Uploaded image for project: 'Keycloak'
  1. Keycloak
  2. KEYCLOAK-8724

BruteForceCrossDCTest is unstable

    XMLWordPrintable

    Details

      Description

      Error:

      BruteForceCrossDCTest.testBruteForceConcurrentUpdate:248->lambda$testBruteForceConcurrentUpdate$2:255 
      -- Expected: a value greater than <20>
      --      but: <20> was equal to <20>
      

      Full logs:

      --------- org.keycloak.testsuite.crossdc.BruteForceCrossDCTest output start ---------
      BruteForceCrossDCTest ++ 09:13:44,325 [main] INFO  [o.k.t.a.AppServerTestEnricher] 
      BruteForceCrossDCTest ++ TEST CONTEXT: org.keycloak.testsuite.crossdc.BruteForceCrossDCTest
      BruteForceCrossDCTest ++ 09:13:44,498 [main] INFO  [o.k.t.a.DeploymentTargetModifier] Setting target container for deployment org.keycloak.testsuite.crossdc.BruteForceCrossDCTest.dc0: auth-server-jboss-cross-dc-0_1
      BruteForceCrossDCTest ++ 09:13:44,499 [main] INFO  [o.k.t.a.DeploymentTargetModifier] Setting target container for deployment org.keycloak.testsuite.crossdc.BruteForceCrossDCTest.dc1: auth-server-jboss-cross-dc-1_1
      BruteForceCrossDCTest ++ 09:13:45,534 INFO  [org.jboss.as.repository] (management-handler-thread - 1) WFLYDR0001: Content added at location /home/travis/build/keycloak/keycloak/testsuite/integration-arquillian/tests/base/target/containers/auth-server-wildfly-crossdc01/standalone/data/content/23/92169fced1c3e9026b75e8e11e0fe2bde3398a/content
      BruteForceCrossDCTest ++ 09:13:45,554 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-2) WFLYSRV0027: Starting deployment of "run-on-server-classes.war" (runtime-name: "run-on-server-classes.war")
      BruteForceCrossDCTest ++ 09:13:45,858 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-1) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-server-spi-private") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:45,864 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-1) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-services") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:45,864 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-1) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-model-infinispan") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:45,864 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-1) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-model-jpa") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:45,864 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-1) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-kerberos-federation") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:45,864 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-1) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-ldap-federation") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:46,043 INFO  [org.wildfly.extension.undertow] (ServerService Thread Pool -- 69) WFLYUT0021: Registered web context: '/run-on-server-classes' for server 'default-server'
      BruteForceCrossDCTest ++ 09:13:46,090 INFO  [org.jboss.as.server] (management-handler-thread - 1) WFLYSRV0010: Deployed "run-on-server-classes.war" (runtime-name : "run-on-server-classes.war")
      BruteForceCrossDCTest ++ 09:13:47,094 INFO  [org.jboss.as.repository] (management-handler-thread - 1) WFLYDR0001: Content added at location /home/travis/build/keycloak/keycloak/testsuite/integration-arquillian/tests/base/target/containers/auth-server-wildfly-crossdc11/standalone/data/content/46/bfa74f942bc95f7ed42c2d9651903d44e6f57d/content
      BruteForceCrossDCTest ++ 09:13:47,109 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-3) WFLYSRV0027: Starting deployment of "run-on-server-classes.war" (runtime-name: "run-on-server-classes.war")
      BruteForceCrossDCTest ++ 09:13:47,604 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-4) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-server-spi-private") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:47,604 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-4) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-services") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:47,605 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-4) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-model-infinispan") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:47,605 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-4) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-model-jpa") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:47,605 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-4) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-kerberos-federation") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:47,605 WARN  [org.jboss.as.dependency.private] (MSC service thread 1-4) WFLYSRV0018: Deployment "deployment.run-on-server-classes.war" is using a private module ("org.keycloak.keycloak-ldap-federation") which may be changed or removed in future versions without notice.
      BruteForceCrossDCTest ++ 09:13:47,809 INFO  [org.wildfly.extension.undertow] (ServerService Thread Pool -- 69) WFLYUT0021: Registered web context: '/run-on-server-classes' for server 'default-server'
      BruteForceCrossDCTest ++ 09:13:47,862 INFO  [org.jboss.as.server] (management-handler-thread - 1) WFLYSRV0010: Deployed "run-on-server-classes.war" (runtime-name : "run-on-server-classes.war")
      BruteForceCrossDCTest ++ 09:13:47,877 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] [BruteForceCrossDCTest] testBruteForceWithRealmOperations() STARTED
      BruteForceCrossDCTest ++ Nov 02, 2018 9:13:47 AM org.jboss.arquillian.drone.webdriver.factory.HtmlUnitDriverFactory setClientOptions
      BruteForceCrossDCTest ++ INFO: Setting HtmlDriver web client options: {htmlunitCssEnabled=false, htmlunitHistoryPageCacheLimit=1}
      BruteForceCrossDCTest ++ 09:13:47,891 [main] INFO  [o.k.t.d.KeycloakDronePostSetup] Configuring driver settings. implicitWait=750, pageLoadTimeout=20000
      BruteForceCrossDCTest ++ 09:13:48,041 [main] DEBUG [o.k.t.a.CrossDCTestEnricher] --DC: suspendPeriodicTasks
      BruteForceCrossDCTest ++ 09:13:48,058 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: Enable only first node in first datacenter
      BruteForceCrossDCTest ++ 09:13:48,058 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:13:48,059 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:13:48,095 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] loading test realms
      BruteForceCrossDCTest ++ 09:13:48,095 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: AbstractAdminCrossDCTest.addTestRealms - adding realm: admin-client-test
      BruteForceCrossDCTest ++ 09:13:48,095 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] Adding test realm for import from testrealm.json
      BruteForceCrossDCTest ++ 09:13:48,097 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] Configuring test realm 'test'. Enabling direct access grant.
      BruteForceCrossDCTest ++ 09:13:48,098 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] importing test realms
      BruteForceCrossDCTest ++ 09:13:48,098 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --importing realm: test
      BruteForceCrossDCTest ++ 09:13:48,526 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:48,526 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:48,529 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-1) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:48,529 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-1) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:50,601 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --importing realm: admin-client-test
      BruteForceCrossDCTest ++ 09:13:51,492 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: AbstractAdminCrossDCTest.setRealm
      BruteForceCrossDCTest ++ 09:13:51,621 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: creating test realm
      BruteForceCrossDCTest ++ 09:13:53,128 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] --DC: Enabling load balancer for dc=0
      BruteForceCrossDCTest ++ 09:13:53,128 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Route 'auth-server-jboss-cross-dc-0_1' already present. Skip adding
      BruteForceCrossDCTest ++ 09:13:53,128 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:13:53,128 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] --DC: Enabling load balancer for dc=1
      BruteForceCrossDCTest ++ 09:13:53,128 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-1_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1, auth-server-jboss-cross-dc-1_1]
      BruteForceCrossDCTest ++ 09:13:53,667 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force cleared: dc0User1=0, dc0user2=0, dc1user1=0, dc1user2=0, dc0CacheSize=0, dc1CacheSize=0
      BruteForceCrossDCTest ++ 09:13:53,894 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:53,897 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:53,905 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-2) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:53,905 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-2) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,113 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:54,116 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:54,119 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,181 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:54,182 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:54,184 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,249 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:54,250 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:54,252 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,309 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:54,309 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:54,310 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,369 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:54,369 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:54,371 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,429 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:54,429 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:54,430 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,490 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:54,519 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:54,523 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,589 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:54,590 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:54,591 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,649 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:54,650 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:54,651 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,909 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:54,909 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:54,910 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:54,911 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,092 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:55,093 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:55,094 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,153 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:55,153 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:55,155 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,213 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:55,213 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:55,215 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,273 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:55,273 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:55,274 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,337 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:55,337 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:55,339 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,397 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:55,397 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:55,399 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,461 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:55,462 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:55,463 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,521 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:55,521 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:55,524 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,581 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:55,582 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:55,583 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,689 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force for users created: dc0User1=10, dc0user2=10, dc1user1=10, dc1user2=10, dc0CacheSize=2, dc1CacheSize=2
      BruteForceCrossDCTest ++ 09:13:55,696 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006011: Operation 'REMOVE' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,698 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006011: Operation 'REMOVE' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:55,819 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force cleared for realm: dc0User1=0, dc0user2=0, dc1user1=0, dc1user2=0, dc0CacheSize=0, dc1CacheSize=0
      BruteForceCrossDCTest ++ 09:13:56,041 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:56,042 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,044 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,044 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,215 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:56,216 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,217 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,297 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:56,297 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,299 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,357 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:56,358 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,359 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,418 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:56,418 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,419 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,489 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:56,490 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,491 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,549 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:56,550 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,551 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,609 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:56,610 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,611 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,669 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:56,669 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,670 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,737 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:13:56,738 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,739 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,932 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:56,933 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:56,935 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:56,935 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:57,109 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:57,109 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:57,111 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:57,170 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:57,170 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:57,171 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:57,237 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:57,238 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:57,239 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:57,297 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:57,297 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:57,299 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:57,357 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:57,357 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:57,358 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:57,420 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:57,421 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:57,422 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:57,481 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:57,482 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:57,482 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:57,542 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:57,542 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:57,544 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:57,605 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=f659c84d-fcfc-4f8c-ae5c-64571ca4d3bb, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:13:57,606 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:13:57,607 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:57,722 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force for users re-created: dc0User1=10, dc0user2=10, dc1user1=10, dc1user2=10, dc0CacheSize=2, dc1CacheSize=2
      BruteForceCrossDCTest ++ 09:13:58,268 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006011: Operation 'REMOVE' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:58,271 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006011: Operation 'REMOVE' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:13:58,315 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: after AbstractCrossDCTest
      BruteForceCrossDCTest ++ 09:13:58,315 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: Enable only first node in first datacenter
      BruteForceCrossDCTest ++ 09:13:58,315 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:13:58,316 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:13:58,316 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] calling all TestCleanup
      BruteForceCrossDCTest ++ 09:13:58,541 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:13:58,542 [main] INFO  [o.k.t.u.URLUtils] current URL:  about:blank
      BruteForceCrossDCTest ++ 09:13:58,542 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:13:58,663 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/test/protocol/openid-connect/auth?client_id=account&redirect_uri=https%3A%2F%2Flocalhost%3A8543%2Fauth%2Frealms%2Ftest%2Faccount%2Flogin-redirect&state=0%2Fe13aac11-44f7-4833-b774-51e30a9c8d39&response_type=code&scope=openid
      BruteForceCrossDCTest ++ 09:13:58,663 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:13:58,663 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'test' realm
      BruteForceCrossDCTest ++ 09:13:58,664 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:13:58,664 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/test/protocol/openid-connect/auth?client_id=account&redirect_uri=https%3A%2F%2Flocalhost%3A8543%2Fauth%2Frealms%2Ftest%2Faccount%2Flogin-redirect&state=0%2Fe13aac11-44f7-4833-b774-51e30a9c8d39&response_type=code&scope=openid
      BruteForceCrossDCTest ++ 09:13:58,664 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/admin-client-test/account
      BruteForceCrossDCTest ++ 09:13:58,747 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/admin-client-test/protocol/openid-connect/auth?client_id=account&redirect_uri=https%3A%2F%2Flocalhost%3A8543%2Fauth%2Frealms%2Fadmin-client-test%2Faccount%2Flogin-redirect&state=0%2F243c6d13-e260-4fc3-9922-47dd2daafa96&response_type=code&scope=openid
      BruteForceCrossDCTest ++ 09:13:58,748 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:13:58,748 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'admin-client-test' realm
      BruteForceCrossDCTest ++ 09:13:58,748 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: removing rest realms
      BruteForceCrossDCTest ++ 09:13:58,748 [main] INFO  [o.k.t.a.AuthServerTestEnricher] removing test realms after test class
      BruteForceCrossDCTest ++ 09:13:59,759 [main] INFO  [o.k.t.a.AuthServerTestEnricher] removed realms: test, admin-client-test, 
      BruteForceCrossDCTest ++ 09:13:59,759 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:13:59,759 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:13:59,759 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/admin-client-test/protocol/openid-connect/auth?client_id=account&redirect_uri=https%3A%2F%2Flocalhost%3A8543%2Fauth%2Frealms%2Fadmin-client-test%2Faccount%2Flogin-redirect&state=0%2F243c6d13-e260-4fc3-9922-47dd2daafa96&response_type=code&scope=openid
      BruteForceCrossDCTest ++ 09:13:59,759 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:13:59,761 [XNIO-1 I/O-2] WARN  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] No host available
      BruteForceCrossDCTest ++ 09:13:59,761 [XNIO-1 I/O-2] WARN  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Could not resolve backend when request to: /auth/realms/test/account
      BruteForceCrossDCTest ++ 09:13:59,768 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:13:59,768 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:13:59,768 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'test' realm
      BruteForceCrossDCTest ++ 09:13:59,768 [main] DEBUG [o.k.t.a.CrossDCTestEnricher] --DC: restorePeriodicTasks
      BruteForceCrossDCTest ++ 09:13:59,874 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] [BruteForceCrossDCTest] testBruteForceWithRealmOperations() FINISHED
      BruteForceCrossDCTest ++ 09:13:59,874 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] [BruteForceCrossDCTest] testBruteForceConcurrentUpdate() STARTED
      BruteForceCrossDCTest ++ 09:13:59,988 [main] DEBUG [o.k.t.a.CrossDCTestEnricher] --DC: suspendPeriodicTasks
      BruteForceCrossDCTest ++ 09:14:00,019 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: Enable only first node in first datacenter
      BruteForceCrossDCTest ++ 09:14:00,019 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:14:00,019 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:14:00,020 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] loading test realms
      BruteForceCrossDCTest ++ 09:14:00,020 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: AbstractAdminCrossDCTest.addTestRealms - adding realm: admin-client-test
      BruteForceCrossDCTest ++ 09:14:00,020 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] Adding test realm for import from testrealm.json
      BruteForceCrossDCTest ++ 09:14:00,025 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] Configuring test realm 'test'. Enabling direct access grant.
      BruteForceCrossDCTest ++ 09:14:00,025 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] importing test realms
      BruteForceCrossDCTest ++ 09:14:00,025 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --importing realm: test
      BruteForceCrossDCTest ++ 09:14:02,332 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --importing realm: admin-client-test
      BruteForceCrossDCTest ++ 09:14:02,975 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: AbstractAdminCrossDCTest.setRealm
      BruteForceCrossDCTest ++ 09:14:03,125 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: creating test realm
      BruteForceCrossDCTest ++ 09:14:03,926 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] --DC: Enabling load balancer for dc=0
      BruteForceCrossDCTest ++ 09:14:03,926 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Route 'auth-server-jboss-cross-dc-0_1' already present. Skip adding
      BruteForceCrossDCTest ++ 09:14:03,926 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:14:03,926 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] --DC: Enabling load balancer for dc=1
      BruteForceCrossDCTest ++ 09:14:03,926 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-1_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1, auth-server-jboss-cross-dc-1_1]
      BruteForceCrossDCTest ++ 09:14:04,209 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force cleared: dc0User1=0, dc0user2=0, dc1user1=0, dc1user2=0, dc0CacheSize=0, dc1CacheSize=0
      BruteForceCrossDCTest ++ 09:14:04,246 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:04,246 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:04,319 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After create entry1: dc0User1=1, dc0user2=0, dc1user1=1, dc1user2=0, dc0CacheSize=1, dc1CacheSize=1
      BruteForceCrossDCTest ++ 09:14:04,616 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:04,617 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:04,618 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:04,618 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:04,618 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:04,620 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:04,881 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:04,882 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:04,883 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:04,908 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:04,909 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:04,910 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:04,957 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:04,958 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:04,959 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:04,973 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:04,975 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:04,975 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,048 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,048 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,049 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,105 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,105 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,106 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,120 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,120 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,122 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,189 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,189 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,190 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,201 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,202 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,203 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,273 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,273 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,274 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,279 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,280 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,281 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,345 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,346 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,348 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,353 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,354 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,356 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,425 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,426 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,429 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,435 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,435 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,439 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,509 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,509 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,510 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,525 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,525 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,527 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,573 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=e3547949-38cb-497d-a88f-4b76b11a8ec6, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:05,573 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:05,574 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:05,589 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:05,656 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:05,720 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:05,783 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:05,847 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:05,913 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:05,987 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,053 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,119 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,182 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,247 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,290 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-2) ISPN006011: Operation 'REMOVE' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:06,319 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,391 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,454 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,519 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,583 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,649 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,716 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,786 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,855 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,918 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:06,983 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,046 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,113 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,175 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,238 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,303 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,365 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,428 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,499 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,565 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,633 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,705 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,784 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,850 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,911 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:07,973 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,035 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,102 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,164 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,225 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,288 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,351 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,417 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,483 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,544 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,612 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,675 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,744 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,807 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After concurrent update entry1: dc0User1=20, dc1user1=20
      BruteForceCrossDCTest ++ 09:14:08,810 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: after AbstractCrossDCTest
      BruteForceCrossDCTest ++ 09:14:08,810 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: Enable only first node in first datacenter
      BruteForceCrossDCTest ++ 09:14:08,810 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:14:08,810 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:14:08,811 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] calling all TestCleanup
      BruteForceCrossDCTest ++ 09:14:08,963 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:14:08,963 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:08,963 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:08,963 [main] INFO  [o.k.t.u.URLUtils] target URL equals current URL - refreshing the page
      BruteForceCrossDCTest ++ 09:14:08,964 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:08,964 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:14:08,964 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'test' realm
      BruteForceCrossDCTest ++ 09:14:08,964 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:14:08,964 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:08,964 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/admin-client-test/account
      BruteForceCrossDCTest ++ 09:14:09,006 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/admin-client-test/protocol/openid-connect/auth?client_id=account&redirect_uri=https%3A%2F%2Flocalhost%3A8543%2Fauth%2Frealms%2Fadmin-client-test%2Faccount%2Flogin-redirect&state=0%2Fbdee58be-5fbb-4009-b29a-380cc45b9cd0&response_type=code&scope=openid
      BruteForceCrossDCTest ++ 09:14:09,006 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:14:09,006 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'admin-client-test' realm
      BruteForceCrossDCTest ++ 09:14:09,007 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: removing rest realms
      BruteForceCrossDCTest ++ 09:14:09,007 [main] INFO  [o.k.t.a.AuthServerTestEnricher] removing test realms after test class
      BruteForceCrossDCTest ++ 09:14:10,310 [main] INFO  [o.k.t.a.AuthServerTestEnricher] removed realms: test, admin-client-test, 
      BruteForceCrossDCTest ++ 09:14:10,310 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:14:10,310 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:14:10,310 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/admin-client-test/protocol/openid-connect/auth?client_id=account&redirect_uri=https%3A%2F%2Flocalhost%3A8543%2Fauth%2Frealms%2Fadmin-client-test%2Faccount%2Flogin-redirect&state=0%2Fbdee58be-5fbb-4009-b29a-380cc45b9cd0&response_type=code&scope=openid
      BruteForceCrossDCTest ++ 09:14:10,310 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:10,312 [XNIO-1 I/O-2] WARN  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] No host available
      BruteForceCrossDCTest ++ 09:14:10,312 [XNIO-1 I/O-2] WARN  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Could not resolve backend when request to: /auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:10,318 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:10,318 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:14:10,318 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'test' realm
      BruteForceCrossDCTest ++ 09:14:10,318 [main] DEBUG [o.k.t.a.CrossDCTestEnricher] --DC: restorePeriodicTasks
      BruteForceCrossDCTest ++ 09:14:10,348 [main] ERROR [o.k.t.c.BruteForceCrossDCTest] [BruteForceCrossDCTest] testBruteForceConcurrentUpdate() FAILED
      BruteForceCrossDCTest ++ 09:14:10,348 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] [BruteForceCrossDCTest] testBruteForceConcurrentUpdate() FINISHED
      BruteForceCrossDCTest ++ 09:14:10,349 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] [BruteForceCrossDCTest] testDuplicatedPutIfAbsentOperation() STARTED
      BruteForceCrossDCTest ++ 09:14:10,418 [main] DEBUG [o.k.t.a.CrossDCTestEnricher] --DC: suspendPeriodicTasks
      BruteForceCrossDCTest ++ 09:14:10,431 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: Enable only first node in first datacenter
      BruteForceCrossDCTest ++ 09:14:10,431 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:14:10,431 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:14:10,431 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] loading test realms
      BruteForceCrossDCTest ++ 09:14:10,431 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: AbstractAdminCrossDCTest.addTestRealms - adding realm: admin-client-test
      BruteForceCrossDCTest ++ 09:14:10,431 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] Adding test realm for import from testrealm.json
      BruteForceCrossDCTest ++ 09:14:10,432 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] Configuring test realm 'test'. Enabling direct access grant.
      BruteForceCrossDCTest ++ 09:14:10,432 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] importing test realms
      BruteForceCrossDCTest ++ 09:14:10,432 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --importing realm: test
      BruteForceCrossDCTest ++ 09:14:12,215 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --importing realm: admin-client-test
      BruteForceCrossDCTest ++ 09:14:13,207 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: AbstractAdminCrossDCTest.setRealm
      BruteForceCrossDCTest ++ 09:14:13,326 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: creating test realm
      BruteForceCrossDCTest ++ 09:14:13,678 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006011: Operation 'REMOVE' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:14,547 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] --DC: Enabling load balancer for dc=0
      BruteForceCrossDCTest ++ 09:14:14,547 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Route 'auth-server-jboss-cross-dc-0_1' already present. Skip adding
      BruteForceCrossDCTest ++ 09:14:14,547 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:14:14,547 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] --DC: Enabling load balancer for dc=1
      BruteForceCrossDCTest ++ 09:14:14,547 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-1_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1, auth-server-jboss-cross-dc-1_1]
      BruteForceCrossDCTest ++ 09:14:14,831 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force cleared: dc0User1=0, dc0user2=0, dc1user1=0, dc1user2=0, dc0CacheSize=0, dc1CacheSize=0
      BruteForceCrossDCTest ++ 09:14:14,838 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:14,839 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:14,910 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After create entry1: dc0User1=1, dc0user2=0, dc1user1=1, dc1user2=0, dc0CacheSize=1, dc1CacheSize=1
      BruteForceCrossDCTest ++ 09:14:14,937 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:14,937 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:14,938 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:15,013 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After create entry2: dc0User1=2, dc0user2=0, dc1user1=2, dc1user2=0, dc0CacheSize=1, dc1CacheSize=1
      BruteForceCrossDCTest ++ 09:14:15,017 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: after AbstractCrossDCTest
      BruteForceCrossDCTest ++ 09:14:15,017 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: Enable only first node in first datacenter
      BruteForceCrossDCTest ++ 09:14:15,017 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:14:15,017 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:14:15,017 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] calling all TestCleanup
      BruteForceCrossDCTest ++ 09:14:15,177 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:14:15,177 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:15,177 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:15,177 [main] INFO  [o.k.t.u.URLUtils] target URL equals current URL - refreshing the page
      BruteForceCrossDCTest ++ 09:14:15,177 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:15,177 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:14:15,178 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'test' realm
      BruteForceCrossDCTest ++ 09:14:15,178 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:14:15,178 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:15,178 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/admin-client-test/account
      BruteForceCrossDCTest ++ 09:14:15,228 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/admin-client-test/protocol/openid-connect/auth?client_id=account&redirect_uri=https%3A%2F%2Flocalhost%3A8543%2Fauth%2Frealms%2Fadmin-client-test%2Faccount%2Flogin-redirect&state=0%2F66feabfa-a260-4ebb-9454-560cc3a770d8&response_type=code&scope=openid
      BruteForceCrossDCTest ++ 09:14:15,228 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:14:15,228 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'admin-client-test' realm
      BruteForceCrossDCTest ++ 09:14:15,228 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: removing rest realms
      BruteForceCrossDCTest ++ 09:14:15,228 [main] INFO  [o.k.t.a.AuthServerTestEnricher] removing test realms after test class
      BruteForceCrossDCTest ++ 09:14:15,960 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006011: Operation 'REMOVE' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:15,962 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006011: Operation 'REMOVE' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:16,445 [main] INFO  [o.k.t.a.AuthServerTestEnricher] removed realms: test, admin-client-test, 
      BruteForceCrossDCTest ++ 09:14:16,445 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:14:16,445 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:14:16,446 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/admin-client-test/protocol/openid-connect/auth?client_id=account&redirect_uri=https%3A%2F%2Flocalhost%3A8543%2Fauth%2Frealms%2Fadmin-client-test%2Faccount%2Flogin-redirect&state=0%2F66feabfa-a260-4ebb-9454-560cc3a770d8&response_type=code&scope=openid
      BruteForceCrossDCTest ++ 09:14:16,446 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:16,447 [XNIO-1 I/O-2] WARN  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] No host available
      BruteForceCrossDCTest ++ 09:14:16,447 [XNIO-1 I/O-2] WARN  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Could not resolve backend when request to: /auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:16,461 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:16,461 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:14:16,461 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'test' realm
      BruteForceCrossDCTest ++ 09:14:16,461 [main] DEBUG [o.k.t.a.CrossDCTestEnricher] --DC: restorePeriodicTasks
      BruteForceCrossDCTest ++ 09:14:16,472 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] [BruteForceCrossDCTest] testDuplicatedPutIfAbsentOperation() FINISHED
      BruteForceCrossDCTest ++ 09:14:16,475 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] [BruteForceCrossDCTest] testBruteForceWithUserOperations() STARTED
      BruteForceCrossDCTest ++ 09:14:16,571 [main] DEBUG [o.k.t.a.CrossDCTestEnricher] --DC: suspendPeriodicTasks
      BruteForceCrossDCTest ++ 09:14:16,580 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: Enable only first node in first datacenter
      BruteForceCrossDCTest ++ 09:14:16,580 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:14:16,580 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:14:16,580 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] loading test realms
      BruteForceCrossDCTest ++ 09:14:16,580 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: AbstractAdminCrossDCTest.addTestRealms - adding realm: admin-client-test
      BruteForceCrossDCTest ++ 09:14:16,580 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] Adding test realm for import from testrealm.json
      BruteForceCrossDCTest ++ 09:14:16,581 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] Configuring test realm 'test'. Enabling direct access grant.
      BruteForceCrossDCTest ++ 09:14:16,581 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] importing test realms
      BruteForceCrossDCTest ++ 09:14:16,581 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --importing realm: test
      BruteForceCrossDCTest ++ 09:14:18,610 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --importing realm: admin-client-test
      BruteForceCrossDCTest ++ 09:14:19,340 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: AbstractAdminCrossDCTest.setRealm
      BruteForceCrossDCTest ++ 09:14:19,443 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: creating test realm
      BruteForceCrossDCTest ++ 09:14:19,812 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006011: Operation 'REMOVE' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:20,979 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] --DC: Enabling load balancer for dc=0
      BruteForceCrossDCTest ++ 09:14:20,979 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Route 'auth-server-jboss-cross-dc-0_1' already present. Skip adding
      BruteForceCrossDCTest ++ 09:14:20,979 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:14:20,979 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] --DC: Enabling load balancer for dc=1
      BruteForceCrossDCTest ++ 09:14:20,979 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-1_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1, auth-server-jboss-cross-dc-1_1]
      BruteForceCrossDCTest ++ 09:14:21,354 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force cleared: dc0User1=0, dc0user2=0, dc1user1=0, dc1user2=0, dc0CacheSize=0, dc1CacheSize=0
      BruteForceCrossDCTest ++ 09:14:21,535 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:21,536 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:21,537 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:21,537 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:21,716 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:21,717 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:21,718 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:21,781 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:21,781 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:21,783 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:21,841 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:21,841 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:21,842 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:21,905 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:21,905 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:21,906 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:21,969 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:21,969 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:21,970 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:22,033 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:22,033 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:22,034 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:22,093 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:22,094 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:22,095 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:22,153 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:22,153 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:22,155 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:22,213 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:22,213 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:22,214 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:22,400 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force for user1 created: dc0User1=10, dc0user2=0, dc1user1=10, dc1user2=0, dc0CacheSize=1, dc1CacheSize=1
      BruteForceCrossDCTest ++ 09:14:22,634 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:14:22,635 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:22,636 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:22,636 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:22,869 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:14:22,869 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:22,870 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:22,933 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:14:22,933 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:22,935 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:22,997 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:14:22,998 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:22,999 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:23,057 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:14:23,057 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:23,058 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:23,113 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:14:23,114 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:23,115 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:23,185 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:14:23,185 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:23,186 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:23,250 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:14:23,251 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:23,252 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:23,309 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:14:23,309 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:23,310 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:23,369 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-2, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-2
      BruteForceCrossDCTest ++ 09:14:23,369 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-2 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:23,371 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:23,554 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force for user2 created: dc0User1=10, dc0user2=10, dc1user1=10, dc1user2=10, dc0CacheSize=2, dc1CacheSize=2
      BruteForceCrossDCTest ++ 09:14:23,662 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force for user1 cleared: dc0User1=0, dc0user2=10, dc1user1=0, dc1user2=10, dc0CacheSize=1, dc1CacheSize=1
