Intel Up² Quick Start
This section provides Eclipse Kura™ quick installation procedures for the Intel Up² and the Kura development environment.
This quickstart will install the version of Kura with the administrative web UI and network configuration support but not CAN support. For more information on this please visit the Eclipse Kura download page
This quickstart has been tested using the following image:
and with the image burned on an USB stick with balenaEtcher
A complete guide on how to install Ubuntu on the Intel Up² can be found here.
It is important, in order to access the HAT, Bluetooth, Wifi functionality, to follow the relative steps provided in the complete guide. Make sure to assign the right execute permissions to
kurad user created by the installer as described here: Add Groups
It is high raccomanded to install the custom Intel kernel provided in the guide.
Eclipse Kura™ Installation
To install Kura with its dependencies on the Intel Up², perform the following steps:
Boot the Raspberry Pi with the Ubuntu Image 18.04.5.
The following packages must be installed before installing Kura:
sudo apt install hostapd, isc-dhcp-server, iw, dos2unix, bind9, unzip, ethtool, telnet, bluez-hcidump,wireless-tools, chrony
Assign a static ip to the primary ethernet network interface:
nano /etc/netplan/00-installer-config.yaml network: ethernets: enp2s0: dhcp4: no addresses: - 172.16.0.1/24 enp3s0: dhcp4: true version: 2
Make sure that Java 8 is installed with
if not install OpenJDK 8 performing the following command:
sudo apt-get install openjdk-8-jre-headless
Download the Kura package with:
Note: replace <version> in the URL above with the version number of the latest release (e.g. 5.0.0).
Install Kura with:
apt install kura_<version>_intel-up2-ubuntu-18_installer.deb
- Update the Wi-Fi Regulatory Domain editing the file:
Reboot the Intel Up² with:
Kura starts on the target platform after reboot.
Kura setups a local web ui that is available using a browser via:
The browser will prompt the user to accept the connection to an endpoint with an untrusted certificate:
Once trusted the source, the user will be redirected to a login page where the default username is:
and the default password is: