request/response command with name setBrightness from an application might look like this:
command///req/1010f8ab0b53-bd96-4d99-9d9c-56b868474a6a/setBrightness
{
"brightness": 79
}
A corresponding one-way command might look like this:
command///req//setBrightness
{
"brightness": 79
}
Note that the topic in the latter case doesn’t contain a request identifier.
The following command can be used to subscribe to commands resulting in command messages being published to a topic that includes the tenant ID:
mosquitto_sub -v -u 'sensor1@DEFAULT_TENANT' -P hono-secret -t c/DEFAULT_TENANT//q/#
Note the usage of the abbreviated names (c and q instead of command and req) and the inclusion of the tenant ID
in the topic filter.
A corresponding request/response command with name setBrightness from an application might look like this:
c/DEFAULT_TENANT//q/1010f8ab0b53-bd96-4d99-9d9c-56b868474a6a/setBrightness
{
"brightness": 79
}
A corresponding one-way command might look like this:
c/DEFAULT_TENANT//q//setBrightness
{
"brightness": 79
}
Note that the topic also includes the abbreviated names and the tenant identifier because the topic filter used for subscribing did contain the tenant ID as well.
An unauthenticated device MUST use the topic filter command/${tenant-id}/${device-id}/req/# to subscribe to commands.
Example
mosquitto_sub -v -t command/DEFAULT_TENANT/4711/req/#
The adapter will then publish Request/Response commands for the device to topic command/${tenant-id}/${device-id}/req/${req-id}/${command}
and one-way commands to topic command/${tenant-id}/${device-id}/req//${command}.
For example, a request/response command with name setBrightness from an application might look like this:
command/DEFAULT_TENANT/4711/req/1010f8ab0b53-bd96-4d99-9d9c-56b868474a6a/setBrightness
{
"brightness": 79
}
A corresponding one-way command might look like this:
command/DEFAULT_TENANT/4711/req//setBrightness
{
"brightness": 79
}
Note that the topic in the latter case doesn’t contain a request identifier.
Gateway components can receive commands for devices which do not connect to a protocol adapter directly but instead are connected to the gateway, e.g. using some low-bandwidth radio based technology like SigFox or LoRa. Corresponding devices have to be configured so that they can be used with a gateway. See Configuring Gateway Devices for details.
An authenticated gateway MUST use one of the following topic filters for subscribing to commands:
| Topic Filter | Description |
|---|---|
command//+/req/# |
Subscribe to commands for all devices that the gateway is authorized to act on behalf of. |
command/${tenant-id}/+/req/# |
Subscribe to commands for all devices that the gateway is authorized to act on behalf of. |
command//${device-id}/req/# |
Subscribe to commands for a specific device that the gateway is authorized to act on behalf of. |
command/${tenant-id}/${device-id}/req/# |
Subscribe to commands for a specific device that the gateway is authorized to act on behalf of. |
The protocol adapter will publish commands for devices to the following topic names
command//${device-id}/req//${command} or command/${tenant-id}/${device-id}/req//${command}command//${device-id}/req/${req-id}/${command} or command/${tenant-id}/${device-id}/req/${req-id}/${command}The ${tenant-id} will be included in the topic name if the tenant ID had been included in the topic filter used for subscribing to commands.
command/+/+/req/# for subscribing to commands.
This old topic filter is deprecated. Gateways MAY still use it until support for it will be removed in a future Hono version.When processing an incoming command message, the protocol adapter will give precedence to a device-specific command subscription matching the command target device, whether the subscription comes from a gateway or the device itself. If there are multiple such subscriptions from multiple gateways and/or from the device itself, the subscription initiated last will get the command messages.
If no device-specific command subscription exists for a command target device, but one gateway, that may act on behalf of the device, has subscribed to commands for all its devices, then the command message is sent to that gateway.
If multiple gateways have initiated such generic subscriptions, the protocol adapter may have to decide to which gateway a particular command message will be sent to. In case the command target device has already sent a telemetry, event or command response message via a gateway and if that gateway has created such a command subscription, that gateway will be chosen. Otherwise one gateway that may act on behalf of the command target device and that has an open subscription will be chosen randomly to receive the command message.
