peasead / elastic-container

Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine
Apache License 2.0
361 stars 62 forks source link

[BUG] kibana wont start #28

Closed CodeXTF2 closed 1 year ago

CodeXTF2 commented 1 year ago

kibana container stuck on starting state. docker logs and docker ps below:

ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:49.054Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:50.058Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:51.062Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:51.081Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:52.067Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:53.072Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:53.579Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:54.077Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:55.081Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:56.079Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:56.085Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} ecp-elasticsearch | {"@timestamp":"2023-05-31T14:01:57.089Z", "log.level": "INFO", "message":"Authentication of [kibana_system] was terminated by realm [reserved] - failed to authenticate user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#1]","log.logger":"org.elasticsearch.xpack.security.authc.RealmsAuthenticator","trace.id":"3e691ecda4e6dfd3ca9535a379343e7e","elasticsearch.cluster.uuid":"KOmpYfbNR4Wy09jNe4hNrA","elasticsearch.node.id":"EF70Lhy5Ss-W7srSwMEWOQ","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container"} root@osboxes:/home/osboxes/Desktop/elastic-container# docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES 36025e9f883e docker.elastic.co/kibana/kibana:8.7.0 "/bin/tini -- /usr/l…" 15 minutes ago Up 8 minutes (health: starting) 0.0.0.0:5601->5601/tcp, :::5601->5601/tcp ecp-kibana 5c9ffea39925 docker.elastic.co/elasticsearch/elasticsearch:8.7.0 "/bin/tini -- /usr/l…" 15 minutes ago Up 9 minutes (healthy) 0.0.0.0:9200->9200/tcp, :::9200->9200/tcp, 9300/tcp ecp-elasticsearch 6f87290e92ee docker.elastic.co/elasticsearch/elasticsearch:8.7.0 "/bin/tini -- /usr/l…" 15 minutes ago Up 9 minutes (healthy) 9200/tcp, 9300/tcp ecp-elasticsearch-security-setup root@osboxes:/home/osboxes/Desktop/elastic-container#

DefSecSentinel commented 1 year ago

Hey @CodeXTF2 👋 Would you mind posting your .env file settings here? I think I know what's going on.

CodeXTF2 commented 1 year ago

LOCAL_KBN_URL=https://127.0.0.1:5601

# Local ES URL
LOCAL_ES_URL=https://127.0.0.1:9200

# Username for Kibana
ELASTIC_USERNAME=elastic

# Password for the 'elastic' user (at least 6 characters)
ELASTIC_PASSWORD=mypasswordhere

# Password for the 'kibana_system' user (at least 6 characters)
KIBANA_PASSWORD=mypasswordhere

# Version of Elastic products
STACK_VERSION=8.8.0

# Bulk Enable Detection Rules by OS
LinuxDR=0

WindowsDR=1

MacOSDR=0

# Set the cluster name
CLUSTER_NAME=elastic-container

# Set to "basic" or "trial" to automatically start the 30-day trial
LICENSE=basic
#LICENSE=trial

# Port to expose Elasticsearch HTTP API to the host
ES_PORT=9200
#ES_PORT=127.0.0.1:9200

# Port to expose Kibana to the host
KIBANA_PORT=5601

# Port to expose Fleet to the host
FLEET_PORT=8220

# Increase or decrease based on the available host memory (in bytes)
MEM_LIMIT=1073741824
peasead commented 1 year ago

I've not been able to reproduce this.

I wonder if your passphrase for kibana_system has some characters that need to be escaped or ""'d.

Can you try to use something like password and see if that works?

peasead commented 1 year ago

We'll reopen this when @CodeXTF2 responds.

CodeXTF2 commented 1 year ago

hi sorry a few months late didnt see the reply.

yes i did try that (using password as the password) and it didnt work, same issue (at the time).

peasead commented 1 year ago

I really don't know what to say here.

We've tried Linux (Ubuntu, Rocky, Arch), Windows WSL, and macOS - fresh builds of each. Unable to recreate. I'm unaware of anyone else in the community that's been able to recreate this either.

I have to assume there is something in your build that is preventing this. Are you using a "golden image" that you've created or a fresh ISO?

CodeXTF2 commented 1 year ago

i was using a fresh ubuntu 2204 vm created from the official isos if i recall correctly. havent touched this in a while already but thats what i remember using, but if youve been unable to reproduce it then its likely on my end, the project should be fine (i think)

kbering commented 2 weeks ago

I had the same issue with kibana_system user, and my root cause was with elasticsearch: at least one primary shard for the index [.security-7] is unavailable

My docker was almost out of space, I added more space and restarted the elastic-container setup and it started working again.

Error in my Elasticsearch log: 2024-09-13 15:26:43 {"@timestamp":"2024-09-13T13:26:43.222Z", "log.level":"ERROR", "message":"failed to retrieve password hash for reserved user [kibana_system]", "ecs.version": "1.2.0","service.name":"ES_ECS","event.dataset":"elasticsearch.server","process.thread.name":"elasticsearch[ecp-elasticsearch][transport_worker][T#8]","log.logger":"org.elasticsearch.xpack.security.authc.esnative.ReservedRealm","trace.id":"fcfacd536e60f842ae76c29691508473","elasticsearch.cluster.uuid":"anxgiDdRQ5yurVOnvnGXCA","elasticsearch.node.id":"RHS93dgXSWWufzz3oaeyfA","elasticsearch.node.name":"ecp-elasticsearch","elasticsearch.cluster.name":"elastic-container-project","error.type":"org.elasticsearch.action.UnavailableShardsException","error.message":"at least one primary shard for the index [.security-7] is unavailable","error.stack_trace":"org.elasticsearch.action.UnavailableShardsException: at least one primary shard for the index [.security-7] is unavailable\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.support.SecurityIndexManager.getUnavailableReason(SecurityIndexManager.java:209)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.esnative.NativeUsersStore.getReservedUserInfo(NativeUsersStore.java:640)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.esnative.ReservedRealm.getUserInfo(ReservedRealm.java:272)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.esnative.ReservedRealm.doAuthenticate(ReservedRealm.java:136)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticateWithCache(CachingUsernamePasswordRealm.java:200)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticate(CachingUsernamePasswordRealm.java:105)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$4(RealmsAuthenticator.java:170)\n\tat org.elasticsearch.xcore@8.15.1/org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.RealmsAuthenticator.consumeToken(RealmsAuthenticator.java:263)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.RealmsAuthenticator.authenticate(RealmsAuthenticator.java:106)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:167)\n\tat org.elasticsearch.xcore@8.15.1/org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:146)\n\tat org.elasticsearch.xcore@8.15.1/org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:146)\n\tat org.elasticsearch.xcore@8.15.1/org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:146)\n\tat org.elasticsearch.xcore@8.15.1/org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.AuthenticatorChain.doAuthenticate(AuthenticatorChain.java:125)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticate(AuthenticatorChain.java:95)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:264)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:152)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:130)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.Security.lambda$getHttpTransports$39(Security.java:1974)\n\tat org.elasticsearch.security@8.15.1/org.elasticsearch.xpack.security.Security.lambda$getHttpServerTransportWithHeadersValidator$42(Security.java:2031)\n\tat org.elasticsearch.transport.netty4@8.15.1/org.elasticsearch.http.netty4.internal.HttpHeadersAuthenticatorUtils.lambda$getValidatorInboundHandler$2(HttpHeadersAuthenticatorUtils.java:47)\n\tat org.elasticsearch.transport.netty4@8.15.1/org.elasticsearch.http.netty4.Netty4HttpHeaderValidator.lambda$requestStart$1(Netty4HttpHeaderValidator.java:139)\n\tat org.elasticsearch.server@8.15.1/org.elasticsearch.action.ActionListener.run(ActionListener.java:444)\n\tat org.elasticsearch.transport.netty4@8.15.1/org.elasticsearch.http.netty4.Netty4HttpHeaderValidator.requestStart(Netty4HttpHeaderValidator.java:113)\n\tat org.elasticsearch.transport.netty4@8.15.1/org.elasticsearch.http.netty4.Netty4HttpHeaderValidator.channelRead(Netty4HttpHeaderValidator.java:61)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412)\n\tat io.netty.codec@4.1.109.Final/io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:346)\n\tat io.netty.codec@4.1.109.Final/io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:318)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412)\n\tat io.netty.codec@4.1.109.Final/io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412)\n\tat io.netty.handler@4.1.109.Final/io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1475)\n\tat io.netty.handler@4.1.109.Final/io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1338)\n\tat io.netty.handler@4.1.109.Final/io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1387)\n\tat io.netty.codec@4.1.109.Final/io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:530)\n\tat io.netty.codec@4.1.109.Final/io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:469)\n\tat io.netty.codec@4.1.109.Final/io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:440)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:788)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:689)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:652)\n\tat io.netty.transport@4.1.109.Final/io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:562)\n\tat io.netty.common@4.1.109.Final/io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:997)\n\tat io.netty.common@4.1.109.Final/io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)\n\tat java.base/java.lang.Thread.run(Thread.java:1570)\n"}