Documentation Index
Fetch the complete documentation index at: https://docs.pangolin.net/llms.txt
Use this file to discover all available pages before exploring further.
Try free on Pangolin Cloud
Fastest way to get started with Pangolin using the hosted control plane. No credit card required.
README
values.yaml
values.schema.json
Version context
This page is aligned with the Newt Helm chart1.4.0.
| Item | Value |
|---|---|
| Chart version | 1.4.0 |
| App version | 1.12.3 |
| Kubernetes version | >=1.30.14-0 |
| Default image | docker.io/fosrl/newt:1.12.3 |
1.4.0 also publishes the Newt image metadata for Docker Hub and GHCR and includes Artifact Hub signing metadata.
Configuration sections
Image and global defaults
Image and global defaults
Use Recommendations:
global.image to control the Newt container image used by all instances.- Leave
tagempty to use the chartappVersion. - Use
digestwhen you need immutable image pinning. - Use
imagePullSecretswhen pulling from a private registry. - Use per-instance overrides only when
allowGlobalOverrideis enabled for that instance.
Namespace and Pod Security Admission
Namespace and Pod Security Admission
The chart can render Namespace resources, including Pod Security Admission labels.Recommended production pattern:Example namespace labels:Per-instance namespace overrides are available when
- Create the namespace manually.
- Apply required Pod Security Admission labels or policy labels.
- Install the chart into that namespace.
allowGlobalOverride: true is set:Creating the namespace manually is recommended when your cluster uses Pod Security Admission, policy labels, admission webhooks, or namespace annotations.
Credentials and authentication
Credentials and authentication
For production, use an existing Kubernetes Secret.Create the Secret before installing the chart:The default Secret keys are:Use Chart
auth.keys.* only when your Secret uses different key names:auth.keys.* are Secret key names, not credential values.Inline credentials are supported, but should only be used for local testing:1.4.0 also includes auth.createSecret and auth.envVarsDirect modes for generated Secret and direct environment-variable workflows. Use these only when they match your operational model.Provisioning
Provisioning
Provisioning supports installs where Newt bootstraps credentials from a provisioning key.Use provisioning when Newt should bootstrap credentials from a provisioning key instead of using a static Provisioning requires writable config persistence so Newt can store the generated configuration.For durable storage, use an existing PVC:You can also provide a provisioning blueprint:
NEWT_ID and NEWT_SECRET.Instance runtime settings
Instance runtime settings
Each Newt instance is configured under Key settings:
newtInstances[].| Setting | Purpose |
|---|---|
replicas | Number of replicas for this Newt instance |
mtu | WireGuard interface MTU |
dns | Optional DNS server address pushed to the client |
pingInterval / pingTimeout | Optional Newt ping timing overrides |
acceptClients | Allows client connections at runtime |
useNativeInterface | Uses native WireGuard interface when native mode is enabled |
noCloud | Disables cloud connectivity |
disableClients | Disables client connections |
Newt 1.11 changed upstream ping defaults. Set
pingInterval and pingTimeout explicitly if you need older timing behavior.Service and connectivity
Service and connectivity
Service exposure is controlled separately from Important behavior:
acceptClients.acceptClientsdoes not create a Service.newtInstances[].service.enabledcontrols whether a Service is created.- Tester port exposure is disabled by default unless enabled through test settings or explicit legacy tester-port configuration.
| Type | Use case |
|---|---|
ClusterIP | Internal cluster access |
LoadBalancer | External exposure through cloud load balancer |
NodePort | Node-level port exposure |
Configuration persistence
Configuration persistence
Use Storage types:
Provisioning-based installs should enable config persistence. For production provisioning, prefer a PVC over
configPersistence when Newt needs writable configuration storage.| Type | Behavior |
|---|---|
emptyDir | Ephemeral storage, recreated with the pod |
persistentVolumeClaim | Durable storage using an existing PVC |
emptyDir.Blueprints, mTLS, and scripts
Blueprints, mTLS, and scripts
The chart supports blueprints, provisioning blueprints, mTLS certificate mounts, Docker socket mounts, and up/down scripts.Blueprint example:Provisioning blueprint example:mTLS using an existing PEM Secret:Up/down scripts:
Use Secrets for certificates and sensitive script inputs. Avoid inline private keys or credentials in values files.
Service accounts and RBAC
Service accounts and RBAC
ServiceAccount creation is enabled by default.RBAC is disabled by default in chart Enable RBAC only when your selected configuration needs Kubernetes API permissions:Per-instance ServiceAccount overrides are available when
1.4.0:allowGlobalOverride: true is set:Resources and scheduling
Resources and scheduling
Global resource requests and limits apply to Newt workloads.Scheduling defaults:Pod Disruption Budget:Recommendations:
- Start with the chart defaults.
- Increase requests and limits based on traffic volume.
- Use node selectors, tolerations, affinity, or topology spread constraints when you need placement control.
- Enable a PodDisruptionBudget only when your replica count and maintenance policy support it.
Health probes and Helm tests
Health probes and Helm tests
Health probes are disabled by default.Per-instance health options:Helm test jobs are disabled by default:Enable tests only when you want chart test jobs and tester-port related resources.
Metrics and monitoring
Metrics and monitoring
Metrics are disabled by default.The default Prometheus Operator resources:Example with ServiceMonitor:Optional pprof endpoint:
adminAddr is :2112, which listens on all interfaces and allows in-cluster scraping. Use 127.0.0.1:2112 only when scraping from other pods is not required.Metrics Service:Network policy
Network policy
NetworkPolicy rendering is disabled by default.Per-instance NetworkPolicy overrides:Modes:
Enable DNS egress rules if your default network policy blocks DNS.
| Mode | Behavior |
|---|---|
inherit | Use global components and rule sets only |
merge | Combine global and instance-level policy settings |
replace | Use only the instance-level policy settings |
Configuration by install method
Helm
Use a values file:Kustomize
Render the chart with Helm, then use Kustomize overlays:GitOps
Store Helm values or Kustomize overlays in Git. Argo CD or Flux reconciles the desired state. Argo CD Helm example:Next steps
Helm Install
Install Newt with Helm.
Kustomize Install
Install Newt with rendered manifests and Kustomize overlays.
Troubleshooting
Debug Newt deployment and connection issues.
GitOps
Deploy Newt with Argo CD or Flux.

