Status: Open (View Workflow)
Affects Version/s: 5.2.10, 6.1.7
Fix Version/s: None
Component/s: User Management - LDAP Integration
Support reference count:38
Regular Expression:LDAP response read timed out
In this bug, a read timeout exception is thrown before the timeout has passed, as can be seen in the logs below:
The LDAP connection does not timeout before the Read Timeout (seconds) is reached in the User Directory Configuration, for example Connecting to an LDAP Directory.
The connection times out before the Read Timeout (seconds) interval is met.
Review when the synchronisation started in the logs, for example in the below snippet it's 07:36:47,601:
And compare that to when the timeout occurs:
Here we can see the timeout occurred at 07:36:58,084 which is around 11 seconds, and the Read Timeout (seconds) was set to 60. It's highly likely this is a result of the Java bug. If the timeout occurs after the interval, this is normal and expected behaviour. For example if the timeout occurred at 07:37:47,684 this would be expected behaviour.
This bug is triggered randomly in some environments, when the Read Timeout field in LDAP directory properties has been set to non-zero value.
This bug is caused by a known bug (#6968459) affecting Java SE.
Normally these exceptions can be safely ignored as the synchronisation is self-correcting. That is, problems encountered in one synchronisation round will get fixed in the following synchronisation round.
If the synchronisation fails to complete successfully repeatedly, a known workaround is to disable read timeout by setting the Read Timeout field in LDAP directory properties to 0. A side-effect of this change is that Crowd will not be able to recover automatically from LDAP requests that take too long to run, which might cause Crowd to stop communicating with LDAP directories until it is restarted.
If you have confirmed that you are experiencing the aforementioned Java bug, we have developed a temporary fix until Oracle fixes the issue in the JDK itself.
This is in the form of 2 JARs, a new version of Crowd for JIRA and a patched+shaded version of the JDK's LDAP JNDI provider.
Source for the patched+shaded version of the JDK's LDAP JNDI provider is available at https://bitbucket.org/atlassian/atlassian-ldap-jndi-provider
To install these files and apply them as a workaround:
- Stop yourJIRA instance
- Navigate to JIRA's webapp/WEB-INF/lib directory.
- Replace the existing `crowd-ldap-???.jar` with crowd-ldap-2.8.0-OD-6-JIRA-06.jar
- Add the atlassian-ldap-jndi-provider-1.8.1-atlassian.jar file to this directory as well.
- Start your JIRA instance.
IMPORTANT: This will only work if the you are running Java 8 and a version of JIRA that uses crowd-ldap-2.8.0-OD-6 or compatible (JIRA 6.3.x)