The "Manual systemd install (advanced)" example in docs/INSTALL.md told users to run `sudo install -m 0755 pulse /usr/local/bin/pulse`, but the release tarballs extract to ./bin/pulse, not ./pulse. Following the documented command literally produced "install: cannot stat 'pulse'". Show the download/extract commands explicitly so users know the tarball shape, and correct the install path to `bin/pulse`. validate-release.sh already pins the ./bin/pulse tarball layout, so this is the matching documentation side of that contract.
7.6 KiB
📦 Installation Guide
Pulse offers flexible installation options from Docker to enterprise-ready Kubernetes charts.
Paid Pulse Pro / Relay / legacy customers: GitHub release assets and the public
rcourtman/pulseDocker image are community builds. They can accept an activation key, but they do not include the private Pulse Pro runtime hooks. Use https://pulserelay.pro/download.html with your activation key to get the private Pulse Pro Docker image or Linux archive. For Docker Compose, use thePULSE_IMAGE-aware image line shown below, or replace a hardcodedrcourtman/pulseimage line with the private image shown on the download page.
🚀 Quick Start (Recommended)
Proxmox VE (LXC installer)
If you run Proxmox VE, the easiest and most “Pulse-native” deployment is the official installer which creates and configures a lightweight LXC container.
Replace vX.Y.Z with the exact release tag you want, then run this on your Proxmox host:
export PULSE_VERSION=vX.Y.Z
curl -fsSLO "https://github.com/rcourtman/Pulse/releases/download/${PULSE_VERSION}/install.sh"
curl -fsSLO "https://github.com/rcourtman/Pulse/releases/download/${PULSE_VERSION}/install.sh.sshsig"
ssh-keygen -Y verify \
-f <(printf '%s\n' 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMZd/DaH+BldzOkq1A8KVTcFk73nAyrE8aJOyf7i00jm pulse-installer') \
-I pulse-installer \
-n pulse-install \
-s install.sh.sshsig < install.sh
bash install.sh --version "${PULSE_VERSION}"
rm -f install.sh install.sh.sshsig
Note
: The GitHub
install.shis the server installer. The agent installer is served from your Pulse server at/install.sh(see Settings → Infrastructure → Install on a host).
Docker
Ideal for containerized environments or testing.
docker run -d \
--name pulse \
-p 7655:7655 \
-v pulse_data:/data \
--restart unless-stopped \
rcourtman/pulse:vX.Y.Z
Docker Compose
Create a docker-compose.yml file:
services:
pulse:
image: ${PULSE_IMAGE:-rcourtman/pulse:vX.Y.Z}
container_name: pulse
restart: unless-stopped
ports:
- "7655:7655"
volumes:
- pulse_data:/data
environment:
- PULSE_AUTH_USER=admin
- PULSE_AUTH_PASS=secret123
volumes:
pulse_data:
The PULSE_IMAGE variable lets paid Docker users switch the same compose file
to the private Pulse Pro image shown on
https://pulserelay.pro/download.html without rebuilding the file around a
second deployment path.
Note
: Plain text passwords set via
PULSE_AUTH_PASSare auto-hashed on startup. For production, prefer Quick Security Setup or a pre-hashed bcrypt value. Note: Docker monitoring requires the unified agent on the Docker host with socket access; the Pulse server container does not need/var/run/docker.sock. See UNIFIED_AGENT.md.
🛠️ Installation Methods
1. Kubernetes (Helm)
Deploy to your cluster using our Helm chart.
helm repo add pulse https://rcourtman.github.io/Pulse
helm repo update
helm upgrade --install pulse pulse/pulse \
--namespace pulse \
--create-namespace
See KUBERNETES.md for ingress and persistence configuration.
2. Bare Metal / Systemd
For Linux servers (VM or bare metal), use the official installer:
export PULSE_VERSION=vX.Y.Z
curl -fsSLO "https://github.com/rcourtman/Pulse/releases/download/${PULSE_VERSION}/install.sh"
curl -fsSLO "https://github.com/rcourtman/Pulse/releases/download/${PULSE_VERSION}/install.sh.sshsig"
ssh-keygen -Y verify \
-f <(printf '%s\n' 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMZd/DaH+BldzOkq1A8KVTcFk73nAyrE8aJOyf7i00jm pulse-installer') \
-I pulse-installer \
-n pulse-install \
-s install.sh.sshsig < install.sh
sudo bash install.sh --version "${PULSE_VERSION}"
rm -f install.sh install.sh.sshsig
Note
: This installs the Pulse server. Use the
/install.shendpoint from Settings → Infrastructure → Install on a host for installingpulse-agenton monitored hosts.
Manual systemd install (advanced)
# Download and extract the architecture-specific tarball from GitHub Releases:
# https://github.com/rcourtman/Pulse/releases
# e.g.
# curl -fsSLO "https://github.com/rcourtman/Pulse/releases/download/${PULSE_VERSION}/pulse-${PULSE_VERSION}-linux-amd64.tar.gz"
# tar -xzf "pulse-${PULSE_VERSION}-linux-amd64.tar.gz"
# The extracted tree contains ./bin/pulse plus ./bin/pulse-agent-* and ./scripts/.
sudo install -m 0755 bin/pulse /usr/local/bin/pulse
# Create systemd service
sudo tee /etc/systemd/system/pulse.service > /dev/null << 'EOF'
[Unit]
Description=Pulse Monitoring
After=network.target
[Service]
Type=simple
ExecStart=/usr/local/bin/pulse
Restart=always
RestartSec=10
Environment=PULSE_DATA_DIR=/etc/pulse
[Install]
WantedBy=multi-user.target
EOF
# Start service
sudo mkdir -p /etc/pulse
sudo systemctl daemon-reload
sudo systemctl enable --now pulse
🔐 First-Time Setup
Pulse is secure by default. On first launch, you must retrieve a Bootstrap Token to create your admin account.
Step 1: Get the Token
| Platform | Command |
|---|---|
| Docker | docker exec pulse /app/pulse bootstrap-token |
| Kubernetes | kubectl exec -it <pod> -- /app/pulse bootstrap-token |
| Systemd | sudo pulse bootstrap-token |
Important: Paste the token string printed by the command above. Do not paste the raw
.bootstrap_tokenfile contents directly. In v6 that file may contain an encrypted JSON snapshot rather than the usable setup token.
Step 2: Create Admin Account
- Open
http://<your-ip>:7655 - Paste the Bootstrap Token.
- Complete the Quick Security Setup wizard.
- Set your Admin Username and Password (or let Pulse generate one).
- Pulse generates an API token for agents and automations.
- Copy the credentials before leaving the page.
- Open Settings → Infrastructure → Install on a host and install the unified agent only on hosts where you need agent-provided telemetry. For Proxmox, start with API-only monitoring when inventory, node status, VM/container status, and storage metrics are enough; use agents for inside-guest Docker/Podman visibility, host SMART/temperature data, local ZFS/Ceph/mdadm detail, or other telemetry that requires local host access. See Agent Security.
Note
: If you configure authentication via environment variables (
PULSE_AUTH_USER/PULSE_AUTH_PASS), the bootstrap token is automatically removed and this step is skipped.
🔄 Updates
Automatic Updates (Systemd/LXC only)
Pulse can self-update to the latest stable version.
Enable via UI: Settings → System → Updates
Manual Update
| Platform | Command |
|---|---|
| Docker | docker pull rcourtman/pulse:vX.Y.Z && docker restart pulse |
| Kubernetes | helm repo update && helm upgrade pulse pulse/pulse -n pulse |
| Systemd / Proxmox LXC | sudo /bin/update |
Rollback
If an update causes issues on systemd installations, backups are created automatically during the update process.
Manual rollback: In-app updates store backups under /etc/pulse/backup-<timestamp>/. The systemd auto-update timer uses a temporary /tmp/pulse-backup-<timestamp> during the update and auto-restores on failure.
🗑️ Uninstall
Docker:
docker rm -f pulse && docker volume rm pulse_data
Kubernetes:
helm uninstall pulse -n pulse
Systemd:
sudo systemctl disable --now pulse
sudo rm -rf /etc/pulse /etc/systemd/system/pulse.service /usr/local/bin/pulse
sudo systemctl daemon-reload