-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
There was an error querying the ntp host #1532
Comments
am also facing the same issue . any update on this issue ? any datadog engineer working on this ? please prioritize this
am using datadog docker image It seems because of this time sync issue , am not seeing the jmx metrics in datadog dashboards.
|
This is what i get when i do a datadog agent ntp check from the side car
|
@adamgotterer @shine17 check that your firewalls/security groups allow outgoing connections on high ports (or source port 123 or target port 123). |
@pbudzon I'm on AWS with DD running on an ECS cluster. That machines running those containers have egress rules for TCP open on ports 0 - 65535. So I don't think its a security group issue. |
@adamgotterer what about your Network ACL, though? |
Just double checked the network and ACL and it's allow all traffic on all protocols outbound. |
Remember that network acls are stateless so you need to enable traffic in
as well as out.
|
... why doesn't datadog just trust the host's time? |
This doesn’t have much to do with trust. It’s one of the default checks
(like pulling out cpu and memory until) which validates that your system’s
time didn’t drift off - you can see the time difference (between system’s
time and ntp reported time) in datadog metrics, just like you can see cpu,
memory and bunch of other stuff out of the box.
If you have ntpd or similar service enabled and working on your server then
this check is usually one you can get by without, but still it’s nice to
have it. Especially if you’re doing any time-sensitive stuff on the server,
like crypto or some authentications.
|
I'm getting the same error. Dedicated server. Ports opened. 2018-05-15 20:55:10 UTC | INFO | (ntp.go:122 in Run) | There was an error querying the ntp host: read udp x.x.x.x:60440->64.113.44.55:123: i/o timeout |
Any update on this? |
on a fresh installation : agent.log INFO UTC | INFO | (ntp.go:123 in Run) | There was an error querying the ntp host: read udp x.x.x.x:52870->138.96.64.10:123: i/o timeout still broken. |
We're experiencing this as well. This seems to be causing the dd agent to stop reporting momentarily and as a result our monitors start to fire for No Data alerts. Any ETA on the fix? |
Could we look at support the ability to pass a runtime var to define an NTP host for the Docker container within AWS so we could leverage their internal endpoint (169.254.169.123) As a number of organisations aren't always keen to allow NTP in/out of their VPC/Nat Instances. |
Isn't there an option to just turn this off? |
We're also having this issue, and it appears to be intermittent. The agent will suddenly recover and start posting metrics briefly, then later fail again for a while. |
It looks as though there are configuration options for NTP (https://docs.datadoghq.com/integrations/ntp/#configuration). The page reads "The Agent enables the NTP check by default, but if you want to configure the check yourself, edit the file ntp.d/conf.yaml in the conf.d/ folder at the root of your Agent’s configuration directory." There doesn't seem to be an option to disable NTP checks (although stating that the check is enabled by default does seem to imply there is a way to turn it off), for organizations that want to keep NTP internal, NTP server locations are configurable. |
Hi all, Apologies for the late reply. As @micahsmith mentioned, you can configure the Agent's NTP check to query your own/your service provider's NTP servers by following the instructions at https://docs.datadoghq.com/integrations/ntp/#configuration. Also, as with any other Agent check that's enabled by default, you can disable the check completely by removing the file at That said, we don't recommend disabling the NTP check entirely as:
We've implemented significant improvements to the NTP check in v |
Having this issue on K8S Deployment on AWS , version of agent 6.10.2 |
@ahharu Thanks for the heads up, could you send us a note via [email protected] with a flare and some details about your configuration? We could then assess the situation. |
We have merged a couple PRs for the upcoming 6.14 release that should make this better. Please let us know if this is still an issue for you after upgrading. |
Describe what happened:
Launched the agent and the logs look like:
Additional environment details (Operating System, Cloud provider, etc):
Docker, AWS, Amazon Linux
The text was updated successfully, but these errors were encountered: