Install Ubuntu Core
on an Intel IEI TANK 870

We will walk you through the steps of flashing Ubuntu Core on an Intel IEI TANK 870. At the end of this process, you will have a board ready for production or testing snaps.


Minimum requirements

  • An Intel® IEI TANK 870 with BIOS updated to the latest version (update instructions)
  • 2 USB 2.0 or 3.0 flash drives (2GB minimum)
  • A monitor with D-sub interface
  • A USB keyboard
  • A network connection with Internet access

  1. Set up an Ubuntu SSO account

    An Ubuntu SSO account is required to create the first user on an Ubuntu Core installation.

    1. Start by creating an Ubuntu SSO account.
    2. Import an SSH Key into your Ubuntu SSO account. (instructions)

  2. Download Ubuntu Core

    Download the Ubuntu Core 18 image for the Intel IEI TANK 870.

    You can then verify the integrity of the download using the associated SHA256SUMS file and the md5sum command on most Linux distributions.


  3. Prepare the two USB flash drives

    1. Download and flash an Ubuntu Desktop 24.04.1 LTS image on the first USB flash drive by following the live USB Ubuntu Desktop tutorial for Ubuntu, Windows, or macOS.
    2. Copy the Ubuntu Core image file to the second USB flash drive.

  4. Boot the live Ubuntu Desktop image

    1. Connect the keyboard and monitor to the Intel IEI TANK 870.
    2. Insert the first USB flash drive, containing Ubuntu Desktop 24.04.1 LTS.
    3. Start the device and press F7 to enter the boot menu.
    4. Select the USB flash drive as a boot option.
    5. Select "Try Ubuntu without installing".

  5. Flash Ubuntu Core to the internal memory

    1. Once the Ubuntu session has started, insert the second USB flash drive containing the Ubuntu Core image file.
    2. Open a terminal and use the following command to find out the target disk device to install the Ubuntu Core image to:

      sudo fdisk -l
    3. Run the following command, where <disk label> is the label of the second USB flash drive:

      xzcat /media/ubuntu/<disk label>/<name of the image>.img.xz | sudo dd of=/dev/<target disk device> bs=32M status=progress; sync
    4. Reboot the system and remove the flash drives when prompted. It will then boot from the internal memory where Ubuntu Core has been flashed.

  6. First boot setup

    1. The system will boot then become ready to configure.
    2. The device will display the prompt "Press enter to configure".
    3. Press enter then select "Start" to begin configuring your network and an administrator account. Follow the instructions on the screen, you will be asked to configure your network and enter your Ubuntu SSO credentials.
    4. At the end of the process, you will see your credentials to access your Ubuntu Core machine:
      This device is registered to <Ubuntu SSO email address>.
      Remote access was enabled via authentication with the SSO user <Ubuntu SSO user name>
      Public SSH keys were added to the device for remote access.

  7. Connect to the device

    Once setup is done, you can login with SSH into Ubuntu Core, from a machine on the same network, using the following command:

    ssh <Ubuntu SSO user name>@<device IP address>

    Your user name is your Ubuntu SSO user name, and the command should be displayed on the RPi.


Next steps


First boot tips

  1. During setup, console-conf will download the SSH key registered with your Store account and configure it so you can log into the device via ssh <Ubuntu SSO account name>@<device IP address> without a password.
  2. There is no default ubuntu user on these images, but you can run sudo passwd <account name> to set a password if you need a local console login.

Get started with snaps

Your board is now ready to have snaps installed, it's time to use the snap command to install your first snap.

The Snap Store is where you can find the best Linux apps packaged as snaps to install on your Ubuntu device and get started with your secure IoT journey.


Before you start, get your IoT security story straight

A recent Canonical survey of 2,000 consumers suggests that a shockingly high percentage of connected devices may be vulnerable to botnets, hackers and cyber attacks:

  • Only 31% of consumers update the firmware on their connected devices as soon as updates become available.
  • 40% of consumers have never performed firmware updates on their connected devices
  • 40% of consumers believe that performing firmware updates on their connected devices is the responsibility of either software developers or the device manufacturer
Contact information
  • All information provided will be handled in accordance with the Canonical privacy policy.

Resources