Skip to content

Conversation

@kanelatechnical
Copy link
Contributor

updated aclk documentation (added troubleshooting section, faqs, format updated)

updated aclk documentation (added troubleshooting section, faqs, format updated)
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR significantly enhances the ACLK (Agent-Cloud Link) README documentation by adding comprehensive troubleshooting guidance. The update transforms a minimal README into a detailed operational guide with troubleshooting procedures, diagnostic commands, and FAQs.

Key changes:

  • Converts blockquote-style warning to standard warning admonition syntax
  • Adds extensive troubleshooting section covering connection diagnostics, status codes, error messages, and network testing
  • Includes FAQ section with collapsible details for common ACLK questions

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines +311 to +312
[plugins]
aclk = no
Copy link

Copilot AI Oct 29, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The configuration section shown here uses [plugins] to disable ACLK, but this appears inconsistent with typical Netdata configuration patterns where ACLK would be under a [cloud] section or similar. Please verify this is the correct configuration section for disabling ACLK in netdata.conf.

Suggested change
[plugins]
aclk = no
[cloud]
enabled = no

Copilot uses AI. Check for mistakes.
sudo iptables -A OUTPUT -p tcp -d api.netdata.cloud --dport 443 -j ACCEPT
sudo iptables -A OUTPUT -p tcp -d app.netdata.cloud --dport 443 -j ACCEPT
```

Copy link

Copilot AI Oct 29, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The iptables rules use -d with domain names (mqtt.netdata.cloud, etc.), which requires DNS resolution at rule creation time and creates static IP-based rules. This contradicts the earlier warning about IP addresses changing. Consider documenting that these rules will resolve to IPs at insertion time, or suggest using an alternative approach like using owner module to control by process, or explicitly noting that these examples need to be periodically updated.

Suggested change
:::warning
The above iptables rules use `-d` with domain names. **iptables resolves these domain names to IP addresses only at the time the rule is created.** If the IP addresses for these domains change (which is common for cloud services), the rules will not match future connections. You must manually update these rules whenever the IPs change. For dynamic allowlisting, use a firewall that supports domain-based rules, or automate IP updates.
:::

Copilot uses AI. Check for mistakes.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants