We have just started using MQTT on our cr350 dataloggers to publish a data table to AWS every 5 minutes. In addition, the station state is published every 1 minute. The data is being published OK, and we can retreive it OK. We noticed a huge increase in cell data use. I monitored the MQTT state field on the datalogger and discovered that the TLS handshake is occurring on EVERY publish, and the MQTT session gets re-established each time. Has anyone solved a similar problem? Is there a setting somewhere to avoid this unnecessary TLS overhead?
It seems you’re facing repeated TLS handshakes, causing high data usage. A few suggestions:
Could you share more details like logs or current configurations? The community can help troubleshoot further!
I consulted with one of the OS engineers here at Campbell's about your question and got the following reply. Basically, the CR350 should maintain the MQTT session unless the datalogger program has configured it not to. The TLS stack in the datalogger does not support TLS session resumption so a new TLLS negotiation must take place each time that a new connection is made.
The logger should keep the TLS connection open unless programmed to close it. Aspen does not work this way but the loggers should.