java.io.IOException: HTTP status [500], exception [com.cloudera.keytrustee.TrusteeKeyProvider$DuplicateKeyException], message [Key with name "amalKey" already exists in "com.cloudera.keytrustee.TrusteeKeyProvider@6d88562. Key exists but has been disabled. Use undelete to enable.]

amalgjose.com | 5 months ago
  1. 0

    hdfs | Amal G Jose

    wordpress.com | 9 months ago
    java.io.IOException: HTTP status [500], exception [com.cloudera.keytrustee.TrusteeKeyProvider$DuplicateKeyException], message [Key with name "amalKey" already exists in "com.cloudera.keytrustee.TrusteeKeyProvider@6d88562. Key exists but has been disabled. Use undelete to enable.]
  2. 0

    hdfs | Amal G Jose

    amalgjose.com | 5 months ago
    java.io.IOException: HTTP status [500], exception [com.cloudera.keytrustee.TrusteeKeyProvider$DuplicateKeyException], message [Key with name "amalKey" already exists in "com.cloudera.keytrustee.TrusteeKeyProvider@6d88562. Key exists but has been disabled. Use undelete to enable.]
  3. 0
    Check for bad records in the input data (like '(null)')
  4. Speed up your debug routine!

    Automated exception search integrated into your IDE

  5. 0
    Download the winutils.exe for your Hadoop version: https://github.com/steveloughran/winutils . Save it to HADOOP_HOME/bin
  6. 0
    Bad input data (not properly separated)

    Not finding the right solution?
    Take a tour to get the most out of Samebug.

    Tired of useless tips?

    Automated exception search integrated into your IDE

    Root Cause Analysis

    1. java.io.IOException

      HTTP status [500], exception [com.cloudera.keytrustee.TrusteeKeyProvider$DuplicateKeyException], message [Key with name "amalKey" already exists in "com.cloudera.keytrustee.TrusteeKeyProvider@6d88562. Key exists but has been disabled. Use undelete to enable.]

      at org.apache.hadoop.util.HttpExceptionUtils.validateResponse()
    2. Hadoop
      HttpExceptionUtils.validateResponse
      1. org.apache.hadoop.util.HttpExceptionUtils.validateResponse(HttpExceptionUtils.java:159)
      1 frame
    3. org.apache.hadoop
      KeyShell.run
      1. org.apache.hadoop.crypto.key.kms.KMSClientProvider.call(KMSClientProvider.java:545)
      2. org.apache.hadoop.crypto.key.kms.KMSClientProvider.call(KMSClientProvider.java:503)
      3. org.apache.hadoop.crypto.key.kms.KMSClientProvider.createKeyInternal(KMSClientProvider.java:676)
      4. org.apache.hadoop.crypto.key.kms.KMSClientProvider.createKey(KMSClientProvider.java:684)
      5. org.apache.hadoop.crypto.key.KeyShell$CreateCommand.execute(KeyShell.java:483)
      6. org.apache.hadoop.crypto.key.KeyShell.run(KeyShell.java:79)
      6 frames
    4. Hadoop
      ToolRunner.run
      1. org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:70)
      1 frame
    5. org.apache.hadoop
      KeyShell.main
      1. org.apache.hadoop.crypto.key.KeyShell.main(KeyShell.java:515)
      1 frame