From: Tom C. <tc...@ex...> - 2020-11-17 13:09:17
|
Ah ha, adding System.setProperty("org.slf4j.simplelogger.log.ca.uhn.hl7v2.app.Receiver","error"); to our server impl. seems to do the trick. Tom On 17/11/2020 11:56, Tom Chiverton wrote: > Hi, > > We've got a HL7 receiving application using HAPI, and all works well > except when our system health checking system connects, it is causing > spam to the log file. > > I was hoping that registering a hander with > 'server.setExceptionHandler(...)' would stop this, but I think the > reason it's not working is because the error is occurring earlier than > in our own ReceivingApplication implementation ? > > Should I be looking at the slf4j log configuration ? Or sub-class > ca.uhn.hl7v2.app.Receiver / ca.uhn.hl7v2.concurrent.Service ? Or is > there some setting I can change in the Context ? > > An example stack trace we'd like to suppress is below, after the line > from ca.uhn.hl7v2.app.Receiver. "New connection received" is from our > Server class's server.registerConnectionListener(...) > > 448905 [hapi-worker-1] INFO ca.uhn.hl7v2.app.SimpleServer - Accepted > connection from 192.168.4.250:23446 on local port 9007 > New connection received: /192.168.4.250 > 448906 [hapi-worker-5] WARN ca.uhn.hl7v2.app.Receiver - IOException: > closing Connection from 192.168.4.250:23446, will no longer read > messages with this Receiver. > javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake > at > java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1588) > at > java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1416) > at > java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1314) > at > java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:440) > at > java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:819) > at > java.base/sun.security.ssl.SSLSocketImpl$AppInputStream.read(SSLSocketImpl.java:910) > at > java.base/java.io.BufferedInputStream.fill(BufferedInputStream.java:252) > at > java.base/java.io.BufferedInputStream.read(BufferedInputStream.java:271) > at > ca.uhn.hl7v2.llp.MllpDecoderState.read(MllpDecoderState.java:128) > at ca.uhn.hl7v2.llp.MllpDecoder.getMessage(MllpDecoder.java:63) > at > ca.uhn.hl7v2.llp.Hl7DecoderReader.getMessage(Hl7DecoderReader.java:84) > at ca.uhn.hl7v2.llp.MinLLPReader.getMessage(MinLLPReader.java:33) > at ca.uhn.hl7v2.app.Receiver.handle(Receiver.java:63) > at ca.uhn.hl7v2.concurrent.Service.run(Service.java:205) > at > java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515) > at > java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264) > at > java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) > at > java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) > at java.base/java.lang.Thread.run(Thread.java:829) > Caused by: java.io.EOFException: SSL peer shut down incorrectly > at > java.base/sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:481) > at > java.base/sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:470) > at > java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:160) > at > java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:110) > at > java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1408) > ... 17 more > Lost connection from: /192.168.4.250 > > Tom > > > ______________________________________________________________________ > This email has been scanned by the Symantec Email Security.cloud service. > For more information please visit http://www.symanteccloud.com > ______________________________________________________________________ > > > _______________________________________________ > Hl7api-devel mailing list > Hl7...@li... > https://lists.sourceforge.net/lists/listinfo/hl7api-devel > > ______________________________________________________________________ > This email has been scanned by the Symantec Email Security.cloud service. > For more information please visit http://www.symanteccloud.com > ______________________________________________________________________ ______________________________________________________________________ This email has been scanned by the Symantec Email Security.cloud service. For more information please visit http://www.symanteccloud.com ______________________________________________________________________ |