Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting downstream sender...
- 16:39:10.742 [main] DEBUG i.n.u.i.l.InternalLoggerFactory - Using SLF4J as the default logging framework
- 16:39:10.745 [main] DEBUG io.netty.util.ResourceLeakDetector - -Dio.netty.leakDetection.level: simple
- 16:39:10.746 [main] DEBUG io.netty.util.ResourceLeakDetector - -Dio.netty.leakDetection.maxRecords: 4
- 16:39:10.775 [main] DEBUG i.n.c.MultithreadEventLoopGroup - -Dio.netty.eventLoopThreads: 8
- 16:39:10.790 [main] DEBUG i.n.util.internal.PlatformDependent - -Dio.netty.noUnsafe: false
- 16:39:10.792 [main] DEBUG i.n.util.internal.PlatformDependent0 - java.nio.Buffer.address: available
- 16:39:10.792 [main] DEBUG i.n.util.internal.PlatformDependent0 - sun.misc.Unsafe.theUnsafe: available
- 16:39:10.792 [main] DEBUG i.n.util.internal.PlatformDependent0 - sun.misc.Unsafe.copyMemory: available
- 16:39:10.793 [main] DEBUG i.n.util.internal.PlatformDependent0 - direct buffer constructor: available
- 16:39:10.793 [main] DEBUG i.n.util.internal.PlatformDependent0 - java.nio.Bits.unaligned: available, true
- 16:39:10.793 [main] DEBUG i.n.util.internal.PlatformDependent0 - java.nio.DirectByteBuffer.<init>(long, int): available
- 16:39:10.794 [main] DEBUG io.netty.util.internal.Cleaner0 - java.nio.ByteBuffer.cleaner(): available
- 16:39:10.795 [main] DEBUG i.n.util.internal.PlatformDependent - Java version: 8
- 16:39:10.795 [main] DEBUG i.n.util.internal.PlatformDependent - sun.misc.Unsafe: available
- 16:39:10.795 [main] DEBUG i.n.util.internal.PlatformDependent - -Dio.netty.noJavassist: false
- 16:39:10.795 [main] DEBUG i.n.util.internal.PlatformDependent - Javassist: unavailable
- 16:39:10.795 [main] DEBUG i.n.util.internal.PlatformDependent - You don't have Javassist in your class path or you don't have enough permission to load dynamically generated classes. Please check the configuration for better performance.
- 16:39:10.796 [main] DEBUG i.n.util.internal.PlatformDependent - -Dio.netty.tmpdir: /tmp (java.io.tmpdir)
- 16:39:10.796 [main] DEBUG i.n.util.internal.PlatformDependent - -Dio.netty.bitMode: 64 (sun.arch.data.model)
- 16:39:10.796 [main] DEBUG i.n.util.internal.PlatformDependent - -Dio.netty.noPreferDirect: false
- 16:39:10.796 [main] DEBUG i.n.util.internal.PlatformDependent - io.netty.maxDirectMemory: 921174016 bytes
- 16:39:10.872 [main] DEBUG io.netty.channel.nio.NioEventLoop - -Dio.netty.noKeySetOptimization: false
- 16:39:10.872 [main] DEBUG io.netty.channel.nio.NioEventLoop - -Dio.netty.selectorAutoRebuildThreshold: 512
- 16:39:10.876 [main] DEBUG i.n.util.internal.PlatformDependent - org.jctools-core.MpscChunkedArrayQueue: available
- 16:39:10.898 [main] DEBUG i.n.resolver.dns.DnsServerAddresses - Default DNS servers: [/127.0.1.1:53] (sun.net.dns.ResolverConfiguration)
- 16:39:10.901 [main] DEBUG io.netty.util.NetUtil - -Djava.net.preferIPv4Stack: false
- 16:39:10.901 [main] DEBUG io.netty.util.NetUtil - -Djava.net.preferIPv6Addresses: false
- 16:39:10.903 [main] DEBUG io.netty.util.NetUtil - Loopback interface: lo (lo, 0:0:0:0:0:0:0:1%lo)
- 16:39:10.903 [main] DEBUG io.netty.util.NetUtil - /proc/sys/net/core/somaxconn: 128
- 16:39:10.939 [main] INFO o.e.h.c.HonoClientConfigProperties - using certificates from file [certs/trusted-certs.pem] as trust anchor
- 16:39:10.940 [main] INFO o.e.h.c.ConnectionFactoryImpl - connecting to AMQP 1.0 container [amqps://192.168.56.101:5671]
- 16:39:11.107 [main] DEBUG io.netty.buffer.AbstractByteBuf - -Dio.netty.buffer.bytebuf.checkAccessible: true
- 16:39:11.108 [main] DEBUG i.n.util.ResourceLeakDetectorFactory - Loaded default ResourceLeakDetector: io.netty.util.ResourceLeakDetector@67b467e9
- 16:39:11.115 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.numHeapArenas: 8
- 16:39:11.115 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.numDirectArenas: 8
- 16:39:11.115 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.pageSize: 8192
- 16:39:11.115 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.maxOrder: 11
- 16:39:11.115 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.chunkSize: 16777216
- 16:39:11.115 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.tinyCacheSize: 512
- 16:39:11.115 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.smallCacheSize: 256
- 16:39:11.116 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.normalCacheSize: 64
- 16:39:11.116 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.maxCachedBufferCapacity: 32768
- 16:39:11.116 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.cacheTrimInterval: 8192
- 16:39:11.116 [main] DEBUG i.n.buffer.PooledByteBufAllocator - -Dio.netty.allocator.useCacheForAllThreads: true
- 16:39:11.122 [main] DEBUG io.netty.buffer.ByteBufUtil - -Dio.netty.allocator.type: pooled
- 16:39:11.122 [main] DEBUG io.netty.buffer.ByteBufUtil - -Dio.netty.threadLocalDirectBufferSize: 65536
- 16:39:11.122 [main] DEBUG io.netty.buffer.ByteBufUtil - -Dio.netty.maxThreadLocalCharBufferSize: 16384
- 16:39:11.140 [main] DEBUG io.netty.handler.ssl.JdkSslContext - Default protocols (JDK): [TLSv1.2, TLSv1.1, TLSv1]
- 16:39:11.149 [main] DEBUG io.netty.handler.ssl.JdkSslContext - Default cipher suites (JDK): [TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA]
- 16:39:11.185 [main] DEBUG io.netty.channel.DefaultChannelId - -Dio.netty.processId: 10325 (auto-detected)
- 16:39:11.189 [main] DEBUG io.netty.channel.DefaultChannelId - -Dio.netty.machineId: 08:00:27:ff:fe:b7:2b:0c (auto-detected)
- 16:39:11.190 [main] DEBUG i.n.util.internal.ThreadLocalRandom - -Dio.netty.initialSeedUniquifier: 0xc0f9b111f617996e
- 16:39:11.301 [vert.x-eventloop-thread-0] DEBUG io.netty.util.Recycler - -Dio.netty.recycler.maxCapacityPerThread: 32768
- 16:39:11.301 [vert.x-eventloop-thread-0] DEBUG io.netty.util.Recycler - -Dio.netty.recycler.maxSharedCapacityFactor: 2
- 16:39:11.301 [vert.x-eventloop-thread-0] DEBUG io.netty.util.Recycler - -Dio.netty.recycler.linkCapacity: 16
- 16:39:11.301 [vert.x-eventloop-thread-0] DEBUG io.netty.util.Recycler - -Dio.netty.recycler.ratio: 8
- 16:39:11.497 [vert.x-eventloop-thread-0] WARN o.e.h.c.ConnectionFactoryImpl - can't connect to AMQP 1.0 container [amqps://192.168.56.101:5671]
- javax.net.ssl.SSLHandshakeException: General SSLEngine problem
- at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1478) ~[na:1.8.0_131]
- at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:535) ~[na:1.8.0_131]
- at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:813) ~[na:1.8.0_131]
- at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:781) ~[na:1.8.0_131]
- at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624) ~[na:1.8.0_131]
- at io.netty.handler.ssl.SslHandler$SslEngineType$2.unwrap(SslHandler.java:223) ~[netty-handler-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1117) ~[netty-handler-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1039) ~[netty-handler-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:411) ~[netty-codec-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:248) ~[netty-codec-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:363) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:349) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:341) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1334) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:363) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:349) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:926) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:129) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:642) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:565) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:479) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:441) ~[netty-transport-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:858) ~[netty-common-4.1.8.Final.jar:4.1.8.Final]
- at java.lang.Thread.run(Thread.java:748) ~[na:1.8.0_131]
- Caused by: javax.net.ssl.SSLHandshakeException: General SSLEngine problem
- at sun.security.ssl.Alerts.getSSLException(Alerts.java:192) ~[na:1.8.0_131]
- at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1728) ~[na:1.8.0_131]
- at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:304) ~[na:1.8.0_131]
- at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:296) ~[na:1.8.0_131]
- at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1514) ~[na:1.8.0_131]
- at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[na:1.8.0_131]
- at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1026) ~[na:1.8.0_131]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:966) ~[na:1.8.0_131]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:963) ~[na:1.8.0_131]
- at java.security.AccessController.doPrivileged(Native Method) ~[na:1.8.0_131]
- at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1416) ~[na:1.8.0_131]
- at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1256) ~[netty-handler-4.1.8.Final.jar:4.1.8.Final]
- at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1169) ~[netty-handler-4.1.8.Final.jar:4.1.8.Final]
- ... 17 common frames omitted
- Caused by: sun.security.validator.ValidatorException: PKIX path validation failed: java.security.cert.CertPathValidatorException: signature check failed
- at sun.security.validator.PKIXValidator.doValidate(PKIXValidator.java:352) ~[na:1.8.0_131]
- at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:260) ~[na:1.8.0_131]
- at sun.security.validator.Validator.validate(Validator.java:260) ~[na:1.8.0_131]
- at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324) ~[na:1.8.0_131]
- at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:281) ~[na:1.8.0_131]
- at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:136) ~[na:1.8.0_131]
- at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1501) ~[na:1.8.0_131]
- ... 25 common frames omitted
- Caused by: java.security.cert.CertPathValidatorException: signature check failed
- at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate(PKIXMasterCertPathValidator.java:135) ~[na:1.8.0_131]
- at sun.security.provider.certpath.PKIXCertPathValidator.validate(PKIXCertPathValidator.java:219) ~[na:1.8.0_131]
- at sun.security.provider.certpath.PKIXCertPathValidator.validate(PKIXCertPathValidator.java:140) ~[na:1.8.0_131]
- at sun.security.provider.certpath.PKIXCertPathValidator.engineValidate(PKIXCertPathValidator.java:79) ~[na:1.8.0_131]
- at java.security.cert.CertPathValidator.validate(CertPathValidator.java:292) ~[na:1.8.0_131]
- at sun.security.validator.PKIXValidator.doValidate(PKIXValidator.java:347) ~[na:1.8.0_131]
- ... 31 common frames omitted
- Caused by: java.security.SignatureException: Signature does not match.
- at sun.security.x509.X509CertImpl.verify(X509CertImpl.java:449) ~[na:1.8.0_131]
- at sun.security.provider.certpath.BasicChecker.verifySignature(BasicChecker.java:166) ~[na:1.8.0_131]
- at sun.security.provider.certpath.BasicChecker.check(BasicChecker.java:147) ~[na:1.8.0_131]
- at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate(PKIXMasterCertPathValidator.java:125) ~[na:1.8.0_131]
- ... 36 common frames omitted
- honoClient could not create telemetry sender : General SSLEngine problem
- Finishing downstream sender.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement