Coder Social home page Coder Social logo

Comments (9)

powersj avatar powersj commented on June 2, 2024 1

Debian Server Telegraf Docker Container fails to connect to OPCUA while Ubuntu Machine connects

If you are able to successfully connect from one server, but not another then this points at something in networking getting in the way not Telegraf. Telegraf is produed as a static binary, so the binaries and libraries themselves are exactly the same.

My suggestion is to set client_trace = true in your [[inputs.opcua]] config to get even more verbose information about your connection. However, this does not point to an issue in Telegraf.

If you get additional data, such that you resolve the issue, you should post this here so others can learn from it or we can determine if the docs need updating.

from telegraf.

powersj avatar powersj commented on June 2, 2024 1

Starting Telegraf 1.21.4+ds1-0ubuntu2

This is not the same version you said you were using in your report Telegraf 1.30.2 ;)

That option is only available in newer versions.

from telegraf.

powersj avatar powersj commented on June 2, 2024 1

removing /etc/telegraf/cert.pem /etc/telegraf/key.pem enables it to connect. This might be my misunderstanding!

Thanks for following up and sharing what the root cause was.

it seems input.opcua_listener doesnt have this issue... but it seems its minimal reporting interval sadly cant be configured, probably cause it wasnt made for that.

The listener only listens so in general it ignores the Telegraf interval. There is the sampling_inerval option to tell the server when to check for new data that might be helpful depending on your situation.

from telegraf.

default-student avatar default-student commented on June 2, 2024

I tried to add the tracing, but it does not work.
2024-05-08T13:51:49Z I! Starting Telegraf 1.21.4+ds1-0ubuntu2
2024-05-08T13:51:49Z E! [telegraf] Error running agent: Error loading config file ./telegraf/conf/telegraf-kuehlungsanlage-opcua.conf: plugin inputs.opcua: line 36: configuration specified the fields ["client_trace"], but they weren't used

The working ping and accessible port makes me believe that the networking is alright, but maybe it isnt...

from telegraf.

default-student avatar default-student commented on June 2, 2024

Thank you for the quick answer, i will investigate further.

from telegraf.

default-student avatar default-student commented on June 2, 2024

Sorry for the wait, was finally able to get to it.

