Hi Joshua,
Thank you for sharing the logs and your claim.conf.
There are two issues at play:
1. SSL certificate verification failure
Your logs show:
SSL: certificate verify error 19: self-signed certificate in certificate chain at depth 2,
subject: DC = INT, DC = BAG, CN = BAG-PKI-CA
Your network has a corporate Certificate Authority (BAG-PKI-CA) performing SSL inspection on outbound connections. The Netdata Agent cannot validate this certificate because it’s not in the standard trusted root store, causing the ACLK connection to fail.
2. Rate limiting (HTTP 429)
The repeated failed connection attempts have triggered a 30-day rate limit backoff on Netdata Cloud. This is why the Next Connection Attempt At is set so far in the future. Restarting the Netdata service after fixing the SSL issue will reset this.
Here are your options, in order of preference:
Option 1: Install the corporate CA certificate (recommended)
Obtain the BAG-PKI-CA certificate from your IT department and import it into the Windows trusted root store:
certutil -addstore "Root" path\to\corporate_ca_cert.cer
Then restart the Netdata service.
Option 2: Configure a corporate proxy
If your organisation routes outbound traffic through a proxy, add it to C:\Program Files\Netdata\etc\netdata\claim.conf:
[global]
url = https://app.netdata.cloud
token = YOUR_TOKEN
rooms = YOUR_ROOM
proxy = http://proxy.yourcompany.com:8080
insecure = no
Then restart the Netdata service.
Option 3: Disable SSL verification (last resort only)
If neither option above is possible, you can bypass SSL verification by setting insecure = yes in your claim.conf. This is not recommended as it reduces connection security, but can be used as a temporary measure.
After applying any of the above, restart the Netdata service to clear the rate limit backoff:
net stop Netdata && net start Netdata
Then verify the connection status:
netdatacli aclk-state
Kind Regards,
Kanela