Troubleshooting
Networking#
503 errors during pipeline execution
Error 503 suggests that one or more of the services being contacted by Seqera Enterprise as part of workflow execution are unavailable. Ensure all required services are running and available. Database connectivity is often the culprit for 503
errors.
SocketTimeoutException: connect timed out errors with self-hosted Git servers
You may encounter connection timeout issues while trying to launch workflows from a self-hosted Git server (BitBucket, GitLab, etc.). If you configured the correct Git credentials in Seqera Enterprise, this error signals that the backend/cron
container cannot connect to the Git remote host. This can be caused by a missing or incorrect proxy configuration.
Error log
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 |
|
Update the HTTP proxy configuration in the backend
and cron
environment with your proxy details:
1 2 3 4 |
|
Database#
Login failures: java.sql.SQLException in the backend logs
After Seqera login authentication, an Oops... Unable to process request error is presented, with java.sql.SQLException errors related to server time zone in the backend log:
Error log
1 2 3 4 5 6 |
|
This error means that Seqera is unable to connect to the database and the JDBC
client must specify the time zone value via serverTimezone
.
To resolve this issue for Europe/Amsterdam
time zone, append serverTimezone
to the value of TOWER_DB_URL
:
1 |
|
java.io.IOException: Unsupported protocol version 252 error while completed or terminated runs display as in progress on Seqera
When a service is restarted or otherwise interrupted, this may result in invalid entries which corrupt the cache of your installation's Redis instance. Manually delete the key with the invalid entry to restore expected behavior (replace container-name
with your container name in the commands below):
1 2 3 4 5 6 7 8 |
|
Authentication#
Login failures with OpenID Connect (OIDC): 500 error code in the frontend logs
When using OpenID Connect, the callback request may contain large HTTP headers that exceed buffer size, causing login failures.
Error log
1 |
|
Rebuild the frontend container and add the following proxy directives to the /etc/nginx/nginx.conf
file:
1 2 3 |
|
OIDC callback failure
Callbacks could fail for many reasons. To investigate the problem:
- Set the authentication logging level environment variable to
TOWER_SECURITY_LOGLEVEL=DEBUG
. - Ensure your
TOWER_OIDC_CLIENT
,TOWER_OIDC_SECRET
, andTOWER_OIDC_ISSUER
environment variables all match the values specified in your OIDC provider application. - Ensure your network infrastructure allows the necessary egress and ingress traffic.
OIDC redirect_url
set to HTTP instead of HTTPS
This can occur for several reasons. Verify the following:
- Your
TOWER_SERVER_URL
environment variable uses thehttps://
prefix. - Your
tower.yml
hasmicronaut.ssl.enabled
set totrue
. - Any Load Balancer instance that sends traffic to Seqera Enterprise is configured to use HTTPS as its backend protocol rather than HTTP/TCP.
On-prem HPC compute environments: Exhausted available authentication methods error
This error points to an issue with the SSH credentials used to authenticate Seqera to your HPC cluster (LSF, Slurm, etc.), such as an invalid SSH key or inappropriate permissions on the user directory. Check the following:
-
Ensure the SSH key is still valid. If not, create new SSH keys and re-create the compute environment in Seqera with the updated credentials.
-
Check the backend logs for a stack trace similar to the following:
Error log
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
``` [io-executor-thread-2] 10.42.0.1 ERROR i.s.t.c.GlobalErrorController - Oops... Unable to process request - Error ID: 5d7rDpS8pByF8YqfUVPvB4 net.schmizz.sshj.userauth.UserAuthException: Exhausted available authentication methods at net.schmizz.sshj.SSHClient.auth(SSHClient.java:227) at net.schmizz.sshj.SSHClient.authPublickey(SSHClient.java:342) at net.schmizz.sshj.SSHClient.authPublickey(SSHClient.java:360) at io.seqera.tower.service.platform.ssh.SSHClientFactory.createClient(SSHClientFactory.groovy:110) .. .. Caused by: net.schmizz.sshj.userauth.UserAuthException: Problem getting public key from PKCS5KeyFile{resource=[PrivateKeyStringResource]} at net.schmizz.sshj.userauth.method.KeyedAuthMethod.putPubKey(KeyedAuthMethod.java:47) at net.schmizz.sshj.userauth.method.AuthPublickey.buildReq(AuthPublickey.java:62) at net.schmizz.sshj.userauth.method.AuthPublickey.buildReq(AuthPublickey.java:81) at net.schmizz.sshj.userauth.method.AbstractAuthMethod.request(AbstractAuthMethod.java:68) at net.schmizz.sshj.userauth.UserAuthImpl.authenticate(UserAuthImpl.java:73) at net.schmizz.sshj.SSHClient.auth(SSHClient.java:221) ... 91 common frames omitted Caused by: net.schmizz.sshj.userauth.keyprovider.PKCS5KeyFile$FormatException: Length mismatch: 1152 != 1191 at net.schmizz.sshj.userauth.keyprovider.PKCS5KeyFile$ASN1Data.<init>(PKCS5KeyFile.java:248) ```
-
Enable SSH library log tracing with the following environment variable in your
tower.env
file for verbose debug logging of the SSH connection:1
TOWER_SSH_LOGLEVEL=TRACE
-
Check the permissions of the
/home
directory of the user tied to the cluster's SSH credentials./home/[user]
should bechmod 755
, whereas/home/[user]/ssh
requireschmod 700
:1 2 3 4 5 6 7
$ pwd ; ls -ld . /home/user drwxr-xr-x 41 user user 20480 $ pwd; ls -ld . /home/user/.ssh drwx------ 2 user user 4096