We’ve imported certificates and enabled the SSL.
We can connect to graylog with HTTPS.
But, the Inputs don’t start.
With the error in the log :
PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
2. Describe your environment:
Ubuntu Server 20.04 LTS
Package Version:
4.2.5+59802bf
Service logs, configurations, and environment variables:
[ProxiedResource] Unable to call https://mydomain.net:9000/api/system/inputstates on node : PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
Btw, I can connect to the web interface with HTTPS.
But same error with INPUTS…
WARN [ProxiedResource] Unable to call https://mydomain.net:9000/api/system/inputstates on node : PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
Yep I had this happen to myself. It can be frustrating. Only advice I can give you is what I showed you above. Since you able to connect to the WEB using https://some_domain.com:9000 this kind of tell me something with the Certificates or perhaps the keystore. Need more data to know for sure.
The error occurs because Graylog Web module (or rather, the Java runtime environment JRE that runs it) was not able to validate the certificate presented by the https URL’s web service. It means that the trusted root certificate store of the JRE does not contain the CA certificates of that signed this service’s certificate.
Some suggestions.
Did you insert ca.pem certificate in the keystore?
Are you using the JAVA default keystore? If not make sure its defined.
Showing you Graylog configuration would help also. If you do post make sure you remove personal info.
I’m using the default installation. I think, it’s the default keystore.
We’re trying to use a Signed certificate. It’s a wildcard certificate *.mydomain.net
maybe your linux install does not have the root and intermediate certs in the keystore. i would import them both using update-ca-trust and see if that helps.