Skip to main content

Connect to Devices Using the Python SDK

This guide provides step-by-step instructions for using ngrok as a device gateway. This example shows you how to embed connectivity into an application using ngrok's Python SDK to access an API running on an IoT device. All the Python code in this example is available in the ngrok-samples/ngrok-python-iot-agent repo.

Prerequisites

To use the sample application, you need the following prerequisites on the device or device gateway you wish to connect to:

  • Python 3.11
  • venv or another Python virtual environment manager

Get an ngrok API Key

Create an ngrok API key using the ngrok dashboard. Make sure you save the API key before you leave the screen because it won't be displayed again.

Create a custom wildcard domain

Create a custom wildcard domain, which will allow you to create endpoints and receive traffic on any subdomain of your domain.

For example, you might create *.sitea.{YOUR_DOMAIN}. You would then be able to create endpoints on device342.sitea.{YOUR_DOMAIN} and device896.sitea.{YOUR_DOMAIN} without having to reserve them individually. It can be helpful to create a separate subdomain for each site you wish to connect to.

Run the following command, substituting your API key for {API_KEY} and your domain for {YOUR_DOMAIN}:

curl \
-X POST \
-H "Authorization: Bearer {API_KEY}" \
-H "Content-Type: application/json" \
-H "Ngrok-Version: 2" \
-d '{"domain":"*.sitea.{YOUR_DOMAIN}","region":"us"}' \
https://api.ngrok.com/reserved_domains

You should receive a 201 response similar to the following:

{
"id": "rd_2euR3S7Mt07gRC6NlVGcXtghElK",
"uri": "https://api.ngrok.com/reserved_domains/rd_2euR3S7Mt07gRC6NlVGcXtghElK",
"created_at": "2024-04-10T12:31:16Z",
"domain": "*.sitea.configurable-domain.com",
"region": "",
"cname_target": "mwz4q7fiabfcxbfy.4wsgv9l5wfesschhy.ngrok-cname.com",
"http_endpoint_configuration": null,
"https_endpoint_configuration": null,
"certificate": null,
"certificate_management_policy": {
"authority": "letsencrypt",
"private_key_type": "ecdsa"
},
"certificate_management_status": {
"renews_at": null,
"provisioning_job": {
"error_code": null,
"msg": "Managed certificate provisioning in progress.",
"started_at": "2024-04-10T12:31:16Z",
"retries_at": null
}
},
"acme_challenge_cname_target": "f7ekwqdb.acme-challenge.ngrok-dns.com"
}

You'll need values from the response in the next section.

Update DNS records

Next, add two CNAME records to your DNS provider's registry, providing values from the previous response.

Add a CNAME record for the wildcard subdomain you just created.

alt-text

Then add another record for the ACME (Automated Certificate Management Environment) validation. For the record, enter _acme-challenge.{SUBDOMAIN}, and use the value of the acme_challenge_cname_target property from from previous response for the value. For the example above, the record name would be _acme-challenge.sitea.

Verify DNS

Use the ngrok dashboard to verify that you’ve configured DNS correctly.

  1. Login to the ngrok dashboard.
  2. Click Domains in the left-hand navigation menu.
  3. Click on your wildcard domain under Domain.
  4. Click 2 targets next to DNS Targets in the panel displayed on the right-hand side of the screen, as denoted by the arrow in the screenshot below.

alt-text

  1. Click Check Status, as denoted by the arrow in the screenshot below.

alt-text

  1. You should see a successful response similar to the screenshot below.

alt-text

Create a bot user

You’ll create a bot user so that in the next section, you can create an agent authtoken independent of any user account. A bot user does not belong to a particular user account. Run the following command to create a new bot user, providing your API key and a description:

curl \
-X POST \
-H "Authorization: Bearer {API_KEY}" \
-H "Content-Type: application/json" \
-H "Ngrok-Version: 2" \
-d '{"name":"new bot user from API"}' \
https://api.ngrok.com/bot_users

You should receive a 201 response similar to the following:

{
"id": "bot_2fmwUXhnImKswMgZKCsx7cnbt2l",
"uri": "https://api.ngrok.com/bot_users/bot_2fmwUXhnImKswMgZKCsx7cnbt2l",
"name": "new bot user from API",
"active": true,
"created_at": "2024-04-29T19:39:36Z"
}

Create the agent authtoken

You should start each agent using a separate authtoken, and that token should belong to a bot user.

To create an authtoken, login to the ngrok dashboard and click Authtokens under Tunnels, then click Add a Tunnel Authtoken. For Owner, select the bot user you use created, and select bind:*.sitea.{YOUR_DOMAIN} for the ACL Rules. This ACL will allow an agent with the authtoken to create tunnels on any subdomain of sitea.{YOUR_DOMAIN}.

alt-text

Configure the sample agent

The sample application uses the ngrok Python SDK to embed connectivity directly into the application rather than using the standalone ngrok agent, the CLI, or the ngrok Kubernetes Operator. It serves a local REST API you can use to create, delete, and list tunnels.

Clone the repo

Clone the ngrok-samples/ngrok-python-iot-agent repo on the device or device gateway you wish to connect to.

Create and activate a virtual environment

Run the following to create a virtual environment, providing a directory for {PATH_TO_VENV}:

python -m venv {PATH_TO_VENV}

Run the appropriate command for your O/S to activate the virtual environment:

  • In cmd.exe: {PATH_TO_VENV}\Scripts\activate.bat
  • In PowerShell: {PATH_TO_VENV}\Scripts\Activate.ps1
  • Linux and macOS: source {PATH_TO_VENV}/bin/activate

Install dependencies

Run pip install -r requirements to install the dependencies.

Update the domain

Update line 109 with your domain. Since you created a wildcard domain, you can use any subdomain of your wildcard domain without reserving it. For example, for the wildcard domain *.sitea.configurable-domain.com, you could use api.sitea.configurable-domain.com.

Set your authtoken

This sample application is designed to read your ngrok credentials from the environment, so run the following command, replacing {YOUR_AUTHTOKEN} with the authtoken you created in the previous step:

export NGROK_AUTHTOKEN={YOUR_AUTHTOKEN}

Use the sample app

This sample application is a custom ngrok agent built using the Python SDK. In a previous step, you updated the domain on line 109 of agent.py.

This domain will be used to serve a local REST API built into the sample application using FastAPI. You'll use this API to create, delete, and list tunnels remotely.

The application persists tunnels in a local JSON file, ngrok_config.json, and recreates them when the application is restarted. You could extend this application to store tunnel configuration in a backend database.

You may pass policy information directly in the body of the request. The application includes a JSON file, test.json, which contains the default policies it applies to any new request that doesn't specify policy information. You could update this file to control policies applied to new tunnels rather than passing the policy information in each request.

Start the app

Run the following to start the agent:

python agent.py

List tunnels

Run the following command to list tunnels started by this custom agent application, substituting the domain you set on line 109 for {YOUR_AGENT_DOMAIN}:

curl -k \
-X GET \
https://{YOUR_AGENT_DOMAIN}/tunnels

Initially, you should receive a 200 response with an empty array.

Start a tunnel with default policies

Run the following command to start a tunnel to the device or device gateway where the custom agent application is running, substituting the appropriate values for the variables:

  • {HOST} - the host where the API is running, leave blank and remove the colon for localhost
  • {PORT} - the port where the API is running
  • {TUNNEL_DOMAIN} - the domain you want to serve the API on the device or device gateway
  • {YOUR_AGENT_DOMAIN} - the domain you set on line 109 of the code
curl -k \
-X POST \
-H "Content-Type: application/json" \
-d '{"protocol": "http", "forwards_to": "{HOST}:{PORT}", "domain": "{TUNNEL_DOMAIN}"}' \
https://{YOUR_AGENT_DOMAIN}/tunnels

You should receive a 200 response similar to the following:

{
"url": "https://device123.sitea.configurable-domain.com",
"protocol": "http",
"forwards_to": "localhost:8001",
"domain": "agent.sitea.configurable-domain.com",
"policy": null
}

You'll notice that the policy property is null. This is because the request didn't include any policies. However, this sample application applies the default polcies defined in test.json if no policies are included in the request.

List tunnels

If you run the request to list tunnels again, you should receive a 200 response similar to the following. Notice that it includes the policies defined in test.json. You can update the policies in this file to the defaults you want applied to new tunnels when no policies are specified in the request:

[
{
"url": "https://device123.sitea.configurable-domain.com",
"protocol": "http",
"forwards_to": "localhost:8001",
"domain": "device123.sitea.configurable-domain.com",
"policy": "{\"inbound\": [], \"outbound\": [{\"expressions\": [], \"name\": \"Add headers to requests\", \"actions\": [{\"type\": \"add-headers\", \"config\": {\"headers\": {\"is-ngrok\": \"0000000000\"}}}]}]}"
}
]

Start a tunnel with policies

Run the following command, substituting the appropriate values for the variables to create a new tunnel, specifying policies directly in the request.

curl -k \
-X POST \
-H "Content-Type: application/json" \
-d '{"protocol": "http", "forwards_to": "{HOST}:{PORT}","domain":"{YOUR_DOMAIN}", "policy": \
{"inbound":[],"outbound":[{"expressions":[],"name":"Add headers to requests","actions":[{"type":"add-headers","config":{"headers":{"is-ngrok":"444"}}}]}]}}' \
https://{YOUR_AGENT_DOMAIN}/tunnels

You should receive a 200 response similar to the following:

{
"url": "https://device123.sitea.configurable-domain.com",
"protocol": "http",
"forwards_to": "localhost:8001",
"domain": "device123.sitea.configurable-domain.com",
"policy": {
"inbound": [],
"outbound": [
{
"expressions": [],
"name": "Add headers to requests",
"actions": [
{
"type": "add-headers",
"config": {
"headers": {
"is-ngrok": "444"
}
}
}
]
}
]
}
}

Delete tunnel

Run the following command to delete a tunnel, substituting {YOUR_AGENT_DOMAIN} with the value you set on line 109 of the code and {URL_PART} with the value of the url_part property of the list tunnels request:

curl \
-X \
DELETE \
https://{YOUR_AGENT_DOMAIN}/tunnels/{URL_PART}

Access the API running on the device or device gateway

You should now be able to access the API on the device or device gateway using the value from {TUNNEL_DOMAIN} in the request to remote manage your device fleet.