server { listen 443 ssl; server_name myagent.mycompany.com; ssl_certificate /etc/letsencrypt/live/myagent.mycompany.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/myagent.mycompany.com/privkey.pem; location / { proxy_pass http://localhost:5678; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection 'upgrade'; proxy_set_header Host $host; proxy_cache_bypass $http_upgrade; }
}
server { listen 443 ssl; server_name myagent.mycompany.com; ssl_certificate /etc/letsencrypt/live/myagent.mycompany.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/myagent.mycompany.com/privkey.pem; location / { proxy_pass http://localhost:5678; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection 'upgrade'; proxy_set_header Host $host; proxy_cache_bypass $http_upgrade; }
}
server { listen 443 ssl; server_name myagent.mycompany.com; ssl_certificate /etc/letsencrypt/live/myagent.mycompany.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/myagent.mycompany.com/privkey.pem; location / { proxy_pass http://localhost:5678; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection 'upgrade'; proxy_set_header Host $host; proxy_cache_bypass $http_upgrade; }
} - Installing Certbot (or figuring out Caddy, or configuring cloud provider ACM)
- Pointing DNS correctly before you request the cert
- Setting up an auto-renewal cron job, because Let's Encrypt certs expire every 90 days
- Hoping the renewal doesn't fail silently at 2am and leave your agent serving a security warning to your team on Monday morning - Cron runs as the wrong user and can't access the right directories
- The job runs but output goes to /dev/null and you never know it failed
- The system timezone doesn't match what your agent expects
- Daylight saving time causes your "runs at midnight" job to skip entirely once a year - SSL is automatic. Every instance gets a free, fully managed HTTPS certificate out of the box. Renewal is handled. You never think about Certbot again.
- No reverse proxy configuration. Your agent is live at yourname.agntable.cloud the moment you deploy. Custom domain? Bring your own — SSL is still managed for you.
- Updates happen. Agntable keeps your agent up-to-date with the latest releases and patches CVEs before they become incidents.
- 24/7 monitoring with auto-recovery. When a process crashes, it's restarted. If something deeper breaks, their engineering team handles it. 99.9% uptime SLA.
- Daily backups. Point-in-time recovery for your workflows and data. Configuring restic or S3 lifecycle rules is no longer your Saturday project. - Browse the agent catalog
- Pick a plan (Starter at $9.99/mo, Pro at $24.99/mo, Business at $49.99/mo — all with a 7-day free trial)
- Click deploy, give it a name
- Your agent is live in under 3 minutes - You need deep control over the kernel or runtime environment
- You have strict data residency requirements that a managed platform can't meet
- You're building something highly custom that doesn't fit a catalog agent
- You have a dedicated DevOps engineer and infrastructure is literally their job