Install Ubuntu Core
We will walk you through the steps of flashing Ubuntu Core on an Intel NUC. At the end of this process, you will have a board ready for production or testing snaps.
- An Ubuntu SSO account with an SSH key
- An Intel NUC with BIOS updated to the latest version (update instructions)
- 2 USB 2.0 or 3.0 flash drives (2GB minimum)
- A monitor with an HDMI interface
- A Mini HDMI to HDMI cable
- A USB keyboard and a mouse
- A monitor with VGA or HDMI interface
- A VGA or HDMI cable
- A network connection with Internet access
- An Ubuntu Desktop 20.04.1 LTS image
- An Ubuntu Core image
Set up an Ubuntu SSO account
Download Ubuntu Core
This image is certified for the Dawson Canyon NUC models: NUC7i7DNHE, NUC7i7DNKE, NUC7i7DNBE, NUC7i5DNHE, NUC7i5DNKE, NUC7i5DNBE, NUC7i3DNHE, NUC7i3DNKE, and NUC7i3DNBE, and for the June Canyon NUC models: NUC7PJYH and NUC7CJYH
You can then verify the integrity of the download using the associated MD5SUM file and the
md5sumcommand on most Linux distributions.
Flash the USB drives
Install Ubuntu Core
- Connect your USB hub, keyboard, mouse, monitor to the NUC.
- Insert the first USB flash drive, containing Ubuntu Desktop 20.04.1 LTS.
- Connect the USB hub, keyboard, mouse and the monitor to the NUC.
- Insert the Live USB Ubuntu Desktop flash drive in the NUC.
Boot from the Live USB flash drive
- Start the NUC and push F10 to enter the boot menu.
- Select the USB flash drive as a boot option.
- Select "Try Ubuntu without installing”.
Flash Ubuntu Core
- Once the Ubuntu session has started, insert the second USB flash drive containing the Ubuntu Core image file.
Open a terminal and use the following command to find out the target disk device to install the Ubuntu Core image to:
sudo fdisk -l
Run the following command, where
<disk label>is the label of the second USB flash drive:
xzcat /media/ubuntu/<disk label>/dawson-uc18-m7-20190122-10.img.xz | sudo dd of=/dev/<target disk device> bs=32M status=progress; sync
- Reboot the system and remove the flash drives when prompted. It will then boot from the internal memory where Ubuntu Core has been flashed.
First boot setup
- The system will boot then become ready to configure.
- The device will display the prompt “Press enter to configure”.
- Press enter then select “Start” to begin configuring your network and an administrator account. Follow the instructions on the screen, you will be asked to configure your network and enter your Ubuntu SSO credentials.
At the end of the process, you will see your credentials to access your Ubuntu Core machine:
This device is registered to <Ubuntu SSO email address>. Remote access was enabled via authentication with the SSO user <Ubuntu SSO user name> Public SSH keys were added to the device for remote access.
Once setup is done, you can login with SSH into Ubuntu Core, from a machine on the same network, using the following command:
ssh <Ubuntu SSO user name>@<device IP address>
Your user name is your Ubuntu SSO user name, it has been reminded to you at the end of the account configuration step.
First boot tips
- During setup,
console-confwill download the SSH key registered with your Store account and configure it so you can log into the device via
ssh <Ubuntu SSO account name>@<device IP address>without a password.
- There is no default
ubuntuuser on these images, but you can run
sudo passwd <account name>to set a password if you need a local console login.
Get started with snaps
Your board is now ready to have snaps installed, it’s time to use the snap command to install your first snap.
The Snap Store is where you can find the best Linux apps packaged as snaps to install on your Ubuntu device and get started with your secure IoT journey.
Before you start, get your IoT security story straight
A recent Canonical survey of 2,000 consumers suggests that a shockingly high percentage of connected devices may be vulnerable to botnets, hackers and cyber attacks:
- Only 31% of consumers update the firmware on their connected devices as soon as updates become available.
- 40% of consumers have never performed firmware updates on their connected devices
- 40% of consumers believe that performing firmware updates on their connected devices is the responsibility of either software developers or the device manufacturer