HOOP_KEY).
Deploying the Agent
Each deployment method below requires aHOOP_KEY. Generate one in the web app under Agents, or via the API. It looks like:
HOOP_KEY in your chosen method below.
Docker Compose
Add the agent as a service in yourdocker-compose.yml:
Kubernetes (Helm)
Deploy the agent into a Kubernetes cluster using the official Helm chart:Linux / macOS (System Service)
The hoop agent is distributed as a single binary. Install it with the official install script:hoop-agent) that starts automatically on login and restarts on failure. See Standard Mode below for details.
Configuration Reference
| Variable | Description | Default |
|---|---|---|
HOOP_KEY | Agent authentication DSN (required) | — |
LOG_LEVEL | Log level: debug, info, warn, error | info |
LOG_ENCODING | Log format: json, console, human, verbose | auto |
HOOP_TLSCA | Path to a custom TLS CA certificate | — |
HOOP_TLS_SKIP_VERIFY | Skip TLS verification (not recommended) | false |
Standard Mode
Standard mode runs the agent as a standalone background service. Use this mode when you want a long-lived, stable connection that can handle multiple resource types with automatic start/stop via the OS service manager. It’s ideal for:- Databases
- Port-Forward Internal Services
- Container Platforms (kubectl, aws ecs, etc)
- Acting as a Jump Host
Supported platforms
- Linux: managed via systemd
- macOS: managed via launchctl
- Install or update the agent service definition
- Enable the service to start on login
- Start the agent immediately
Managing the Agent Service
- Keep
HOOP_KEYset in the environment where you runhoop agent startso the daemon can authenticate on boot. - If you rotate credentials, run
hoop agent stopthenhoop agent startto reload them.