Provided by: nebula_1.6.1+dfsg-3build1_amd64 
      
    
NAME
       nebula.yml - nebula configuration files
DESCRIPTION
       Configuration file for nebula(1) are written in YAML. Each section is described below:
   pki
       The PKI section defines the location of credentials
       ca
                Path to the CA certificate
       cert
                Path to this node's certificate file
       key
                Path to this node's key file
   static_host_map
       The  static  host  map defines a set of hosts with fixed IP addresses on the internet. Multiple addresses
       may be defined and Nebula will try each when establishing a tunnel.
   lighthouse
       The lighthouse section allows the entablement  and  configuration  of  lighthouse  behavior.  In  Nebula,
       lighthouses are nodes with ip fixed addresses which other nodes can use to located each other.
       am_lighthouse
              Enables  lighthouse  behavior on this node. Should ONLY be true on nodes you have configured to be
              lighthouses on your network.
       interval
              Number of seconds between updates from this node to a lighthouse. When a  lighthouse  receives  an
              update, it sends information about its current IP address to each node.
       hosts  A  list  of  lighthouse  nodes  this  node  should  report  to  and query from. Should be empty on
              lighthouse nodes.
       serve_dns
              Starts a DNS listener which responds to various queries (VAGUE) and be delegated for resolution.
   listen
       Control the port and interface on which nebula listens.
       host   Set the ip to which nebula binds
       port   Set the port to which nebula binds
   punchy
       punch  Continue to punch inbound/outbound at a regular interval  to  avoid  expiration  of  firewall  NAT
              mapping
       respond
              Configure  the node to reach out and connect to you if your hole punching fails. This is extremely
              useful if one node is behind a difficult NAT, such as a symmetric NAT.
       delay  Delay a punch response for misbehaving NATs, default is 1 second, respond must  be  true  to  take
              effect
   cipher
       Choose  between  the  available  ciphers  for  your  network.  Options are "chachapoly" or "aes." Must be
       identical across all nodes on a network.
   sshd
       SSHD can expose information and administrative function via ssh
       enabled
              If true, this enables SSHD administration
       listen Host and port to listen on. (Port 22 is not allowed.)
       host_key
              A file containing a list of authorized public keys
       authorized_users
              A list of users each with an array of keys
   tun
       disabled
              When tun is disabled, a lighthouse can be started without a local  run  interface  (and  therefore
              without root)
       dev    The name of the device
       drop_local_broadcast
              Toggles forwarding of local broadcast packets, the address of which depends on the ip/mask encoded
              in the pki.cert
       drop_multicast
              Drop the forwarding of multicast packets
       tx_queue
              Sets  the  transmit  queue length. (If you notice lots of transmit drops on the tun it may help to
              raise this number. Defaults to 500.
       mtu    Default MTU for every packet, safe setting is (and the default) 1300 for internet based traffic.
       unsafe_routes
              Unsafe routes allows you to route traffic over nebula to non-nebula nodes. Unsafe routes should be
              avoided unless you have hosts/services that cannot run nebula.
   logging
       Configure logging
       level  Configure the logging level. Must be one of panic, fatal, error, warning, info, or debug.
       format Either json or text
       disable_timestamp
              Disables timestamp logging. Useful when redirected into to a logging system which appends  a  time
              stamp. Defaults to false.
   stats
       Enable a statistics exporter.
       type   Type of statistics exporter. Either "prometheus" or "graphite"
       interval
              Interval to provide updates for either graphite or prometheus.
       prefix Prefix for graphite
       protocol
              Protocol for graphite
       host   Listener for graphite
       listen IP and port to bind the prometheus listener
       path   Path on which metrics are supplied in prometheus
       namespace
              Prometheus namespace
       subsystem
              Prometheus subsystem
       message_metrics
              Enables counter metrics for meta packets. (e.g. message.tx.handshake)
       lighthouse_metrics
              Enables detailed counter metrics for lighthouse packets (e.g. lighthouse.rx.HostQuery)
   handshakes
       Handshakes are sent to all known addresses at each interval with a linear back off.
       try_interval
              Nebula  waits  try_interval after the first attempt, 2 * try_interval on the second attempt, until
              the handshake is older than timeout. This allows you to control this interval.
       retries
              Number of retries before timing out
       trigger_buffer
              Size of the buffer channel for  quickly  sending  handshakes  after  receiving  the  response  for
              lighthouse queries
   firewall
       The  firewall  is  default deny. There is no way to write a deny rule. Rules are comprised of a protocol,
       port, and one or more of host, group, or CIDR. Logical evaluation is roughly: port AND proto AND  (ca_sha
       OR ca_name) AND (host OR group OR groups OR CIDR)
       outbound
              Section containing rules which apply to traffic send from this node. See the rules section.
       inbound
              Section  containing rules which apply to traffic send to this node from other hosts. See the rules
              section.
   rules
       Rules are written in the outbound and inbound sections described above.
       proto
                Protocol. One of "any", "tcp", "udp", or "icmp"
       host
                "any" or literal hostname
       group
                "any" or literal group name
       groups
                Same as group but accepts a list of values. Certificate has to contain all groups to pass.
       cidr
                a CIDR, "0.0.0.0/0" is any
       ca_name
                An issuing CA name
       ca_sum
                An issuing CA shasum
EXAMPLES
       There is a example configuration file in the FILES section below.
       Configuration files placed in /etc/nebula can take advantage  of  the  built-in  systemd  templates.  For
       example, if you have a nebula configuration /etc/nebula/office.yml
         [#] systemctl enable nebula@office.service
FILES
       /etc/nebula
              Contains   configuration   files  for  nebula(1).  This  provides  a  designated  place  to  store
              configuration data and  credentials.  Configuration  files  placed  in  this  directory  can  take
              advantage of the provided systemd template unit.
       /usr/share/doc/nebula/examples/config.yml
              See this example configuration file.
SEE ALSO
         nebula(1), nebula-cert(1)
nebula 1.4.0                                        July 2021                                      nebula.yml(5)