Internal error. code 210

internal error. code 210

Server Errors​ ; , AS_ERR_SINDEX_MAX_COUNT, Maximum number of indicies exceeded. ; , AS_ERR_QUERY_USER_ABORT, Secondary index query aborted. ; Error Code. Error Description Mismatch between transport Number between DP and DT Internal Error - Bond amt cannot be calculated. The request was not sent to the origin server. This is normal in the case of SureRoute test objects, when some requests are interrupted by the edge server if.

Internal error. code 210 - possible

Introduction

Invalid messageThe message is invalid, and no additional details are available for this errorRoot of the messageThis is the default error code for this class

Missing fieldA required field is missing in the messageThe pointer is set to the missing fieldAll requests

Invalid domain for the valueThe value is outside a defined list of acceptable valuesThe pointer is set to the invalid fieldAll requests

Malformed dateA field containing a date value cannot be properly convertedThe pointer is set to the invalid fieldI1/I2, I7/I8, I9/I10, I11/I12, I13/I14, I17/I18, E1/E2, E3/E4, E9/E10, E11/E12, E13/E14

Not an integerA numeric field contains a value that is not numericThe pointer is set to the invalid fieldI7/I8, E9/E10, E11/E12, E13/E14

Field value length exceeded

A String field contains a value with too many characters

The pointer is set to the invalid fieldAll requests

Invalid patternA String field does not match the pattern for the field defined in the XML Schema Definition of the messageThe pointer is set to the invalid fieldAll requests

Invalid fieldThe specified field does not follow the order defined in the XML Schema Definition of the messageThe pointer is set to the invalid fieldAll requests

Missing XML attributeThe specified XML tag is missing a required attribute (e.g. formatCode for all date fields)The pointer is set to the invalid fieldI1/I2, I7/I8, I9/I10, I11/I12, I13/I14, I17/I18, E1/E2, E3/E4, E9/E10, E11/E12, E13/E14

Invalid XML attributeThe specified XML tag has an invalid attribute value (e.g. formatCode for all date fields)The pointer is set to the invalid fieldI1/I2, I7/I8, I9/I10, I11/I12, I13/I14, I17/I18, E1/E2, E3/E4, E9/E10, E11/E12, E13/E14

Too many digitsThe number has too many digitsThe pointer is set to the invalid fieldI7/I8, E9/E10

Too much precisionThe number has a decimal part with too many digitsThe pointer is set to the invalid fieldI7/I8, E9/E10

Invalid eTIR specifications versionThe version specified in the metadata fields is not the one(s) approved to function in the eTIR systemThe pointer is set to the invalid metadata fieldAll messages

Condition C failureThe condition C is not satisfiedThe pointer is set to the invalid fieldI7/I8, I15/I16, E9/E10, E11/E12

Condition C failureThe condition C is not satisfiedThe pointer is set to the invalid fieldI7/I8, I15/I16, E9/E10, E11/E12

Condition C failureThe condition C is not satisfiedThe pointer is set to the invalid fieldI7/I8, I15/I16, E9/E10, E11/E12

Condition C failureThe condition C is not satisfiedThe pointer is set to the invalid fieldI7/I8, I15/I16, E9/E10, E11/E12

Condition C failureThe condition C is not satisfiedThe pointer is set to the invalid fieldI7/I8, I15/I16, E9/E10, E11/E12

Condition C failureThe condition C is not satisfiedNo pointerThis condition applies to all response messages

Condition C failureThe condition C is not satisfiedNo pointerThis condition applies to response messages: E9/E10, E13/E14

Condition C failureThe condition C is not satisfiedThe pointer is set to the invalid fieldI7/I8, E9/E10

Condition C failureThe condition C is not satisfiedNo pointerThis condition applies to response messages: E11/E12

Condition C failureThe condition C is not satisfiedThe pointer is set to the invalid fieldI15/I16, E11/E12

Rule R failureThe rule R is not satisfiedThe pointer is set to the invalid fieldI7/I8, I15/I16, E9/E10

Rule R failureThe rule R is not satisfiedThe pointer is set to the invalid fieldI7/I8, I15/I16, E9/E10

Rule R failureThe rule R is not satisfiedThe pointer is set to the invalid fieldI7/I8, I15/I16, E9/E10, E11/E12

Rule R failureThe rule R is not satisfiedThe pointer is set to the invalid fieldI17/I18, E11/E12

Rule R failureThe rule R is not satisfiedNo pointerI7/I8

Rule R failureThe rule R is not satifiedNo pointerI7/I8

Error Codes

0

Success

Success

Failed to perform service classification

Internal Error

Failed to perform policy evaluation

Internal Error

Failed to perform posture notification

Internal Error

Failed to query authstatus

Internal Error

Internal error in performing authentication

Internal Error

Internal error in RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; server

Internal Error

User not found

Authentication failure

Password mismatch

Authentication failure

Failed to contact Authentication Source

Authentication failure

Failed to classify request to service

Authentication failure

Authentication Source not configured for service

Authentication failure

Access denied by policy

Authentication failure

Failed to get client MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. Address in order to perform Web authentication

Authentication failure

No response from home server

Authentication failure

No password in request

Authentication failure

Unknown CACertificate Authority or Certification Authority. Entity in a public key infrastructure system that issues certificates to clients. A certificate signing request received by the CA is converted into a certificate when the CA adds a signature generated with a private key. See digital certificate. in client certificate

Authentication failure

Client certificate not valid

Authentication failure

Client certificate has expired

Authentication failure

Certificate comparison failed

Authentication failure

No certificate in authentication source

Authentication failure

TLSTransport Layer Security. TLS is a cryptographic protocol that provides communication security over the Internet. TLS encrypts the segments of network connections above the Transport Layer by using asymmetric cryptography for key exchange, symmetric encryption for privacy, and message authentication codes for message integrity. session error

Authentication failure

User authentication failed

Authentication failure

Search failed due to insufficient permissions

Authentication failure

Authentication source timed out

Authentication failure

Bad search filter

Authentication failure

Search failed

Authentication failure

Authentication source error

Authentication failure

Password change error

Authentication failure

Username not available in request

Authentication failure

CallingStationID not available in request

Authentication failure

User account disabled

Authentication failure

User account expired or not active yet

Authentication failure

User account needs approval

Authentication failure

User account has exceeded bandwidth limit

Authentication failure

User account has exceeded session duration limit

Authentication failure

User account has exceeded session count limit

Authentication failure

Internal Error

Command and Control

Invalid MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. &#;Address

Command and Control

Invalid request received

Command and Control

Insufficient parameters received

Command and Control

Query - No MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. &#;address record found

Command and Control

Query - No supported actions

Command and Control

Query - Cannot fetch MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. &#;address details

Command and Control

Request: MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. &#;address not online

Command and Control

Request: No MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. address record found

Command and Control

Unsupported TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. parameter in request

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Protocol

Invalid sequence number

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Protocol

Sequence number overflow

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Protocol

Not enough inputs to perform authentication

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Authentication

Authentication privilege level mismatch

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Authentication

No enforcement profiles matched to perform authentication

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Authentication

Authorization failed as session is not authenticated

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Authorization

Authorization privilege level mismatch

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Authorization

Command not allowed

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Authorization

No enforcement profiles matched to perform command authorization

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Authorization

New password entered does not match

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Change Password

Empty password

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Change Password

Change password allowed only for local users

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Change Password

Internal error in performing change password

TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. Change Password

Wrong shared secret

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Request timed out

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Phase 2 PACProtected Access Credential. PAC is distributed to clients for optimized network authentication. These credentials are used for establishing an authentication tunnel between the client and the authentication server. failure

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Client rejected after PACProtected Access Credential. PAC is distributed to clients for optimized network authentication. These credentials are used for establishing an authentication tunnel between the client and the authentication server. provisioning

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Client does not support posture request

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Received error TLVType-length-value or Tag-Length-Value. TLV is an encoding format. It refers to the type of data being processed, the length of the value, and the value for the type of data being processed.&#;from client

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Received failure TLVType-length-value or Tag-Length-Value. TLV is an encoding format. It refers to the type of data being processed, the length of the value, and the value for the type of data being processed. from client

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Phase 2 PACProtected Access Credential. PAC is distributed to clients for optimized network authentication. These credentials are used for establishing an authentication tunnel between the client and the authentication server. &#;not found

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Unknown Phase 2 PACProtected Access Credential. PAC is distributed to clients for optimized network authentication. These credentials are used for establishing an authentication tunnel between the client and the authentication server.

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Invalid Phase 2 PACProtected Access Credential. PAC is distributed to clients for optimized network authentication. These credentials are used for establishing an authentication tunnel between the client and the authentication server.

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

PACProtected Access Credential. PAC is distributed to clients for optimized network authentication. These credentials are used for establishing an authentication tunnel between the client and the authentication server. verification failed

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

PACProtected Access Credential. PAC is distributed to clients for optimized network authentication. These credentials are used for establishing an authentication tunnel between the client and the authentication server. binding failed

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Session resumption failed

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Cached session data error

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Client does not support configured EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time&#;passwords, and public key encryption authentication.&#;&#;methods

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Client did not send CryptobindingShort for cryptographic binding. A procedure in a tunneled EAP method that binds together the tunnel protocol and the tunneled authentication methods, ensuring the relationship between a collection of data assets. Cryptographic binding focuses on protecting the server; mutual cryptographic binding protects both peer and sprers.eue-length-value or Tag-Length-Value. TLV is an encoding format. It refers to the type of data being processed, the length of the value, and the value for the type of data being processed.

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Failed to contact OCSPOnline Certificate Status Protocol. OCSP is used for determining the current status of a digital certificate without requiring a CRL. &#;Server

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; protocol error

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

Client sent conflicting identities

RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.&#; Protocol

* * * EMPTY * * *

Error Codes

0AS_OKNo error.1AS_ERR_UNKNOWNUnknown server error.2AS_ERR_NOT_FOUNDNo record is found with the specified namespace/set/key combination. Check the correct namesapce/set/key is passed in.3AS_ERR_GENERATIONAttempt to modify a record with unexpected generation. This happens on a read-modify-write situation where concurrent write requests collide and only one wins.4AS_ERR_PARAMETERIllegal parameter sent from client. Check client parameters and verify each is supported by current server version.5AS_ERR_RECORD_EXISTSFor write requests which specify 'CREATE_ONLY', request fail because record already exists.6AS_ERR_BIN_EXISTSCreate-only operation applied to a bin that already exists.7AS_ERR_CLUSTER_KEY_MISMATCHOn scan requests, the scan terminates because cluster is in migration. Only occurs when client requested 'fail_on_cluster_change' policy on scan.8AS_ERR_OUT_OF_SPACEOccurs when stop_writes is true (either memory - stop-writes-pct - or disk - min-avail-pct). Can also occur if memory cannot be allocated anymore (but stop_writes should in general hit first). Namespace will no longer be able to accept write requests.9AS_ERR_TIMEOUTRequest was not completed during the allocated time, thus aborted.10AS_ERR_ALWAYS_FORBIDDENWrite request is rejected because XDR configuration does not allow it. Only occurs when namespace configuration items allow-xdr-writes or allow-nonxdr-writes are false.EE11AS_ERR_UNAVAILABLEPartition unavailable (Strong Consistency mode). Will also be returned in AP mode when a transaction is received on an orphan node (a node that separated from a cluster) or, for versions prior to , during the initial balance for a very short time after a node joins a cluster.12AS_ERR_INCOMPATIBLE_TYPEOperation is not allowed due to data type or namespace configuration incompatibility. For example, append to a float data type, or insert a non-integer when namespace is configured as data-in-index.13AS_ERR_RECORD_TOO_BIGAttempt to write a record whose size is bigger than the configured or . See Known Limitations14AS_ERR_KEY_BUSYToo many concurrent operations (> transaction-pending-limit) on the same record.15AS_ERR_SCAN_ABORTScan aborted by user on Server.16AS_ERR_UNSUPPORTED_FEATUREThis feature currently is not supported.17AS_ERR_BIN_NOT_FOUNDUpdate-only operation applied to a bin that does not exist.18AS_ERR_DEVICE_OVERLOADWrite request is rejected because storage device is not keeping up.19AS_ERR_KEY_MISMATCHFor update request on records which has key stored, the incoming key does not match the existing stored key. This indicates a RIPEMD key collision, and has never happened.20AS_ERR_NAMESPACEThe passed in namespace does not exist on cluster, or no namespace parameter is passed in on request.21AS_ERR_BIN_NAMEBin name length greater than 14 characters, or maximum number of unique bin names are exceeded.22AS_ERR_FORBIDDENOperation not allowed at this time.
  • For writes, the set or namespace is in the middle of being deleted/truncated.
  • For writes, stop_writes is reached.
  • For writes, a is set and the server is not configured to expire records.
  • For writes, reject-non-xdr-writes or reject-xdr-writes is prohibiting writes.
  • For scans with server to , too many concurrent scan jobs (> scan-max-active).
  • For scans with server or later, no threads available (scan-threads-limit reached).
  • For strong-consistency enabled namespaces, if non-durable deletes are issued against while strong-consistency-allow-expunge is set to (default).
  • For strong-consistency enabled namespaces, if clock_skew_stop_writes is in effect, when cluster_clock_skew_ms is above the cluster_clock_skew_stop_writes_sec threshold.
  • As of Aerospike Server , for each Available mode (AP) namespace where nsup is enabled (i.e. not zero) writes will be suspended if cluster clock skew exceeds 40 seconds.
23AS_ERR_ELEMENT_NOT_FOUNDTarget was not found for operations that requires a target to be found.24AS_ERR_ELEMENT_EXISTSTarget already exist for operations that requires the target to not exist.25AS_ERR_ENTERPRISE_ONLYAttempting Enterprise functionality on Community build.EE26AS_ERR_OP_NOT_APPLICABLEOperation isn't able to be applied to the current contents of the bin.27AS_ERR_FILTERED_OUTFilter expression indicated to not return this record.28AS_ERR_LOST_CONFLICTIndicates that the client write lost to a conflicting write by XDR. This can happen when bin convergence is on and XDR wrote a later version of the record compared to the client write.50AS_SEC_OK_LASTEnd of security response. No error.EE51AS_SEC_ERR_NOT_SUPPORTEDSecurity functionality not supported by connected server.EE52AS_SEC_ERR_NOT_ENABLEDSecurity functionality not enabled by connected server.EE53AS_SEC_ERR_SCHEMESecurity scheme not supported.EE54AS_SEC_ERR_COMMANDUnrecognized security command.EE55AS_SEC_ERR_FIELDField is not valid.EE56AS_SEC_ERR_STATESecurity protocol not followed.EE60AS_SEC_ERR_USERNo user supplied or unknown user.EE61AS_SEC_ERR_USER_EXISTSUser already exists.EE62AS_SEC_ERR_PASSWORDPassword does not exists or not recognized.EE63AS_SEC_ERR_EXPIRED_PASSWORDExpired password.EE64AS_SEC_ERR_FORBIDDEN_PASSWORDForbidden password (e.g. recently used).EE65AS_SEC_ERR_CREDENTIALInvalid credential or credential does not exist.EE66AS_SEC_ERR_EXPIRED_SESSIONExpired session token.EE 70AS_SEC_ERR_ROLENo role(s) or unknown role(s).EE71AS_SEC_ERR_ROLE_EXISTSRole already exists.EE72AS_SEC_ERR_PRIVILEGEPrivilege is invalid.EE73AS_SEC_ERR_WHITELISTSpecified IP whitelist is invalid.EE 74AS_SEC_ERR_QUOTAS_NOT_ENABLEDQuotas not enabled on the server.EE 75AS_SEC_ERR_QUOTAInvalid quota specified.EE 80AS_SEC_ERR_NOT_AUTHENTICATEDUser must be authenticated before performing database operations.EE81AS_SEC_ERR_ROLE_VIOLATIONUser does not possess the required role to perform the database operation.EE82AS_SEC_ERR_NOT_WHITELISTEDClient IP address is not on the IP whitelist.EE 83AS_SEC_ERR_QUOTA_EXCEEDEDQuota currently exceeded.EE 90AS_SEC_ERR_LDAP_NOT_ENABLEDLDAP feature not enabled on server.EE 91AS_SEC_ERR_LDAP_SETUPError in LDAP setup.EE 92AS_SEC_ERR_LDAP_TLS_SETUPError in LDAP TLS setup.EE 93AS_SEC_ERR_LDAP_AUTHENTICATIONError authenticating LDAP user.EE 94AS_SEC_ERR_LDAP_QUERYError querying LDAP server.EE AS_ERR_UDF_EXECUTIONA User-Defined Function (UDF) failed to execute.AS_ERR_BATCH_DISABLEDBatch functionality has been disabled by configuring to 0.AS_ERR_BATCH_MAX_REQUESTSBatch max requests has been exceeded.AS_ERR_BATCH_QUEUES_FULLAll batch queues are full.AS_ERR_GEO_INVALID_GEOJSONGeoJSON is malformed or not supported.AS_ERR_SINDEX_FOUNDSecondary index already exists.AS_ERR_SINDEX_NOT_FOUNDSecondary index does not exist.AS_ERR_SINDEX_OOMSecondary index memory space exceeded.AS_ERR_SINDEX_NOT_READABLESecondary index not available for query. Occurs when indexing creation has not finished.AS_ERR_SINDEX_GENERICGeneric secondary index error.AS_ERR_SINDEX_NAMEIndex name maximun length exceeded.AS_ERR_SINDEX_MAX_COUNTMaximum number of indicies exceeded.AS_ERR_QUERY_USER_ABORTSecondary index query aborted.AS_ERR_QUERY_QUEUE_FULLSecondary index queue full.AS_ERR_QUERY_TIMEOUTSecondary index query timed out on server.AS_ERR_QUERY_CBGeneric query error.AS_ERR_QUERY_NET_IOGeneric query error. Query is aborted.AS_ERR_QUERY_DUPLICATEInternal error.
<- TOTAL BLOCKS
This situation is known to be caused by resource contention at the time, underscoped shared memory resources under unexpected load, corruption on disk, forcing into the database (-F), or a torn page condition after a crash Can Torn Pages arise when Type II Areas are used