isereve的spark work服务启动失败 [已关闭]

0 投票
isereve的spark work服务启动失败(有时候成功,有时候失败),日志如下

2019-7-16 16:35:52 - WARN - There was a failure while trying to retrieve remembered principals.  This could be due to a configuration problem or corrupted principals.  This could also be due to a recently changed encryption key, if you are using a shiro.ini file, this property would be 'securityManager.rememberMeManager.cipherKey' see: http://shiro.apache.org/web.html#Web-RememberMeServices. The remembered identity will be forgotten and not used for this request.  
2019-7-16 16:35:52 - WARN - Delegate RememberMeManager instance of type [org.apache.shiro.web.mgt.CookieRememberMeManager] threw an exception during getRememberedPrincipals().  
org.apache.shiro.crypto.CryptoException: Unable to execute 'doFinal' with cipher instance [javax.crypto.Cipher@656e08b0].
    at org.apache.shiro.crypto.JcaCipherService.crypt(JcaCipherService.java:462)
    at org.apache.shiro.crypto.JcaCipherService.crypt(JcaCipherService.java:445)
    at org.apache.shiro.crypto.JcaCipherService.decrypt(JcaCipherService.java:390)
    at org.apache.shiro.crypto.JcaCipherService.decrypt(JcaCipherService.java:382)
    at org.apache.shiro.mgt.AbstractRememberMeManager.decrypt(AbstractRememberMeManager.java:482)
    at org.apache.shiro.mgt.AbstractRememberMeManager.convertBytesToPrincipals(AbstractRememberMeManager.java:419)
    at org.apache.shiro.mgt.AbstractRememberMeManager.getRememberedPrincipals(AbstractRememberMeManager.java:386)
    at org.apache.shiro.mgt.DefaultSecurityManager.getRememberedIdentity(DefaultSecurityManager.java:612)
    at org.apache.shiro.mgt.DefaultSecurityManager.resolvePrincipals(DefaultSecurityManager.java:500)
    at org.apache.shiro.mgt.DefaultSecurityManager.createSubject(DefaultSecurityManager.java:346)
    at org.apache.shiro.subject.Subject$Builder.buildSubject(Subject.java:845)
    at org.apache.shiro.web.subject.WebSubject$Builder.buildWebSubject(WebSubject.java:148)
    at org.apache.shiro.web.servlet.AbstractShiroFilter.createSubject(AbstractShiroFilter.java:292)
    at com.supermap.services.security.MyShiroFilter.createSubject(SourceFile:80)
    at com.supermap.services.security.MyShiroFilter.shiroFilterInternal(SourceFile:119)
    at com.supermap.services.security.MyShiroFilter.doFilterInternal(SourceFile:105)
    at org.apache.shiro.web.servlet.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:125)
    at com.supermap.server.host.webapp.handlers.SecurityHandler.doAuthenticateAndAuthorizate(SourceFile:597)
    at com.supermap.server.host.webapp.handlers.SecurityHandler.handle(SourceFile:483)
    at com.supermap.server.host.webapp.handlers.AbstractHandler.process(SourceFile:197)
    at com.supermap.server.host.webapp.handlers.AbstractHandler.a(SourceFile:223)
    at com.supermap.server.host.webapp.handlers.AbstractHandler.invokeLowerPriorityHandlers(SourceFile:212)
    at com.supermap.server.host.webapp.handlers.AbstractHandler.process(SourceFile:199)
    at com.supermap.server.host.webapp.handlers.BasicHandler.process(SourceFile:320)
    at com.supermap.server.host.webapp.ApplicationFilter.doFilter(SourceFile:254)
    at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
    at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
    at org.apache.catalina.filters.CorsFilter.handleNonCORS(CorsFilter.java:423)
    at org.apache.catalina.filters.CorsFilter.doFilter(CorsFilter.java:169)
    at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
    at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
    at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:124)
    at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
    at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
    at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:198)
    at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96)
    at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:478)
    at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:140)
    at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:80)
    at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:87)
    at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:342)
    at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:799)
    at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:66)
    at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:868)
    at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1457)
    at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
    at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
    at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
    at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
    at java.lang.Thread.run(Thread.java:748)
Caused by: javax.crypto.BadPaddingException: Given final block not properly padded. Such issues can arise if a bad key is used during decryption.
    at com.sun.crypto.provider.CipherCore.unpad(CipherCore.java:975)
    at com.sun.crypto.provider.CipherCore.fillOutputBuffer(CipherCore.java:1056)
    at com.sun.crypto.provider.CipherCore.doFinal(CipherCore.java:853)
    at com.sun.crypto.provider.AESCipher.engineDoFinal(AESCipher.java:446)
    at javax.crypto.Cipher.doFinal(Cipher.java:2164)
    at org.apache.shiro.crypto.JcaCipherService.crypt(JcaCipherService.java:459)
    ... 49 more
2019-7-16 16:36:01 - WARN - Input length must be multiple of 8 when decrypting with padded cipher  
2019-7-16 16:36:14 - WARN - 检测到Spark Master服务spark://localhost:7077没有可用的Spark Worker节点,请检查配置  
2019-7-16 16:36:17 - WARN - Input length must be multiple of 8 when decrypting with padded cipher  
2019-7-16 16:36:17 - WARN - Input length must be multiple of 8 when decrypting with padded cipher  
2019-7-16 16:36:17 - WARN - Input length must be multiple of 8 when decrypting with padded cipher  
2019-7-16 16:36:41 - WARN - Input length must be multiple of 8 when decrypting with padded cipher  
2019-7-16 16:36:41 - WARN - Input length must be multiple of 8 when decrypting with padded cipher  
2019-7-16 16:36:41 - WARN - Input length must be multiple of 8 when decrypting with padded cipher  
2019-7-16 16:37:03 - INFO - 开始启动Spark Worker服务  
2019-7-16 16:37:05 - WARN - spark worker服务启动失败
问题关闭原因: 已解决
7月 16, 2019 分类:  79次浏览 | 用户: 刘小哥 才疏学浅 (16 分)
已关闭 7月 17, 2019 用户:刘小哥
...