Configuration Overview
MeshManager is designed to be configured primarily through the web interface, with some settings available via environment variables.
Deployment Options
Docker Compose (Recommended)
The recommended deployment method uses Docker Compose with:
- MeshManager: Unified application (FastAPI backend + React frontend)
- Database: PostgreSQL 16
See Docker Deployment for detailed instructions, or use the Docker Configurator to generate a customized compose file.
Development Setup
For development, use the development compose file:
bash
docker compose -f docker-compose.dev.yml up -dThis enables hot-reloading and exposes additional debugging ports.
Configuration Areas
Data Sources
Configure where MeshManager pulls data from:
- Data Sources - MeshMonitor and MQTT connections
- Configuration Backup - Export/import your configuration
Solar Integration
Set up solar monitoring features:
- Solar Integration - Forecast.Solar configuration
Notifications
Configure automated alerts:
- Notifications - Apprise notification setup
Authentication & SSO
Configure how users log in:
- SSO (OpenID Connect) - OIDC setup with Authentik, Keycloak, Auth0, etc.
User Management
- User Management - Roles, permissions, and anonymous access
Environment Variables
System-level configuration:
- Environment Variables - All available env vars
Quick Configuration
Adding a MeshMonitor Source
- Navigate to Admin panel
- Click Add Source
- Select MeshMonitor type
- Enter the source name and URL
- Click Save
The collector will immediately begin polling for data.
Adding an MQTT Source
- Navigate to Admin panel
- Click Add Source
- Select MQTT type
- Enter connection details:
- Host, Port
- Topic (e.g.,
msh/US/#) - Credentials (if required)
- Click Save
Setting Up Solar Notifications
- Navigate to Settings > Solar Schedule
- Enable scheduled notifications
- Add notification times
- Configure Apprise URLs:
discord://webhook_id/webhook_token slack://token_a/token_b/token_c - Click Save
Security Considerations
- Use HTTPS in production (configure via reverse proxy)
- Protect the admin interface with authentication
- Use secure passwords for MQTT connections
- Consider network segmentation for database access
