Browser Dashboard "Error fetching data"

I’m having the same problem since updating from 2.2.0p36 to 2.3.0p35.

Usually around 1-3 Day the error “fetching data” appears and user has to refresh the site and login again.

I’ve changed the setting to “disable the login timeout”. But nothing changed.

My experience regarding this:

In conjunction with a federative login method (SAML or OpenID-Connect) a/the validity of your session in an application (in this case CheckMK) depends on the session at your IDP, and the following is the case:

As you authenticate against an IDP the configured session-lifetime with the IDP will determine if you need to re-authenticate or not.
Seeing a/the error “fetching data” means that in the background the application is requesting session-information from your IDP to determine if you still have a valid session with it or not.
→ If your session at the IDP has expired, you should (must) be redirected to its login-page and re-authenticate.
→ If your session is still valid at the IDP the application will refresh its content and display it correctly afterwards.

Depending on the time a/the application takes to get this information you will be confronted with the “fetching data” - error.

In my case the lifetime of an IDP-session is set at 1 hour, meaning if no ‘check’ is done to validate a/the session at the IDP a user will be forced to login again at the IDP.

Looking at the comments, it might be well possible that CheckMK does not always check with the IDP when retrieving page-content.
I will assume for now that the lifetime of a/the session by default is longer then the configured lifetime of the session on the IDP, so it will only ‘check-in’ with the IDP when the local session also expires.

Best practices for federated setups:

  • configure a/the local session lifetime shorter then the session lifetime configured at the IDP, as this will force the application to query the IDP, and reset/extend both a/the local session, aswell as the session at the IDP.

In my case the session lifetime in CheckMK has been set to 55 minutes forcing it to re-visit the IDP before its session expires.

  • Glowsome

We are not using any IDP service. The affected account was created locally in checkmk. This specific user is used for an 24/7 display to show warnings/errors.

In the global settings, everything is left on standard setting.

  • Maximum session duration = 1 Days
  • Advise re-authentication = 15mins
  • Set and individual idle timeout = 1.5 hours

I use following ‘hack / bug’ in Chrome, changing session cookie into date time, to avoid logging into our annoying CRM system daily. Maybe it works for this use case too.

  • when logged in Checkmk web interface, right mouse click inspect

  • go to tab Application, Storage, Cookies, url of your Checkmk

  • you see auth_[site name] as cookie with Expires as Session

  • right mouse click Edit
    image

  • type in year 2 years in the future, so at the moment 2027 will work, press enter

  • Session changes into max possible date / time
    image

:crossed_fingers:

When you want it back to normal, just delete the auth_[site name] cookie, you get logged out and will return to login screen.

No CheckMK kills internally the session after a defined time.

With this settings you can create a behavior that you only need to authenticate one time per week.
Set the Maximum session duration to 7 days and a Monday morning login is enough for the whole week.

Good to read, because it feels like a leak if it was possible … like with our CRM. :sunglasses:

That means the setting directly unter the specific account “disable the login timeout” has no effect in my case?

I need to increase the global maximum session timeout, that will affect all other users too?

It’s no timeout, you define the maximum session duration.
“Maximum session duration” is the only valid option for your problem.

I will try it.

Thanks andreas