See exactly what requests your IDE's Copilot agent sends, including token counts and response latency.
cella configures nftables REDIRECT rules and injects a MITM CA certificate into the container's system trust store (/usr/local/share/ca-certificates/cella-proxy.crt) and sets the LXD instance environment variable NODE_EXTRA_CA_CERTS so that Node.js processes trust it.
NODE_EXTRA_CA_CERTS
and will reject the MITM certificate.# systemd user service systemctl --user restart my-service.service # or restart the process directly pkill -f my-app && my-app &cella intentionally does not restart services on your behalf — it has no knowledge of what is running inside the container and you should remain in full control of your workloads.
When Copilot makes its first request, you'll see an approval overlay for api.business.githubcopilot.com.
Press Y to always allow it, or y for a one-time approval.
To approve all subdomains at once, press L to open the Allow/Deny list, navigate to the entry with j/k, press e to edit, and change it to *.githubcopilot.com.
The Audit panel now shows each API call:
15:04:02 ✅🔓 my-agent POST → api.business.githubcopilot.com /models/claude-sonnet-4.6/chat/completions [200] (5.3s)
Press M for the Inference Stats panel. cella parses the SSE response stream and extracts:
/models/claude-sonnet-4.6/chat/completions)Both standard OpenAI paths (/v1/chat/completions) and model-namespaced Copilot paths (/models/<name>/chat/completions) are detected automatically.
In the Audit panel, press S to export the audit log as JSON for further analysis.
api.github.com for auth token exchange. Approve that domain too for full visibility.