Skip to content

docs(peers): add bootstrap via config file guide#731

Open
SunsetDrifter wants to merge 1 commit intomainfrom
docs/headless-deployments
Open

docs(peers): add bootstrap via config file guide#731
SunsetDrifter wants to merge 1 commit intomainfrom
docs/headless-deployments

Conversation

@SunsetDrifter
Copy link
Copy Markdown
Contributor

Summary

  • New page at /manage/peers/bootstrap-via-config-file covering how to pre-populate default.json so NetBird peers come up with the right settings on first start in IaC, Docker, and Kubernetes deployments.
  • Documents file location across OSes (Linux/macOS, Windows, Docker volume), common keys with explicit guidance to leave PrivateKey empty and treat PreSharedKey as optional (WireGuard PSKs are not auto-generated), and the recommendation to derive a template by bootstrapping one peer manually on the target version.
  • Worked runtime-injection examples for NB_SETUP_KEY via Docker -e and Kubernetes ConfigMap + Secret.
  • Backup section explains the hazard: default.json carries the peer's WireGuard private key, and a cloned identity is rejected by management while the original peer is still connected. Recommends re-registration via setup keys, with Ephemeral Peers for short-lived workloads.
  • Verification section covers netbird status --check live|ready|startup, netbird status --json, and fleet-wide GET /api/peers checks (with a pointer to service users + PATs).
  • Includes a callout that this workflow is for unattended workloads only — end-user devices should still enroll via the SSO flow so Zero Trust can re-verify the user identity.
  • Linked from Manage NetBird → Peers in the sidebar, immediately after Setup Keys.

New page covering how to pre-populate default.json so NetBird peers
register with the right settings on first start in IaC, Docker, and
Kubernetes deployments. Documents file location across OSes, common
keys (with guidance to leave PrivateKey empty and treat PreSharedKey
as optional), runtime setup-key injection with worked Docker and
Kubernetes ConfigMap + Secret examples, backup hazards around the
embedded WireGuard private key, and how to verify registration via
netbird status --check startup, --json, and GET /api/peers.

Includes a callout that this workflow is for unattended workloads
only -- end-user devices should still enroll via the SSO flow so
Zero Trust can re-verify the user identity.

Linked from Manage NetBird -> Peers, right after Setup Keys.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant