Comments (9)
Debian Server Telegraf Docker Container fails to connect to OPCUA while Ubuntu Machine connects
If you are able to successfully connect from one server, but not another then this points at something in networking getting in the way not Telegraf. Telegraf is produed as a static binary, so the binaries and libraries themselves are exactly the same.
My suggestion is to set client_trace = true
in your [[inputs.opcua]]
config to get even more verbose information about your connection. However, this does not point to an issue in Telegraf.
If you get additional data, such that you resolve the issue, you should post this here so others can learn from it or we can determine if the docs need updating.
from telegraf.
Starting Telegraf 1.21.4+ds1-0ubuntu2
This is not the same version you said you were using in your report Telegraf 1.30.2
;)
That option is only available in newer versions.
from telegraf.
removing /etc/telegraf/cert.pem /etc/telegraf/key.pem enables it to connect. This might be my misunderstanding!
Thanks for following up and sharing what the root cause was.
it seems input.opcua_listener doesnt have this issue... but it seems its minimal reporting interval sadly cant be configured, probably cause it wasnt made for that.
The listener only listens so in general it ignores the Telegraf interval. There is the sampling_inerval
option to tell the server when to check for new data that might be helpful depending on your situation.
from telegraf.
I tried to add the tracing, but it does not work.
2024-05-08T13:51:49Z I! Starting Telegraf 1.21.4+ds1-0ubuntu2
2024-05-08T13:51:49Z E! [telegraf] Error running agent: Error loading config file ./telegraf/conf/telegraf-kuehlungsanlage-opcua.conf: plugin inputs.opcua: line 36: configuration specified the fields ["client_trace"], but they weren't used
The working ping and accessible port makes me believe that the networking is alright, but maybe it isnt...
from telegraf.
Thank you for the quick answer, i will investigate further.
from telegraf.
Sorry for the wait, was finally able to get to it.
the client trace shows the origin of the EOF i guess
2024-05-14T07:14:25Z D! [agent] Initializing plugins
2024-05-14T07:14:25Z D! [inputs.opcua] Initialising OpcUAInputClient
2024-05-14T07:14:25Z D! [inputs.opcua] Initialising OpcUAClient
2024-05-14T07:14:25Z D! [inputs.opcua] Initialising node to metric mapping
2024-05-14T07:14:25Z D! [agent] Starting service inputs
2024-05-14T07:14:25Z D! [inputs.opcua] Connecting OPC UA Client to server
2024-05-14T07:14:25Z D! [inputs.opcua] uacp: connecting to opc.tcp://192.168.82.220:4840
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: start HEL/ACK handshake
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: sent HELF with 61 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: recv ACKF with 28 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: recv &uacp.Acknowledge{Version:0x0, ReceiveBufSize:0x2000, SendBufSize:0x2000, MaxMessageSize:0x200000, MaxChunkCount:0x100}
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/1: send *ua.OpenSecureChannelRequest with 132 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: recv OPNF with 136 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/1: recv OPNF with 136 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/1: recv *ua.OpenSecureChannelResponse
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/1: sending *ua.OpenSecureChannelResponse to handler
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1: received security token. channelID=1812551821 tokenID=1 createdAt=2024-05-14T08:57:27Z lifetime=1h0m0s
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/2: send *ua.GetEndpointsRequest with 98 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1: security token is refreshed at 2024-05-14T07:59:25Z (45m0s). channelID=1812551821 tokenID=1
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1: security token expires at 2024-05-14T10:12:27Z. channelID=1812551821 tokenID=1
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: recv MSGF with 6969 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/2: recv MSGF with 6969 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/2: recv *ua.GetEndpointsResponse
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/2: sending *ua.GetEndpointsResponse to handler
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1: Close()
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1/3: send *ua.CloseSecureChannelRequest with 57 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 1: close
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 1: readChunk EOF
2024-05-14T07:14:25Z D! [inputs.opcua] Configuring OPC UA connection options
2024-05-14T07:14:25Z D! [inputs.opcua] Loading cert/key from /etc/telegraf/cert.pem//etc/telegraf/key.pem
2024-05-14T07:14:25Z D! [inputs.opcua] security policy from configuration http://opcfoundation.org/UA/SecurityPolicy#None
2024-05-14T07:14:25Z D! [inputs.opcua] User cares about both the policy (http://opcfoundation.org/UA/SecurityPolicy#None) and security mode (MessageSecurityModeNone)
2024-05-14T07:14:25Z D! [inputs.opcua] Server has 5 endpoints
2024-05-14T07:14:25Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#None, mode MessageSecurityModeNone, level 0
2024-05-14T07:14:25Z D! [inputs.opcua] Security policy and mode found. Using server endpoint opc.tcp://192.168.82.220:4840 for security. Policy http://opcfoundation.org/UA/SecurityPolicy#None
2024-05-14T07:14:25Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256, mode MessageSecurityModeSign, level 60
2024-05-14T07:14:25Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256, mode MessageSecurityModeSignAndEncrypt, level 110
2024-05-14T07:14:25Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256, mode MessageSecurityModeSign, level 65
2024-05-14T07:14:25Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256, mode MessageSecurityModeSignAndEncrypt, level 115
2024-05-14T07:14:25Z D! [inputs.opcua] uacp: connecting to opc.tcp://192.168.82.220:4840
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: start HEL/ACK handshake
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: sent HELF with 61 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: recv ACKF with 28 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: recv &uacp.Acknowledge{Version:0x0, ReceiveBufSize:0x2000, SendBufSize:0x2000, MaxMessageSize:0x200000, MaxChunkCount:0x100}
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 2/1: send *ua.OpenSecureChannelRequest with 1332 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: recv ERRF with 16 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 2: readChunk EOF
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 2: failed to open a new secure channel
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: close
2024-05-14T07:14:25Z E! [inputs.opcua] Error in plugin: connect failed: error in Client Connection: EOF
2024-05-14T07:14:25Z D! [agent] Stopping service inputs
2024-05-14T07:14:25Z D! [agent] Input channel closed
2024-05-14T07:14:25Z D! [agent] Stopped Successfully
2024-05-14T07:14:25Z E! [telegraf] Error running agent: input plugins recorded 1 errors
root@2d0259f63fa0:/app# ping 192.168.82.220
PING 192.168.82.220 (192.168.82.220) 56(84) bytes of data.
64 bytes from 192.168.82.220: icmp_seq=1 ttl=254 time=0.509 ms
64 bytes from 192.168.82.220: icmp_seq=2 ttl=254 time=0.377 ms
meanwhile locally it works even with 1.30.2
2024-05-14T07:19:57Z I! Starting Telegraf 1.30.2 brought to you by InfluxData the makers of InfluxDB
2024-05-14T07:19:57Z I! Available plugins: 233 inputs, 9 aggregators, 31 processors, 24 parsers, 60 outputs, 6 secret-stores
2024-05-14T07:19:57Z I! Loaded inputs: opcua
2024-05-14T07:19:57Z I! Loaded aggregators:
2024-05-14T07:19:57Z I! Loaded processors:
2024-05-14T07:19:57Z I! Loaded secretstores:
2024-05-14T07:19:57Z W! Outputs are not used in testing mode!
2024-05-14T07:19:57Z I! Tags enabled:
2024-05-14T07:19:57Z W! Deprecated inputs: 0 and 34 options
2024-05-14T07:19:57Z D! [agent] Initializing plugins
2024-05-14T07:19:57Z D! [inputs.opcua] Initialising OpcUAInputClient
2024-05-14T07:19:57Z D! [inputs.opcua] Initialising OpcUAClient
2024-05-14T07:19:57Z D! [inputs.opcua] Initialising node to metric mapping
2024-05-14T07:19:57Z D! [agent] Starting service inputs
2024-05-14T07:19:57Z D! [inputs.opcua] Connecting OPC UA Client to server
2024-05-14T07:19:57Z D! [inputs.opcua] uacp: connecting to opc.tcp://192.168.82.220:4840
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: start HEL/ACK handshake
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: sent HELF with 61 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: recv ACKF with 28 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: recv &uacp.Acknowledge{Version:0x0, ReceiveBufSize:0x2000, SendBufSize:0x2000, MaxMessageSize:0x200000, MaxChunkCount:0x100}
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/1: send *ua.OpenSecureChannelRequest with 132 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: recv OPNF with 136 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/1: recv OPNF with 136 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/1: recv *ua.OpenSecureChannelResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/1: sending *ua.OpenSecureChannelResponse to handler
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1: received security token. channelID=1812551826 tokenID=1 createdAt=2024-05-14T09:02:59Z lifetime=1h0m0s
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1: security token is refreshed at 2024-05-14T08:04:57Z (45m0s). channelID=1812551826 tokenID=1
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1: security token expires at 2024-05-14T10:17:59Z. channelID=1812551826 tokenID=1
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/2: send *ua.GetEndpointsRequest with 98 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: recv MSGF with 6969 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/2: recv MSGF with 6969 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/2: recv *ua.GetEndpointsResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/2: sending *ua.GetEndpointsResponse to handler
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1: Close()
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1/3: send *ua.CloseSecureChannelRequest with 57 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 1: close
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 1: readChunk EOF
2024-05-14T07:19:57Z D! [inputs.opcua] Configuring OPC UA connection options
2024-05-14T07:19:57Z D! [inputs.opcua] Loading cert/key from /etc/telegraf/cert.pem//etc/telegraf/key.pem
2024-05-14T07:19:57Z W! [inputs.opcua] Failed to load certificate: open /etc/telegraf/key.pem: permission denied
2024-05-14T07:19:57Z D! [inputs.opcua] security policy from configuration http://opcfoundation.org/UA/SecurityPolicy#None
2024-05-14T07:19:57Z D! [inputs.opcua] User cares about both the policy (http://opcfoundation.org/UA/SecurityPolicy#None) and security mode (MessageSecurityModeNone)
2024-05-14T07:19:57Z D! [inputs.opcua] Server has 5 endpoints
2024-05-14T07:19:57Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#None, mode MessageSecurityModeNone, level 0
2024-05-14T07:19:57Z D! [inputs.opcua] Security policy and mode found. Using server endpoint opc.tcp://192.168.82.220:4840 for security. Policy http://opcfoundation.org/UA/SecurityPolicy#None
2024-05-14T07:19:57Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256, mode MessageSecurityModeSign, level 60
2024-05-14T07:19:57Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256, mode MessageSecurityModeSignAndEncrypt, level 110
2024-05-14T07:19:57Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256, mode MessageSecurityModeSign, level 65
2024-05-14T07:19:57Z D! [inputs.opcua] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256, mode MessageSecurityModeSignAndEncrypt, level 115
2024-05-14T07:19:57Z D! [inputs.opcua] uacp: connecting to opc.tcp://192.168.82.220:4840
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: start HEL/ACK handshake
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: sent HELF with 61 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv ACKF with 28 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv &uacp.Acknowledge{Version:0x0, ReceiveBufSize:0x2000, SendBufSize:0x2000, MaxMessageSize:0x200000, MaxChunkCount:0x100}
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: send *ua.OpenSecureChannelRequest with 132 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv OPNF with 136 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: recv OPNF with 136 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: recv *ua.OpenSecureChannelResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: sending *ua.OpenSecureChannelResponse to handler
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2: received security token. channelID=1812551827 tokenID=1 createdAt=2024-05-14T09:02:59Z lifetime=1h0m0s
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2: security token is refreshed at 2024-05-14T08:04:57Z (45m0s). channelID=1812551827 tokenID=1
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/2: send *ua.CreateSessionRequest with 249 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2: security token expires at 2024-05-14T10:17:59Z. channelID=1812551827 tokenID=1
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv MSGF with 8052 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/2: recv MSGF with 8052 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/2: recv *ua.CreateSessionResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/2: sending *ua.CreateSessionResponse to handler
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/3: send *ua.ActivateSessionRequest with 117 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv MSGF with 96 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/3: recv MSGF with 96 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/3: recv *ua.ActivateSessionResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/3: sending *ua.ActivateSessionResponse to handler
debug: client: monitor: start
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/4: send *ua.ReadRequest with 99 bytes
debug: sub: pause
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv MSGF with 232 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/4: recv MSGF with 232 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/4: recv *ua.ReadResponse
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/4: sending *ua.ReadResponse to handler
2024-05-14T07:19:57Z D! [inputs.opcua] Connected to OPC UA Server
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/5: send *ua.RegisterNodesRequest with 1796 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uacp 2: recv MSGF with 294 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/5: recv MSGF with 294 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/5: recv *ua.RegisterNodesResponse
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/5: sending *ua.RegisterNodesResponse to handler
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/6: send *ua.ReadRequest with 792 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uacp 2: recv MSGF with 770 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/6: recv MSGF with 770 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/6: recv *ua.ReadResponse
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/6: sending *ua.ReadResponse to handler
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/7: send *ua.ReadRequest with 792 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uacp 2: recv MSGF with 770 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/7: recv MSGF with 770 bytes
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/7: recv *ua.ReadResponse
2024-05-14T07:19:58Z D! [inputs.opcua] uasc 2/7: sending *ua.ReadResponse to handler
2024-05-14T07:19:58Z D! [agent] Stopping service inputs
2024-05-14T07:19:58Z D! [agent] Input channel closed
2024-05-14T07:19:58Z D! [agent] Stopped Successfully
> Kuehlungsanlage,id=ns\=3;s\="600_DB_Frostschutz_Schrittkette"."boFrostschutzErforderlich" Frostschutz\ Erforderlich=false,Quality="The operation succeeded. StatusGood (0x0)" 1715671198000000000
the important lines to me are:
in docker this happens and telegraf cannot connect:
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 2/1: send *ua.OpenSecureChannelRequest with 1332 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uacp 2: recv ERRF with 16 bytes
2024-05-14T07:14:25Z D! [inputs.opcua] uasc 2: readChunk EOF
meanwhile locally it works:
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: send *ua.OpenSecureChannelRequest with 132 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uacp 2: recv OPNF with 136 bytes
2024-05-14T07:19:57Z D! [inputs.opcua] uasc 2/1: recv OPNF with 136 byte
from telegraf.
with 132 bytes
locally vs in docker
with 1332 bytes
is that a hint?
from telegraf.
2024-05-14T07:57:26Z D! [inputs.opcua_listener] Evaluating endpoint opc.tcp://192.168.82.220:4840, policy http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256, mode MessageSecurityModeSignAndEncrypt, level 115
2024-05-14T07:57:26Z D! [inputs.opcua_listener] uacp: connecting to opc.tcp://192.168.82.220:4840
2024-05-14T07:57:26Z D! [inputs.opcua_listener] uacp 2: start HEL/ACK handshake
2024-05-14T07:57:26Z D! [inputs.opcua_listener] uacp 2: sent HELF with 61 bytes
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uacp 2: recv ACKF with 28 bytes
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uacp 2: recv &uacp.Acknowledge{Version:0x0, ReceiveBufSize:0x2000, SendBufSize:0x2000, MaxMessageSize:0x200000, MaxChunkCount:0x100}
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uasc 2/1: send *ua.OpenSecureChannelRequest with 1332 bytes
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uacp 2: recv ERRF with 16 bytes
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uasc 2: readChunk EOF
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uasc 2: failed to open a new secure channel
2024-05-14T07:57:27Z D! [inputs.opcua_listener] uacp 2: close
2024-05-14T07:57:27Z E! [telegraf] Error running agent: starting input inputs.opcua_listener: error in Client Connection: EOF
Also reproducible with the opcua_listener plugin
from telegraf.
I got it to work!
removing /etc/telegraf/cert.pem /etc/telegraf/key.pem enables it to connect. This might be my misunderstanding!
It is however still very unstable. Every once in a while
2024-05-14T08:25:00Z D! [inputs.opcua] uasc 3/11: send *ua.CloseSecureChannelRequest with 57 bytes
telegraf-kuehlungsanlage-opcua_1 | 2024-05-14T08:25:00Z D! [inputs.opcua] uacp 3: close
telegraf-kuehlungsanlage-opcua_1 | 2024-05-14T08:25:00Z D! [inputs.opcua] uasc 3: readChunk EOF
telegraf-kuehlungsanlage-opcua_1 | 2024-05-14T08:25:00Z E! [inputs.opcua] Error in plugin: RegisterNodes Read failed: The session id is not valid. StatusBadSessionIDInvali
causes the telegraf instance to reconnect.
it seems input.opcua_listener doesnt have this issue... but it seems its minimal reporting interval sadly cant be configured, probably cause it wasnt made for that.
I while i am happy gopcua exists, it doesnt seem stable to me.
If you want to close it at that, feel free to do so.
from telegraf.
Related Issues (20)
- [inputs.tail] Logs being processed everytime the agent restarts HOT 2
- [inputs.win_eventlog] Telegraf agent not collecting custom event logs HOT 4
- chore: support new golang version 1.22.3
- Add Python example for Execd plugin HOT 1
- [documentation]: improve details on kubernetes input configuration HOT 3
- Refreshing of Bearer token is unsupported in HTTP input plugin HOT 2
- influxdb_v2_listener rate limit HOT 10
- Internet Speed Monitor - add packet loss HOT 1
- Ping size configuration on Windows HOT 2
- feat(processors): Traffic shaper processor plugin to shape uneven distribution of incoming metrics HOT 1
- Kafka Input plugin - allow access to broker list through a VIP HOT 4
- No gather_time_ns when running Windows and --test HOT 2
- Adding support of extended_gateway to SFlow plugin HOT 10
- Support for explicit credentials for monitoring remote systems via win_perf_counters plugin HOT 2
- Cross compile telegraf depend on libc.so instead of libc.so.6 HOT 7
- Cisco_telemetry_mdt input plugin incorrect parsing of child policy HOT 3
- Update produces log: "Failed to execute operation: File exists" HOT 4
- port_name plugin errors for unknown protocols cannot be silenced HOT 2
- Go Mod Toolkit more specific version HOT 2
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from telegraf.