mirror of
https://github.com/fosrl/docs-v2.git
synced 2026-02-08 05:56:45 +00:00
491 lines
15 KiB
Plaintext
491 lines
15 KiB
Plaintext
---
|
|
title: "Configure Sites"
|
|
description: "Configure Newt for connecting to Pangolin sites"
|
|
---
|
|
|
|
## Flags
|
|
|
|
<ResponseField name="id" type="string" required>
|
|
Newt ID generated by Pangolin to identify the client.
|
|
|
|
**Example**: `31frd0uzbjvp721`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="secret" type="string" required>
|
|
A unique secret used to authenticate the client ID with the websocket.
|
|
|
|
**Example**: `h51mmlknrvrwv8s4r1i210azhumt6isgbpyavxodibx1k2d6`
|
|
|
|
<Warning>
|
|
Keep this secret private and secure. It's used for authentication.
|
|
</Warning>
|
|
</ResponseField>
|
|
|
|
<ResponseField name="endpoint" type="string" required>
|
|
The endpoint where both Gerbil and Pangolin reside for websocket connections.
|
|
|
|
**Example**: `https://pangolin.example.com`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="mtu" type="integer">
|
|
MTU for the internal WireGuard interface.
|
|
|
|
**Default**: `1280`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="dns" type="string">
|
|
DNS server to use for resolving the endpoint.
|
|
|
|
**Default**: `9.9.9.9`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="log-level" type="string">
|
|
The log level to use for Newt output.
|
|
|
|
**Options**: `DEBUG`, `INFO`, `WARN`, `ERROR`, `FATAL`
|
|
|
|
**Default**: `INFO`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="ping-interval" type="string">
|
|
Interval for pinging the server.
|
|
|
|
**Default**: `3s`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="ping-timeout" type="string">
|
|
Timeout for each ping.
|
|
|
|
**Default**: `5s`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="docker-socket" type="string">
|
|
Set the Docker socket path for container discovery integration.
|
|
|
|
**Example**: `/var/run/docker.sock`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="docker-enforce-network-validation" type="boolean">
|
|
Validate the container target is on the same network as the Newt process.
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="health-file" type="string">
|
|
Check if connection to WireGuard server (Pangolin) is ok. Creates a file if ok, removes it if not ok. Can be used with Docker healthcheck to restart Newt.
|
|
|
|
**Example**: `/tmp/healthy`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="updown" type="string">
|
|
Script to be called when targets are added or removed.
|
|
|
|
**Example**: `/path/to/updown.sh`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="blueprint-file" type="string">
|
|
Path to blueprint file to define Pangolin resources and configurations.
|
|
|
|
**Example**: `/path/to/blueprint.yaml`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="no-cloud" type="boolean">
|
|
Don't fail over to the cloud when using managed nodes in Pangolin Cloud.
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="disable-clients" type="boolean">
|
|
Disable clients on the WireGuard interface.
|
|
|
|
**Default**: `false` (clients enabled)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="native" type="boolean">
|
|
Use native WireGuard interface (requires WireGuard kernel module and Linux, must run as root).
|
|
|
|
**Default**: `false` (uses userspace netstack)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="interface" type="string">
|
|
Name of the WireGuard interface.
|
|
|
|
**Default**: `newt`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="metrics" type="boolean">
|
|
Enable Prometheus /metrics exporter.
|
|
|
|
**Default**: `true`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="otlp" type="boolean">
|
|
Enable OTLP exporters (metrics/traces) to OTEL_EXPORTER_OTLP_ENDPOINT.
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="metrics-admin-addr" type="string">
|
|
Admin/metrics bind address.
|
|
|
|
**Default**: `127.0.0.1:2112`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="metrics-async-bytes" type="boolean">
|
|
Enable async bytes counting (background flush; lower hot path overhead).
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="region" type="string">
|
|
Optional region resource attribute for telemetry and metrics.
|
|
|
|
**Example**: `us-west-2`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="enforce-hc-cert" type="boolean">
|
|
Enforce certificate validation for health checks.
|
|
|
|
**Default**: `false` (accepts any cert)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="tls-client-cert-file" type="string">
|
|
Path to client certificate file (PEM/DER format) for mTLS.
|
|
|
|
**Example**: `/path/to/client.crt`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="tls-client-key" type="string">
|
|
Path to client private key file (PEM/DER format) for mTLS.
|
|
|
|
**Example**: `/path/to/client.key`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="tls-client-ca" type="string">
|
|
Path to CA certificate file for validating remote certificates (can be specified multiple times).
|
|
|
|
**Example**: `/path/to/ca.crt`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="tls-client-cert" type="string">
|
|
Path to client certificate (PKCS12 format) - DEPRECATED: use `--tls-client-cert-file` and `--tls-client-key` instead.
|
|
|
|
**Example**: `/path/to/client.p12`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="prefer-endpoint" type="string">
|
|
Prefer this endpoint for the connection (if set, will override the endpoint from the server).
|
|
|
|
**Example**: `https://preferred.endpoint.com`
|
|
</ResponseField>
|
|
|
|
## Environment Variables
|
|
|
|
All CLI arguments can be set using environment variables as an alternative to command line flags. Environment variables are particularly useful when running Newt in containerized environments.
|
|
|
|
<Note>
|
|
When both environment variables and CLI arguments are provided, CLI arguments take precedence.
|
|
</Note>
|
|
|
|
<ResponseField name="PANGOLIN_ENDPOINT" type="string">
|
|
Endpoint of your Pangolin server (equivalent to `--endpoint`)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="NEWT_ID" type="string">
|
|
Newt ID generated by Pangolin (equivalent to `--id`)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="NEWT_SECRET" type="string">
|
|
Newt secret for authentication (equivalent to `--secret`)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="MTU" type="integer">
|
|
MTU for the internal WireGuard interface (equivalent to `--mtu`)
|
|
|
|
**Default**: `1280`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="DNS" type="string">
|
|
DNS server to use for resolving the endpoint (equivalent to `--dns`)
|
|
|
|
**Default**: `9.9.9.9`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="CONFIG_FILE" type="string">
|
|
Load the config JSON from this file instead of in the home folder.
|
|
</ResponseField>
|
|
|
|
<ResponseField name="BLUEPRINT_FILE" type="string">
|
|
Path to blueprint file to define Pangolin resources and configurations (equivalent to `--blueprint-file`).
|
|
</ResponseField>
|
|
|
|
<ResponseField name="NO_CLOUD" type="boolean">
|
|
Don't fail over to the cloud when using managed nodes in Pangolin Cloud (equivalent to `--no-cloud`).
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="LOG_LEVEL" type="string">
|
|
Log level (equivalent to `--log-level`)
|
|
|
|
**Default**: `INFO`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="DOCKER_SOCKET" type="string">
|
|
Path to Docker socket for container discovery (equivalent to `--docker-socket`)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="PING_INTERVAL" type="string">
|
|
Interval for pinging the server (equivalent to `--ping-interval`)
|
|
|
|
**Default**: `3s`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="PING_TIMEOUT" type="string">
|
|
Timeout for each ping (equivalent to `--ping-timeout`)
|
|
|
|
**Default**: `5s`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="UPDOWN_SCRIPT" type="string">
|
|
Path to updown script for target add/remove events (equivalent to `--updown`)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="DOCKER_ENFORCE_NETWORK_VALIDATION" type="boolean">
|
|
Validate container targets are on same network (equivalent to `--docker-enforce-network-validation`)
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="HEALTH_FILE" type="string">
|
|
Path to health file for connection monitoring (equivalent to `--health-file`)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="DISABLE_CLIENTS" type="boolean">
|
|
Disable clients on the WireGuard interface (equivalent to `--disable-clients`).
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="USE_NATIVE_INTERFACE" type="boolean">
|
|
Use native WireGuard interface (Linux only, equivalent to `--native`)
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="INTERFACE" type="string">
|
|
Name of the WireGuard interface (equivalent to `--interface`)
|
|
|
|
**Default**: `newt`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="NEWT_METRICS_PROMETHEUS_ENABLED" type="boolean">
|
|
Enable Prometheus /metrics exporter (equivalent to `--metrics`).
|
|
|
|
**Default**: `true`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="NEWT_METRICS_OTLP_ENABLED" type="boolean">
|
|
Enable OTLP exporters (metrics/traces) to OTEL_EXPORTER_OTLP_ENDPOINT (equivalent to `--otlp`).
