-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Windows Cells not sending logs to syslog drain when posted via https. #39
Comments
We have created an issue in Pivotal Tracker to manage this. Unfortunately, the Pivotal Tracker project is private so you may be unable to view the contents of the story. The labels on this github issue will be updated when the story is started. |
Thanks for the report! Is the loggregator-agent-release/jobs/loggr-syslog-agent/spec Lines 38 to 39 in 1212c5e
Does this error only appear on |
This problem doesn't show up on our diego-cells. We haven't set any I can use powershell tools to get urls without any cert errors. For instance:
So it seems like at least the CA's used by windows tools include Digicert. |
@pusherofbrooms Hello! Sorry for this regression. We believe that this is due to syslog drains being serviced by syslog agents in cf-deployment v13+, rather than syslog adapters. The syslog agents run within the Windows Diego cells, rather than separate Linux VMs, so we're affected by this Golang issue. Our assumption is that you did not have syslog agents enabled in v12. Is this correct? The fix for this will be somewhat complex, but we hope to have it released within the month. |
Before I close this issue, just want to make sure that you are no longer experiencing this issue @pusherofbrooms cc @pianohacker |
@pianohacker We had default settings in this area, so in v12, if the default was to not enable syslog agents, that's probably what we had. @kkburr I don't see that the issue referenced by @pianohacker was closed or resolved. As of the latest version of v13 cf-deployment, we still have the issue. We won't be deploying v15 cf-deployment until January (barring critical security updates). |
Hi @pusherofbrooms, Sorry for the delay in getting back to you regarding this issue. As mentioned earlier this is due to Go not supporting loading the system cert pool on Windows: golang/go#16736 The good news is that there was recently a commit to Go master which restores the ability for Go to load the system cert pool on Windows. I tested compiling the syslog-agent with gotip and confirmed that the certificate was then trusted: If this is not backported to earlier versions of Go, this would ship in Go 1.18 (expected in Feb 2022) and be picked up when loggregator-agent-release bumps its version of Go. I think that it may also be possible with current versions of Go to have the syslog-agent not provide a cert pool on Windows when configuring TLS (and have Go fallback to using the platform support). As a workaround you can currently set Thanks, Andrew. |
Greetings acrmp, |
Since we upgraded from cf-deployment 12.45.0 up to 13.7.0 and up to present 13.10.0, our windows application and cell logs are not arriving at the syslog drains which use
https
post.The loggr-syslog-agent-windows logs contain the following suspicious error:
2020/09/08 15:50:21 failed to write to syslogdain.cloud.pcftest.com, retrying in 15s, err: x509: certificate signed by unknown authority
. syslogdain.cloud.pcftest.com does in fact have a valid cert signed by Digicert.I can work around this by setting
drain_skip_cert_verify
, but that doesn't seem optimal or desired.Here is how I reproduce the issue:
cf cups syslogdrain -l "https://MYLOGURL"
[email protected]:cloudfoundry-incubator/NET-sample-app.git
and bind it to the syslog drainCELL
orAPP/PROC/WEB
logs are sent to the drain applicationerr: x509
cert error in the loggr-syslog-agent-windows logsThe text was updated successfully, but these errors were encountered: