diff --git a/public/docs-static/img/overview/personal-access-token-creation.png b/public/docs-static/img/overview/personal-access-token-creation.png index 06c2dba9..9126449c 100644 Binary files a/public/docs-static/img/overview/personal-access-token-creation.png and b/public/docs-static/img/overview/personal-access-token-creation.png differ diff --git a/public/docs-static/img/overview/personal-access-token-creation2.png b/public/docs-static/img/overview/personal-access-token-creation2.png new file mode 100644 index 00000000..06c2dba9 Binary files /dev/null and b/public/docs-static/img/overview/personal-access-token-creation2.png differ diff --git a/public/docs-static/img/overview/personal-access-token-example.png b/public/docs-static/img/overview/personal-access-token-example.png index 1c4e540c..371fbf9a 100644 Binary files a/public/docs-static/img/overview/personal-access-token-example.png and b/public/docs-static/img/overview/personal-access-token-example.png differ diff --git a/public/docs-static/img/overview/personal-access-token-example2.png b/public/docs-static/img/overview/personal-access-token-example2.png new file mode 100644 index 00000000..1c4e540c Binary files /dev/null and b/public/docs-static/img/overview/personal-access-token-example2.png differ diff --git a/public/docs-static/img/overview/personal-access-token-overview.png b/public/docs-static/img/overview/personal-access-token-overview.png index 2086a0fd..4050403c 100644 Binary files a/public/docs-static/img/overview/personal-access-token-overview.png and b/public/docs-static/img/overview/personal-access-token-overview.png differ diff --git a/public/docs-static/img/overview/personal-access-token-overview2.png b/public/docs-static/img/overview/personal-access-token-overview2.png new file mode 100644 index 00000000..2086a0fd Binary files /dev/null and b/public/docs-static/img/overview/personal-access-token-overview2.png differ diff --git a/public/docs-static/img/overview/service-user-creation.png b/public/docs-static/img/overview/service-user-creation.png index 6e36e208..7e697b58 100644 Binary files a/public/docs-static/img/overview/service-user-creation.png and b/public/docs-static/img/overview/service-user-creation.png differ diff --git a/public/docs-static/img/overview/service-user-creation2.png b/public/docs-static/img/overview/service-user-creation2.png new file mode 100644 index 00000000..6e36e208 Binary files /dev/null and b/public/docs-static/img/overview/service-user-creation2.png differ diff --git a/public/docs-static/img/overview/service-user-overview.png b/public/docs-static/img/overview/service-user-overview.png index 6049c08e..03f495d4 100644 Binary files a/public/docs-static/img/overview/service-user-overview.png and b/public/docs-static/img/overview/service-user-overview.png differ diff --git a/public/docs-static/img/overview/service-user-overview2.png b/public/docs-static/img/overview/service-user-overview2.png new file mode 100644 index 00000000..6049c08e Binary files /dev/null and b/public/docs-static/img/overview/service-user-overview2.png differ diff --git a/src/components/NavigationDocs.jsx b/src/components/NavigationDocs.jsx index 80b0f2d2..d34b857e 100644 --- a/src/components/NavigationDocs.jsx +++ b/src/components/NavigationDocs.jsx @@ -84,7 +84,7 @@ export const docsNavigation = [ { title: 'Activity', links: [ - { title: 'Activity Events', href: '/how-to/monitor-system-and-network-activity' }, + { title: 'Activity events', href: '/how-to/monitor-system-and-network-activity' }, ], }, @@ -93,7 +93,7 @@ export const docsNavigation = [ isOpen: false, links: [ {title: 'Authentication', href: '/how-to/enforce-periodic-user-authentication' }, - {title: 'Delete Account/Danger Zone', href: '/how-to/delete-account' } + {title: 'Delete account/danger zone', href: '/how-to/delete-account' } /*{title: 'Groups', href: '/about-netbird/netbird-vs-traditional-vpn' }, {title: 'Plans & Billing', href: '/about-netbird/netbird-vs-traditional-vpn' },*/ @@ -103,9 +103,9 @@ export const docsNavigation = [ title: 'Integrations', isOpen: false, links: [ - {title: 'Activity Event Streaming', href: '/how-to/activity-event-streaming' }, - {title: 'Identity Provider', href: '/how-to/idp-sync' }, - {title: 'Enable Post Quantum Cryptography', href: '/how-to/enable-post-quantum-cryptography' }, + {title: 'Activity event streaming', href: '/how-to/activity-event-streaming' }, + {title: 'Identity provider sync', href: '/how-to/idp-sync' }, + {title: 'Enable post quantum cryptography', href: '/how-to/enable-post-quantum-cryptography' }, ] }, @@ -125,7 +125,7 @@ export const docsNavigation = [ { title: 'USE CASES', links: [ - { title: 'NetBird on FaaS', href: '/how-to/netbird-on-faas' }, + { title: 'Serverless and NetBird', href: '/how-to/netbird-on-faas' }, { title: 'Routing peers and Kubernetes', href: '/how-to/routing-peers-and-kubernetes'}, { title: 'NetBird Client on AWS ECS', href: '/how-to/examples'}, ], diff --git a/src/pages/about-netbird/how-netbird-works.mdx b/src/pages/about-netbird/how-netbird-works.mdx index 1295709c..57d808e0 100644 --- a/src/pages/about-netbird/how-netbird-works.mdx +++ b/src/pages/about-netbird/how-netbird-works.mdx @@ -20,7 +20,7 @@ A **Peer** is a machine or any device that is connected to the network. It can be a Linux server running in the cloud or on-premises, a personal laptop, mobile phone, or even a Raspberry PI.

- high-level-dia + high-level-dia

With NetBird clients installed and authorized on the Management service, machines form a mesh network connecting @@ -58,7 +58,7 @@ After that, they are able to establish a connection to the new peer. The Management service runs in the cloud NetBird-managed. It can also be self-hosted.

- management-dia + management-dia

### Client Application @@ -99,7 +99,7 @@ peers need to find each other and exchange the most suitable connection candidat This is done through Signal. After a connection has been established, Signal steps out.

- signal-dia + signal-dia

@@ -116,7 +116,7 @@ In fact, we use an open-source implementation called [Coturn](https://github.com The purpose of this service is to be a "plan B" and relay traffic between peers in case a point-to-point connection isn't possible.

- relay-dia + relay-dia

diff --git a/src/pages/how-to/access-netbird-public-api.mdx b/src/pages/how-to/access-netbird-public-api.mdx index 681956ec..73ec6b2d 100644 --- a/src/pages/how-to/access-netbird-public-api.mdx +++ b/src/pages/how-to/access-netbird-public-api.mdx @@ -20,28 +20,28 @@ The most common usage scenarios: ### Creating a service user -To create a service user, you'll need to log in to your organization's account at https://app.netbird.io and navigate to the "Users" -> "Service Users" section of your account. +To create a service user, you'll need to log in to your organization's account at https://app.netbird.io and navigate to the "Team" -> "Service Users" section of your account.

- service-user-overview + service-user-overview

From there, you can create a new service user and specify a role that the user should have. User role allows read-only access, use the admin for write access.

- service-user-creation-popup + service-user-creation-popup

- +‚ It's important to keep your service users secure, as they can provide access to sensitive data and actions within your organization. You should treat your service users like you would treat your own personal account and limit the scope of access granted to the service user. ### Creating an access token -To create an access token, you'll need to log in to your account and navigate to the "Users" section and look for your user or create a [service user](#service-users) to use for your API requests. +To create an access token, you'll need to log in to your account and navigate to the "Team" section and look for your user or create a [service user](#service-users) to use for your API requests.

- personal-access-token-overview + personal-access-token-overview

From there, you can create a new token and specify expiration for the token. You won't be able to modify your token. diff --git a/src/pages/how-to/activity-event-streaming.mdx b/src/pages/how-to/activity-event-streaming.mdx index 3f05e6fa..a6aa8062 100644 --- a/src/pages/how-to/activity-event-streaming.mdx +++ b/src/pages/how-to/activity-event-streaming.mdx @@ -20,7 +20,7 @@ Before you start creating and configuring a Datadog event-streaming integration, ### Step 2: Create an event-streaming integration in NetBird - Navigate to the [Integrations » Event Streaming](https://preview.netbird.io/integrations) tab in the NetBird dashboard

- event-streaming-integration + event-streaming-integration

- Enable and configure the Datadog integration diff --git a/src/pages/how-to/add-machines-to-your-network.mdx b/src/pages/how-to/add-machines-to-your-network.mdx index 7c60435e..f572f96a 100644 --- a/src/pages/how-to/add-machines-to-your-network.mdx +++ b/src/pages/how-to/add-machines-to-your-network.mdx @@ -15,7 +15,7 @@ To add a new peer to your network follow these steps: 2. Hit `Add Peer` button

- high-level-dia + high-level-dia

3. Follow the instructions @@ -27,10 +27,9 @@ To add a new peer to your network follow these steps: 4. Refresh the Peers tab, and it will display new machines

- high-level-dia + high-level-dia

- ## What's next? Here are a few links that might be handy as you venture further into NetBird: diff --git a/src/pages/how-to/add-users-to-your-network.mdx b/src/pages/how-to/add-users-to-your-network.mdx index 96b5825f..c09adb0e 100644 --- a/src/pages/how-to/add-users-to-your-network.mdx +++ b/src/pages/how-to/add-users-to-your-network.mdx @@ -56,11 +56,11 @@ NetBird has three user roles - `Owner`, `Admin`, and `User`. The roles allow you To manage user roles, proceed to the `Users` tab and click on the user you want to update:

- high-level-dia + high-level-dia

After that, select the desired role from the dropdown:

- high-level-dia + high-level-dia

Click the `Save` button to save the changes. diff --git a/src/pages/how-to/approve-peers.mdx b/src/pages/how-to/approve-peers.mdx index d8c01158..543ecfa5 100644 --- a/src/pages/how-to/approve-peers.mdx +++ b/src/pages/how-to/approve-peers.mdx @@ -15,7 +15,7 @@ Administrators then can assess whether the peer is eligible to join the network. To enable peer approval, navigate to [Settings » Authentication](https://app.netbird.io/settings) and enable 'Peer approval'.

- peer-approval-settings + peer-approval-settings

diff --git a/src/pages/how-to/delete-account.mdx b/src/pages/how-to/delete-account.mdx index bf92508e..4e8aef63 100644 --- a/src/pages/how-to/delete-account.mdx +++ b/src/pages/how-to/delete-account.mdx @@ -9,7 +9,7 @@ To delete your NetBird organization account, you must be a user with the [owner Go to the `Settings` tab, then click on `Danger Zone`. Review the message and click on the `Delete Account` button.

- high-level-dia + high-level-dia

To confirm, click on the `Delete` button.

diff --git a/src/pages/how-to/enforce-periodic-user-authentication.mdx b/src/pages/how-to/enforce-periodic-user-authentication.mdx index 7c85d339..57a1dcc2 100644 --- a/src/pages/how-to/enforce-periodic-user-authentication.mdx +++ b/src/pages/how-to/enforce-periodic-user-authentication.mdx @@ -11,7 +11,7 @@ Every new network has this feature enabled, and the expiration period is set to Expired peers will appear in the peers' view with the status `Login required`.

- peer-needs-login.png + peer-needs-login.png

## Configure and disable expiration @@ -20,7 +20,7 @@ Go to the Web UI `Settings` tab and set the desired period in the Authentication You can also disable the expiration for the whole network in the same section.

- peer-login-expiration + peer-login-expiration

@@ -36,7 +36,7 @@ In the Peers tab of the web UI click on the peer you want to disable expiration Peers with `Expiration disabled` will be marked with a corresponding label in the Peers table.

- peer-login-expiration + peer-login-expiration

## Get started diff --git a/src/pages/how-to/getting-started.mdx b/src/pages/how-to/getting-started.mdx index fa312d6a..5209ef5c 100644 --- a/src/pages/how-to/getting-started.mdx +++ b/src/pages/how-to/getting-started.mdx @@ -20,7 +20,7 @@ Both machines are running Linux but NetBird also works on Windows, MacOS nad pop You can use your Google, GitHub or Microsoft account.

- login-to-netbird + login-to-netbird

2. After a successful login you will be redirected to the ```Peers``` screen which is empty because you don't have any peers yet. @@ -28,7 +28,7 @@ You can use your Google, GitHub or Microsoft account. The `Add peer` window should automatically pop up, but if it doesn't, click ```Add new peer``` to add a new machine.

- login-to-netbird + login-to-netbird

3. Choose your machine operating system (in our case it is ```Linux```) and proceed with the installation steps. @@ -37,16 +37,17 @@ The `Add peer` window should automatically pop up, but if it doesn't, click ```A login-to-netbird

-4. If you installed NetBird Desktop UI you can use it to connect to the network instead of running `netbird up` command. Look for `NetBird` in your application list, run it, and click `Connect`. +4. If you installed NetBird Desktop UI you can use it to connect to the network instead of running `netbird up` command. +Look for `NetBird` in your application list, run it, and click `Connect`. >

- login-to-netbird + login-to-netbird

5. At this point a browser window pops up starting a device registration process. Click confirm and follow the steps if required.

- login-to-netbird + login-to-netbird

6. On the EC2 node repeat the installation steps and run `netbird up` command. @@ -57,13 +58,13 @@ sudo netbird up 7. Copy the verification URL from the terminal output and paste it in your browser. Repeat step #5

- login-to-netbird + login-to-netbird

8. Return to ```Peers``` and you should notice 2 new machines with status ```online```

- login-to-netbird + login-to-netbird

9. To test the connection you could try pinging devices: diff --git a/src/pages/how-to/idp-sync.mdx b/src/pages/how-to/idp-sync.mdx index e91eb263..f43b7133 100644 --- a/src/pages/how-to/idp-sync.mdx +++ b/src/pages/how-to/idp-sync.mdx @@ -23,14 +23,14 @@ Before you start creating and configuring an Google Workspace application, ensur - Service account ID: `netbird` - Click `DONE`

- service-account-create + service-account-create

#### Step 2: Create service account keys - Navigate to [API Credentials](https://console.cloud.google.com/apis/credentials) page - Under `Service Accounts` click the `NetBird` to edit the service account

- edit-service-account + edit-service-account

- Take note of service account email address, we will use it in next steps @@ -50,26 +50,26 @@ Read how to manage and secure your service keys [here](https://cloud.google.com/ - description: `User and Group Management ReadOnly` - Click `CONTINUE`

- new-admin-role + new-admin-role

- Scroll down to `Admin API privileges` and add the following privileges - Users: `Read` - Groups: `Read`

- privileges-review + privileges-review

- Verify preview of assigned Admin API privileges to ensure that everything is properly configured, and then click `CREATE ROLE` - Click `Assign service accounts`, add service account email address and then click `ADD`

- assign-service-account + assign-service-account

- Click `ASSIGN ROLE` to assign service account to `User and Group Management ReadOnly` admin role

- service-account-privileges + service-account-privileges

- Navigate to [Account Settings](https://admin.google.com/ac/accountsettings/profile?hl=en_US) page and take note of `Customer ID` @@ -88,7 +88,7 @@ Before you start creating and configuring an Azure AD application, ensure that y - Name: `NetBird`

- azure-new-application + azure-new-application

@@ -100,13 +100,13 @@ Before you start creating and configuring an Azure AD application, ensure that y - In `Select permissions` select `User.Read.All` and `Group.Read.All` and click `Add permissions`

- azure-openid-permissions + azure-openid-permissions

- Click `Grant admin consent for Default Directory` and click `Yes`

- azure-grant-admin-consent + azure-grant-admin-consent

#### Step 3. Generate client secret @@ -117,7 +117,7 @@ Before you start creating and configuring an Azure AD application, ensure that y - Copy `Value` and save it as it can be viewed only once after creation.

- azure-client-secret + azure-client-secret

- Navigate to [Owner applications](https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/RegisteredApps). @@ -135,14 +135,14 @@ In this step, we will create and configure NetBird SAML 2.0 application in okta. - Sign-in method: `SAML 2.0`

- high-level-dia + high-level-dia

- Fill in the form with the following values and click `Next` - App integration name: `NetBird SCIM`

- high-level-dia + high-level-dia

- Fill in the form will the following values and click `Next` @@ -150,12 +150,12 @@ In this step, we will create and configure NetBird SAML 2.0 application in okta. - Audience URI (SP Entity ID): `http://localhost`

- high-level-dia + high-level-dia

- Select App type as `This is an internal app that we have created` and click `Finish`

- high-level-dia + high-level-dia

#### Step 2. Create Okta SCIM integration @@ -169,14 +169,14 @@ Before proceeding with this step, we need to create - Select the `NetBird SCIM` application we created earlier

- high-level-dia + high-level-dia

- Click `General` tab and in `App Settings` click `Edit` to update the settings - Tick `Enable SCIM provisioning` and click `Save`

- high-level-dia + high-level-dia

- Click `Provisioning` and under `SCIM connection` click `Edit` @@ -188,28 +188,28 @@ Before proceeding with this step, we need to create - HTTP Header Token you obtained from NetBird : `nbs_zKY09...`

- high-level-dia + high-level-dia

- Click on `Test Connector Configuration` to verify if the SCIM configuration is working. After the test is completed, make sure `Create Users`, `Update User Attributes`, and `Push Groups` were successful.

- high-level-dia + high-level-dia

- Click `Save` and then click `Provisioning` tab

- high-level-dia + high-level-dia

- Go to the `Provisioning` tab, and select the `To App` settings and click `Edit` - Enable `Create Users`, `Update User Attributes`, and `Deactivate Users` and click `Save`

- high-level-dia + high-level-dia

#### Step 4. Assign groups to application and push to NetBird @@ -220,7 +220,7 @@ access without using the groups, you can learn how to do it [here](https://help. - Go to the `Assignments` tab.

- high-level-dia + high-level-dia

- Select the `Assign` and then click `Assign to Groups` @@ -232,17 +232,17 @@ At this point, all members of the groups assigned to the application will be syn - Go to the `Push Groups` tab

- high-level-dia + high-level-dia

- Select the `Push Groups` and then click `Find groups by name` - Search groups to push and then click `Save`

- high-level-dia + high-level-dia

- The selected groups will then be synced to NetBird.

- high-level-dia + high-level-dia

diff --git a/src/pages/how-to/installation.mdx b/src/pages/how-to/installation.mdx index ced37923..0508885a 100644 --- a/src/pages/how-to/installation.mdx +++ b/src/pages/how-to/installation.mdx @@ -173,7 +173,7 @@ NetBird has an official Android application that you can download at Google Play

- playstore + playstore

@@ -220,7 +220,7 @@ If you installed the Desktop UI client, you can launch it and click on Connect. > It will open your browser, and you will be prompt for email and password. Follow the instructions.

- high-level-dia + high-level-dia

#### CLI @@ -231,7 +231,7 @@ Alternatively, you could use command line. Simply run > It will open your browser, and you will be prompt for email and password. Follow the instructions.

- high-level-dia + high-level-dia

Check connection status: diff --git a/src/pages/how-to/manage-dns-in-your-network.mdx b/src/pages/how-to/manage-dns-in-your-network.mdx index f59f6694..4235c55d 100644 --- a/src/pages/how-to/manage-dns-in-your-network.mdx +++ b/src/pages/how-to/manage-dns-in-your-network.mdx @@ -63,7 +63,7 @@ A nameserver group defines up to 2 nameservers to resolve DNS to a set of peers ### Creating a nameserver group Access the `DNS` tab, the `Namservers` section and click `Add Nameserver`.

- high-level-dia + high-level-dia

That will open a nameserver selection configuration screen where you can choose between using three predefined public nameservers or using a custom setup. @@ -116,12 +116,12 @@ To add a private DNS server that is running behind routing peers, you need to cr In the Berlin office example from previous steps, we have a peer from the `Office network` that can route traffic to the `192.168.0.32` IP, so we need to ensure that a similar network route exists:

- high-level-dia + high-level-dia

Then we need to confirm that an access rule exists to connect `Remote developers` to `Office network` group allowing port `UDP 53`:

- high-level-dia + high-level-dia

## Testing configuration diff --git a/src/pages/how-to/manage-network-access.mdx b/src/pages/how-to/manage-network-access.mdx index c5d04f3f..7cebeaba 100644 --- a/src/pages/how-to/manage-network-access.mdx +++ b/src/pages/how-to/manage-network-access.mdx @@ -69,7 +69,7 @@ If necessary, you can create new groups simply by entering new names in the inpu Once you have finished configuring the policy, click `Add Policy` to save it. You will then see your new policy in the table.

- high-level-dia + high-level-dia

@@ -85,7 +85,7 @@ If you create a new group when defining a policy, you will need to add a peer to You can assign a peer to a group by accessing the `Peers` section. Then, choose the specific peer you want to assign to a group. Click on the `Assigned Groups` select box and select the group(s) you wish to assign to this peer.

- high-level-dia + high-level-dia

diff --git a/src/pages/how-to/manage-posture-checks.mdx b/src/pages/how-to/manage-posture-checks.mdx index e1c83c2b..2d27bfcc 100644 --- a/src/pages/how-to/manage-posture-checks.mdx +++ b/src/pages/how-to/manage-posture-checks.mdx @@ -84,7 +84,7 @@ higher to connect and access network resources. Access the `Access Control` tab, then the `Posture Checks` section, and click `Create Posture Check`.

- high-level-dia + high-level-dia

@@ -119,7 +119,7 @@ Click `Continue`, fill out the form with the following information, and click `C Navigate to the `Access Control` tab and select the `Policies` section.

- high-level-dia + high-level-dia

Choose the policy to which you want to assign the posture check. This will open the policy update screen. Then, diff --git a/src/pages/how-to/monitor-system-and-network-activity.mdx b/src/pages/how-to/monitor-system-and-network-activity.mdx index 0bb6c872..2d2be1b5 100644 --- a/src/pages/how-to/monitor-system-and-network-activity.mdx +++ b/src/pages/how-to/monitor-system-and-network-activity.mdx @@ -10,7 +10,7 @@ Activity monitoring is enabled by default for every network, and you can access You can also use the search bar to filter events by activity type.

- activity-monitoring + activity-monitoring

@@ -19,9 +19,11 @@ You can also use the search bar to filter events by activity type. - The unknown name or unknown@unknown.com e-mail address. - In the activity event store, the system keeps the deleted user information encrypted. If the encryption key has been corrupted or lost, then the events returned by the API could show "unknown@unknown.com" for the e-mail address field and "unknown" for the name field. - If the configuration files have been generated by the configure.sh script, you can find the previous encryption key in the backup files in the same folder as the script. Look for the DataStoreEncryptionKey field in the management.json backup file. + The `unknown`name or `unknown@unknown.com` e-mail address. + In the activity event store, the system keeps the deleted user information encrypted. If the encryption key has been corrupted or lost, + then the events returned by the API could show as `unknown@unknown.com` for the e-mail address field and as `unknown` for the name field. + If the configuration files have been generated by the `configure.sh` script, you can find the previous encryption key in + the backup files in the same folder as the script. Look for the DataStoreEncryptionKey field in the `management.json` backup file. ## Get started diff --git a/src/pages/how-to/netbird-on-faas.mdx b/src/pages/how-to/netbird-on-faas.mdx index 2153fc07..74f320aa 100644 --- a/src/pages/how-to/netbird-on-faas.mdx +++ b/src/pages/how-to/netbird-on-faas.mdx @@ -1,5 +1,5 @@ -# Running NetBird on FaaS environments +# Running NetBird on serverless environments (FaaS) Function as a Service (FaaS) is a cloud computing model where developers deploy small, specific-purpose code functions, managed by a cloud provider. FaaS environments, however, impose restrictions like limited access to the system's root, kernel, and network stack, crucial for security in shared cloud infrastructure. diff --git a/src/pages/how-to/register-machines-using-setup-keys.mdx b/src/pages/how-to/register-machines-using-setup-keys.mdx index c8c5c52f..2131442f 100644 --- a/src/pages/how-to/register-machines-using-setup-keys.mdx +++ b/src/pages/how-to/register-machines-using-setup-keys.mdx @@ -28,7 +28,7 @@ Setup keys are available in the NetBird Management Dashboard under the `Setup Ke You can easily add new or revoke keys.

- high-level-dia + high-level-dia

@@ -59,7 +59,7 @@ To add `Auto-assign groups`, open the `Setup Keys` tab and create or update any Then use this key to enroll new machine.

- high-level-dia + high-level-dia

diff --git a/src/pages/how-to/routing-peers-and-kubernetes.mdx b/src/pages/how-to/routing-peers-and-kubernetes.mdx index f6be2b65..19c1b89f 100644 --- a/src/pages/how-to/routing-peers-and-kubernetes.mdx +++ b/src/pages/how-to/routing-peers-and-kubernetes.mdx @@ -139,7 +139,7 @@ kubectl logs -l app=netbird You can also verify that the agent is connected to the NetBird management dashboard by checking the dashboard.

- k8s-netbird-agent-connected + k8s-netbird-agent-connected

## Conclusion diff --git a/src/pages/how-to/routing-traffic-to-private-networks.mdx b/src/pages/how-to/routing-traffic-to-private-networks.mdx index 9394404a..83c6d53e 100644 --- a/src/pages/how-to/routing-traffic-to-private-networks.mdx +++ b/src/pages/how-to/routing-traffic-to-private-networks.mdx @@ -15,7 +15,7 @@ NetBird provides fast and reliable end-to-end encryption between peers in your n In these cases, you can configure network routes assigning routing peers to connect existing infrastructure. Routing peers will forward packets between your NetBird peers and your other networks; they can masquerade traffic going to your data centers or embedded devices, reducing the need for external route configuration and agent installation.

- high-level-dia + high-level-dia

@@ -65,7 +65,7 @@ A network route describes a network you want to connect with your NetBird peers. Access the `Network Routes` tab and click the `Add Route` button to create a new route. That will open a route configuration screen where you can add the information about the network you want to route:

- high-level-dia + high-level-dia

Now you can enter the details of your route. @@ -84,7 +84,7 @@ In the example below, we are creating a route with the following information: Once you fill in the route information, you can click on the `Add Route` button to save your new route.

- high-level-dia + high-level-dia

Done! Now every peer connected to your routing peer will be able to send traffic to your external network. @@ -100,7 +100,7 @@ Groups with multiple peers automatically provide [high availability routing](#hi Once you fill in the route information, you can click on the `Add Route` button to save your new route.

- high-level-dia + high-level-dia

Done! Now every peer connected to the peer member of the groups will be able to send traffic to your external network. @@ -127,7 +127,7 @@ In the following example, we are adding the peer `aws-nb-europe-router-az-b` to This way, peers connected to `aws-nb-europe-router-az-a` and `aws-nb-europe-router-az-b` will have highly available access to the `172.31.0.0/16` network.

- high-level-dia + high-level-dia

@@ -148,7 +148,7 @@ the `aws-nb-europe-router-az-a` routing peer to access the `aws-eu-central-1-vpc While peers that belong to the `london-office` group will use the `aws-nb-europe-router-az-b` routing peer.

- high-level-dia + high-level-dia

### Routes without masquerading @@ -159,7 +159,7 @@ That will require a routing configuration on your external network router pointi This way, devices that don't have the agent installed can communicate with your NetBird peers.

- high-level-dia + high-level-dia

## Get started diff --git a/src/styles/tailwind.css b/src/styles/tailwind.css index f2398a09..ff6f8650 100644 --- a/src/styles/tailwind.css +++ b/src/styles/tailwind.css @@ -43,6 +43,13 @@ box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); border-radius: 4px; overflow:hidden; + width: 70%; +} + +.imagewrapper-big { + box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); + border-radius: 4px; + overflow:hidden; } .videowrapper {