Subscribe to all Devices
A subscription to commands for all devices that a gateway acts on behalf of looks like this:
mosquitto_sub -v -u 'gw@DEFAULT_TENANT' -P gw-secret -t command/DEFAULT_TENANT/+/req/#
A request/response command for device 4711 with name setBrightness from an application might then look like this:
command/DEFAULT_TENANT/4711/req/1010f8ab0b53-bd96-4d99-9d9c-56b868474a6a/setBrightness
{
"brightness": 79
}
Note that the tenant identifier is included in the topic name that the command has been published to because it had been included in the topic filter used for subscribing to the commands.
Subscribe to a specific Device
A subscription to commands for a specific device can be done like this:
mosquitto_sub -v -u 'gw@DEFAULT_TENANT' -P gw-secret -t c//4711/q/#
Note the usage of the abbreviated names (c and q instead of command and req) in the topic filter.
A corresponding one-way command might look like this:
c//4711/q//setBrightness
{
"brightness": 79
}
Note that the topic also includes the abbreviated names and does not include the tenant identifier because the topic filter used for subscribing did not contain the tenant ID either.
An authenticated device MUST send the response to a previously received command to the topic command///res/${req-id}/${status}.
Example
After a command has arrived as in the above example, you send a response using the arrived ${req-id}:
mosquitto_pub -u 'sensor1@DEFAULT_TENANT' -P hono-secret -t command///res/1010f8ab0b53-bd96-4d99-9d9c-56b868474a6a/200 -m '{"lumen": 200}'
An unauthenticated device MUST send the response to a previously received command to the topic command/${tenant-id}/${device-id}/res/${req-id}/${status}.
Example
After a command has arrived as in the above example, you send a response using the arrived ${req-id}:
mosquitto_pub -t command/DEFAULT_TENANT/4711/res/1010f8ab0b53-bd96-4d99-9d9c-56b868474a6a/200 -m '{"lumen": 200}'
An authenticated gateway MUST send a device’s response to a command it has received on behalf of the device to the topic command//${device-id}/res/${req-id}/${status}.
Example
After a command has arrived as in the above example, the response is sent using the ${req-id} from the topic that the command had been published to:
mosquitto_pub -u 'gw@DEFAULT_TENANT' -P gw-secret -t command//4711/res/1010f8ab0b53-bd96-4d99-9d9c-56b868474a6a/200 -m '{"lumen": 200}'
The default behaviour when an error occurs while publishing telemetry, event or command response messages is for the MQTT adapter to close the network connection to the device, as mandated by the MQTT 3.1.1 spec.
An alternative way of dealing with errors involves keeping the connection intact and letting the MQTT adapter publish a corresponding error message on a specific error topic to the device. To enable that behaviour, the device sends an MQTT SUBSCRIBE packet with a topic filter as described below on the same MQTT connection that is also used for publishing the telemetry, event or command response messages. Devices can subscribe with QoS 0 only. The adapter indicates the outcome of the subscription request by sending back a corresponding SUBACK packet. The SUBACK packet will contain Success - QoS 0 (0x00) for a valid error topic filter and will contain the Failure (0x80) value for an invalid or unsupported filter. In order to again activate the default error handling behaviour, the device can send an MQTT UNSUBSCRIBE packet to the adapter, including the same topic filter that has been used to subscribe.
The following sections define the topic filters to use for subscribing to error messages and the resulting error message topic. Instead of the error topic path segment, the shorthand version e is also supported.
The following variables are used:
${endpoint-type}: The endpoint type of the device message that caused the error. Its value is either telemetry, event or the respective shorthand version. In case of a command response device message command-response or c-s is used.${correlation-id}: The identifier that may be used to correlate the error message with the device message that caused the error. The identifier is either the value of a correlation-id property bag value contained in the device message topic, or the identifier is the packet-id of the device message if it was sent with QoS 1. Otherwise, a value of -1 is used.${error-status}: The HTTP status code of the error that was caused by the device message.An authenticated device MUST use the following topic filter for subscribing to error messages:
error/[${tenant-id}]/[${device-id}]/#
Both the tenant and the device ID are optional. If specified, they MUST match the authenticated device’s tenant and/or device ID. Note that the authentication identifier used in the device’s credentials is not necessarily the same as the device ID.
The protocol adapter will publish error messages for the device to the following topic name
error/[${tenant-id}]/[${device-id}]/${endpoint-type}/${correlation-id}/${error-status}
The tenant-id and/or device-id will be included in the topic name if the tenant and/or device ID had been included in the topic filter used for subscribing to error messages.
Example
An example using the MQTT CLI that will produce an error output provided there is no downstream consumer for the device messages.
mqtt shell
con -V 3 -h [MQTT_ADAPTER_IP] -u [DEVICE]@[TENANT] -pw [PWD]
sub -t error///# --qos 0 --outputToConsole
pub -t telemetry -m '{"temp": 5}' --qos 1
Using an explicit correlation id:
pub -t telemetry/?correlation-id=123 -m '{"temp": 5}' --qos 1
An unauthenticated device MUST use the following topic filter for subscribing to error messages:
error/${tenant-id}/${device-id}/#
The protocol adapter will publish error messages for the device to the following topic name
error/${tenant-id}/${device-id}/${endpoint-type}/${correlation-id}/${error-status}
An authenticated gateway MUST use one of the following topic filters for subscribing to error messages:
| Topic Filter | Description |
|---|---|
error//+/#error/${tenant-id}/+/# |
Subscribe to error messages for all devices that the gateway is authorized to act on behalf of. |
error//${device-id}/#error/${tenant-id}/${device-id}/# |
Subscribe to error messages for a specific device that the gateway is authorized to act on behalf of. |
The protocol adapter will publish error messages for the device to the following topic name
error/[${tenant-id}]/[${device-id}]/${endpoint-type}/${correlation-id}/${error-status}
The tenant-id and/or device-id will be included in the topic name if the tenant and/or device ID had been included in the topic filter used for subscribing to error messages.
The MQTT adapter publishes error messages with a UTF-8 encoded JSON payload containing the following fields:
| Name | Mandatory | JSON Type | Description |
|---|---|---|---|
| code | yes | number | The HTTP error status code. See the table below for possible values. |
| message | yes | string | The error detail message. |
| timestamp | yes | string | The date and time the error message was published by the MQTT adapter. The value is an ISO 8601 compliant combined date and time representation in extended format. |
| correlation-id | yes | string | The identifier that may be used to correlate the error message with the device message that caused the error. The identifier is either the value of a correlation-id property bag value contained in the device message topic, or the identifier is the packet-id of the device message if it was sent with QoS 1. Otherwise a value of -1 is used. |
The error message’s code field may contain the following HTTP status codes:
| Code | Description |
|---|---|
| 400 | Bad Request, the request cannot be processed. A possible reason for this is an invalid PUBLISH topic. |
| 403 | Forbidden, the device’s registration status cannot be asserted. |
| 404 | Not Found, the device is disabled or does not exist. |
| 413 | Request Entity Too Large, the request body exceeds the maximum supported size. |
| 429 | Too Many Requests, the tenant’s message limit for the current period is exceeded. |
| 503 | Service Unavailable, the request cannot be processed. Possible reasons for this include:
|
Example payload:
{
"code": 400,
"message": "malformed topic name",
"timestamp": "2020-12-24T19:00:00+0100",
"correlation-id": "5"
}
When a device publishes a telemetry, event or command response message and there is an error processing the message, the handling of the error depends on whether there is a error topic subscription for the device and whether a on-error property bag parameter was set on the topic used for sending the message.
If no error subscription is in place and no on-error parameter was set, the default error handling behaviour is to close the MQTT connection to the device. If the device has a subscription on the error topic (on the same MQTT connection the device uses for sending messages), the default behaviour is to keep the MQTT connection open unless a terminal error happens. The errors that are classified as terminal are listed below.
The following table lists the different behaviours based on the value of the on-error property bag parameter and the existence of an error subscription:
| on-error topic parameter | Error subscription exists | Description |
|---|---|---|
| default or value not set | no | The connection to the device will get closed (like with the disconnect option). |
| disconnect | no | The connection to the device will get closed. |
| ignore | no | The error will be ignored and a PUBACK for the message that caused the error will get sent. |
| skip-ack | no | The error will be ignored and no PUBACK for the message that caused the error will get sent. |
| default or value not set | yes | After having sent an error message on the error topic, the error will be ignored and a PUBACK for the message that caused the error will get sent (like with the ignore option). |
| disconnect | yes | After having sent an error message on the error topic, the connection to the device will get closed. |
| ignore | yes | After having sent an error message on the error topic, the error will be ignored and a PUBACK for the message that caused the error will get sent. |
| skip-ack | yes | After having sent an error message on the error topic, the error will be ignored and no PUBACK for the message that caused the error will get sent. |
Example
An authenticated device wanting to have errors always be ignored can for example publish telemetry messages on this topic:
telemetry/?on-error=ignore
This protocol adapter supports transformation of messages that have been uploaded by devices before they get forwarded to downstream consumers.
This feature is useful in scenarios where devices are connected to the adapter via a gateway but the gateway is not able to include
the device ID in the topic that the gateway publishes data to. The gateway will use the plain telemetry or event topics in this case.
The message payload will usually contain the identifier of the device that the data originates from.
The same functionality can also be used to transform the payload of messages uploaded by a device. This can be used for example to transform binary encoded data into a JSON document which can be consumed more easily by downstream consumers.
The mechanism works as follows:
A client uploads a message to the MQTT adapter.
The adapter invokes the Device Registration service’s assert Registration operation using either the authenticated device’s identifier, if the topic does not contain a device ID, or the device ID from the topic.
If the assertion succeeds, the adapter creates the downstream message using the original message’s payload and the asserted device ID as the origin device.
If the assert Registration response payload contains a value for the mapper property, the adapter tries to find a mapper endpoint configuration for the given value. If a mapper endpoint with a matching name has been configured for the adapter,
The adapter forwards the downstream message.
Please refer to the Device Registry Management API for how to register a mapper for a device. Please refer to the MQTT Adapter Admin Guide for how to configure custom mapper endpoints.
The adapter includes the following meta data in messages being sent downstream:
| Name | Location | Type | Description |
|---|---|---|---|
| device_id | application | string | The identifier of the device that the message originates from. |
| orig_adapter | application | string | Contains the adapter’s type name which can be used by downstream consumers to determine the protocol adapter that the message has been received over. The MQTT adapter’s type name is hono-mqtt. |
| orig_address | application | string | Contains the name of the MQTT topic that the device has originally published the data to. |
| x-opt-retain | message-annotations | boolean | Contains true if the device has published an event or telemetry message with its retain flag set to 1 |
The adapter also considers defaults registered for the device at either the tenant or the device level. The values of the default properties are determined as follows:
Note that of the standard AMQP 1.0 message properties only the content-type and ttl can be set this way to a default value.
Events published by devices will usually be persisted by the AMQP Messaging Network in order to support deferred delivery to downstream consumers. In most cases the AMQP Messaging Network can be configured with a maximum time-to-live to apply to the events so that the events will be removed from the persistent store if no consumer has attached to receive the event before the message expires.
In order to support environments where the AMQP Messaging Network cannot be configured accordingly, the MQTT protocol adapter supports setting a downstream event message’s ttl property based on the hono-ttl property set as property-bag at the end of the event topic. Also the default ttl and max-ttl values can be configured for a tenant/device as described in the Tenant API.
The adapter uses the Tenant API to retrieve tenant specific configuration for adapter type hono-mqtt.
The following properties are (currently) supported in the Adapter object:
| Name | Type | Default Value | Description |
|---|---|---|---|
| enabled | boolean | true |
If set to false the adapter will reject all data from devices belonging to the tenant. |