java.lang.RuntimeException: Error{condition=com.microsoft:container-close,description=The message container is being closed (24417). TrackingId:a85e714d-b02c-4eb6-8a48-6a523c7b7596_B10, SystemTracker:NoSystemTracker, Timestamp:7/13/2016 7:29:42 AM}

microsoft.com | 4 months ago
  1. 0

    Zookeeper disconnecting and storm restarting?

    microsoft.com | 4 months ago
    java.lang.RuntimeException: Error{condition=com.microsoft:container-close,description=The message container is being closed (24417). TrackingId:a85e714d-b02c-4eb6-8a48-6a523c7b7596_B10, SystemTracker:NoSystemTracker, Timestamp:7/13/2016 7:29:42 AM}
  2. 0

    Storm "EventHubSpout due to failure of receiving messages in 11 milliseconds"

    microsoft.com | 7 months ago
    java.lang.RuntimeException: Restart EventHubSpout due to failure of receiving messages in 11 millisecond
  3. 0

    Storm "EventHubSpout due to failure of receiving messages in 11 milliseconds"

    microsoft.com | 12 months ago
    java.lang.RuntimeException: Restart EventHubSpout due to failure of receiving messages in 11 millisecond
  4. Speed up your debug routine!

    Automated exception search integrated into your IDE

  5. 0

    Having large messages (100-240KB) in EventHubs may cause receive failure.

    GitHub | 1 year ago | rtandonmsft
    java.lang.RuntimeException: Error{condition=detach-forced,description=The link 'G18:3561300:eventhubs-receiver-link' is force detached by the broker due to errors occurred in consumer(link398864). Detach origin: AmqpMessageConsumer.IdleTimerExpired: Idle timeout: 00:10:00. TrackingId:<redacted>,TimeStamp:7/13/2015 1:00:59 PM}
  6. 0

    users-cxf-apache - Encoding special characters when marshalling - msg#00079 - Recent Discussion OSDir.com

    osdir.com | 8 months ago
    java.lang.RuntimeException: Default SSL context init failed: Keystore was tampered with, or password was incorrect trustStore is: C:\temp\digicert\truststore.jks trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: Valid from Mon Apr 02 20:00:00 EDT 2007 until Sat Apr 02 20:00:00 EDT 2022 trigger seeding of SecureRandom done seeding SecureRandom May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersuites INFO: The cipher suites have not been configured, falling back to cipher suite filters. May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersuites INFO: The cipher suite filters have not been configured, falling back to default filters. May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersFromList INFO: The cipher suites have been set to SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5. May 7, 2010 10:49:09 PM org.apache.cxf.interceptor.LoggingOutInterceptor$LoggingCallback onClose INFO: Outbound Message --------------------------- ID: 1 Address: Encoding: UTF-8 Content-Type: text/xml -------------------------------------- %% No cached client session *** ClientHello, TLSv1 RandomCookie: GMT: 1256444197 bytes = { 4, 66, 95, 49, 78, 123, 240, 208, 162, 18, 225, 86, 252, 18, 29, 71, 157, 151, 61, 44, 211, 72, 133, 220, 191, 41, 45, 141 } Session ID: {} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 93 0000: 01 00 00 59 03 01 4B E4 D1 25 04 42 5F 31 4E 7B ...Y..K..%.B_1N. 0010: F0 D0 A2 12 E1 56 FC 12 1D 47 9D 97 3D 2C D3 48 .....V...G..=,.H 0020: 85 DC BF 29 2D 8D 00 00 32 00 04 00 05 00 2F 00 ...)-...2...../. 0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2............. 0040: 03 00 08 00 14 00 11 00 20 00 24 00 1F 00 23 00 ........ .$...#. 0050: 1E 00 22 00 28 00 2B 00 26 00 29 01 00 ..".(.+.&.).. main, WRITE: TLSv1 Handshake, length = 93 [write] MD5 and SHA1 hashes: len = 128 0000: 01 03 01 00 57 00 00 00 20 00 00 04 01 00 80 00 ....W... ....... 0010: 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A 07 00 ..../..3..2..... 0020: C0 00 00 16 00 00 13 00 00 09 06 00 40 00 00 15 ............@... 0030: 00 00 12 00 00 03 02 00 80 00 00 08 00 00 14 00 ................ 0040: 00 11 00 00 20 00 00 24 00 00 1F 00 00 23 00 00 .... ..$.....#.. 0050: 1E 00 00 22 00 00 28 00 00 2B 00 00 26 00 00 29 ..."..(..+..&..) 0060: 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 E1 56 K..%.B_1N......V 0070: FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 2D 8D ...G..=,.H...)-. main, WRITE: SSLv2 client hello message, length = 128 [Raw write]: length = 130 0000: 80 80 01 03 01 00 57 00 00 00 20 00 00 04 01 00 ......W... ..... 0010: 80 00 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A ....../..3..2... 0020: 07 00 C0 00 00 16 00 00 13 00 00 09 06 00 40 00 ..............@. 0030: 00 15 00 00 12 00 00 03 02 00 80 00 00 08 00 00 ................ 0040: 14 00 00 11 00 00 20 00 00 24 00 00 1F 00 00 23 ...... ..$.....# 0050: 00 00 1E 00 00 22 00 00 28 00 00 2B 00 00 26 00 ....."..(..+..&. 0060: 00 29 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 .)K..%.B_1N..... 0070: E1 56 FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 .V...G..=,.H...) 0080: 2D 8D -. [Raw read]: length = 5 0000: 16 03 01 0D 16 ..... [Raw read]: length = 2515 0000: 02 00 00 46 03 01 4B E4 D1 57 2B 4C E7 E7 78 B4 ...F..K..W+L..x. 0330: 6D 78 C9 79 43 E8 7A 37 FF 5C 35 49 BF A1 C5 0E mx.yC.z7.\5I.... 0340: 00 00 00 ... main, READ: TLSv1 Handshake, length = 3350 *** ServerHello, TLSv1 RandomCookie: GMT: 1256444247 bytes = { 43, 76, 231, 231, 120, 180, 163, 252, 72, 210, 159, 210, 232, 7, 171, 166, 52, 24, 150, 144, 229, 38, 77, 240, 163, 62, 189, 136 } Session ID: {42, 31, 0, 0, 80, 55, 253, 150, 224, 47, 243, 186, 0, 90, 249, 204, 156, 126, 43, 191, 137, 65, 244, 136, 90, 140, 145, 221, 59, 18, 141, 154} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 *** %% Created: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA [read] MD5 and SHA1 hashes: len = 74 0000: 02 00 00 46 03 01 4B E4 D1 57 2B 4C E7 E7 78 B4 ...F..K..W+L..x. 0010: A3 FC 48 D2 9F D2 E8 07 AB A6 34 18 96 90 E5 26 ..H.......4....& 0020: 4D F0 A3 3E BD 88 20 2A 1F 00 00 50 37 FD 96 E0 M..>.. *...P7... 0030: 2F F3 BA 00 5A F9 CC 9C 7E 2B BF 89 41 F4 88 5A /...Z....+..A..Z 0040: 8C 91 DD 3B 12 8D 9A 00 2F 00 ...;..../. *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=xxx, OU=Systems, O=xxx, L=xx, ST=xx, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 19 20:00:00 EDT 2010, To: Tue Apr 23 19:59:59 EDT 2013] Issuer: CN= SerialNumber: [ ] Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1.3.6.1.5.5.7.48.1 xxx ] [2]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ [DNSName: xxx] [3]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 90 45 08 69 5C 17 71 06 61 61 6C 5E 03 6D 94 7D .E.i\.q.aal^.m.. 0010: 41 5E AE 1B A^.. ] ] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.3.0.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: ]] ] ] [6]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] [7]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ [1.3.6.1.5.5.7.3.1, 1.3.6.1.5.5.7.3.2]] [8]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: ] , DistributionPoint: [URIName: ] ]] [9]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] ] Algorithm: [SHA1withRSA] Signature: 0000: 11 73 A7 85 29 F0 F2 1D C0 F1 6A 09 A1 49 28 27 .s..).....j..I(' E8 69 61 2A 56 20 67 A7 B9 D4 8A CE 5B ....ia*V g.....[ ] chain [1] = [ [ Version: V3 Subject: Key: Sun RSA public key, 2048 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 02 20:00:00 EDT 2007, To: Sat Apr 02 20:00:00 EDT 2022] Issuer: Certificate Extensions: 7 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B1 3E C3 69 03 F8 BF 47 01 D4 98 26 1A 08 02 EF .>.i...G...&.... 0010: 63 64 2B C3 cd+. ] ] [3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [4]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.3.0.2] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 2E 68 74 74 70 3A 2F 2F 77 77 77 2E 64 69 67 .. 0010: 69 63 65 72 74 2E 63 6F 6D 2F 73 73 6C 2D 63 70 icert.com/ssl-cp 0020: 73 2D 72 65 70 6F 73 69 74 6F 72 79 2E 68 74 6D s-repository.htm ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t . . . . . ]] ] ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [6]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1 [7]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] ] Algorithm: [SHA1withRSA] Signature: 0000: 5D 4F 84 F1 A8 88 D3 A3 B2 BC 9C 6D E5 29 49 77 ]O.........m.)Iw 0010: E1 E7 D6 DC A9 D8 35 AE C9 71 DC E5 DB DC 9D 24 ......5..q.....$ 0020: 21 90 A6 CF B7 01 1C 9B D4 57 97 91 D7 75 16 A5 !........W...u.. 0030: 12 D7 B9 3D 2E 89 3D 39 69 8A D6 35 37 F9 F1 21 ...=..=9i..57..! 0040: C4 5B 40 AD 59 A9 2F 5F 3A 00 29 43 27 71 03 E4 .[@.Y./_:.)C'q.. 0050: BD 30 32 55 A6 FE 84 0E 0B 9B 38 19 2C 43 7C AC .02U......8.,C.. 0060: 43 BF 75 31 E5 23 1C 45 55 B7 69 08 91 B5 CF D7 C.u1.#.EU.i..... 0070: D5 B1 5E EE 9F 94 E4 D6 7A B9 18 C3 B8 D6 52 63 ..^.....z.....Rc 0080: 1C 10 BA 8B 2F 6D 5D CC 05 38 F4 56 05 6D EF 9E ..../m]..8.V.m.. 0090: EC E8 61 36 0C 14 4B 85 14 5A 0C 83 4F 22 5C 59 ..a6..K..Z..O"\Y 00A0: CB 8C 8A 71 DA FA C5 10 84 58 CF 07 EE E3 90 C2 ...q.....X...... 00B0: F5 F9 29 C7 5A 23 71 F9 59 B4 64 2B 88 B0 A7 36 ..).Z#q.Y.d+...6 00C0: C7 9A 20 61 EB FA 4E B5 AE 6B 1B E4 E3 EC E2 D9 .. a..N..k...... 00D0: 3C 41 49 A8 20 A4 54 F5 92 8D BB C0 55 20 04 A6 <AI. .T.....U .. 00E0: D8 B0 17 16 CC E3 D0 C8 B4 3D E5 D9 84 C6 D3 F6 .........=...... 00F0: 6E 6D 78 C9 79 43 E8 7A 37 FF 5C 35 49 BF A1 C5 nmx.yC.z7.\5I... ] *** Found trusted certificate: [ [ Version: V3 Subject: Key: Sun RSA public key, 2048 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 02 20:00:00 EDT 2007, To: Sat Apr 02 20:00:00 EDT 2022] Issuer: CN= Certificate Extensions: 7 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B1 3E C3 69 03 F8 BF 47 01 D4 98 26 1A 08 02 EF .>.i...G...&.... 0010: 63 64 2B C3 cd+. ] ] [3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: []] [4]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies 7.\5I... *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Random Secret: { } [write] MD5 and SHA1 hashes: len = 134 0000: 10 00 00 82 00 80 93 4A 6C 8E 21 B1 03 DF FA E2 .......Jl.!..... 0010: 9C 2C 89 DC 88 94 77 26 8D FB 07 43 B6 63 12 89 .,....w&...C.c.. 0020: 48 F7 94 F0 99 E4 98 98 87 C9 BA 30 EB 47 C3 C9 H..........0.G.. 0030: AE E0 CA 18 7C BC 6C 72 54 D0 68 53 F9 32 8F 3F ......lrT.hS.2.? 0040: B3 8A 54 AA EE B2 8E 89 98 C4 5F B5 4B DA 6E 3F ..T......._.K.n? 0050: 0A 5B 01 4B 9A 1A ED 94 F3 DF B9 5F C9 47 38 37 .[.K......._.G87 0060: 29 B6 E2 1B 40 B1 8F 1A 2E D9 C9 A6 86 A4 B4 82 )...@........... 0070: 31 A7 54 95 D1 88 1D D2 CA 88 2E 5A FD B6 E6 7E 1.T........Z.... 0080: E1 25 44 28 C7 88 .%D(.. main, WRITE: TLSv1 Handshake, length = 134 [Raw write]: length = 139 0000: 16 03 01 00 86 10 00 00 82 00 80 93 4A 6C 8E 21 ............Jl.! 0010: B1 03 DF FA E2 9C 2C 89 DC 88 94 77 26 8D FB 07 ......,....w&... 0020: 43 B6 63 12 89 48 F7 94 F0 99 E4 98 98 87 C9 BA C.c..H.......... 0030: 30 EB 47 C3 C9 AE E0 CA 18 7C BC 6C 72 54 D0 68 0.G........lrT.h 0040: 53 F9 32 8F 3F B3 8A 54 AA EE B2 8E 89 98 C4 5F S.2.?..T......._ 0050: B5 4B DA 6E 3F 0A 5B 01 4B 9A 1A ED 94 F3 DF B9 .K.n?.[.K....... 0060: 5F C9 47 38 37 29 B6 E2 1B 40 B1 8F 1A 2E D9 C9 _.G87)...@...... 0070: A6 86 A4 B4 82 31 A7 54 95 D1 88 1D D2 CA 88 2E .....1.T........ 0080: 5A FD B6 E6 7E E1 25 44 28 C7 88 Z.....%D(.. SESSION KEYGEN: PreMaster Secret: 0000: 03 01 06 0D 87 EB 8B 76 53 3B 86 92 4B 62 A8 A8 .......vS;..Kb.. 0010: 81 93 D0 71 41 74 26 DB C7 EB E2 8D 69 35 C6 00 ...qAt&.....i5.. 0020: A4 75 F9 57 0D 21 09 04 67 38 CC 5A DB F3 AA 28 .u.W.!..g8.Z...( CONNECTION KEYGEN: Client Nonce: 0000: 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 E1 56 K..%.B_1N......V 0010: FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 2D 8D ...G..=,.H...)-. Server Nonce: 0000: 4B E4 D1 57 2B 4C E7 E7 78 B4 A3 FC 48 D2 9F D2 K..W+L..x...H... 0010: E8 07 AB A6 34 18 96 90 E5 26 4D F0 A3 3E BD 88 ....4....&M..>.. Master Secret: 0000: D5 0B 0C E1 79 E2 33 25 DC 3E 4A 7C BB 06 9A 97 ....y.3%.>J..... 0010: 32 DF 3A 4D E2 5A 30 D8 84 FF 8E 6F 84 1B 3B 9D 2.:M.Z0....o..;. 0020: D9 4E 83 E9 82 C9 11 CC 2F F0 71 B0 3F 6C 3B 92 .N....../.q.?l;. Client MAC write Secret: 0000: 3D D3 8E 9F A6 98 86 9A 6D 21 DA 18 65 AA 17 70 =.......m!..e..p 0010: DA 7B 91 0C .... Server MAC write Secret: 0000: DC 81 F0 F2 B6 DE 7C 0E 37 55 D3 38 80 C3 32 B4 ........7U.8..2. 0010: F8 73 DF E3 .s.. Client write key: 0000: 7B FA 8C 89 43 5C ED B4 16 9E C6 6A D3 5D FF A7 ....C\.....j.].. Server write key: 0000: EA 7F CD 96 77 35 0F DB B4 8E 63 FE 41 D9 3B 5F ....w5....c.A.;_ Client write IV: 0000: 74 68 F9 DA BD 6C D3 51 AD 71 1C DF 7B 78 15 B6 th...l.Q.q...x.. Server write IV: 0000: 64 E0 71 8D 7D 53 4B 15 53 AC BD BF F9 C0 78 8D d.q..SK.S.....x. main, WRITE: TLSv1 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 01 00 01 01 ...... *** Finished verify_data: { 109, 97, 67, 95, 197, 170, 72, 116, 16, 58, 97, 123 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 6D 61 43 5F C5 AA 48 74 10 3A 61 7B ....maC_..Ht.:a. Padded plaintext before ENCRYPTION: len = 48 0000: 14 00 00 0C 6D 61 43 5F C5 AA 48 74 10 3A 61 7B ....maC_..Ht.:a. 0010: D1 1D A4 5B A0 A4 EE 28 30 4E 09 0C 48 33 76 98 ...[...(0N..H3v. 0020: B8 86 20 55 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .. U............ main, WRITE: TLSv1 Handshake, length = 48 [Raw write]: length = 53 0000: 16 03 01 00 30 E2 0A AB B5 AA FC 77 B6 D5 EB 94 ....0......w.... 0010: 6B 33 3B D3 75 23 D4 B2 11 79 94 BA 82 54 84 EE k3;.u#...y...T.. 0020: DE 70 8B 44 B2 8F 09 EC 09 C2 F4 29 DD 76 3E 4A .p.D.......).v>J 0030: C7 18 97 B9 78 ....x [Raw read]: length = 5 0000: 14 03 01 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1 Change Cipher Spec, length = 1 [Raw read]: length = 5 0000: 16 03 01 00 30 ....0 [Raw read]: length = 48 0000: 2A 3D AE FF DE 13 07 3B 34 B8 F0 22 95 9E 00 1D *=.....;4..".... 0010: 00 52 A5 CD 16 FC FE 2E E7 4E 21 C9 3E C8 F7 B7 .R.......N!.>... 0020: 4D 56 B7 DC 99 13 C8 06 04 65 13 D3 90 F6 74 25 MV.......e....t% main, READ: TLSv1 Handshake, length = 48 Padded plaintext after DECRYPTION: len = 48 0000: 14 00 00 0C 6A 97 DB 52 C7 68 28 67 51 ED 9E 38 ....j..R.h(gQ..8 0010: 8C 9B 50 F3 92 11 26 4C 2D 01 B6 11 B5 9C 76 72 ..P...&L-.....vr 0020: 8B 14 5F 0E 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .._............. *** Finished verify_data: { 106, 151, 219, 82, 199, 104, 40, 103, 81, 237, 158, 56 } *** %% Cached client session: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 6A 97 DB 52 C7 68 28 67 51 ED 9E 38 ....j..R.h(gQ..8 Padded plaintext before ENCRYPTION: len = 368 0010: 73 02 B7 C1 57 8E EF A2 07 07 07 07 07 07 07 07 s...W........... *** HelloRequest (empty) %% Client cached [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] from port 2546 *** ClientHello, TLSv1 RandomCookie: GMT: 1256444197 bytes = { 138, 120, 134, 63, 86, 223, 42, 123, 137, 19, 60, 7, 83, 60, 199, 60, 186, 57, 95, 244, 139, 119, 158, 37, 252, 43, 243, 88 } Session ID: {42, 31, 0, 0, 80, 55, 253, 150, 224, 47, 243, 186, 0, 90, 249, 204, 156, 126, 43, 191, 137, 65, 244, 136, 90, 140, 145, 221, 59, 18, 141, 154} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 125 main, READ: TLSv1 Handshake, length = 4736 Padded plaintext after DECRYPTION: len = 4736 *** ServerHello, TLSv1 RandomCookie: GMT: 1256444248 bytes = { 203, 166, 103, 61, 49, 5, 241, 224, 171, 116, 142, 41, 158, 125, 94, 19, 126, 235, 117, 67, 245, 85, 76, 236, 239, 134, 179, 151 } Session ID: {76, 11, 0, 0, 115, 46, 228, 166, 49, 19, 37, 7, 178, 252, 166, 228, 215, 246, 221, 20, 93, 151, 217, 62, 204, 21, 243, 187, 119, 92, 42, 174} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 *** %% Created: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN= Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: public exponent: 65537 Validity: [ Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1.3.6.1.5.5.7.48.1 ] [2]: ObjectId: 2.5.29.17 Criticality=f *** Found trusted certificate: [ [ 7.\5I... *** CertificateRequest Cert Types: RSA, DSS, Type-64, Cert Authorities: . . . . . . .[read] MD5 and SHA1 hashes: len = 1365 *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** Certificate chain *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 [Raw write]: length = 181 *** Finished verify_data: { 214, 45, 110, 126, 40, 45, 100, 196, 135, 143, 51, 126 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C D6 2D 6E 7E 28 2D 64 C4 87 8F 33 7E .....-n.(-d...3. Padded plaintext before ENCRYPTION: len = 48 Padded plaintext after DECRYPTION: len = 48 0000: 14 00 00 0C 10 40 85 14 79 98 95 9A 19 46 04 D6 .....@..y....F.. 0010: AC 82 3B 0A 87 3F CE B3 CC B5 36 6E 36 F4 AB 0A ..;..?....6n6... 0020: C4 C7 7C B3 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B ................ *** Finished verify_data: { 16, 64, 133, 20, 121, 152, 149, 154, 25, 70, 4, 214 } *** %% Cached client session: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 10 40 85 14 79 98 95 9A 19 46 04 D6 .....@..y....F.. [Raw read]: length = 5 0000: 17 03 01 05 90 ..... [Raw read]: length = 1424 May 7, 2010 10:49:09 PM org.apache.cxf.interceptor.LoggingInInterceptor logging INFO: Inbound Message ---------------------------- ID: 1 Response-Code: 403 Encoding: ISO-8859-1 Content-Type: text/html Headers: {Content-Length=[1233], X-Powered-By=[ASP.NET], Date=[Sat, 08 May 2010 02:50:00 GMT], Server=[Microsoft-IIS/7.0], content-type=[text/html]} Payload: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" " ;> <html xmlns=" ;> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/> <title>403 - Forbidden: Access is denied.</title> <style type="text/css"> <!-- body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;} fieldset{padding:0 15px 10px 15px;} h1{font-size:2.4em;margin:0;color:#FFF;} h2{font-size:1.7em;margin:0;color:#CC0000;} h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} #header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF; background-color:#555555;} #content{margin:0 0 0 2%;position:relative;} .content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;} --> </style> </head> <body> <div id="header"><h1>Server Error</h1></div> <div id="content"> <div class="content-container"><fieldset> <h2>403 - Forbidden: Access is denied.</h2> <h3>You do not have permission to view this directory or page using the credentials that you supplied.</h3> </fieldset></div> </div> </body> </html> at org.apache.cxf.interceptor.StaxInInterceptor.handleMessage(StaxInInterceptor.java:77) at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:243)

    Not finding the right solution?
    Take a tour to get the most out of Samebug.

    Tired of useless tips?

    Automated exception search integrated into your IDE

    Root Cause Analysis

    1. java.lang.RuntimeException

      Error{condition=com.microsoft:container-close,description=The message container is being closed (24417). TrackingId:a85e714d-b02c-4eb6-8a48-6a523c7b7596_B10, SystemTracker:NoSystemTracker, Timestamp:7/13/2016 7:29:42 AM}

      at com.microsoft.eventhubs.client.EventHubReceiver.checkError()
    2. com.microsoft.eventhubs
      EventHubSpout.nextTuple
      1. com.microsoft.eventhubs.client.EventHubReceiver.checkError(EventHubReceiver.java:123)[stormjar.jar:na]
      2. com.microsoft.eventhubs.client.EventHubReceiver.receive(EventHubReceiver.java:86)[stormjar.jar:na]
      3. com.microsoft.eventhubs.spout.EventHubReceiverImpl.receive(EventHubReceiverImpl.java:111)[stormjar.jar:na]
      4. com.microsoft.eventhubs.spout.PartitionManager.receive(PartitionManager.java:56)[stormjar.jar:na]
      5. com.microsoft.eventhubs.spout.EventHubSpout.nextTuple(EventHubSpout.java:187)[stormjar.jar:na]
      5 frames
    3. backtype.storm.daemon
      executor$fn__5064$fn__5079$fn__5108.invoke
      1. backtype.storm.daemon.executor$fn__5064$fn__5079$fn__5108.invoke(executor.clj:585)[storm-core-0.9.3.2.2.9.1-1.jar:0.9.3.2.2.9.1-1]
      1 frame
    4. backtype.storm
      util$async_loop$fn__550.invoke
      1. backtype.storm.util$async_loop$fn__550.invoke(util.clj:465)[storm-core-0.9.3.2.2.9.1-1.jar:0.9.3.2.2.9.1-1]
      1 frame
    5. Clojure
      AFn.run
      1. clojure.lang.AFn.run(AFn.java:24)[clojure-1.5.1.jar:na]
      1 frame
    6. Java RT
      Thread.run
      1. java.lang.Thread.run(Thread.java:745)[na:1.7.0_55]
      1 frame