Created
January 19, 2021 12:54
-
-
Save hreidar/43da13e3d25558365cbe79fed6084ead to your computer and use it in GitHub Desktop.
vector to eck errors
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# vector elastic sink config | |
[sinks.eck-c1-ip_leases] | |
type = "elasticsearch" | |
inputs = ["ipv4-json-rename"] | |
healthcheck = true | |
request.concurrency = "auto" | |
host = "https://eck-c1.my.org:9200" | |
tls.verify_hostname = false | |
index = "ip_leases-%Y-%m" | |
auth.strategy = "basic" | |
auth.user = "${ECK_USERNAME}" | |
auth.password = "${ECK_PASSWORD}" | |
# vector logs | |
Jan 19 12:42:43.049 ERROR sink{component_kind="sink" component_name=eck-c1-ip_leases component_type=elasticsearch}:request{request_id=15}: vector::sinks::util::retries: Unexpected error type; dropping the request. error=Failed to make HTTP(S) request | |
Jan 19 12:42:43.049 ERROR sink{component_kind="sink" component_name=eck-c1-ip_leases component_type=elasticsearch}:request{request_id=15}: vector::sinks::util::sink: Request failed. error=Failed to make HTTP(S) request | |
# elasticsearch logs | |
2021-01-19T12:43:32.949026757Z "Caused by: javax.crypto.BadPaddingException: Insufficient buffer remaining for AEAD cipher fragment (2). Needs to be more than tag size (16)", | |
2021-01-19T12:43:32.949037439Z "at sun.security.ssl.SSLCipher$T13GcmReadCipherGenerator$GcmReadCipher.decrypt(SSLCipher.java:1895) ~[?:?]", | |
2021-01-19T12:43:32.949047866Z "at sun.security.ssl.SSLEngineInputRecord.decodeInputRecord(SSLEngineInputRecord.java:240) ~[?:?]", | |
2021-01-19T12:43:32.949058554Z "at sun.security.ssl.SSLEngineInputRecord.decode(SSLEngineInputRecord.java:197) ~[?:?]", | |
2021-01-19T12:43:32.949068955Z "at sun.security.ssl.SSLEngineInputRecord.decode(SSLEngineInputRecord.java:160) ~[?:?]", | |
2021-01-19T12:43:32.949079429Z "at sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) ~[?:?]", | |
2021-01-19T12:43:32.949089775Z "at sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:736) ~[?:?]", | |
2021-01-19T12:43:32.949100105Z "at sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:691) ~[?:?]", | |
2021-01-19T12:43:32.949120039Z "at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:506) ~[?:?]", | |
2021-01-19T12:43:32.949139135Z "at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:482) ~[?:?]", | |
2021-01-19T12:43:32.949156222Z "at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:637) ~[?:?]", | |
2021-01-19T12:43:32.949167508Z "at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:282) ~[netty-handler-4.1.49.Final.jar:4.1.49.Final]", | |
2021-01-19T12:43:32.949178315Z "at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1372) ~[netty-handler-4.1.49.Final.jar:4.1.49.Final]", | |
2021-01-19T12:43:32.949189070Z "at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1267) ~[netty-handler-4.1.49.Final.jar:4.1.49.Final]", | |
2021-01-19T12:43:32.949199977Z "at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1314) ~[netty-handler-4.1.49.Final.jar:4.1.49.Final]", | |
2021-01-19T12:43:32.949212517Z "at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:501) ~[netty-codec-4.1.49.Final.jar:4.1.49.Final]", | |
2021-01-19T12:43:32.949223853Z "at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:440) ~[netty-codec-4.1.49.Final.jar:4.1.49.Final]", | |
2021-01-19T12:43:32.949234773Z "... 16 more"] } |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment