Skip to content

Comments

Update azure-vm.mdx#2173

Merged
robert-inkeep merged 1 commit intomainfrom
robert-inkeep-patch-1
Feb 19, 2026
Merged

Update azure-vm.mdx#2173
robert-inkeep merged 1 commit intomainfrom
robert-inkeep-patch-1

Conversation

@robert-inkeep
Copy link
Collaborator

No description provided.

@changeset-bot
Copy link

changeset-bot bot commented Feb 19, 2026

⚠️ No Changeset found

Latest commit: 995c139

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

@vercel
Copy link

vercel bot commented Feb 19, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
agents-api Ready Ready Preview, Comment Feb 19, 2026 6:09pm
agents-docs Ready Ready Preview, Comment Feb 19, 2026 6:09pm
agents-manage-ui Ready Ready Preview, Comment Feb 19, 2026 6:09pm

Request Review

Copy link
Contributor

@claude claude bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PR Review Summary

(2) Total Issues | Risk: Medium

🟠⚠️ Major (1) 🟠⚠️

🟠 1) azure-vm.mdx:195-215 Production section provides incomplete network architecture guidance

Issue: The new Production section instructs users to "restrict access to the VM and only expose 3002" but doesn't explain the full production topology. Earlier in the document (line 23), users are told to open ports 3000, 3002, 3050, 3051, and 3080. The Production section doesn't clarify:

  • How to access the Management UI (port 3000) after restricting VM access
  • Whether SigNoz (port 3080) and Nango (port 3050/3051) should remain accessible and how
  • How the Front Door HTTPS URL should be reflected in PUBLIC_INKEEP_AGENTS_API_URL environment variable
  • The note "You will need this for building agents" is vague about which access is needed

Why: Users following this guide will successfully set up the gateway for the API (port 3002), but lose the ability to access critical operational services. Without understanding the full architecture, they may be locked out of the Management UI where they actually build and configure agents, or the observability tools (SigNoz) needed to debug production issues.

Fix: Expand the Production section to clarify the complete network architecture:

  1. Add a brief architecture overview explaining which services are public vs internal:

    • Port 3002 (API) → Exposed via Application Gateway + Front Door for external consumers
    • Port 3000 (Manage UI), 3050/3051 (Nango), 3080 (SigNoz) → Administrator-only access
  2. Provide concrete guidance for internal service access:

    • Option A: IP allowlist in NSG rules for administrator IPs
    • Option B: Azure Bastion or VPN for secure internal access
  3. Add note about updating environment variables:

    # After Front Door setup, update to use the HTTPS endpoint:
    PUBLIC_INKEEP_AGENTS_API_URL=https://<your-frontdoor-endpoint>.azurefd.net

Refs:

🟡 Minor (1) 🟡

Inline Comments:

  • 🟡 Minor: azure-vm.mdx:205 Health probe host configuration may confuse users

💭 Consider (4) 💭

💭 1) azure-vm.mdx:195-215 Documentation inconsistency across cloud providers
Issue: This PR adds a Production section to Azure VM docs, but peer deployment docs (AWS EC2, GCP Compute Engine, Hetzner) don't have equivalent sections.
Why: Users comparing cloud options may find inconsistent depth of guidance.
Fix: Consider tracking this as a follow-up task to add equivalent production sections to other cloud docs, or extract common patterns into a shared production-hardening guide.
Refs: aws-ec2.mdx, gcp-compute-engine.mdx

💭 2) azure-vm.mdx:208-211 Front Door section lacks configuration details
Issue: The Front Door section mentions "Quick create" but doesn't specify SKU tier, WAF options, or complete origin configuration steps.
Why: Users may make suboptimal choices without guidance on production-appropriate settings.
Fix: Consider adding: SKU recommendation (Standard vs Premium), whether to enable WAF, and explicit origin health probe settings.

💭 3) azure-vm.mdx:213-215 "Restrict VM Access" guidance is vague
Issue: The section says "modify the inbound security rules, for example, to only specific IPs" without providing concrete examples or specifying which ports should remain accessible.
Why: Users don't know what IP ranges to allow or which operations require direct VM access.
Fix: Consider providing example NSG rules showing the recommended inbound rule configuration.

💭 4) azure-vm.mdx:19 Disk size recommendation differs from other cloud docs
Issue: Azure now recommends 128 GiB (P10) while AWS EC2 and GCP recommend 30 GB.
Why: The discrepancy may confuse users about actual storage requirements.
Fix: If the higher recommendation is intentional (for P10 tier performance characteristics), consider adding a brief note explaining why. Otherwise, consider aligning with ~30 GB if sufficient.


💡 APPROVE WITH SUGGESTIONS

Summary: This PR adds valuable production deployment guidance that will help users secure their Azure deployments. The main actionable item is clarifying the full production network architecture so users understand how to access operational services (Manage UI, SigNoz, Nango) after restricting VM access. The documentation improvement is welcome — consider addressing the architecture clarity concern before merging to avoid user confusion. 🎉

Discarded (3)
Location Issue Reason Discarded
azure-vm.mdx:195-215 Missing <Steps> component for sequential instructions The existing doc doesn't use <Steps> components elsewhere; bullet lists are the established pattern in this file.
azure-vm.mdx:205 Health probe 127.0.0.1 will cause probes to fail Incorrect — the Host header value doesn't affect probe routing. Probes target the backend VM regardless of Host header. The Inkeep API /health endpoint works regardless of Host header value.
azure-vm.mdx:195-215 Production section should be removed to maintain consistency Adding useful documentation shouldn't be blocked by the absence of similar docs elsewhere. The fix is to add equivalent sections to other docs, not remove this one.
Reviewers (3)
Reviewer Returned Main Findings Consider While You're Here Inline Comments Pending Recs Discarded
pr-review-docs 5 1 2 0 0 0 2
pr-review-product 3 0 1 0 1 0 1
pr-review-consistency 2 0 1 0 0 0 0
Total 10 1 4 0 1 0 3

Note: Findings from docs #1 and product #1 were merged (same underlying issue). Health probe findings from docs #2 and product #2 were merged.

- Wait for the gateway to deploy (can take >5 mins)
- On the gateway page, under "Settings" > "Backend pools", click on the pool. Under "Backend targets", add a target of type "Virtual machine" and select your VM.
- On the gateway page, under "Settings" > "Backend Settings", change the "Backend port" to 3002.
- On the gateway page, under "Settings" > "Health probes", add a new health probe. Provide a name, select HTTP for protocol. For the host use `127.0.0.1`, `3002` for the port, and `/health` for the path. "Pick host name from backend settings" and "Pick port from backend settings" should be "No". Then select your "Backend settings".
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🟡 Minor: Health probe host configuration may confuse users

Issue: The instruction to use 127.0.0.1 as the host for the health probe, combined with setting "Pick host name from backend settings" to "No", may confuse users about how Azure Application Gateway probes work. Users might expect 127.0.0.1 means "probe from localhost" rather than understanding it sets the HTTP Host header while the probe actually targets the VM's private IP.

Why: While this configuration likely works (the Inkeep API /health endpoint doesn't validate Host headers), the combination of settings is non-obvious and could lead to debugging confusion if users try to replicate this pattern elsewhere.

Fix: Consider clarifying this instruction with one of:

  • Use the VM's private IP address as the host (more intuitive)
  • Add a brief note explaining that 127.0.0.1 is the Host header value, not the probe target
  • Example: "For the host, enter the VM's private IP (found on the VM Overview page), or use 127.0.0.1 as the Inkeep API health endpoint responds regardless of Host header."

Refs:

@github-actions
Copy link
Contributor

🔎💬 Inkeep AI search and chat service is syncing content for source 'Inkeep Agent Framework Docs'

@github-actions github-actions bot deleted a comment from claude bot Feb 19, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant