You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello everyone, I'm currently evaluating a local pyroscope deployment, but I'm unable to send data to my test instance as soon as I get SSL involved. HTTP is working fine and without any issues, but with our internal ssl certs I get the errors as seen in the log below. I'm sure that the internal CA is the issue, because if I use a ceretificate from LetsEncrypt it works. The internal ca is inside the default OS ca trust store (/etc/ssl/certs/ca-bundle.crt) and environment variables like "SSL_CERT_FILE" had no effect. Unfortunately, I've never worked with rust and can't really debug this myself. The pyroscope config for python doesn't have many options so if theres a way to get more verbose output please let me know and I will provide the logs for that.
What did you expect to happen instead?
The python pyroscope module should provide an option to allow setting a diffent ca bundle or should use the OS cert store like the golang library that worked without any issues.
How did you install pyroscope-rs?
pip3.11 install -U pyroscope-io
pyroscope-io==0.8.7
pyroscope-rs version and environment
log output from the example app
2024-08-13T12:14:52.727Z INFO py_spy::python_spy > Found libpython binary @ /usr/lib64/libpython3.11.so.1.0
2024-08-13T12:14:52.728Z INFO py_spy::python_spy > Getting version from python binary BSS
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > Failed to get version from BSS section: failed to find version string
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > Getting version from libpython BSS
2024-08-13T12:14:52.729Z INFO py_spy::version > Found matching version string '3.11.9 (main, Jun 19 2024, 10:02:06) [GCC 8.5.0 20210514 (Red Hat 8.5.0'
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > python version 3.11.9 detected
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > got symbol _PyRuntime (0x00007f9e4fdc96e0) from libpython binary
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > Found interpreter at 0x00007f9e4fdd7d18
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > got symbol _PyRuntime (0x00007f9e4fdc96e0) from libpython binary
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > Found _PyRuntime @ 0x00007f9e4fdc96e0, getting gilstate.tstate_current from offset 0x240
2024-08-13T12:15:00.000Z INFO Pyroscope::Session > Creating Session
2024-08-13T12:15:00.000Z DEBUG Pyroscope::Session > Encoding 3 reports to PPROF
2024-08-13T12:15:00.000Z DEBUG Pyroscope::Session > Compressing 1 reports to Some(GZIP)
2024-08-13T12:15:00.000Z INFO Pyroscope::Session > Sending Session: 1723551290 - 1723551300
2024-08-13T12:15:00.001Z DEBUG reqwest::connect > starting new connection: https://pyroscope.internal-adress.com/
2024-08-13T12:15:00.001Z DEBUG hyper_util::client::legacy::connect::dns > resolving host="pyroscope.internal-adress.com"
2024-08-13T12:15:00.002Z DEBUG hyper_util::client::legacy::connect::http > connecting to 192.168.32.10:443
2024-08-13T12:15:00.004Z DEBUG hyper_util::client::legacy::connect::http > connected to 192.168.32.10:443
2024-08-13T12:15:00.004Z DEBUG rustls::client::hs > No cached session for DnsName("pyroscope.internal-adress.com")
2024-08-13T12:15:00.004Z DEBUG rustls::client::hs > Not resuming any session
2024-08-13T12:15:00.013Z DEBUG rustls::client::hs > Using ciphersuite TLS13_AES_128_GCM_SHA256
2024-08-13T12:15:00.013Z DEBUG rustls::client::tls13 > Not resuming
2024-08-13T12:15:00.013Z DEBUG rustls::client::tls13 > TLS1.3 encrypted extensions: [ServerNameAck]
2024-08-13T12:15:00.013Z DEBUG rustls::client::hs > ALPN protocol is None
2024-08-13T12:15:00.014Z ERROR pyroscope::session > SessionManager - Failed to send session: error sending request for url (https://pyroscope.internal-adress.com/ingest?name=simple.python.app&from=1723551290&until=1723551300&format=pprof&sampleRate=100&spyName=pyspy)
The text was updated successfully, but these errors were encountered:
Describe the bug you encountered:
Hello everyone, I'm currently evaluating a local pyroscope deployment, but I'm unable to send data to my test instance as soon as I get SSL involved. HTTP is working fine and without any issues, but with our internal ssl certs I get the errors as seen in the log below. I'm sure that the internal CA is the issue, because if I use a ceretificate from LetsEncrypt it works. The internal ca is inside the default OS ca trust store (/etc/ssl/certs/ca-bundle.crt) and environment variables like "SSL_CERT_FILE" had no effect. Unfortunately, I've never worked with rust and can't really debug this myself. The pyroscope config for python doesn't have many options so if theres a way to get more verbose output please let me know and I will provide the logs for that.
What did you expect to happen instead?
The python pyroscope module should provide an option to allow setting a diffent ca bundle or should use the OS cert store like the golang library that worked without any issues.
How did you install
pyroscope-rs
?pip3.11 install -U pyroscope-io
pyroscope-io==0.8.7
pyroscope-rs version and environment
log output from the example app
2024-08-13T12:14:52.727Z INFO py_spy::python_spy > Found libpython binary @ /usr/lib64/libpython3.11.so.1.0
2024-08-13T12:14:52.728Z INFO py_spy::python_spy > Getting version from python binary BSS
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > Failed to get version from BSS section: failed to find version string
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > Getting version from libpython BSS
2024-08-13T12:14:52.729Z INFO py_spy::version > Found matching version string '3.11.9 (main, Jun 19 2024, 10:02:06) [GCC 8.5.0 20210514 (Red Hat 8.5.0'
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > python version 3.11.9 detected
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > got symbol _PyRuntime (0x00007f9e4fdc96e0) from libpython binary
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > Found interpreter at 0x00007f9e4fdd7d18
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > got symbol _PyRuntime (0x00007f9e4fdc96e0) from libpython binary
2024-08-13T12:14:52.729Z INFO py_spy::python_spy > Found _PyRuntime @ 0x00007f9e4fdc96e0, getting gilstate.tstate_current from offset 0x240
2024-08-13T12:15:00.000Z INFO Pyroscope::Session > Creating Session
2024-08-13T12:15:00.000Z DEBUG Pyroscope::Session > Encoding 3 reports to PPROF
2024-08-13T12:15:00.000Z DEBUG Pyroscope::Session > Compressing 1 reports to Some(GZIP)
2024-08-13T12:15:00.000Z INFO Pyroscope::Session > Sending Session: 1723551290 - 1723551300
2024-08-13T12:15:00.001Z DEBUG reqwest::connect > starting new connection: https://pyroscope.internal-adress.com/
2024-08-13T12:15:00.001Z DEBUG hyper_util::client::legacy::connect::dns > resolving host="pyroscope.internal-adress.com"
2024-08-13T12:15:00.002Z DEBUG hyper_util::client::legacy::connect::http > connecting to 192.168.32.10:443
2024-08-13T12:15:00.004Z DEBUG hyper_util::client::legacy::connect::http > connected to 192.168.32.10:443
2024-08-13T12:15:00.004Z DEBUG rustls::client::hs > No cached session for DnsName("pyroscope.internal-adress.com")
2024-08-13T12:15:00.004Z DEBUG rustls::client::hs > Not resuming any session
2024-08-13T12:15:00.013Z DEBUG rustls::client::hs > Using ciphersuite TLS13_AES_128_GCM_SHA256
2024-08-13T12:15:00.013Z DEBUG rustls::client::tls13 > Not resuming
2024-08-13T12:15:00.013Z DEBUG rustls::client::tls13 > TLS1.3 encrypted extensions: [ServerNameAck]
2024-08-13T12:15:00.013Z DEBUG rustls::client::hs > ALPN protocol is None
2024-08-13T12:15:00.014Z ERROR pyroscope::session > SessionManager - Failed to send session: error sending request for url (https://pyroscope.internal-adress.com/ingest?name=simple.python.app&from=1723551290&until=1723551300&format=pprof&sampleRate=100&spyName=pyspy)
The text was updated successfully, but these errors were encountered: