Caught exception while handling client http traffic, closing connection Netty4HttpChannel{localAddress=/

{"type": "server", "timestamp": "2021-12-17T19:45:21,865Z", "level": "WARN", "component": "o.e.h.AbstractHttpServerTransport", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "caught exception while handling client http traffic, closing connection Netty4HttpChannel{localAddress=/192.168.137.234:9200, remoteAddress=/192.168.189.0:56454}", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g" , 
{"type": "server", "timestamp": "2021-12-21T03:35:06,081Z", "level": "INFO", "component": "o.e.l.LicenseService", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "license [9dec2a3f-c213-4fa5-8516-7bcb0f591fde] mode [basic] - valid" }
{"type": "server", "timestamp": "2021-12-21T03:35:06,082Z", "level": "INFO", "component": "o.e.x.s.a.Realms", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "license mode is [basic], currently licensed security realms are [reserved/reserved,file/file1,native/native1]" }
{"type": "server", "timestamp": "2021-12-21T03:35:06,083Z", "level": "INFO", "component": "o.e.x.s.s.SecurityStatusChangeListener", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "Active license is now [BASIC]; Security is enabled" }
{"type": "server", "timestamp": "2021-12-21T03:35:06,101Z", "level": "INFO", "component": "o.e.h.AbstractHttpServerTransport", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "publish_address {dev-es-data-node-hot-0.dev-es-data-node-hot.dev-elk.svc/192.168.137.226:9200}, bound_addresses {0.0.0.0:9200}", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g"  }
{"type": "server", "timestamp": "2021-12-21T03:35:06,102Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "started", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g"  }
{"type": "server", "timestamp": "2021-12-21T03:35:07,966Z", "level": "INFO", "component": "o.e.c.s.ClusterSettings", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "updating [cluster.routing.allocation.enable] from [primaries] to [all]", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g"  }
{"type": "server", "timestamp": "2021-12-21T03:35:07,967Z", "level": "INFO", "component": "o.e.c.s.ClusterSettings", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "updating [cluster.routing.allocation.enable] from [primaries] to [all]", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g"  }
{"type": "deprecation.elasticsearch", "timestamp": "2021-12-21T03:35:49,945Z", "level": "WARN", "component": "o.e.d.x.s.a.s.CompositeRolesStore", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "The role [reporting_user] is deprecated and will be removed in a future version of Elasticsearch. Please use Kibana feature privileges instead", "x-opaque-id": "51b1f9df-8bad-411e-ab83-f9c51d4686fd", "key": "deprecated_role-reporting_user", "category": "security", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g"  }
{"type": "deprecation.elasticsearch", "timestamp": "2021-12-21T03:35:49,961Z", "level": "WARN", "component": "o.e.d.x.s.a.s.DeprecationRoleDescriptorConsumer", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "Role [developer] contains index privileges covering the [logback-log-tx-new] alias but which do not cover some of the indices that it points to [shrink-qbec-logback-log-tx-new-2021.09.12-000026, shrink-x2ih-logback-log-tx-new-2021.09.05-000025]. Granting privileges over an alias and hence granting privileges over all the indices that the alias points to is deprecated and will be removed in a future version of Elasticsearch. Instead define permissions exclusively on index names or index name patterns.", "x-opaque-id": "51b1f9df-8bad-411e-ab83-f9c51d4686fd", "key": "index_permissions_on_alias", "category": "security", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g"  }
{"type": "server", "timestamp": "2021-12-21T03:39:05,157Z", "level": "WARN", "component": "o.e.h.AbstractHttpServerTransport", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "caught exception while handling client http traffic, closing connection Netty4HttpChannel{localAddress=/192.168.137.226:9200, remoteAddress=/192.168.189.0:29431}", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g" , 
"stacktrace": ["io.netty.handler.codec.DecoderException: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate",
"at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:477) ~[netty-codec-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276) ~[netty-codec-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:620) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:583) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:986) [netty-common-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.66.Final.jar:4.1.66.Final]",
"at java.lang.Thread.run(Thread.java:833) [?:?]",
"Caused by: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate",
"at sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[?:?]",
"at sun.security.ssl.Alert.createSSLException(Alert.java:117) ~[?:?]",
"at sun.security.ssl.TransportContext.fatal(TransportContext.java:357) ~[?:?]",
"at sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) ~[?:?]",
"at sun.security.ssl.TransportContext.dispatch(TransportContext.java:203) ~[?:?]",
"at sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[?:?]",
"at sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:736) ~[?:?]",
"at sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:691) ~[?:?]",
"at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:506) ~[?:?]",
"at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:482) ~[?:?]",
"at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:679) ~[?:?]",
"at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:298) ~[netty-handler-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1344) ~[netty-handler-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1237) ~[netty-handler-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1286) ~[netty-handler-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:507) ~[netty-codec-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:446) ~[netty-codec-4.1.66.Final.jar:4.1.66.Final]",

I can only provide the current log of es, the log of this field has been appearing crazily

Unfortunately posting a single line of a log file with no context doesn't help us help you.

Please add more information to your topic.

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.