NTP health check failed - No Active NTP peers: [{‘SERVER: NOT_SELECTABLE [162.159.200.1]’}, {‘SERVER: NOT_SELECTABLE [178.251.64.52]’}, {‘SERVER: NOT_SELECTABLE [152.53.15.127]’}, {‘SERVER: NOT_SELECTABLE [86.59.80.170]’}]
This issue has been discussed several times BUT i have not found any solution so far to get rid of this bug as it ignores what i have configured in my system ?
This issue comes every day at 15:00 local time without any reason as the network is up and running AND those IPs are reachable.
So following questions:
1.) where are those NTP servers configured AS mine (configured in the GUI) might get ignored ?
why are those configured when mine in the GUI should overwrite them.
How can i get rid of this mess as nobody asked to query not reachable NPT servers within some config in the system - it’s annoying - this system should use the stuff i configured.
More to your point. It appears that the time servers from your configured NTP pool become unavailable at 1500 local time every day. That’s external to TrueNAS (maybe something with your ISP).
Thnx i will check this but i dont think that ALL “AT NTP server” get unavailable at 15:00 at once for everybody ?
But i will check and maybe add some more also from germany and other trustfull providers.
I added now 2 other countries. so this cannot happen again unless there is some other issue with my provider. but i was on the whole day so no ISP issue recognized from my side.
You might want to set your min poll rate a bit higher to avoid getting blocked.
I run a Stratum 0 GPS+PPS NTP server on my pfSense firewall. Configurable clients are pointed directly to the firewall, or a firewall rule redirects all outbound NTP requests to the local firewall.
PROS:
All clients are using the same time source
Eliminates any Internet delay and minimizes offset/jitter
All clients continue to receive time even if WAN is down
Miscreants cannot profile what services or IoT devices I may have based on outbound NTP requests to hardcoded NTP servers.
Makes me a good citizen by not allowing clients to overload external NTP servers with 1000’s of NTP requests per hour and possibly get blocked.
CONS:
It takes a bit of trial and error to dial in the fudge[0,1] time values, but once they are, it works reliably.