the client trace shows the origin of the EOF i guess

2024-05-14T07:14:25Z D! [agent] Initializing plugins
2024-05-14T07:14:25Z D! [inputs.opcua] Initialising OpcUAInputClient
2024-05-14T07:14:25Z D! [inputs.opcua] Initialising OpcUAClient
2024-05-14T07:14:25Z D! [inputs.opcua] Initialising node to metric mapping
2024-05-14T07:14:25Z D! [agent] Starting service inputs
2024-05-14T07:14:25Z D! [inputs.opcua] Connecting OPC UA Client to server
2024-05-14T07:14:25Z D! [inputs.opcua] uacp: connecting to opc.tcp://192.168.82.220:4840
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: start HEL/ACK handshake
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: sent HELF with 61 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: recv ACKF with 28 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: recv &uacp.Acknowledge{Version:0x0, ReceiveBufSize:0x2000, SendBufSize:0x2000, MaxMessageSize:0x200000, MaxChunkCount:0x100}
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/1: send *ua.OpenSecureChannelRequest with 132 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: recv OPNF with 136 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/1: recv OPNF with 136 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/1: recv *ua.OpenSecureChannelResponse
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/1: sending *ua.OpenSecureChannelResponse to handler
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1: received security token. channelID=1812551821 tokenID=1 createdAt=2024-05-14T08:57:27Z lifetime=1h0m0s
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/2: send *ua.GetEndpointsRequest with 98 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1: security token is refreshed at 2024-05-14T07:59:25Z (45m0s). channelID=1812551821 tokenID=1
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1: security token expires at 2024-05-14T10:12:27Z. channelID=1812551821 tokenID=1
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: recv MSGF with 6969 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/2: recv MSGF with 6969 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/2: recv *ua.GetEndpointsResponse
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/2: sending *ua.GetEndpointsResponse to handler
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1: Close()
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/3: send *ua.CloseSecureChannelRequest with 57 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: close
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1: readChunk EOF
2024-05-14T07:14:25Z D! [inputs.opcua] Configuring OPC UA connection options
2024-05-14T07:14:25Z D! [inputs.opcua] Loading cert/key from /etc/telegraf/cert.pem//etc/telegraf/key.pem
2024-05-14T07:14:25Z D! [inputs.opcua] security policy from configuration http://opcfoundation.org/UA/SecurityPolicy#None
2024-05-14T07:14:25Z D! [inputs.opcua] User cares about both the policy (http://opcfoundation.org/UA/SecurityPolicy#None) and security mode (MessageSecurityModeNone)
2024-05-14T07:14:25Z D! [inputs.opcua] Server has 5 endpoints
2024-05-14T07:14:25Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#None, mode MessageSecurityModeNone, level 0
2024-05-14T07:14:25Z D! [inputs.opcua] Security policy and mode found. Using server endpoint opc.tcp://192.168.82.220:4840 for security. Policy http://opcfoundation.org/UA/SecurityPolicy#None
2024-05-14T07:14:25Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256, mode MessageSecurityModeSign, level 60
2024-05-14T07:14:25Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256, mode MessageSecurityModeSignAndEncrypt, level 110
2024-05-14T07:14:25Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256, mode MessageSecurityModeSign, level 65
2024-05-14T07:14:25Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256, mode MessageSecurityModeSignAndEncrypt, level 115
2024-05-14T07:14:25Z D! [inputs.opcua] uacp: connecting to opc.tcp://192.168.82.220:4840
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: start HEL/ACK handshake
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: sent HELF with 61 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: recv ACKF with 28 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: recv &uacp.Acknowledge{Version:0x0, ReceiveBufSize:0x2000, SendBufSize:0x2000, MaxMessageSize:0x200000, MaxChunkCount:0x100}
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 2/1: send *ua.OpenSecureChannelRequest with 1332 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: recv ERRF with 16 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 2: readChunk EOF
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 2: failed to open a new secure channel
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: close
2024-05-14T07:14:25Z E! [inputs.opcua] Error in plugin: connect failed: error in Client Connection: EOF
2024-05-14T07:14:25Z D! [agent] Stopping service inputs
2024-05-14T07:14:25Z D! [agent] Input channel closed
2024-05-14T07:14:25Z D! [agent] Stopped Successfully
2024-05-14T07:14:25Z E! [telegraf] Error running agent: input plugins recorded 1 errors
root@2d0259f63fa0:/app# ping 192.168.82.220     
PING 192.168.82.220 (192.168.82.220) 56(84) bytes of data.
64 bytes from 192.168.82.220: icmp_seq=1 ttl=254 time=0.509 ms
64 bytes from 192.168.82.220: icmp_seq=2 ttl=254 time=0.377 ms

meanwhile locally it works even with 1.30.2

2024-05-14T07:19:57Z I! Starting Telegraf 1.30.2 brought to you by InfluxData the makers of InfluxDB
2024-05-14T07:19:57Z I! Available plugins: 233 inputs, 9 aggregators, 31 processors, 24 parsers, 60 outputs, 6 secret-stores
2024-05-14T07:19:57Z I! Loaded inputs: opcua
2024-05-14T07:19:57Z I! Loaded aggregators: 
2024-05-14T07:19:57Z I! Loaded processors: 
2024-05-14T07:19:57Z I! Loaded secretstores: 
2024-05-14T07:19:57Z W! Outputs are not used in testing mode!
2024-05-14T07:19:57Z I! Tags enabled: 
2024-05-14T07:19:57Z W! Deprecated inputs: 0 and 34 options
2024-05-14T07:19:57Z D! [agent] Initializing plugins
2024-05-14T07:19:57Z D! [inputs.opcua] Initialising OpcUAInputClient
2024-05-14T07:19:57Z D! [inputs.opcua] Initialising OpcUAClient
2024-05-14T07:19:57Z D! [inputs.opcua] Initialising node to metric mapping
2024-05-14T07:19:57Z D! [agent] Starting service inputs
2024-05-14T07:19:57Z D! [inputs.opcua] Connecting OPC UA Client to server
2024-05-14T07:19:57Z D! [inputs.opcua] uacp: connecting to opc.tcp://192.168.82.220:4840
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: start HEL/ACK handshake
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: sent HELF with 61 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: recv ACKF with 28 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: recv &uacp.Acknowledge{Version:0x0, ReceiveBufSize:0x2000, SendBufSize:0x2000, MaxMessageSize:0x200000, MaxChunkCount:0x100}
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/1: send *ua.OpenSecureChannelRequest with 132 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: recv OPNF with 136 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/1: recv OPNF with 136 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/1: recv *ua.OpenSecureChannelResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/1: sending *ua.OpenSecureChannelResponse to handler
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1: received security token. channelID=1812551826 tokenID=1 createdAt=2024-05-14T09:02:59Z lifetime=1h0m0s
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1: security token is refreshed at 2024-05-14T08:04:57Z (45m0s). channelID=1812551826 tokenID=1
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1: security token expires at 2024-05-14T10:17:59Z. channelID=1812551826 tokenID=1
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/2: send *ua.GetEndpointsRequest with 98 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: recv MSGF with 6969 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/2: recv MSGF with 6969 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/2: recv *ua.GetEndpointsResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/2: sending *ua.GetEndpointsResponse to handler
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1: Close()
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/3: send *ua.CloseSecureChannelRequest with 57 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: close
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1: readChunk EOF
2024-05-14T07:19:57Z D! [inputs.opcua] Configuring OPC UA connection options
2024-05-14T07:19:57Z D! [inputs.opcua] Loading cert/key from /etc/telegraf/cert.pem//etc/telegraf/key.pem
2024-05-14T07:19:57Z W! [inputs.opcua] Failed to load certificate: open /etc/telegraf/key.pem: permission denied
2024-05-14T07:19:57Z D! [inputs.opcua] security policy from configuration http://opcfoundation.org/UA/SecurityPolicy#None
2024-05-14T07:19:57Z D! [inputs.opcua] User cares about both the policy (http://opcfoundation.org/UA/SecurityPolicy#None) and security mode (MessageSecurityModeNone)
2024-05-14T07:19:57Z D! [inputs.opcua] Server has 5 endpoints
2024-05-14T07:19:57Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#None, mode MessageSecurityModeNone, level 0
2024-05-14T07:19:57Z D! [inputs.opcua] Security policy and mode found. Using server endpoint opc.tcp://192.168.82.220:4840 for security. Policy http://opcfoundation.org/UA/SecurityPolicy#None
2024-05-14T07:19:57Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256, mode MessageSecurityModeSign, level 60
2024-05-14T07:19:57Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256, mode MessageSecurityModeSignAndEncrypt, level 110
2024-05-14T07:19:57Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256, mode MessageSecurityModeSign, level 65
2024-05-14T07:19:57Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256, mode MessageSecurityModeSignAndEncrypt, level 115
2024-05-14T07:19:57Z D! [inputs.opcua] uacp: connecting to opc.tcp://192.168.82.220:4840
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: start HEL/ACK handshake
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: sent HELF with 61 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv ACKF with 28 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv &uacp.Acknowledge{Version:0x0, ReceiveBufSize:0x2000, SendBufSize:0x2000, MaxMessageSize:0x200000, MaxChunkCount:0x100}
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: send *ua.OpenSecureChannelRequest with 132 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv OPNF with 136 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: recv OPNF with 136 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: recv *ua.OpenSecureChannelResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: sending *ua.OpenSecureChannelResponse to handler
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2: received security token. channelID=1812551827 tokenID=1 createdAt=2024-05-14T09:02:59Z lifetime=1h0m0s
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2: security token is refreshed at 2024-05-14T08:04:57Z (45m0s). channelID=1812551827 tokenID=1
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/2: send *ua.CreateSessionRequest with 249 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2: security token expires at 2024-05-14T10:17:59Z. channelID=1812551827 tokenID=1
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv MSGF with 8052 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/2: recv MSGF with 8052 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/2: recv *ua.CreateSessionResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/2: sending *ua.CreateSessionResponse to handler
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/3: send *ua.ActivateSessionRequest with 117 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv MSGF with 96 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/3: recv MSGF with 96 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/3: recv *ua.ActivateSessionResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/3: sending *ua.ActivateSessionResponse to handler
debug: client: monitor: start
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/4: send *ua.ReadRequest with 99 bytes
debug: sub: pause
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv MSGF with 232 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/4: recv MSGF with 232 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/4: recv *ua.ReadResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/4: sending *ua.ReadResponse to handler
2024-05-14T07:19:57Z D! [inputs.opcua] Connected to OPC UA Server
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/5: send *ua.RegisterNodesRequest with 1796 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uacp 2: recv MSGF with 294 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/5: recv MSGF with 294 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/5: recv *ua.RegisterNodesResponse
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/5: sending *ua.RegisterNodesResponse to handler
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/6: send *ua.ReadRequest with 792 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uacp 2: recv MSGF with 770 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/6: recv MSGF with 770 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/6: recv *ua.ReadResponse
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/6: sending *ua.ReadResponse to handler
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/7: send *ua.ReadRequest with 792 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uacp 2: recv MSGF with 770 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/7: recv MSGF with 770 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/7: recv *ua.ReadResponse
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/7: sending *ua.ReadResponse to handler
2024-05-14T07:19:58Z D! [agent] Stopping service inputs
2024-05-14T07:19:58Z D! [agent] Input channel closed
2024-05-14T07:19:58Z D! [agent] Stopped Successfully
> Kuehlungsanlage,id=ns\=3;s\="600_DB_Frostschutz_Schrittkette"."boFrostschutzErforderlich" Frostschutz\ Erforderlich=false,Quality="The operation succeeded. StatusGood (0x0)" 1715671198000000000

