initial / docker fixes for agent and agent gateway #2849
No reviewers
Labels
No labels
1week
2weeks
Failed compliance check
IP cameras
NATS
Possible security concern
Review effort 1/5
Review effort 2/5
Review effort 3/5
Review effort 4/5
Review effort 5/5
UI
aardvark
accessibility
amd64
api
arm64
auth
back-end
bgp
blog
bug
build
checkers
ci-cd
cleanup
cnpg
codex
core
dependencies
device-management
documentation
duplicate
dusk
ebpf
enhancement
eta 1d
eta 1hr
eta 3d
eta 3hr
feature
fieldsurvey
github_actions
go
good first issue
help wanted
invalid
javascript
k8s
log-collector
mapper
mtr
needs-triage
netflow
network-sweep
observability
oracle
otel
plug-in
proton
python
question
reddit
redhat
research
rperf
rperf-checker
rust
sdk
security
serviceradar-agent
serviceradar-agent-gateway
serviceradar-web
serviceradar-web-ng
siem
snmp
sysmon
topology
ubiquiti
wasm
wontfix
zen-engine
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
carverauto/serviceradar!2849
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "refs/pull/2849/head"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Imported from GitHub pull request.
Original GitHub pull request: #2698
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/pull/2698
Original created: 2026-02-04T21:21:54Z
Original updated: 2026-02-04T22:53:02Z
Original head: carverauto/serviceradar:2696-bugdocker-agent-cant-talk-to-agent-gateway
Original base: staging
Original merged: 2026-02-04T22:52:59Z by @mfreeman451
User description
IMPORTANT: Please sign the Developer Certificate of Origin
Thank you for your contribution to ServiceRadar. Please note, when contributing, the developer must include
a DCO sign-off statement indicating the DCO acceptance in one commit message. Here
is an example DCO Signed-off-by line in a commit message:
Describe your changes
Issue ticket number and link
Code checklist before requesting a review
PR Type
Bug fix
Description
Fix agent-gateway connectivity in Docker Compose by adding network aliases
Add agent-gateway service dependency to ensure gateway readiness before agent startup
Update agent bootstrap configs to use stable gateway DNS alias
agent-gateway.serviceradarAdd Docker Compose troubleshooting documentation for agent enrollment issues
Diagram Walkthrough
File Walkthrough
docker-compose.yml
Add agent-gateway dependency and network aliasesdocker-compose.yml
agent-gatewayservice dependency withservice_healthycondition toagent service
agent-gatewayandagent-gateway.serviceradaragent-minimal.docker.json
Update gateway address to use stable DNS aliasdocker/compose/agent-minimal.docker.json
gateway_addrfromagent-gateway:50052toagent-gateway.serviceradar:50052server_namein gateway_security fromagent-gatewaytoagent-gateway.serviceradaragent.docker.json
Update gateway address to stable DNS aliasdocker/compose/agent.docker.json
gateway_addrfromagent-gateway:50052toagent-gateway.serviceradar:50052agent.mtls.json
Update gateway address to stable DNS aliasdocker/compose/agent.mtls.json
gateway_addrfromagent-gateway:50052toagent-gateway.serviceradar:50052docker-setup.md
Add agent enrollment troubleshooting documentationdocs/docs/docker-setup.md
proposal.md
Add change proposal for agent-gateway connectivity fixopenspec/changes/fix-docker-agent-gateway-connectivity/proposal.md
agent-gateway in Docker Compose
sequencing
spec.md
Add specification for agent-gateway connectivity requirementopenspec/changes/fix-docker-agent-gateway-connectivity/specs/docker-compose-stack/spec.md
gateway without manual edits
alias
tasks.md
Add implementation tasks for connectivity fixopenspec/changes/fix-docker-agent-gateway-connectivity/tasks.md
dependencies, and documentation
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/2698#issuecomment-3849810447
Original created: 2026-02-04T21:22:26Z
PR Compliance Guide 🔍
Below is a summary of compliance checks for this PR:
No security concerns identified
No security vulnerabilities detected by AI analysis. Human verification advised for critical code.🎫 #2696
agentcan resolve and connect toagent-gateway(avoid
context deadline exceededonagent-gateway:50052) on a fresh install.without manual edits (e.g., a network alias).
ready/healthy.
Compose.
docker compose up -dafter removing volumes) the agentenrolls successfully and gateway logs show enrollment.
Codebase context is not defined
Follow the guide to enable codebase context checks.
Generic: Comprehensive Audit Trails
Objective: To create a detailed and reliable record of critical system actions for security analysis
and compliance.
Status: Passed
Generic: Meaningful Naming and Self-Documenting Code
Objective: Ensure all identifiers clearly express their purpose and intent, making code
self-documenting
Status: Passed
Generic: Robust Error Handling and Edge Case Management
Objective: Ensure comprehensive error handling that provides meaningful context and graceful
degradation
Status: Passed
Generic: Secure Error Handling
Objective: To prevent the leakage of sensitive system information through error messages while
providing sufficient detail for internal debugging.
Status: Passed
Generic: Secure Logging Practices
Objective: To ensure logs are useful for debugging and auditing without exposing sensitive
information like PII, PHI, or cardholder data.
Status: Passed
Generic: Security-First Input Validation and Data Handling
Objective: Ensure all data inputs are validated, sanitized, and handled securely to prevent
vulnerabilities
Status: Passed
Compliance status legend
🟢 - Fully Compliant🟡 - Partial Compliant
🔴 - Not Compliant
⚪ - Requires Further Human Verification
🏷️ - Compliance label
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/2698#issuecomment-3849814879
Original created: 2026-02-04T21:23:32Z
PR Code Suggestions ✨
Explore these optional code suggestions:
Update TLS certificate for new hostname
The PR updates the agent's target address to
agent-gateway.serviceradarbutoverlooks updating the TLS certificate generation. To prevent TLS handshake
failures, the new hostname must be added to the gateway certificate's Subject
Alternative Name (SAN) list.
Examples:
docker/compose/agent-minimal.docker.json [7-15]
docker-compose.yml [505-508]
Solution Walkthrough:
Before:
After:
Suggestion importance[1-10]: 9
__
Why: This suggestion correctly identifies a critical oversight where changing the service hostname to
agent-gateway.serviceradarwill cause TLS validation to fail unless the server certificate's Subject Alternative Name (SAN) is also updated, rendering the PR's fix incomplete.Remove unused and confusing alias
In
docker-compose.yml, remove the redundantagent-gatewaynetwork alias, as allconfigurations now use
agent-gateway.serviceradar.docker-compose.yml [505-508]
[To ensure code accuracy, apply this suggestion manually]Suggestion importance[1-10]: 4
__
Why: The suggestion correctly identifies that the
agent-gatewayalias is redundant since all configurations were updated to useagent-gateway.serviceradar, and removing it improves configuration clarity and consistency.