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="NEWT_ADMIN_ADDR" type="string">
|
|
Admin/metrics bind address (equivalent to `--metrics-admin-addr`).
|
|
|
|
**Default**: `127.0.0.1:2112`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="NEWT_METRICS_ASYNC_BYTES" type="boolean">
|
|
Enable async bytes counting (background flush; lower hot path overhead, equivalent to `--metrics-async-bytes`).
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="NEWT_REGION" type="string">
|
|
Optional region resource attribute for telemetry and metrics (equivalent to `--region`).
|
|
</ResponseField>
|
|
|
|
<ResponseField name="ENFORCE_HC_CERT" type="boolean">
|
|
Enforce certificate validation for health checks (equivalent to `--enforce-hc-cert`).
|
|
|
|
**Default**: `false`
|
|
</ResponseField>
|
|
|
|
<ResponseField name="TLS_CLIENT_CERT" type="string">
|
|
Path to client certificate file (PEM/DER format) for mTLS (equivalent to `--tls-client-cert-file`)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="TLS_CLIENT_KEY" type="string">
|
|
Path to client private key file (PEM/DER format) for mTLS (equivalent to `--tls-client-key`)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="TLS_CLIENT_CAS" type="string">
|
|
Comma-separated list of CA certificate file paths for validating remote certificates (equivalent to multiple `--tls-client-ca` flags)
|
|
</ResponseField>
|
|
|
|
<ResponseField name="TLS_CLIENT_CERT_PKCS12" type="string">
|
|
Path to client certificate (PKCS12 format) - DEPRECATED: use `TLS_CLIENT_CERT` and `TLS_CLIENT_KEY` instead
|
|
</ResponseField>
|
|
|
|
## Loading secrets from files
|
|
|
|
You can use `CONFIG_FILE` to define a location of a config file to store the credentials between runs.
|
|
|
|
```
|
|
$ cat ~/.config/newt-client/config.json
|
|
{
|
|
"id": "spmzu8rbpzj1qq6",
|
|
"secret": "f6v61mjutwme2kkydbw3fjo227zl60a2tsf5psw9r25hgae3",
|
|
"endpoint": "https://app.pangolin.net",
|
|
"tlsClientCert": ""
|
|
}
|
|
```
|
|
|
|
This file is also written to when newt first starts up. So you do not need to run every time with --id and secret if you have run it once!
|
|
|
|
Default locations:
|
|
|
|
- **macOS**: `~/Library/Application Support/newt-client/config.json`
|
|
- **Windows**: `%PROGRAMDATA%\newt\newt-client\config.json`
|
|
- **Linux/Others**: `~/.config/newt-client/config.json`
|
|
|
|
### Docker Socket Integration
|
|
|
|
Newt can integrate with the Docker socket to provide remote inspection of Docker containers. This allows Pangolin to query and retrieve detailed information about containers running on the Newt client, including metadata, network configuration, port mappings, and more.
|
|
|
|
**Configuration:**
|
|
|
|
You can specify the Docker socket path using the `--docker-socket` CLI argument or by setting the `DOCKER_SOCKET` environment variable. If the Docker socket is not available or accessible, Newt will gracefully disable Docker integration and continue normal operation.
|
|
|
|
Supported values include:
|
|
|
|
- Local UNIX socket (default):
|
|
>You must mount the socket file into the container using a volume, so Newt can access it.
|
|
|
|
`unix:///var/run/docker.sock`
|
|
|
|
- TCP socket (e.g., via Docker Socket Proxy):
|
|
|
|
`tcp://localhost:2375`
|
|
|
|
- HTTP/HTTPS endpoints (e.g., remote Docker APIs):
|
|
|
|
`http://your-host:2375`
|
|
|
|
- SSH connections (experimental, requires SSH setup):
|
|
|
|
`ssh://user@host`
|
|
|
|
|
|
```yaml
|
|
services:
|
|
newt:
|
|
image: fosrl/newt
|
|
container_name: newt
|
|
restart: unless-stopped
|
|
volumes:
|
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
|
environment:
|
|
- PANGOLIN_ENDPOINT=https://example.com
|
|
- NEWT_ID=2ix2t8xk22ubpfy
|
|
- NEWT_SECRET=nnisrfsdfc7prqsp9ewo1dvtvci50j5uiqotez00dgap0ii2
|
|
- DOCKER_SOCKET=unix:///var/run/docker.sock
|
|
```
|
|
|
|
<Note>
|
|
If the Docker socket is not available or accessible, Newt will gracefully disable Docker integration and continue normal operation.
|
|
</Note>
|
|
|
|
#### Hostnames vs IPs
|
|
|
|
When the Docker Socket Integration is used, depending on the network which Newt is run with, either the hostname (generally considered the container name) or the IP address of the container will be sent to Pangolin:
|
|
|
|
- **Running in Network Mode 'host'**: IP addresses will be used
|
|
- **Running in Network Mode 'bridge'**: IP addresses will be used
|
|
- **Running in docker-compose without a network specification**: Docker compose creates a network for the compose by default, hostnames will be used
|
|
- **Running on docker-compose with defined network**: Hostnames will be used
|
|
|
|
#### Docker Enforce Network Validation
|
|
|
|
When run as a Docker container, Newt can validate that the target being provided is on the same network as the Newt container and only return containers directly accessible by Newt. Validation will be carried out against either the hostname/IP Address and the Port number to ensure the running container is exposing the ports to Newt.
|
|
|
|
<Warning>
|
|
If the Newt container is run with a network mode of `host`, this feature will not work. Running in `host` mode causes the container to share its resources with the host machine, making it impossible to retrieve specific host container information for network validation.
|
|
</Warning>
|
|
|
|
**Configuration:**
|
|
|
|
Validation is `false` by default. It can be enabled via setting the `--docker-enforce-network-validation` CLI argument or by setting the `DOCKER_ENFORCE_NETWORK_VALIDATION` environment variable.
|
|
|
|
### Updown Scripts
|
|
|
|
You can pass in an updown script for Newt to call when it is adding or removing a target:
|
|
|
|
```bash
|
|
--updown "python3 test.py"
|
|
```
|
|
|
|
The script will be called with arguments when a target is added or removed:
|
|
|
|
```bash
|
|
python3 test.py add tcp localhost:8556
|
|
python3 test.py remove tcp localhost:8556
|
|
```
|
|
|
|
<Info>
|
|
Returning a string from the script in the format of a target (`ip:dst` so `10.0.0.1:8080`) will override the target and use this value instead to proxy.
|
|
</Info>
|
|
|
|
<Note>
|
|
You can look at `updown.py` as a reference script to get started!
|
|
</Note>
|
|
|
|
### mTLS Authentication
|
|
|
|
Newt supports mutual TLS (mTLS) authentication if the server is configured to request a client certificate. You can use either a PKCS12 (.p12/.pfx) file or split PEM files for the client cert, private key, and CA.
|
|
|
|
#### Option 1: PKCS12 (Legacy)
|
|
|
|
<Note>
|
|
This is the original method and still supported.
|
|
</Note>
|
|
|
|
**Requirements:**
|
|
- File must contain:
|
|
- Client private key
|
|
- Public certificate
|
|
- CA certificate
|
|
- Encrypted `.p12` files are **not supported**
|
|
|
|
**Example:**
|
|
|
|
```bash
|
|
newt \
|
|
--id 31frd0uzbjvp721 \
|
|
--secret h51mmlknrvrwv8s4r1i210azhumt6isgbpyavxodibx1k2d6 \
|
|
--endpoint https://example.com \
|
|
--tls-client-cert ./client.p12
|
|
```
|
|
|
|
#### Option 2: Split PEM Files (Preferred)
|
|
|
|
You can now provide separate files for:
|
|
|
|
- `--tls-client-cert-file`: client certificate (`.crt` or `.pem`)
|
|
- `--tls-client-key`: client private key (`.key` or `.pem`)
|
|
- `--tls-client-ca`: CA cert to verify the server (can be specified multiple times)
|
|
|
|
**Example:**
|
|
|
|
```bash
|
|
newt \
|
|
--id 31frd0uzbjvp721 \
|
|
--secret h51mmlknrvrwv8s4r1i210azhumt6isgbpyavxodibx1k2d6 \
|
|
--endpoint https://example.com \
|
|
--tls-client-cert-file ./client.crt \
|
|
--tls-client-key ./client.key \
|
|
--tls-client-ca ./ca.crt
|
|
```
|