当前位置:网站首页>Channel shutdown: channel error; protocol method: #method<channel.close>(reply-code=406, reply-text=
Channel shutdown: channel error; protocol method: #method<channel.close>(reply-code=406, reply-text=
2022-07-26 22:40:00 【hayhead】
完整错误
CachingConnectionFactory.java:1278 - Channel shutdown: channel error; protocol method: #method<channel.close>(reply-code=406, reply-text=PRECONDITION_FAILED - unknown delivery tag 1, class-id=60, method-id=80)
原因:消费者有ack确认,而spring-boot-starter-amqp默认是自动签收信息的方式,消费结果签收了两次,我们代码里面是写的手动签收,但是系统还有一次自动签收,所以就想到了是不是需要配置一下让rabbitmq手动签署,就不会触发自动签收的功能
channel.basicAck(message.getMessageProperties().getDeliveryTag(), true);
解决方法:去掉自动签收功能
spring:
rabbitmq:
host: 127.0.0.1
port: 5672
username: guest
password: guest
#消费端配置
listener:
simple:
#自动签收auto 手动 manual
acknowledge-mode: manual
边栏推荐
- Only hard work, hard work and hard work are the only way out C - patient entity class
- Solve the problem that there is no ado.net entity data model in vs
- [HITCON 2017]SSRFme
- [BJDCTF2020]EzPHP
- Two methods of automated testing XSS vulnerabilities using burpsuite
- VMware Workstation 虚拟机启动就直接蓝屏重启问题解决
- [By Pass] 文件上传的绕过方式
- 2022.7.18DAY608
- [问题]yum资源被占用怎么办
- 重学JSON.stringify
猜你喜欢

2020-12-20 99 multiplication table
![[CTF攻防世界] WEB区 关于Cookie的题目](/img/96/6e91ee19343a1ddc49dc2bc94cba62.png)
[CTF攻防世界] WEB区 关于Cookie的题目

8_ Polynomial regression and model generalization
![[watevrCTF-2019]Cookie Store](/img/24/8baaa1ac9daa62c641472d5efac895.png)
[watevrCTF-2019]Cookie Store

14 web vulnerability: types of SQL injection and submission injection
![[NPUCTF2020]ezinclude](/img/24/ee1a6d49a74ce09ec721c1a3b5dce4.png)
[NPUCTF2020]ezinclude
![[By Pass] 文件上传的绕过方式](/img/72/d3e46a820796a48b458cd2d0a18f8f.png)
[By Pass] 文件上传的绕过方式

Solve the problem that there is no ado.net entity data model in vs

JSCORE day_02(7.1)
![[NPUCTF2020]ezinclude](/img/24/ee1a6d49a74ce09ec721c1a3b5dce4.png)
[NPUCTF2020]ezinclude
随机推荐
CUDA version difference between NVIDIA SMI and nvcc -v
Crop TIF image
Ansible MySQL installation case record
SSRF explanation and burp automatic detection SSRF
14 web vulnerability: types of SQL injection and submission injection
Use of postman
[SQL注入] 联合查询
Designer mode
当事务遇上分布式锁
Alibaba internal "shutter" core advanced notes~
Spark累加器(Accumulator)
JSCORE day_ 03(7.4)
[4.2 approximations]
JSCORE day_04(7.5)
[4.1 prime number and linear sieve]
Canal 介绍
箭头函数详解 2021-04-30
logback自定义MessageConverter
DOM day_ 02 (7.8) web page production process, picture SRC attribute, carousel chart, custom attribute, tab bar, input box event, check operation, accessor syntax
[ciscn2019 North China Day1 web5] cyberpunk