<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic LDAP Synthetic connectivity in Extensions</title>
    <link>https://community.dynatrace.com/t5/Extensions/LDAP-Synthetic-connectivity/m-p/294135#M7032</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Good morning,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We are experiencing issues getting the &lt;STRONG&gt;LDAP Synthetic extension&lt;/STRONG&gt; to work in Dynatrace. The extension is fully configured, but it always returns an SSL handshake error, as shown in the following &lt;STRONG&gt;ActiveGate log entry&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;[912d4363-e154-343e-ade5-629f15259bb5][-5664247153095800450][3658611][err]&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;2026-02-03 17:04:15,006 [ERROR] (ThreadPoolExecutor-0_0):&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;DEC:127 Unknown error. Failed to connect to LDAP Server on&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;ldaps:// XXXXXX.servidores.net:636 - ssl :&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;("('socket ssl wrapping error: [SSL: SSLV3_ALERT_HANDSHAKE_FAILURE]&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;ssl/tls alert handshake failure (_ssl.c:1017)',)",)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Initially, this pointed to a potential &lt;STRONG&gt;connectivity issue between the ActiveGate and the LDAP server&lt;/STRONG&gt;. However, we have verified that &lt;STRONG&gt;network connectivity from ActiveGate is correct&lt;/STRONG&gt;, by using the command: &lt;FONT size="1 2 3 4 5 6 7"&gt;openssl s_client -connect XXXXXX.servidores.net:636&lt;/FONT&gt;&lt;BR /&gt;We have also verified &lt;STRONG&gt;TLS 1.2 negotiation and the server certificate&lt;/STRONG&gt;, confirming that:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The certificate includes valid &lt;STRONG&gt;SAN entries&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;The cipher suite is compatible&lt;/LI&gt;&lt;LI&gt;TLS 1.2 is correctly negotiated&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;After ruling out connectivity and TLS configuration issues, we used &lt;STRONG&gt;ldapsearch from the ActiveGate host&lt;/STRONG&gt; to validate the LDAP parameters used in the extension and to confirm that the LDAP connection itself works correctly.&lt;/P&gt;&lt;P&gt;The bind operation succeeds (correct user and password), and the LDAP server returns the expected &lt;STRONG&gt;namingContexts&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;We then executed &lt;STRONG&gt;the exact same LDAP query from the ActiveGate&lt;/STRONG&gt; using ldapsearch, matching &lt;STRONG&gt;all parameters configured in the LDAP Synthetic extension&lt;/STRONG&gt; (Bind DN, Base DN,pass, filter, LDAPS, port 636).&lt;BR /&gt;This test returns data successfully.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Summary&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;From the &lt;STRONG&gt;ActiveGate host&lt;/STRONG&gt;, we can confirm:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;TLS 1.2 works correctly&lt;/LI&gt;&lt;LI&gt;The LDAP certificate is valid and trusted&lt;/LI&gt;&lt;LI&gt;Bind DN and Base DN are correct&lt;/LI&gt;&lt;LI&gt;LDAP searches return results&lt;/LI&gt;&lt;LI&gt;No SSL/TLS handshake errors occur&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;From the &lt;STRONG&gt;LDAP Synthetic extension&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The configuration is exactly the same&lt;/LI&gt;&lt;LI&gt;The connection fails with SSLV3_ALERT_HANDSHAKE_FAILURE&lt;/LI&gt;&lt;LI&gt;The error originates from Python SSL (_ssl.c:1017), according to the log&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Despite using the same configuration, the extension consistently fails to connect to LDAP, which leads us to believe that the issue is related to &lt;STRONG&gt;how the LDAP Synthetic extension establishes the SSL/TLS connection&lt;/STRONG&gt;. It’s possible that the extension’s Python runtime is using &lt;STRONG&gt;different SSL libraries or SSL handling logic than the one used by ldapsearch&lt;/STRONG&gt; on the ActiveGate host.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Has anyone encountered a similar issue with the LDAP Synthetic extension, or can you provide guidance on how SSL/TLS is handled internally by this extension?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I’m not really sure how python manage this connections. The problem seems to be due a TLS/SSL compatibility problem in the extension (python), maybe pyOpenSSL is not installed or something like that…&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;&lt;STRONG&gt;Rob Doce&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Feb 2026 11:29:33 GMT</pubDate>
    <dc:creator>Rob_Doce</dc:creator>
    <dc:date>2026-02-04T11:29:33Z</dc:date>
    <item>
      <title>LDAP Synthetic connectivity</title>
      <link>https://community.dynatrace.com/t5/Extensions/LDAP-Synthetic-connectivity/m-p/294135#M7032</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Good morning,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We are experiencing issues getting the &lt;STRONG&gt;LDAP Synthetic extension&lt;/STRONG&gt; to work in Dynatrace. The extension is fully configured, but it always returns an SSL handshake error, as shown in the following &lt;STRONG&gt;ActiveGate log entry&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;[912d4363-e154-343e-ade5-629f15259bb5][-5664247153095800450][3658611][err]&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;2026-02-03 17:04:15,006 [ERROR] (ThreadPoolExecutor-0_0):&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;DEC:127 Unknown error. Failed to connect to LDAP Server on&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;ldaps:// XXXXXX.servidores.net:636 - ssl :&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;("('socket ssl wrapping error: [SSL: SSLV3_ALERT_HANDSHAKE_FAILURE]&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;ssl/tls alert handshake failure (_ssl.c:1017)',)",)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Initially, this pointed to a potential &lt;STRONG&gt;connectivity issue between the ActiveGate and the LDAP server&lt;/STRONG&gt;. However, we have verified that &lt;STRONG&gt;network connectivity from ActiveGate is correct&lt;/STRONG&gt;, by using the command: &lt;FONT size="1 2 3 4 5 6 7"&gt;openssl s_client -connect XXXXXX.servidores.net:636&lt;/FONT&gt;&lt;BR /&gt;We have also verified &lt;STRONG&gt;TLS 1.2 negotiation and the server certificate&lt;/STRONG&gt;, confirming that:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The certificate includes valid &lt;STRONG&gt;SAN entries&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;The cipher suite is compatible&lt;/LI&gt;&lt;LI&gt;TLS 1.2 is correctly negotiated&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;After ruling out connectivity and TLS configuration issues, we used &lt;STRONG&gt;ldapsearch from the ActiveGate host&lt;/STRONG&gt; to validate the LDAP parameters used in the extension and to confirm that the LDAP connection itself works correctly.&lt;/P&gt;&lt;P&gt;The bind operation succeeds (correct user and password), and the LDAP server returns the expected &lt;STRONG&gt;namingContexts&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;We then executed &lt;STRONG&gt;the exact same LDAP query from the ActiveGate&lt;/STRONG&gt; using ldapsearch, matching &lt;STRONG&gt;all parameters configured in the LDAP Synthetic extension&lt;/STRONG&gt; (Bind DN, Base DN,pass, filter, LDAPS, port 636).&lt;BR /&gt;This test returns data successfully.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Summary&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;From the &lt;STRONG&gt;ActiveGate host&lt;/STRONG&gt;, we can confirm:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;TLS 1.2 works correctly&lt;/LI&gt;&lt;LI&gt;The LDAP certificate is valid and trusted&lt;/LI&gt;&lt;LI&gt;Bind DN and Base DN are correct&lt;/LI&gt;&lt;LI&gt;LDAP searches return results&lt;/LI&gt;&lt;LI&gt;No SSL/TLS handshake errors occur&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;From the &lt;STRONG&gt;LDAP Synthetic extension&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The configuration is exactly the same&lt;/LI&gt;&lt;LI&gt;The connection fails with SSLV3_ALERT_HANDSHAKE_FAILURE&lt;/LI&gt;&lt;LI&gt;The error originates from Python SSL (_ssl.c:1017), according to the log&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Despite using the same configuration, the extension consistently fails to connect to LDAP, which leads us to believe that the issue is related to &lt;STRONG&gt;how the LDAP Synthetic extension establishes the SSL/TLS connection&lt;/STRONG&gt;. It’s possible that the extension’s Python runtime is using &lt;STRONG&gt;different SSL libraries or SSL handling logic than the one used by ldapsearch&lt;/STRONG&gt; on the ActiveGate host.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Has anyone encountered a similar issue with the LDAP Synthetic extension, or can you provide guidance on how SSL/TLS is handled internally by this extension?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I’m not really sure how python manage this connections. The problem seems to be due a TLS/SSL compatibility problem in the extension (python), maybe pyOpenSSL is not installed or something like that…&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;&lt;STRONG&gt;Rob Doce&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 11:29:33 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Extensions/LDAP-Synthetic-connectivity/m-p/294135#M7032</guid>
      <dc:creator>Rob_Doce</dc:creator>
      <dc:date>2026-02-04T11:29:33Z</dc:date>
    </item>
  </channel>
</rss>

