-
Notifications
You must be signed in to change notification settings - Fork 5.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
plugin telegraf_inputs-openldap.conf broken after update to telegraf-1.29.5 from telegraf-1.29.2 #15436
Comments
Hi,
Can you:
This is the diff between 1.29.2 and 1.29.5. Unfortunately, I see no changes to any LDAP plugin code or any relevant dependencies. There was a similar report in #15236 where it turned out a gRPC library changed the default cipher suites allowed. Knowing what is expected could shed light on that. |
Hi, To narrow down the issue, we upgrade from last known working version 1.29.2-1 until we get the tls: handshake failure message. For us the last good/working version is telegraf-1.29.4-1.x86_64 For sake of simplicity localhost is used in the plugin conf file With 1.29.5 the error appears: tls:handshake failure |
Thank you very much for doing this. I think this does possibly narrow it down to the upgrade to go1.22.
I believe the TLS 1.0 and SSL 3.0 is the issue here, from the go1.22 docs:
What we do for other plugins is expose some common TLS options that allow the user to specify the minimum version (e.g. Let me double check with the team today and we can hopefully get a PR up for you to test. |
@paulusc please use the newer [[inputs.ldap]]
server = "ldaps://myhost.mydomain.com:636"
bind_dn = "cn=StatisticsActt,ou=InternalAccount,dc=mydomain,dc=com"
bind_password = "godknowswhatitisfromday1"
reverse_field_names = true
## TLS options
tls_min_version = "TLS10"
tls_cipher_suites = ["TLS_AES_256_GCM_SHA384"]
insecure_skip_verify = true according to your config above. |
@srebhan the latest version available (10.30.2) was not able to digest the tls_cipher_suites option. Install the telegraf-nightly.x86_64.rpm this one does not show errors but no datas received. Still working on it.
|
@paulusc which plugin are you using? You have to use |
@srebhan we are using the inputs.ldap plugin. This is our last attempt to get it working. Sorry for the delay to respond, busy week!
using the following config file
|
@paulusc when running |
@srebhan please find below the lines below SSL-Session:
|
Just to make sure we are not hunting ghosts, your [[inputs.ldap]]
server = "[ldaps://](ldaps://xxxxxxxxxxxxxx.xxxxxxxxxx.xxx)[xxxxxxxxxxxxxx](ldaps://xxxxxxxxxxxxxx.xxxxxxxxxx.xxx)[.xxxxxxxxxx.xxx](ldaps://xxxxxxxxxxxxxx.xxxxxxxxxx.xxx)"
bind_dn = "cn=StatisticsAcct,ou=InternalAccount,dc=xxxxxxxxxx,dc=xxx"
bind_password = "xxxxxxxxxxxxxxxxxxxxx"
reverse_field_names = true
# TLS options
tls_min_version = "TLS10"
tls_cipher_suites = ["TLS_AES_256_GCM_SHA384"]
insecure_skip_verify = true it should be something like server = "ldaps://xxxxxxxxxxxxxx.xxxxxxxxxx.xxx:636" |
@paulusc I think I found the issue. Cipher I put up PR #15570 which allows to specify Furthermore, you likely do not need to restrict the TLS minimum version as the server offers TLS1.2... |
@srebhan All right you nailed it. With this configuration and the latest night build we are all ok.
|
Closing this issue as the solution is to enable the corresponding insecure cipher. PR #15570 making this easier is already merged and will be released with v1.32.0... |
Relevant telegraf.conf
Logs from Telegraf
System info
telegraf-1.29.2.5 RHEL7
Docker
No response
Steps to reproduce
...
Expected behavior
Telegraf able to communicate openldap metrics to the host
Actual behavior
no communication
Additional info
happens when upgrading telegram from 1.29.2 to 1.29.5
Version 1.30.2 was also tested and same issue :
[inputs.openldap] Error in plugin: LDAP Result Code 200 "Network Error": remote error: tls: handshake failure
The text was updated successfully, but these errors were encountered: