Troubleshooting Broker

Multi-tenant settings When you are setting up Broker and/or Code Agent for use in Multi-tenant environments, additional variables are required. See Regional hosting and data residency for details.

This page has information and instructions for the following:

For more comprehensive troubleshooting information, see Broker Troubleshooting FAQs.

Logging with the Broker Client

By default, the log level of the Broker is set to INFO. All SCM responses, regardless of HTTP status code, are logged by the Broker Client. Set the following environment variables to alter the logging behavior:

To keep the logs concise in normal operation, Snyk produces minimal information on the INFO level, tracking the requests coming from Snyk into the client as well as the downstream request made to the targeted system, Github, Gitlab, JIRA, and so on, and logging the url hit and the response code received.

When you set LOG_INFO_VERBOSE="true", the environment variable will add the headers in these log lines without requiring that you use debug.

If you override the default logging, some logs may be provided by other processes such as API requests, and may list credentials. Before you send any Broker logs with increased logging enabled, check for any passwords or tokens and redact them in bulk.

Monitoring: Healthcheck

Broker exposes an endpoint at /healthcheck, which can be used to monitor the health of the running application. This endpoint responds with status code 200 OK when the internal request is successful and returns { ok: true } in the response body.

In the case of the Broker Client, this endpoint also reports on the status of the Broker websocket connection. If the websocket connection is not open, this endpoint responds with status code 500 Internal Server Error and { ok: false } in the response body.

This status can be tested by connecting to the Broker and running http://localhost:8000/healthcheck with the default settings.

To change the location of the healthcheck endpoint, you can specify an alternative path in an environment variable:

ENV BROKER_HEALTHCHECK_PATH /path/to/healthcheck

Monitoring: Systemcheck

The Broker Client exposes an endpoint at /systemcheck, which can be used to validate the connectivity and credentials of the brokered service, Git or another SCM, or the brokered container registry . This endpoint causes the Broker Client to make a request to a preconfigured URL and report on the success of the request. The supported configuration is:

  • BROKER_CLIENT_VALIDATION_URL - the URL to which the request will be made.

  • BROKER_CLIENT_VALIDATION_AUTHORIZATION_HEADER - [optional] the Authorization header value of the request. Mutually exclusive with BROKER_CLIENT_VALIDATION_BASIC_AUTH.

  • BROKER_CLIENT_VALIDATION_BASIC_AUTH - [optional] the basic auth credentials (username:password) to be base64 encoded and placed in the Authorization header value of the request. Mutually exclusive with BROKER_CLIENT_VALIDATION_AUTHORIZATION_HEADER.

  • BROKER_CLIENT_VALIDATION_METHOD - [optional] the HTTP method of the request (default is GET).

  • BROKER_CLIENT_VALIDATION_TIMEOUT_MS - [optional] the request timeout in milliseconds (default is 5000 ms).

This endpoint responds with status code 200 OK when the internal request is successful, and returns { ok: true } in the response body, one object in the array per credential; see Credential pooling. If the internal request fails, this endpoint responds with status code 500 Internal Server Error and { ok: false } in the response body.

This status can be tested by connecting to the Broker and running http://localhost:8000/systemcheck with the default settings.

Example that enables the /systemcheck capability to verify connectivity between broker and Nexus: -e BROKER_CLIENT_VALIDATION_URL=https://[username:password]@acme.com/service/rest/v1/status[/check] / snyk/broker:nexus

To change the location of the systemcheck endpoint, you can specify an alternative path in an environment variable:

ENV BROKER_SYSTEMCHECK_PATH /path/to/systemcheck

Snyk Broker does not support authentication with mTLS method.

Troubleshooting Standalone Broker

If after running the Broker there is still an error connecting to the on-premise Git, use the following troubleshooting steps.

  1. Ensure there are relevant logs in the Broker container. To do this, attempt to connect to the on-premise Git. Do this by navigating to the Integrations tab and attempt to import. This generates a log in the Broker logs.

  2. Review the logs of the container. This can be done on Docker by running docker logs <container id>

  3. Review the logs to see where the problem is occurring.

Common problems with Standalone Broker

  • If there is no log after performing the preceding steps, ensure that the customer has the correct Broker token. If so, ensure that the websocket has been established. Some firewalls will block this

  • Review the HTTP code in the request to the on-premise Git.

    • 404 - Not found - Ensure correct information in the docker run command.

    • 401/403 - Check credentials.

    • If there is any reference to SSL, this can be caused by a self-signed certificate. Ensure you have either mounted the correct certificate or use the flag -e NODE_TLS_REJECT_UNAUTHORIZED=0.

Testing connectivity for Standalone Broker

The Broker and the agents do not have curl in their image. To test connectivity to an agent or an endpoint like a Container registry or SCM, you can use the following commands:

#start node
node

#test a url with http
http = require("http")
http.get("<URL_HERE>", res => {console.log(`statusCode: ${res.statusCode}`)})

#test a url with https
https = require("https")
https.get('<URL_HERE>', res => {console.log(`statusCode: ${res.statusCode}`)})

Support of big manifest files (> 1Mb) for GitHub and GitHub Enterprise

Open Fix/Upgrade PRs or PR/recurring tests may fail because of fetching big manifest files (> 1Mb) failure. To address this issue, follow either the Docker or Helm instructions to allow large manifest files.

Troubleshooting Broker with Code Agent

The best way to troubleshoot the Broker with the Code Agent is to understand the communication flow. Traffic travels from Snyk > Broker Client > Code Agent > On-premise Git > Code Agent > Snyk.

The vast majority of problems with the Code aAgent are due to traffic being interrupted at one of these points.

Troubleshooting the Code Agent

As for Standalone Broker, in order to troubleshoot the code agent, you must generate logs. Do this by attempting to import a repository.

  1. Ensure that the Broker is functioning correctly and you can list the repositories. If this does not work, review the Standalone Broker troubleshooting steps.

  2. If after attempting to import a repository, you see an error message Bundle Creation Failed, review the logs of the containers.

  3. Start with the Broker container. Run docker logs <container id>

  4. Look for the string snykgit . This is the API call from the Broker container to the Code Agent container. If you get anything other than a 200 code, there is some problem with the communication between the Broker and the Code Agent. Ensure you have the proper flags set in the docker run command. Also ensure you have set up the docker network

  5. Review the logs of the Code Agent by running docker logs <container id>

Common problems with the Code Agent

  • Communication with the on-premise Git is not functioning. There will be a 404 error on the attempt to clone the code If there is any reference to SSL This can be caused by a self-signed certificate. Ensure you have mounted the correct certificate or use the flag -e NODE_TLS_REJECT_UNAUTHORIZED=0

  • If you see the message: “Uploaded Repo”, the Code Agent and Broker are configured correctly. If there are still errors on the import log, contact Snyk Support.

Containers go down when you log out of the host

If your containers go down, along with the Broker ecosystem, when you detach from their host, run the following to ensure the containers stay online when you log out:

loginctl enable-linger $(whoami)

Last updated

More information

Snyk privacy policy

© 2023 Snyk Limited | All product and company names and logos are trademarks of their respective owners.