Getting started with ngrok is almost suspiciously easy. Which is why the question we hear most often isn’t "where do I start?" but rather “what else can I do with ngrok?” For over a decade, we’ve been serving millions of developers and, through them, millions of users.
Sure, our documentation has all the answers, every CLI flag, every Traffic Policy configuration neatly laid out, but what about the developers who are always on the lookout for a TL;DR? What if you too are not looking for a full solution or a specific use case for your next project, but just want to know… what else **you** can do with ngrok?
Presenting ngrok's new cheatsheet that walks you through some of our most interesting offerings, designed to scratch that itch of not just serving, but also securing endpoints in as little as two steps. Read on or download the crisp two-pager printable in PDF.
# Install via Homebrew
brew install ngrok
# Add your authtoken
ngrok config add-authtoken <token>
# Start an endpoint
ngrok http 80
# Install via Apt
curl -sSL https://ngrok-agent.s3.amazonaws.com/ngrok.asc \
| sudo tee /etc/apt/trusted.gpg.d/ngrok.asc >/dev/null \
&& echo "deb https://ngrok-agent.s3.amazonaws.com bookworm main" \
| sudo tee /etc/apt/sources.list.d/ngrok.list \
&& sudo apt update \
&& sudo apt install ngrok
# OR
# Install via Snap
snap install ngrok
# Add your authtoken
ngrok config add-authtoken <token>
# Start an endpoint
ngrok http 80
# Install via WinGet
winget install ngrok -s msstore
# OR
# Install via Scoop
scoop install ngrok
# Add your authtoken
ngrok config add-authtoken <token>
# Start an endpoint
ngrok http 80
# Add ngrok Kubernetes Operator to Helm
helm repo add ngrok https://charts.ngrok.com
# Add ngrok API key and authtoken
export NGROK_AUTHTOKEN=YOUR_NGROK_AUTHTOKEN
export NGROK_API_KEY=YOUR_NGROK_API_KEY
helm install ngrok-operator ngrok/ngrok-operator \
--namespace ngrok-operator \
--create-namespace \
--set credentials.apiKey=$NGROK_API_KEY \
--set credentials.authtoken=$NGROK_AUTHTOKEN
# Install via Docker
docker pull ngrok/ngrok
# Run ngrok via Docker
docker run --net=host -it -e NGROK_AUTHTOKEN=xyz ngrok/ngrok:latest http 80
# Node.js: https://ngrok.com/downloads/node-js
npm install @ngrok/ngrok
# Go: https://ngrok.com/downloads/go
go get golang.ngrok.com/ngrok/v2
# Python: https://ngrok.com/downloads/python
python3 -m pip install ngrok
# Rust: https://ngrok.com/downloads/rust
# Install ngrok-rust package and the required dependencies
cargo add ngrok -F axum && cargo add axum && cargo add tokio -F rt-multi-thread -F macros
Read the Docs: https://ngrok.com/docs/agent/#example-usage
# Example: API service on localhost:8080
ngrok http 8080
# Example: On localhost:3000
ngrok http 3000
# Example: On Port 22
ngrok tcp 22
ngrok tcp 5432
ngrok http http://192.168.1.50:8080
Read the Docs: https://ngrok.com/docs/agent/#troubleshooting-connectivity
ngrok diagnose
# To test IPv6 connectivity
ngrok diagnose --ipv6 true
# To test connectivity between the ngrok agent and all ngrok points of presence
ngrok diagnose --region all
# For a verbose report
ngrok diagnose -w out.txt #OR
ngrok diagnose --write-report out.txt
Read the Docs: https://ngrok.com/docs/traffic-policy/
policy.yaml
nano policy.yaml
List of Providers: https://ngrok.com/docs/traffic-policy/actions/oauth/#supported-providers
# policy.yaml
on_http_request:
- actions:
- type: oauth
config:
provider: google # OAuth available with Amazon, Facebook, GitHub, GitLab, Google, LinkedIn, Microsoft, Twitch
ngrok http 8080 --traffic-policy-file=policy.yaml
# policy.yaml
on_http_request:
- actions:
- type: oauth
config:
provider: google
- expressions:
- "!(actions.ngrok.oauth.identity.email in ['alice@example.com','bob@example.com'])"
actions:
- type: deny
# policy.yaml
on_http_request:
- actions:
- type: oauth
config:
provider: google
- expressions:
- "!(actions.ngrok.oauth.identity.email.endsWith('@example.com'))"
actions:
- type: deny
Read the Docs: https://ngrok.com/docs/traffic-policy/actions/verify-webhook/
verify-webhook
action for Slack# policy.yaml
on_http_request:
- actions:
- type: verify-webhook
config:
provider: slack
secret: $SLACK_TOKEN
Read more: https://ngrok.com/docs/integrations/slack/webhooks/
ngrok http 3000 \
--verify-webhook=slack \
--verify-webhook-secret=$SLACK_TOKEN
provider
for any supported providerList of supported providers: https://ngrok.com/docs/traffic-policy/actions/verify-webhook/
# policy.yaml
on_http_request:
- actions:
- type: verify-webhook
config:
provider: $PROVIDER # Example: GitHub
secret: $PROVIDER_TOKEN
Read the docs: https://ngrok.com/docs/universal-gateway/internal-endpoints/
# Create a private, internal agent endpoint only reachable via forward-internal
ngrok http 8080 --url https://api.internal
Read the Docs: https://ngrok.com/docs/traffic-policy/actions/forward-internal/
# Forward to an internal endpoint from a public endpoint
on_http_request:
- actions:
- type: forward-internal
config:
url: https://api.internal
Read the Docs: https://ngrok.com/docs/universal-gateway/cloud-endpoints/routing-and-policy-decentralization/
# policy.yaml
# Route /api/* to api.internal, /app/* to app.internal
on_http_request:
- expressions:
- "req.path.startsWith('/api/')"
actions:
- type: forward-internal
config:
url: https://api.internal
- expressions:
- "req.path.startsWith('/app/')"
actions:
- type: forward-internal
config:
url: https://app.internal
Read the Docs: https://ngrok.com/docs/traffic-policy/actions/forward-internal/#examples
# policy.yaml
# Host-based and header-based dynamic forwarding to internal endpoints via forward-internal action
on_http_request:
- expressions:
- "req.host == 'api.example.com'"
actions:
- type: forward-internal
config: { url: https://api.internal }
- expressions:
- "getReqHeader('X-Tenant') != ''"
actions:
- type: forward-internal
config: { url: https://tenant.internal }
Read the Docs: https://ngrok.com/docs/universal-gateway/examples/multiplex/
# policy.yaml
on_http_request:
- actions:
- type: forward-internal
config:
url: https://${req.host.split(".$NGROK_DOMAIN")[0]}.internal
Read the Docs: https://ngrok.com/docs/traffic-policy/actions/rate-limit/
# policy.yaml
# 10 requests per 60s window per client IP -> 429 on limit
on_http_request:
- actions:
- type: rate-limit
config:
name: per-ip-60s
algorithm: sliding_window
capacity: 10
rate: "60s"
bucket_key:
- conn.client_ip
Read the Docs: https://ngrok.com/docs/traffic-policy/examples/block-unwanted-requests/#how-do-i-deny-traffic-from-bots-and-crawlers-with-a-robotstxt
# policy.yaml
# Send a robots.txt denying crawlers
on_http_request:
- expressions:
- "req.path == '/robots.txt'"
actions:
- type: custom-response
config:
status_code: 200
headers:
Content-Type: "text/plain"
body: |
User-agent: *
Disallow: /
# policy.yaml
# Deny common bot/AI user agents
on_http_request:
- expressions:
- "req.user_agent.raw.matches('(?i)(gptbot|chatgpt-user|ccbot|bingbot|googlebot)')"
actions:
- type: deny
# policy.yaml
# Also add X-Robots-Tag to all responses
on_http_response:
- actions:
- type: add-headers
config:
headers:
X-Robots-Tag: "noindex, nofollow, noai, noimageai"
Read the Docs: https://ngrok.com/docs/traffic-policy/actions/add-headers/
# Common security headers
ngrok http 8080 \
--request-header-add "X-Frame-Options: DENY" \
--response-header-add "Referrer-Policy: no-referrer"
# policy.yaml
# Add headers on request/response
on_http_request:
- actions:
- type: add-headers
config:
headers:
X-Frame-Options: "DENY"
on_http_response:
- actions:
- type: add-headers
config:
headers:
Referrer-Policy: "no-referrer"
Read the Docs: https://ngrok.com/docs/traffic-policy/actions/restrict-ips/
# Allow only 203.0.113.0/24; deny others
ngrok http 8080 --cidr-allow 203.0.113.0/24
# Or explicitly deny CIDRs
ngrok http 8080 --cidr-deny 0.0.0.0/0
Read the Docs: https://ngrok.com/docs/traffic-policy/actions/owasp-crs-response/
# policy.yaml
# Apply OWASP Core Rule Set on requests/responses
on_http_request:
- actions:
- type: owasp-crs-request
on_http_response:
- actions:
- type: owasp-crs-response
url
# Choose a URL instead of random assignment
ngrok http 8080 --url https://baz.ngrok.dev
traffic-policy-file
# Manipulate traffic to your endpoint with a traffic policy file
ngrok http 8080 --url https://baz.ngrok.dev --traffic-policy-file policy.yaml
traffic-policy-url
# Manipulate traffic to your endpoint with a traffic policy URL
ngrok http 8080 --url https://baz.ngrok.dev policy --traffic-policy-url https://example.com/policy.yml
pooling-enabled
# Load Balance (different ports)
ngrok http 8080 --url https://api.example.com --pooling-enabled
ngrok http 8081 --url https://api.example.com --pooling-enabled
The first iteration of the ngrok cheat sheet was created by Keith Casey, who served on the Product/GTM Team at ngrok.