Connect Agent to Cloud
This section guides you through installing and securely connecting a new Agent to Netdata Cloud via the encrypted Agent-Cloud Link (ACLK). Connecting your Agent to your Space in Netdata Cloud unlocks additional features like centralized monitoring and easier collaboration.
Connect
Install and Connect a New Agent
There are three places in the UI where you can add/connect your Node:
- Space/Room settings: Click the cogwheel (the bottom-left corner or next to the Room name at the top) and select "Nodes." Click the "+" button to add a new node.
- Nodes tab: Click on the "Add nodes" button.
- Integrations page: From the "Deploy" groups of integrations, select the OS or container environment your node runs on, and follow the instructions.
Netdata Cloud will generate a command that you can execute on your Node to install and connect the Agent to your Space.
Connect an existing Agent
There are three methods to connect an already installed Agent to your Space.
Manually, via the UI
The UI method is the easiest and recommended way to connect your Agent. Here's how:
- Open your Agent's local dashboard (normally under
IP:19999
). - Sign in to your Netdata Cloud account.
- Click the "Connect" button.
- Follow the on-screen instructions to connect your Agent.
Automatically, via a provisioning system or the command line
Netdata Agents can be connected to Netdata Cloud by creating /INSTALL_PREFIX/netdata/claim.conf
:
[global]
url = https://app.netdata.cloud
token = NETDATA_CLOUD_SPACE_TOKEN
rooms = ROOM_KEY1,ROOM_KEY2,ROOM_KEY3
proxy = http://username:password@myproxy:8080
insecure = no
option | description | required |
---|---|---|
url | The Netdata Cloud base URL (defaults to https://app.netdata.cloud ) | no |
token | The claiming token for your Netdata Cloud Space | yes |
rooms | A comma-separated list of Rooms that the Agent will be added to | no |
proxy | Can be anything libcurl accepts as a proxy, or the none and env keywords. none (or just an empty value) disables proxy configuration, while env tells libcurl to use the environment to determine the proxy configuration (usually the https_proxy environment variable) | no |
insecure | A boolean (either yes , or no ) and when set to yes it instructs libcurl to disable host verification. | no |
If the Agent is already running, you can either run netdatacli reload-claiming-state
or restart the Agent. Otherwise, the Agent will be connected when it starts.
If the connection process fails, the reason will be logged in daemon.log (search for "CLAIM") and the cloud
section of http://ip:19999/api/v3/info
.
Automatically, via environment variables
Netdata will use the following environment variables:
Option | Description | Required |
---|---|---|
NETDATA_CLAIM_URL | The Netdata Cloud base URL (defaults to https://app.netdata.cloud ) | no |
NETDATA_CLAIM_TOKEN | The claiming token for your Netdata Cloud Space | yes |
NETDATA_CLAIM_ROOMS | A comma-separated list of Rooms that the Agent will be added to | no |
NETDATA_CLAIM_PROXY | The URL of a proxy server to use for the connection | no |
NETDATA_EXTRA_CLAIM_OPTS | May contain a space-separated list of options. The option -insecure is the only currently used. | no |
If the connection process fails, the reason will be logged in daemon.log (search for "CLAIM") and the cloud
section of http://ip:19999/api/v3/info
.
Reconnect
Linux based installations
To remove a node from your Space in Netdata Cloud, delete the cloud.d/
directory in your Netdata library directory.
cd /var/lib/netdata # Replace with your Netdata library directory, if not /var/lib/netdata/
sudo rm -rf cloud.d/
IMPORTANT
Keep in mind that the Agent will be re-claimed automatically if the environment variables or
claim.conf
exist when the Agent is restarted.
This node will no longer have access to the credentials it used when connecting to Netdata Cloud via the ACLK.
Docker based installations
To remove a node from your Space and connect it to another, follow these steps:
Enter the running container you wish to remove from your Space
docker exec -it CONTAINER_NAME sh
Replacing
CONTAINER_NAME
with either the container's name or ID.Delete
/var/lib/netdata/cloud.d
and/var/lib/netdata/registry/netdata.public.unique.id
rm -rf /var/lib/netdata/cloud.d/
rm /var/lib/netdata/registry/netdata.public.unique.idStop and remove the container
Docker CLI:
docker stop CONTAINER_NAME
docker rm CONTAINER_NAMEReplacing
CONTAINER_NAME
with either the container's name or ID.Docker Compose:
Inside the directory that has thedocker-compose.yml
file, run:docker compose down
Docker Swarm:
Run the following, and replaceSTACK
with your Stack's name:docker stack rm STACK
Finally, go to your new Space, copy the installation command with the new claim token and run it.
If you’re using adocker-compose.yml
file, you will have to overwrite it with the new claiming token.
The node should now appear online in that Space.
Regenerate Claiming Token
There may be situations where you need to revoke your previous Claiming Token and generate a new one for security reasons. Here's how to do it:
Requirements:
- Only Administrators of a Space in Netdata Cloud can regenerate Claim Tokens.
Steps:
- Navigate to any screen containing the Connection command.
- Click the "Regenerate token" button. This action will invalidate your previous token and generate a new one.
Troubleshoot
If you're having trouble connecting a node, this may be because the ACLK cannot connect to Cloud.
With the Netdata Agent running, visit http://NODE:19999/api/v3/info
in your browser, replacing NODE
with the IP address or hostname of your Agent. The returned JSON contains a section called cloud
with helpful information to diagnose any issues you might be having with the ACLK or connection process.
You can also run sudo netdatacli aclk-state
to get some diagnostic information about ACLK:
ACLK Available: Yes
ACLK Implementation: Next Generation
New Cloud Protocol Support: Yes
Claimed: Yes
Claimed Id: 53aa76c2-8af5-448f-849a-b16872cc4ba1
Online: Yes
Used Cloud Protocol: New
Use these keys and the information below to troubleshoot the ACLK.
kickstart: unsupported Netdata installation
If you run the kickstart script and get the following error Existing install appears to be handled manually or through the system package manager.
you most probably installed Netdata using an unsupported package.
Check our installation section to find the proper way of installing Netdata on your system.
kickstart: Failed to write new machine GUID
You might encounter this error if you run the Netdata kickstart script without sufficient permissions:
Failed to write new machine GUID. Please make sure you have rights to write to /var/lib/netdata/registry/netdata.public.unique.id.
To resolve this issue, you have two options:
- Run the script with root privileges.
- Run the script with the user that runs the Netdata Agent.
Connecting to Cloud on older distributions (Ubuntu 14.04, Debian 8, CentOS 6)
If you're running an older Linux distribution or one that has reached EOL, such as Ubuntu 14.04 LTS, Debian 8, or CentOS 6, your Agent may not be able to securely connect to Netdata Cloud due to an outdated version of OpenSSL. These old versions of OpenSSL cannot perform hostname validation, which helps securely encrypt SSL connections.
We recommend you reinstall Netdata with a static build, which uses an up-to-date version of OpenSSL with hostname validation enabled.
If you choose to continue using the outdated version of OpenSSL, your node will still connect to Netdata Cloud, albeit with hostname verification disabled. Without verification, your Netdata Cloud connection could be vulnerable to man-in-the-middle attacks.
Do you have any feedback for this page? If so, you can open a new issue on our netdata/learn repository.