Tableau Desktop, Tableau Server, and Tableau Cloud are all products that need to communicate with other products over the internet. Hence, sometimes when there are external forces affecting the connection between Tableau and another server, Tableau can have issues communicating. These communication issues are the same types of issues that affect all products and platforms. Often times, when there is an issue connecting to a database, refreshing an extract, or even connecting to a Tableau Server or Tableau Cloud, issues with the network connection between the client and the server can interfere and cause issues.
Listed below are some examples of network connections Tableau makes:
Errors you may see in Tableau from the example scenarios above:
Who is this guide for?
Troubleshooting network connections can be difficult and may often involve engagement from other teams within your organization. This article provides some useful starting points for investigating network issues that may be outside the scope of Tableau Server. However this guide should cover many universal tips for any network troubleshooting scenario.
There are different avenues to investigate depending on the actual wording of the error. For example, "timed out" means the client waited a certain amount of time before giving up waiting for a response from the server. Whereas "connection refused" means the server actively disallowed communication. Understanding the error will point the investigation in a different direction. Here are some examples:
This means communication between client and destination was likely lost or not received on time. This error may be caused by:
Communication was received, but access was denied. Here are some areas to focus on:
General exceptions cover a wide range of issues, but here are some important elements to consider that may not be listed above:
A clear understanding of the error received allows for more targeted troubleshooting of the issue. A connection that times out is very different from a connection refusal. A connection refused gets a response, but a timeout does not.
Isolating the issue to the fewest variables is important for speeding up time to diagnose the problem. When multiple devices, software, users, etc. are involved, it is best to start by eliminating variables. But it's also necessary to know how wide the problem reaches to determine what is most likely to be the cause. Hence, these questions are important to answer:
1. How many users are affected?
2. Are all of the resources affected (Does one client have issues with multiple servers)?
3. Does this occur when they are at a specific location? (At home, at a specific office, etc)
4. How often does the issue occur?( All the time or intermittent? If intermittent, is there a pattern?)
5. What devices can Tableau bypass, and does the issue still occur? i.e.
- Proxies
- Endpoint Software
- Load Balancers
- Running a client locally on the server machine.
6. Were there any recent changes to the network environment?
7. Were there changes to access, or the machines?
Once some of the devices involved are identified, bypassing those devices to test if the issue still occurs is the best way to eliminate variables. For example, if a user cannot reach a database from Tableau Desktop at home on a VPN, and another user also can't reach it in the office, then the VPN location and likely the network path aren't related to the root cause of the issue.
In a situation where there's a connection timeout or other network exception, knowing which teams to engage is necessary. Here's a general list of teams and/or resources who need to be engaged to track down a Network issue:
1. Client OS manager (IT admin, etc.) is always a good start.
2. Network Administrator
3. Database
4. Server administrator (This is both the software and hardware admins)
5. 3rd party support (for external or publicly accessible servers)
6. ISP (internet service providers) for either the client (someone working from home) or the server (IT/Infrastructure at a physical location)
7. VPN administrators (or any other software that reads or diverts traffic, such as Antivirus)
Sometimes the manager of a particular server could be multiple people. For example, say there is an issue reaching an on-premise MS SQL Server database. Then both the DBA, as well as a network / infrastructure manager, may need to be engaged to fully cover both the database and the host operating system it the database runs on. If the host is a virtual machine hosted on a platform like AWS, involving the AWS administrator or connecting with AWS support may be necessary as well.
When diving deeper into the technical causes of communication failures, it's important to have the right tools on hand. Below are categories of tools and their primary uses.
There are a lot of basic network connectivity tools that can be run from any machine's command line.
| Checks for open ports on the machine where it's run |
| Checks the DNS record |
| Checks that a device is reachable (but is not reliable for many reasons*) |
| Can check a specific port to ensure the port is reachable and open |
traceroute | Checks for network path routing to the server, as well as latency. |
| Great for looking for network degradation (latency or packet loss) along a specific path |
| Easily see information about a given network interface (or all available interfaces) |
curl [-v ] | A great tool for downloading a URL from the command line |
Advantages:
Disadvantages:
A Note About Ping
Ping can be misleading, for a number of reasons. There are a lot of reasons we can either give a false positive, a false negative, or just be plain misleading.
Lastly, ping time is not always representative of the machine, but more often of the transport network between them. A long ping time could be the network more likely than the server itself.
Here are some examples of network applications recommended for finding and troubleshooting issues:
Fiddler
Decrypts and captures http/https web requests. Good for looking for communication between a web server and client and is run from the client machine. It does not capture traffic for communication protocols other than HTTP, and also can bypass errors in SSL evaluation.
Advantages:
Disadvantages:
Browser Dev tools / HAR files:
Browser network traces are possible as well. They can gather the same information as a Fiddler, but can be more difficult to configure properly. They also may not collect all of the information fiddler collects, so some specific information necessary to diagnose the issue may be lost. But an advantage is that it can see what the browser sees, so requests can be gathered without decrypting traffic through a proxy. SSL proxy could fix issues with an otherwise bad server cert, as detailed here:
https://www.telerik.com/blogs/help!-running-fiddler-fixes-my-app-
Access logs (or other application-native logs):
Web applications, load balancers, etc. that send and receive web requests often have access logs, making them useful for reviewing information about requests to and from a client. Often, when a proxy or load balancer is the issue, the request in the access logs is either missing or has a different response code than the request hitting an application. If a load balancer reports a timeout, but the same request shows a completion on Tableau logs, it's likely the proxy has a lower limit set for request time.
Access logs will also generally have important metadata about requests, such as the source IP, the response code, the time taken to process the request, and any headers included with the request (i.e. X-Forwarded-For, X-Forwarded-Proto, etc.)
Other applications or platforms may also have logs that track incoming and outgoing requests.
Wireshark:
Wireshark is an extremely technical tool that captures network traffic at the packet (and deeper) level. Wireshark is a great tool for seeing very specific information about the network traffic, but has a lot of disadvantages as well.
Advantages:
Disadvantages:
Network transport issues can be very complicated, and be disrupted for very technical reasons. It is important to ensure you have subject matter experts with technical knowledge of both network concepts, but also the specific infrastructure of your organization to solve these kinds of issues. But it also involves investigation work.
Here are a few tips:
Here are some additional external resources that are worth reviewing:
COMP-TIA Network Troubleshooting Methodology:
https://www.comptia.org/en-us/blog/use-a-troubleshooting-methodology-for-more-efficient-it-support/
Wireshark Documentation:
https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html
Fiddler Fixes my app?
https://www.telerik.com/blogs/help!-running-fiddler-fixes-my-app-
005093835

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.