=dispatch.go:104 component=dispatcher msg="Received alert" alert=InstanceDown[921d528][active]
level=debug ts=2020-03-09T08:46:12.118Z caller=dispatch.go:104 component=dispatcher msg="Received alert" alert=InstanceDown[0d9a507][active]
level=debug ts=2020-03-09T08:46:12.118Z caller=dispatch.go:104 component=dispatcher msg="Received alert" alert=InstanceDown[ef6c116][active]
level=debug ts=2020-03-09T08:46:12.119Z caller=dispatch.go:432 component=dispatcher aggrGroup="{}:{alertname=\"InstanceDown\", job=\"dockerd-exporter\"}" msg=flushing alerts="[InstanceDown[921d528][active] InstanceDown[0d9a507][active] InstanceDown[ef6c116][active]]"
level=debug ts=2020-03-09T08:46:12.143Z caller=notify.go:667 component=dispatcher msg="Notify attempt failed" attempt=1 integration=slack receiver=slack_general err="Post <redacted>: x509: certificate signed by unknown authority"
My certificate is valid and I have checked for revocation, it's ok.
You can go to https://alertmanager.cloud.patrowl.io and check. Just cancel the http auth
Logs for tcpdump port https - Alertmanager container:
09:01:36.128928 IP (tos 0x0, ttl 64, id 43540, offset 0, flags [DF], proto TCP (6), length 60)
****.36078 > server-54-240-168-90.ams54.r.cloudfront.net.443:
Flags [S], cksum 0x9b9c (incorrect -> 0x0dac), seq 1115653932, win
29200, options [mss 1460,sackOK,TS val 1409908855 ecr 0,nop,wscale 7],
length 0
09:01:36.135810 IP (tos 0x0, ttl 240, id 0, offset 0, flags [DF], proto TCP (6), length 60)
server-54-240-168-90.ams54.r.cloudfront.net.443
> ****.36078: Flags [S.], cksum 0xcf86 (correct), seq 3649616458,
ack 1115653933, win 28960, options [mss 1460,sackOK,TS val 105751778 ecr
1409908855,nop,wscale 8], length 0
09:01:36.135860 IP (tos 0x0, ttl 64, id 43541, offset 0, flags [DF], proto TCP (6), length 52)
****.36078 > server-54-240-168-90.ams54.r.cloudfront.net.443:
Flags [.], cksum 0x9b94 (incorrect -> 0x6e88), ack 1, win 229,
options [nop,nop,TS val 1409908862 ecr 105751778], length 0
09:01:36.136204 IP (tos 0x0, ttl 64, id 43542, offset 0, flags [DF], proto TCP (6), length 267)
****.36078 > server-54-240-168-90.ams54.r.cloudfront.net.443:
Flags [P.], cksum 0x9c6b (incorrect -> 0x8d07), seq 1:216, ack 1,
win 229, options [nop,nop,TS val 1409908863 ecr 105751778], length 215
09:01:36.143236 IP (tos 0x0, ttl 240, id 7848, offset 0, flags [DF], proto TCP (6), length 52)
server-54-240-168-90.ams54.r.cloudfront.net.443
> ****.36078: Flags [.], cksum 0x6e1e (correct), ack 216, win 118,
options [nop,nop,TS val 105751779 ecr 1409908863], length 0
09:01:36.143255 IP (tos 0x0, ttl 240, id 7849, offset 0, flags [DF], proto TCP (6), length 2948)
server-54-240-168-90.ams54.r.cloudfront.net.443
> ****.36078: Flags [.], cksum 0xa6e4 (incorrect -> 0x9386), seq
1:2897, ack 216, win 118, options [nop,nop,TS val 105751779 ecr
1409908863], length 2896
09:01:36.143302 IP (tos 0x0, ttl 64, id 43543, offset 0, flags [DF], proto TCP (6), length 52)
****.36078 > server-54-240-168-90.ams54.r.cloudfront.net.443:
Flags [.], cksum 0x9b94 (incorrect -> 0x622b), ack 2897, win 274,
options [nop,nop,TS val 1409908870 ecr 105751779], length 0
09:01:36.145411 IP (tos 0x0, ttl 240, id 7851, offset 0, flags [DF], proto TCP (6), length 1102)
server-54-240-168-90.ams54.r.cloudfront.net.443
> ****.36078: Flags [P.], cksum 0x46af (correct), seq 2897:3947, ack
216, win 118, options [nop,nop,TS val 105751779 ecr 1409908863], length
1050
09:01:48.657107 IP (tos 0x0, ttl 64, id 64508, offset 0, flags [DF], proto TCP (6), length 60)
****.36086 > server-54-240-168-90.ams54.r.cloudfront.net.443:
Flags [S], cksum 0x9b9c (incorrect -> 0x8c7c), seq 1465565832, win
29200, options [mss 1460,sackOK,TS val 1409921383 ecr 0,nop,wscale 7],
length 0
09:01:48.664267 IP (tos 0x0, ttl 240, id 0, offset 0, flags [DF], proto TCP (6), length 60)
server-54-240-168-90.ams54.r.cloudfront.net.443
> ****.36086: Flags [S.], cksum 0x1678 (correct), seq 284513267, ack
1465565833, win 28960, options [mss 1460,sackOK,TS val 101911527 ecr
1409921383,nop,wscale 8], length 0
09:01:48.664321 IP (tos 0x0, ttl 64, id 64509, offset 0, flags [DF], proto TCP (6), length 52)
****.36086 > server-54-240-168-90.ams54.r.cloudfront.net.443:
Flags [.], cksum 0x9b94 (incorrect -> 0xb578), ack 1, win 229,
options [nop,nop,TS val 1409921391 ecr 101911527], length 0
09:01:48.664630 IP (tos 0x0, ttl 64, id 64510, offset 0, flags [DF], proto TCP (6), length 267)
****.36086 > server-54-240-168-90.ams54.r.cloudfront.net.443:
Flags [P.], cksum 0x9c6b (incorrect -> 0x4b95), seq 1:216, ack 1,
win 229, options [nop,nop,TS val 1409921391 ecr 101911527], length 215
09:01:48.671642 IP (tos 0x0, ttl 240, id 22556, offset 0, flags [DF], proto TCP (6), length 52)
server-54-240-168-90.ams54.r.cloudfront.net.443
> ****.36086: Flags [.], cksum 0xb50f (correct), ack 216, win 118,
options [nop,nop,TS val 101911528 ecr 1409921391], length 0
09:01:48.671874 IP (tos 0x0, ttl 240, id 22557, offset 0, flags [DF], proto TCP
feel free to ask questions if you don't understand something
Thanks for your help
level=debug ts=2020-03-09T08:46:12.143Z caller=notify.go:667 component=dispatcher msg="Notify attempt failed" attempt=1 integration=slack receiver=slack_general err="Post <redacted>: x509: certificate signed by unknown authority"
My certificate is valid and I have checked for revocation, it's ok.
You can go to https://alertmanager.cloud.patrowl.io and check. Just cancel the http auth
--
You received this message because you are subscribed to the Google Groups "Prometheus Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to prometheus-use...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/prometheus-users/f2c1e343-8014-4b9e-8bdc-6da67a6a1b61%40googlegroups.com.
| ||||||||
| ||||||||
| ||||||||
check if you have the proper CAs mounted in the docker image of alertmanager./etc/ssl/certs or the equivalent in your distro - if not, then there is no source of truth for trusted CAs
On Mon, Mar 9, 2020 at 11:44 AM Brian Candler <b.ca...@pobox.com> wrote:
On Monday, 9 March 2020 09:12:41 UTC, BDT wrote:--level=debug ts=2020-03-09T08:46:12.143Z caller=notify.go:667 component=dispatcher msg="Notify attempt failed" attempt=1 integration=slack receiver=slack_general err="Post <redacted>: x509: certificate signed by unknown authority"
The bit you've redacted - at least, the hostname in the URL - is the important part. The error seems to be saying the *remote* server's certificate is bad, but not knowing the hostname you're connecting to, we can't check that.Is it showing the same URL as the slack "api_url: *****" in your config?Can you post to it using curl -v? That would prove whether the certificate is OK or not.Are you behind some sort of nasty corporate firewall which breaks TLS by performing man-in-the-middle decryption?My certificate is valid and I have checked for revocation, it's ok.
You can go to https://alertmanager.cloud.patrowl.io and check. Just cancel the http auth
Canceling the http auth just gives 401 forbidden.
You received this message because you are subscribed to the Google Groups "Prometheus Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to promethe...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/prometheus-users/f2c1e343-8014-4b9e-8bdc-6da67a6a1b61%40googlegroups.com.
To check if the certificate is ok, just cancel the http auth and click on the padlock of the adress bar and check the tls certificateI am behind the firewall of ovh but didn't config it to perfom mitm decryption
# Configures the TLS settings.
tls_config:
[ <tls_config> ]
# Optional proxy URL.
[ proxy_url: <string> ]
# CA certificate to validate the server certificate with.
[ ca_file: <filepath> ]
# Certificate and key files for client cert authentication to the server.
[ cert_file: <filepath> ]
[ key_file: <filepath> ]
# ServerName extension to indicate the name of the server.
# http://tools.ietf.org/html/rfc4366#section-3.1
[ server_name: <string> ]
# Disable validation of the server certificate.
[ insecure_skip_verify: <boolean> | default = false]
So I try this:
tls_config:
# CA certificate to validate the server certificate with.
ca_file: /etc/ssl/DigiCert_Global_Root_CA.pem
# ServerName extension to indicate the name of the server.
# http://tools.ietf.org/html/rfc4366#section-3.1
server_name: hooks.slack.com
# Disable validation of the server certificate.
insecure_skip_verify: false
Get an error in the config. Sure I have missed something ^^
The doc of alertmanager:
I didn't verify but I miss to tell you something about docker image. I have build my own one like this. If the alertmanager image contains CA, I think it didn't copy automatically to my new image.I'm not an expert with multi stating docker image but it could be my problem. I have to be carefull ...ARG ALERT_TAG=latest
FROM prom/alertmanager:${ALERT_TAG} as build
FROM alpine:3.10.2
RUN apk add gettext
COPY --from=build /bin/alertmanager /bin/alertmanager