the important lines to me are:
in docker this happens and telegraf cannot connect:

2024-05-14T07:14:25Z D! [inputs.opcua] uasc 2/1: send *ua.OpenSecureChannelRequest with 1332 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: recv ERRF with 16 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 2: readChunk EOF

meanwhile locally it works:

2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: send *ua.OpenSecureChannelRequest with 132 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv OPNF with 136 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: recv OPNF with 136 byte

from telegraf.

default-student avatar default-student commented on June 2, 2024

with 132 bytes

locally vs in docker

with 1332 bytes

is that a hint?

from telegraf.

default-student avatar default-student commented on June 2, 2024
2024-05-14T07:57:26Z D! [inputs.opcua_listener] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256, mode MessageSecurityModeSignAndEncrypt, level 115
2024-05-14T07:57:26Z D! [inputs.opcua_listener] uacp: connecting to opc.tcp://192.168.82.220:4840
2024-05-14T07:57:26Z D! [inputs.opcua_listener] uacp 2: start HEL/ACK handshake
2024-05-14T07:57:26Z D! [inputs.opcua_listener] uacp 2: sent HELF with 61 bytes
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uacp 2: recv ACKF with 28 bytes
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uacp 2: recv &uacp.Acknowledge{Version:0x0, ReceiveBufSize:0x2000, SendBufSize:0x2000, MaxMessageSize:0x200000, MaxChunkCount:0x100}
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uasc 2/1: send *ua.OpenSecureChannelRequest with 1332 bytes
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uacp 2: recv ERRF with 16 bytes
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uasc 2: readChunk EOF
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uasc 2: failed to open a new secure channel
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uacp 2: close
2024-05-14T07:57:27Z E! [telegraf] Error running agent: starting input inputs.opcua_listener: error in Client Connection: EOF

Also reproducible with the opcua_listener plugin

from telegraf.

default-student avatar default-student commented on June 2, 2024

I got it to work!
removing /etc/telegraf/cert.pem /etc/telegraf/key.pem enables it to connect. This might be my misunderstanding!
It is however still very unstable. Every once in a while

2024-05-14T08:25:00Z D! [inputs.opcua] uasc 3/11: send *ua.CloseSecureChannelRequest with 57 bytes
telegraf-kuehlungsanlage-opcua_1  | 2024-05-14T08:25:00Z D! [inputs.opcua] uacp 3: close
telegraf-kuehlungsanlage-opcua_1  | 2024-05-14T08:25:00Z D! [inputs.opcua] uasc 3: readChunk EOF
telegraf-kuehlungsanlage-opcua_1  | 2024-05-14T08:25:00Z E! [inputs.opcua] Error in plugin: RegisterNodes Read failed: The session id is not valid. StatusBadSessionIDInvali

causes the telegraf instance to reconnect.
it seems input.opcua_listener doesnt have this issue... but it seems its minimal reporting interval sadly cant be configured, probably cause it wasnt made for that.

I while i am happy gopcua exists, it doesnt seem stable to me.
If you want to close it at that, feel free to do so.

from telegraf.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.