Skip to content

Instantly share code, notes, and snippets.

@hreidar
Created January 19, 2021 12:54
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save hreidar/43da13e3d25558365cbe79fed6084ead to your computer and use it in GitHub Desktop.
Save hreidar/43da13e3d25558365cbe79fed6084ead to your computer and use it in GitHub Desktop.
vector to eck errors
# vector elastic sink config
[sinks.eck-c1-ip_leases]
type = "elasticsearch"
inputs = ["ipv4-json-rename"]
healthcheck = true
request.concurrency = "auto"
host = "https://eck-c1.my.org:9200"
tls.verify_hostname = false
index = "ip_leases-%Y-%m"
auth.strategy = "basic"
auth.user = "${ECK_USERNAME}"
auth.password = "${ECK_PASSWORD}"
# vector logs
Jan 19 12:42:43.049 ERROR sink{component_kind="sink" component_name=eck-c1-ip_leases component_type=elasticsearch}:request{request_id=15}: vector::sinks::util::retries: Unexpected error type; dropping the request. error=Failed to make HTTP(S) request
Jan 19 12:42:43.049 ERROR sink{component_kind="sink" component_name=eck-c1-ip_leases component_type=elasticsearch}:request{request_id=15}: vector::sinks::util::sink: Request failed. error=Failed to make HTTP(S) request
# elasticsearch logs
2021-01-19T12:43:32.949026757Z "Caused by: javax.crypto.BadPaddingException: Insufficient buffer remaining for AEAD cipher fragment (2). Needs to be more than tag size (16)",
2021-01-19T12:43:32.949037439Z "at sun.security.ssl.SSLCipher$T13GcmReadCipherGenerator$GcmReadCipher.decrypt(SSLCipher.java:1895) ~[?:?]",
2021-01-19T12:43:32.949047866Z "at sun.security.ssl.SSLEngineInputRecord.decodeInputRecord(SSLEngineInputRecord.java:240) ~[?:?]",
2021-01-19T12:43:32.949058554Z "at sun.security.ssl.SSLEngineInputRecord.decode(SSLEngineInputRecord.java:197) ~[?:?]",
2021-01-19T12:43:32.949068955Z "at sun.security.ssl.SSLEngineInputRecord.decode(SSLEngineInputRecord.java:160) ~[?:?]",
2021-01-19T12:43:32.949079429Z "at sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) ~[?:?]",
2021-01-19T12:43:32.949089775Z "at sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:736) ~[?:?]",
2021-01-19T12:43:32.949100105Z "at sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:691) ~[?:?]",
2021-01-19T12:43:32.949120039Z "at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:506) ~[?:?]",
2021-01-19T12:43:32.949139135Z "at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:482) ~[?:?]",
2021-01-19T12:43:32.949156222Z "at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:637) ~[?:?]",
2021-01-19T12:43:32.949167508Z "at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:282) ~[netty-handler-4.1.49.Final.jar:4.1.49.Final]",
2021-01-19T12:43:32.949178315Z "at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1372) ~[netty-handler-4.1.49.Final.jar:4.1.49.Final]",
2021-01-19T12:43:32.949189070Z "at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1267) ~[netty-handler-4.1.49.Final.jar:4.1.49.Final]",
2021-01-19T12:43:32.949199977Z "at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1314) ~[netty-handler-4.1.49.Final.jar:4.1.49.Final]",
2021-01-19T12:43:32.949212517Z "at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:501) ~[netty-codec-4.1.49.Final.jar:4.1.49.Final]",
2021-01-19T12:43:32.949223853Z "at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:440) ~[netty-codec-4.1.49.Final.jar:4.1.49.Final]",
2021-01-19T12:43:32.949234773Z "... 16 more"] }
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment