Running Docker Swarm but eyeing Kubernetes? Don’t miss our free 60-min webinar
Defense Technology

Containerized workloads at the hostile edge and across defense installations

Tactical compute at the hostile edge, defense installation OT infrastructure, and autonomous maritime and aerial platforms: containerized workloads in environments where conventional tooling cannot operate.
Verticals
Defense · Military Intelligence · Government
Runtimes
Nova8 + KubeSolo · Docker · Talos
Connectivity
DDIL · commercial cellular · LEO SATCOM · LAN · air-gapped
Compliance
DADMS approved · FIPS 140-3 · TAA compliant
Deployment
100% self-hosted · 100% air-gap · no external dependencies
Supply chain
New Zealand HQ · Five Eyes · US-deemed domestic supplier

Why defense compute at the tactical edge is a distinct fleet management problem

What Portainer does here: Portainer manages containerized workloads across all deployment contexts from a single central management plane, pushing deployments and updates without requiring inbound ports at any field location. The Portainer agent buffers state locally and continues running workloads through disconnection events, making it purpose-built for DDIL environments. Portainer is DADMS approved, FIPS 140-3 compliant, TAA compliant, and is deployed across defense agencies in Five Eyes member nations. The platform is 100% self-hosted and 100% air-gap capable with no external infrastructure dependencies of any kind.

Defense and intelligence operations increasingly require containerized workloads to run at the physical point of data collection: on personnel in the field, on tactical vehicles, and at forward-deployed locations. The operational case is straightforward. Transmitting raw sensor data, imagery, and intelligence feeds back to a centralized processing facility over constrained, intermittent links consumes bandwidth that does not exist and introduces latency that is operationally unacceptable. Processing locally and transmitting only refined, decision-ready outputs changes that equation fundamentally.

The infrastructure problem this creates is less commonly understood. The field devices running these workloads operate in denied, disrupted, intermittent, and limited (DDIL) connectivity environments. The networks available are commercial: local cellular, LEO satellite uplinks, regional ISPs in austere locations. Those networks are inherently untrusted and actively monitored by adversaries. The conventional response, bolting a VPN onto the field device, requires open inbound ports, which means the device has a public IP presence that can be enumerated, scanned, and attacked. A field compute node with an exposed inbound port is a liability in a contested environment regardless of how capable the workloads running on it are.

The same problem exists at the other end of the deployment spectrum: fixed and semi-fixed defense installations running decades-old operational technology infrastructure with no centralized visibility, no early warning capability, and no management tooling that was designed for the security constraints of a defense environment. The OT devices that run power generation, HVAC, physical access control, and building management systems were not designed with network security in mind. Connecting them to any network using conventional approaches expands the attack surface rather than solving the visibility problem.

Three examples of how Portainer could help

Important: The scenarios on this page are examples of how Portainer could help in this sector. They are not Portainer customer references, partner references, or endorsed use cases. Named programs, platforms, and organizations are referenced solely on the basis of publicly available information from official government sources and published defense documentation. Portainer has no confirmed engagement, relationship, or involvement with any of the programs or organizations referenced here unless explicitly stated elsewhere. Nothing on this page should be read as implying otherwise.

Tactical edge compute (example of how Portainer could help)

Wearable compute, vehicle-mounted racks, and air-deployable field compute units at the hostile edge

Defense and intelligence operations require containerized workloads to run at the physical point of data collection: on personnel in the field, on tactical vehicles, and at forward-deployed positions. Transmitting raw sensor data over constrained, intermittent links to a centralized facility consumes bandwidth that does not exist and introduces latency that is operationally unacceptable. Processing locally and transmitting only refined, decision-ready outputs changes that equation fundamentally.

The architecture spans three hardware tiers. Wearable backpack compute runs Nova8 hardened OS, bootstrapping KubeSolo (under 200MB RAM) and auto-registering with the central Portainer instance on first connectivity. Vehicle-mounted micro-racks in Humvees and MRAPs extend the same Nova8 and KubeSolo stack with additional compute headroom, supporting heavier inference workloads and acting as local aggregation points. Air-deployable ruggedized field compute units: built to military transport specifications and compatible with C-17 and C-130 cargo configurations: run multi-node Kubernetes on Talos OS and can be brought operational within hours of reaching a forward position. All three tiers are governed from a single Portainer server at the command center. Xiid's Terniion secures the management channel on all tiers: outbound-only, triple-encrypted, process-to-process tunnels over any available commercial network. The field device has no public IP presence and cannot be enumerated by adversaries.

How Portainer could assist: Single management plane for all three tiers. Workload deployments push through Terniion-secured tunnels with no inbound port required at any field location. Offline nodes buffer state and sync on reconnection. Self-hosted end to end with no external infrastructure dependencies. Xiid Terniion carries DoD ATO and IL5 certification.
Defense installation infrastructure (example of how Portainer could help)

OT infrastructure visibility and management across fixed and semi-fixed defense installations

Defense installations run operational technology infrastructure that is in most cases decades old, proprietary, and entirely unmonitored at scale: power generation and distribution equipment, HVAC and environmental controls, physical access control, fire suppression, building management systems, and fuel monitoring. When a generator degrades or a cooling system fails, the failure is typically discovered after the fact. There is no unified visibility layer, no early warning, and no way for central facilities teams to understand the state of distributed infrastructure without dispatching personnel.

Containerized OT collector workloads deployed on small ruggedized gateway hardware adjacent to legacy PLCs and building systems (Modbus, BACnet, DNP3, PROFIBUS) collect and normalize telemetry and feed it back to a central operations dashboard. The gateway requires no modification to the underlying OT devices: it sits physically adjacent and handles all external communication on their behalf. Xiid's Terniion secures the backhaul: outbound-only SealedTunnel, no inbound exposure, legacy devices gain centralized visibility without any increase in attack surface.

How Portainer could assist: Portainer manages containerized OT collector workloads across every installation gateway centrally. Protocol driver containers can be updated, replaced, or reconfigured without physical access to field hardware. Per-installation RBAC scopes access to the relevant facilities teams, with a complete audit trail on every change. Self-hosted, FIPS 140-3 validated, and air-gap capable.
Tactical drones (example of how Portainer could help)

Containerized workloads on autonomous aerial and maritime platforms

Autonomous aerial and unmanned surface platforms require containerized AI, computer vision, mission autonomy, and sensor fusion workloads to run directly on-platform: at operational speed, with no dependency on a live communications link to a command center. The platform must continue executing its mission if that link is lost entirely.

The U.S. Navy's Unmanned Surface Vessel Squadron Three (USVRON-3), established in May 2024 at Naval Amphibious Base Coronado, is referenced here solely as a publicly documented example of where Portainer could help. Portainer has no confirmed relationship, engagement, or involvement with USVRON-3 or any associated Navy program. The squadron operates Global Autonomous Reconnaissance Craft (GARC): 16-foot autonomous surface vessels built by Maritime Applied Physics Corporation. Its personnel are designated subject matter experts in computer vision, mission autonomy, navigation autonomy, data systems, AI, and machine learning on robotic autonomous system platforms, operating at the tactical edge. The Navy's broader Modular Attack Surface Craft program explicitly specifies containerized payload solutions and open architecture standards for autonomy, perception, and C2 software, and requires vessels to continue operating autonomously if communications with the control station are lost. The operational specifics of what runs on these platforms are not publicly disclosed. What is public is the architectural requirement: containerized workloads, open standards, DDIL autonomy, and AI inference on-platform.

How Portainer could assist: Nova8 OS and KubeSolo on the autonomous platform's onboard compute, running containerized AI inference, computer vision, and autonomy workloads as a single managed stack. Portainer manages the platform's software lifecycle from a central operations instance: deploying updated models and mission software through the available comms window, with the platform operating autonomously between updates.

Three tiers of field compute, one management plane

The tactical edge architecture is organized across three hardware tiers that share a common software philosophy but differ deliberately in compute headroom, form factor, and OS stack.

Tier 1

Wearable / backpack compute

Ruggedized compute small enough to carry in a backpack. Runs Nova8 hardened OS, bootstrapping KubeSolo (single-node Kubernetes, under 200MB RAM) and auto-registering with the central Portainer instance the moment connectivity is established. Personnel in the field have zero provisioning burden. Connects via LEO satellite uplink. All traffic carried through Terniion tunnel from first contact.

Tier 2

Vehicle-mounted micro-rack

The same Nova8 and KubeSolo stack deployed as a micro-rack in Humvees, MRAPs, and other tactical platforms. Additional compute headroom supports heavier inference workloads and allows the vehicle node to act as a local aggregation point for nearby wearable devices. Connectivity over cellular and SATCOM links, with Terniion re-establishing the tunnel automatically as the vehicle moves between networks.

Tier 3

Air-deployable field compute unit

A ruggedized compute unit built to military transport specifications, compatible with C-17 and C-130 cargo configurations. Transportable to a forward position and operational within hours of landing. Runs a multi-node Kubernetes cluster on Talos OS (immutable, no SSH attack surface). Provides the heavy compute layer of the field hierarchy: multi-stream AI inference, large-scale data processing, and local aggregation for the tiers above it. Connects via the same Terniion model.

All three tiers are governed from a single Portainer server at the command center. Workload deployments push from Portainer through the Terniion tunnels to target nodes without any field device needing to expose an inbound port to receive them. Intelligence data and operational telemetry flow back up the same tunnels.

How the Portainer and Terniion stack fits together

Unified edge-to-command topology: Portainer and Xiid Terniion
Architecture diagram showing three field compute tiers connecting through Xiid Terniion SealedTunnel to a central Portainer command and control instance FIELD COMPUTE TIERS TIER 1: WEARABLE / BACKPACK Nova8 OS · KubeSolo · <200MB RAM LEO SATCOM uplink Terniion STLink agent (containerized) All inbound ports closed on startup TIER 2: VEHICLE MICRO-RACK Nova8 OS · KubeSolo · Humvee / MRAP Cellular / SATCOM · auto-reconnects Terniion STLink agent (containerized) All inbound ports closed on startup TIER 3: FIELD COMPUTE UNIT TalosOS · multi-node Kubernetes C-17/C-130 deployable · ops-ready hrs Cellular / SATCOM Terniion STLink agent (containerized) All inbound ports closed on startup INSTALLATION OT GATEWAYS Docker / KubeSolo · Modbus / BACnet Raspberry Pi CM4 / Jetson Orin Terniion STLink · outbound-only TERNIION CONNECTOR FLEET Self-hosted · on-prem · air-gap capable Outbound-only SealedTunnel Process-to-process microsegmentation Zero-knowledge relay: no node decryption Port 443 inbound only · no SaaS dependency Encryption stack L1: TLS 1.3 + ML-KEM-768 / X25519 L2: Kyber + Dilithium end-to-end L3: AES-256-GCM per-packet AEAD Exceeds CNSA 2.0 · FIPS 140-3 validated Certifications DoD Authority to Operate · IL5 cATO · FISMA · RMF ready 96% jitter reduction over DDIL links COMMAND Portainer Fleet governance All tiers · single pane of glass DoD ATO RBAC · audit trail Zero inbound ports open Self-hosted Air-gap capable No external dependencies FIPS 140-3 validated SealedTunnel: outbound-only · proc-to-proc · triple-encrypted · post-quantum · all inbound ports closed No SaaS · No third-party network dependency · Air-gap capable · Self-hosted end to end

Deployment and management in practice

1

Field device powers on and bootstraps automatically

On wearable and vehicle-tier devices, Nova8 OS handles installation, hardening, and KubeSolo configuration from a pre-staged image. The Terniion STLink agent, deployed as a container, immediately closes all inbound firewall ports on the host and initiates an outbound-only encrypted tunnel to the self-hosted Terniion Connector fleet at the command center. The field operator has zero provisioning burden. The device appears in the central Portainer fleet view within seconds of establishing connectivity, with its node status, running workloads, and available resources visible.

2

Workloads deploy from command through the tunnel

Intelligence workloads, sensor processing applications, and OT collector stacks are defined as Kubernetes manifests or Helm charts in a Git repository. Portainer's GitOps engine targets the appropriate field devices and deploys through the Terniion-secured tunnel. The field device never opens an inbound port to receive the deployment. Container images are pulled from a self-hosted registry, also accessible only through the Terniion-protected backplane. Deployment status, container health, and resource utilization are visible in the central Portainer dashboard in real time.

3

DDIL connectivity is handled transparently

Terniion was engineered specifically for degraded network environments. The STLink agent maintains session persistence across high-latency, high-packet-loss connections, reducing network jitter by up to 96% over unstable links. When a field device loses connectivity entirely, the Portainer agent buffers state locally and continues running workloads. Update instructions queued while the device was offline are delivered automatically on reconnection. No manual intervention is required at the device.

4

OT gateways provide installation visibility without exposure

For fixed and semi-fixed installation infrastructure, small ruggedized OT gateway hardware is positioned adjacent to legacy PLCs and building management systems. The gateway runs containerized protocol adapter workloads (Node-RED for Modbus/BACnet/DNP3 translation, Telegraf for metric collection) managed by Portainer, with Terniion securing the backhaul. The legacy OT device is never connected to any public network. The gateway handles all external communication on its behalf, making the underlying device non-addressable while feeding normalized telemetry to the central operations dashboard.

5

RBAC scopes access by tier, site, and function

Portainer's RBAC model maps to the organizational structure of a defense deployment. A field operations team for a specific region sees only their devices. An OT facilities team at a specific installation sees only their gateways. An application team can deploy workloads to their assigned fleet without access to the underlying infrastructure configuration. All access is audit-logged. Every deployment, configuration change, and workload restart is recorded with the user, timestamp, and outcome.

Why Portainer for defense technology deployments

DADMS approved · FIPS 140-3 compliant · TAA compliant

Portainer is listed on the DoD Approved Products List via DADMS and is FIPS 140-3 compliant and TAA compliant. These are verifiable approvals that matter in federal procurement and security assessment contexts. Deploying a DADMS-listed, FIPS 140-3 validated platform directly reduces the documentation burden for the overall system ATO, because the compliance evidence for the platform itself has already been produced and accepted.

100% self-hosted · 100% air-gap · zero external dependencies

Portainer runs entirely on hardware the agency controls, in facilities the agency controls. There is no SaaS control plane, no licensing server that requires internet connectivity, no telemetry phoning home, and no third-party infrastructure in the data path. Air-gap operation is not a feature add-on: it is the default. An agency can deploy and operate Portainer across thousands of nodes with zero external network access whatsoever. This is a non-negotiable requirement in classified and sensitive compartmented environments, and Portainer satisfies it without compromise.

TAA compliant · New Zealand HQ · Five Eyes · US-deemed domestic supplier

Portainer is headquartered in New Zealand, a Five Eyes signals intelligence partner and a US-designated friendly nation. Under the Trade Agreements Act and US procurement policy, New Zealand is treated as a domestic supplier for federal acquisitions: Portainer does not carry the supply chain risk, foreign ownership concerns, or procurement friction associated with vendors from non-allied nations. For defense procurement teams navigating supplier vetting, this matters. It removes a category of risk that many alternative platforms cannot address.

Already deployed across defense agencies in Five Eyes member nations

Portainer is in active use across defense agencies in Five Eyes member nations. The platform is not being proposed for defense use: it is already there. That operational track record in sensitive government environments is a material differentiator from platforms that are proposing a first defense deployment.

One management plane for every deployment context

A wearable node in a contested environment, a vehicle rack advancing with a ground unit, a forward-deployed field compute unit, an OT gateway at a fixed installation, and an autonomous platform operating in a denied environment all appear in the same Portainer fleet view, receive deployments through the same toolchain, and are governed by the same RBAC and audit model. There is no separate management system per deployment context, no bespoke provisioning pipeline, and no single-point-of-failure engineer who built something custom.

DDIL-native: designed for intermittent and denied connectivity

The Portainer edge agent was designed from the ground up for environments where connectivity between the field device and the central management plane is not continuous. The agent buffers state locally, continues running workloads regardless of connectivity, and syncs with the central server when connectivity resumes. Update instructions queued while a device was offline or operating in a denied environment are delivered automatically on reconnection. This is not a contingency mode: it is the baseline operational behavior.

Commercial networks replace expensive military circuits

Provisioning a dedicated DISA circuit for a new tactical site takes six to eighteen months and carries significant recurring cost. Portainer operates identically over commercial broadband, cellular, LEO satellite, or any available IP network. When used with Xiid Terniion on the first two deployment contexts above, the commercial network is treated as fully untrusted by architecture: the security posture does not depend on the underlying network's integrity. Deployment timelines drop from months to days and cost drops proportionally.

Portainer is already in defense. Let's talk about your environment.

DADMS approved, FIPS 140-3 compliant, TAA compliant, Five Eyes supply chain. If you are scoping a tactical edge compute deployment, a defense installation OT management program, or an autonomous platform software architecture, talk to a solutions engineer.

Talk to a solutions engineer

Frequently asked questions

Direct answers to questions about Portainer's suitability for defense technology deployments.

Is Portainer approved for use on DoD networks?

Portainer is listed on the DoD Approved Products List via DADMS (Defense Acquisition Data Management System). It is FIPS 140-3 compliant and TAA compliant. These are verifiable approvals. Portainer does not currently hold a DoD Authority to Operate in its own right — an ATO is issued per deployment and per environment, not per product. Portainer's DADMS listing and compliance posture materially reduce the documentation burden when pursuing a system-level ATO.

Does Portainer support fully air-gapped defense deployments?

Yes. Portainer is 100% self-hosted and 100% air-gap capable. There is no SaaS control plane, no licensing server requiring internet connectivity, and no telemetry leaving the environment. Container images are pulled from a self-hosted registry. The entire Portainer management stack runs on hardware the agency controls, in facilities the agency controls, with zero external network dependency.

Is Portainer TAA compliant? Where is it headquartered?

Yes, Portainer is TAA compliant. Portainer is headquartered in New Zealand, a Five Eyes signals intelligence partner. Under US Trade Agreements Act procurement policy and federal supplier classification, New Zealand is treated as a domestic supplier for US federal acquisitions. This removes a category of supply chain risk and procurement friction that vendors from non-allied nations cannot address.

What operating system does Portainer recommend for defense edge compute nodes?

For wearable and vehicle-mounted edge compute in hostile environments, Portainer recommends Nova8 OS (nova8technologies.com) as the hardened underlying OS, with KubeSolo as the single-node Kubernetes layer. Nova8 is purpose-built for constrained, security-sensitive edge deployments and handles OS installation, hardening, and KubeSolo configuration automatically. For heavier multi-node deployments such as forward-deployed field compute units, Talos OS with standard Kubernetes is recommended.

Can Portainer manage containerized workloads on autonomous platforms such as UAVs or unmanned surface vessels?

Portainer and KubeSolo are architecturally well-suited to autonomous platforms that require containerized AI, computer vision, and mission autonomy workloads to run on-platform with no dependency on a live communications link. KubeSolo runs on minimal hardware (under 200MB RAM), continues operating autonomously through complete disconnection events, and syncs with the central Portainer management instance when comms are available. The specifics of any actual deployment on such platforms are not disclosed here.

How does Portainer integrate with Xiid Terniion for secure management channel communications?

Xiid's Terniion SealedTunnel runs as a containerized agent alongside the Portainer agent on each field node. On startup, Terniion closes all inbound firewall ports and establishes an outbound-only, triple-encrypted, process-to-process tunnel to the self-hosted Terniion Connector fleet at the command center. Portainer management traffic, workload deployments, and telemetry all traverse this tunnel. The field device has no public IP presence and cannot be enumerated by adversaries. Terniion carries a DoD Authority to Operate and IL5 designation. This integration applies to the tactical edge compute and defense installation infrastructure scenarios on this page, not to the autonomous platform scenario.