We’ve recently migrated this into Azure as part of a lift & shift migration, I’m now experiencing issues when adding new users/looking up AD security groups for team permissions - essentially the lookup just times out:
I thought initially that this was due to a broken LDAP connection, but I can run a separate LDAP query tool as the service account (as mentioned LDAP Authentication - Octopus Deploy) and query against the AD - additionally I can login using my AD account and can see in netstat connections that the LDAP connections are ESTABLISHED.
I’m unable to find anything useful here.
Also note that I don’t have the ‘LDAP Authentication’ Setting available to me and only the ‘Active Directory’ Setting is available (older version of OctopusDeploy perhaps?).
I’ve ran the scripts as the Service Account that runs the OctopusDeploy service and interestingly I’m able to pull down a list of groups based on the user specified in the script.
When doing this from Octopus itself, it doesn’t work and I just receive the timeout - very strange.
I might look at having another server spun up to test if this issue occurs there.
If you haven’t already, it may be worth checking the Windows event logs to see if there is any correlation between the timeouts and something environmental on the machine Octopus Server is installed on.
I’d be interested to hear if this behavior occurs on a test instance as well.
I’ve found that If I click the Search button when linking a user to an AD account (or on the Teams menu pulling in a AD security group) it will show the below error roughly 3 times.
‘The time limit for this request was exceeded.’
One more attempt and I’ll actually get the results back?!
No idea what’s happening here as bypassing Octopus and using the scripts as I’ve said pulls back AD groups of the user defined in the script first time every time.
Either way will try a test machine and see if the same occurs.