      BruteForceCrossDCTest ++ 09:14:23,846 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:23,847 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:23,849 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'PUT_IF_ABSENT' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:23,849 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006011: Operation 'PUT_IF_ABSENT' forced to return previous value should be used on transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:24,035 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=invalid_user_credentials, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:24,035 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:24,036 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:24,101 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:24,101 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:24,103 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:24,161 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:24,161 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:24,162 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:24,221 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:24,222 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:24,223 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:24,281 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:24,281 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:24,282 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:24,337 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:24,338 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:24,339 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:24,397 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:24,398 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:24,400 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:24,465 WARN  [org.keycloak.events] (default task-3) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:24,466 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:24,467 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-3) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:24,533 WARN  [org.keycloak.events] (default task-2) type=LOGIN_ERROR, realmId=dee8de72-8c52-43b9-8b76-48ab8dc963ed, clientId=test-app, userId=login-test-1, ipAddress=127.0.0.1, error=user_temporarily_disabled, auth_method=openid-connect, grant_type=password, client_auth_method=client-secret, username=login-test-1
      BruteForceCrossDCTest ++ 09:14:24,533 WARN  [org.keycloak.services] (Brute Force Protector) KC-SERVICES0053: login failure for user login-test-1 from ip 127.0.0.1
      BruteForceCrossDCTest ++ 09:14:24,534 WARN  [org.infinispan.server.hotrod.Decoder2x] (HotRod-ServerWorker-4-4) ISPN006010: Conditional operation 'REPLACE_IF_UNMODIFIED' should be used with transactional caches, otherwise data inconsistency issues could arise under failure situations
      BruteForceCrossDCTest ++ 09:14:24,582 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After brute force for user1 re-created: dc0User1=10, dc0user2=10, dc1user1=10, dc1user2=10, dc0CacheSize=2, dc1CacheSize=2
      BruteForceCrossDCTest ++ 09:14:24,735 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] After user1 removed: dc0User1=0, dc0user2=10, dc1user1=0, dc1user2=10, dc0CacheSize=1, dc1CacheSize=1
      BruteForceCrossDCTest ++ 09:14:24,736 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: after AbstractCrossDCTest
      BruteForceCrossDCTest ++ 09:14:24,736 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: Enable only first node in first datacenter
      BruteForceCrossDCTest ++ 09:14:24,736 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:14:24,736 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: enabled node 'auth-server-jboss-cross-dc-0_1', All enabled nodes: [auth-server-jboss-cross-dc-0_1]
      BruteForceCrossDCTest ++ 09:14:24,736 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] calling all TestCleanup
      BruteForceCrossDCTest ++ 09:14:24,898 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:14:24,898 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:24,898 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:24,898 [main] INFO  [o.k.t.u.URLUtils] target URL equals current URL - refreshing the page
      BruteForceCrossDCTest ++ 09:14:24,898 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:24,898 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:14:24,898 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'test' realm
      BruteForceCrossDCTest ++ 09:14:24,898 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:14:24,899 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:24,899 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/admin-client-test/account
      BruteForceCrossDCTest ++ 09:14:24,953 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/admin-client-test/protocol/openid-connect/auth?client_id=account&redirect_uri=https%3A%2F%2Flocalhost%3A8543%2Fauth%2Frealms%2Fadmin-client-test%2Faccount%2Flogin-redirect&state=0%2Fb6c1552d-2551-4743-9622-b34c4fd0038e&response_type=code&scope=openid
      BruteForceCrossDCTest ++ 09:14:24,953 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:14:24,953 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'admin-client-test' realm
      BruteForceCrossDCTest ++ 09:14:24,953 [main] DEBUG [o.k.t.c.BruteForceCrossDCTest] --DC: removing rest realms
      BruteForceCrossDCTest ++ 09:14:24,953 [main] INFO  [o.k.t.a.AuthServerTestEnricher] removing test realms after test class
      BruteForceCrossDCTest ++ 09:14:26,132 [main] INFO  [o.k.t.a.AuthServerTestEnricher] removed realms: test, admin-client-test, 
      BruteForceCrossDCTest ++ 09:14:26,132 [main] INFO  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Load balancer: disabling all nodes
      BruteForceCrossDCTest ++ 09:14:26,132 [main] INFO  [o.k.t.u.URLUtils] starting navigation
      BruteForceCrossDCTest ++ 09:14:26,133 [main] INFO  [o.k.t.u.URLUtils] current URL:  https://localhost:8543/auth/realms/admin-client-test/protocol/openid-connect/auth?client_id=account&redirect_uri=https%3A%2F%2Flocalhost%3A8543%2Fauth%2Frealms%2Fadmin-client-test%2Faccount%2Flogin-redirect&state=0%2Fb6c1552d-2551-4743-9622-b34c4fd0038e&response_type=code&scope=openid
      BruteForceCrossDCTest ++ 09:14:26,133 [main] INFO  [o.k.t.u.URLUtils] navigating to https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:26,139 [XNIO-1 I/O-2] WARN  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] No host available
      BruteForceCrossDCTest ++ 09:14:26,139 [XNIO-1 I/O-2] WARN  [o.k.t.a.u.l.SimpleUndertowLoadBalancer] Could not resolve backend when request to: /auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:26,145 [main] INFO  [o.k.t.u.URLUtils] new current URL:  https://localhost:8543/auth/realms/test/account
      BruteForceCrossDCTest ++ 09:14:26,145 [main] INFO  [o.k.t.u.URLUtils] navigation complete
      BruteForceCrossDCTest ++ 09:14:26,145 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] deleting cookies in 'test' realm
      BruteForceCrossDCTest ++ 09:14:26,145 [main] DEBUG [o.k.t.a.CrossDCTestEnricher] --DC: restorePeriodicTasks
      BruteForceCrossDCTest ++ 09:14:26,156 [main] INFO  [o.k.t.c.BruteForceCrossDCTest] [BruteForceCrossDCTest] testBruteForceWithUserOperations() FINISHED
      BruteForceCrossDCTest ++ 09:14:26,163 INFO  [org.wildfly.extension.undertow] (ServerService Thread Pool -- 71) WFLYUT0022: Unregistered web context: '/run-on-server-classes' from server 'default-server'
      BruteForceCrossDCTest ++ 09:14:26,206 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-2) WFLYSRV0028: Stopped deployment run-on-server-classes.war (runtime-name: run-on-server-classes.war) in 44ms
      BruteForceCrossDCTest ++ 09:14:26,236 INFO  [org.jboss.as.repository] (management-handler-thread - 2) WFLYDR0002: Content removed from location /home/travis/build/keycloak/keycloak/testsuite/integration-arquillian/tests/base/target/containers/auth-server-wildfly-crossdc01/standalone/data/content/23/92169fced1c3e9026b75e8e11e0fe2bde3398a/content
      BruteForceCrossDCTest ++ 09:14:26,236 INFO  [org.jboss.as.server] (management-handler-thread - 2) WFLYSRV0009: Undeployed "run-on-server-classes.war" (runtime-name: "run-on-server-classes.war")
      BruteForceCrossDCTest ++ 09:14:26,249 INFO  [org.wildfly.extension.undertow] (ServerService Thread Pool -- 70) WFLYUT0022: Unregistered web context: '/run-on-server-classes' from server 'default-server'
      BruteForceCrossDCTest ++ 09:14:26,289 INFO  [org.jboss.as.server.deployment] (MSC service thread 1-4) WFLYSRV0028: Stopped deployment run-on-server-classes.war (runtime-name: run-on-server-classes.war) in 48ms
      BruteForceCrossDCTest ++ 09:14:26,347 INFO  [org.jboss.as.repository] (management-handler-thread - 2) WFLYDR0002: Content removed from location /home/travis/build/keycloak/keycloak/testsuite/integration-arquillian/tests/base/target/containers/auth-server-wildfly-crossdc11/standalone/data/content/46/bfa74f942bc95f7ed42c2d9651903d44e6f57d/content
      BruteForceCrossDCTest ++ 09:14:26,355 INFO  [org.jboss.as.server] (management-handler-thread - 2) WFLYSRV0009: Undeployed "run-on-server-classes.war" (runtime-name: "run-on-server-classes.war")
      
      --------- org.keycloak.testsuite.crossdc.BruteForceCrossDCTest output end  ---------
      Tests run: 4, Failures: 1, Errors: 0, Skipped: 0, Time elapsed: 42.046 sec <<< FAILURE! - in org.keycloak.testsuite.crossdc.BruteForceCrossDCTest
      -- testBruteForceConcurrentUpdate(org.keycloak.testsuite.crossdc.BruteForceCrossDCTest)  Time elapsed: 10.471 sec  <<< FAILURE!
      -- java.lang.AssertionError: 
      -- 
      -- Expected: a value greater than <20>
      --      but: <20> was equal to <20>
      -- 	at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:20)
      -- 	at org.junit.Assert.assertThat(Assert.java:956)
      -- 	at org.junit.Assert.assertThat(Assert.java:923)
      -- 	at org.keycloak.testsuite.crossdc.BruteForceCrossDCTest.lambda$testBruteForceConcurrentUpdate$2(BruteForceCrossDCTest.java:255)
      -- 	at org.keycloak.common.util.Retry.execute(Retry.java:41)
      -- 	at org.keycloak.testsuite.crossdc.BruteForceCrossDCTest.testBruteForceConcurrentUpdate(BruteForceCrossDCTest.java:248)
      -- 	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
      -- 	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
      -- 	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
      -- 	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
      -- 	at org.jboss.arquillian.junit.Arquillian$8$1.invokeMethod(Arquillian.java:325)
      -- 	at org.jboss.arquillian.junit.MethodInvoker$1.invoke(MethodInvoker.java:18)
      -- 	at org.jboss.arquillian.container.test.impl.execution.LocalTestExecuter.execute(LocalTestExecuter.java:57)
      -- 	at org.keycloak.testsuite.arquillian.ModelTestExecutor.execute(ModelTestExecutor.java:49)
      -- 	at sun.reflect.GeneratedMethodAccessor395.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.invokeObservers(EventContextImpl.java:103)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:90)
      -- 	at org.jboss.arquillian.core.impl.ManagerImpl.fire(ManagerImpl.java:133)
      -- 	at org.jboss.arquillian.core.impl.ManagerImpl.fire(ManagerImpl.java:105)
      -- 	at org.jboss.arquillian.core.impl.EventImpl.fire(EventImpl.java:62)
      -- 	at org.jboss.arquillian.container.test.impl.execution.ClientTestExecuter.execute(ClientTestExecuter.java:50)
      -- 	at sun.reflect.GeneratedMethodAccessor394.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.invokeObservers(EventContextImpl.java:103)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:90)
      -- 	at org.jboss.arquillian.container.test.impl.client.ContainerEventController.createContext(ContainerEventController.java:128)
      -- 	at org.jboss.arquillian.container.test.impl.client.ContainerEventController.createTestContext(ContainerEventController.java:118)
      -- 	at sun.reflect.GeneratedMethodAccessor393.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:95)
      -- 	at org.jboss.arquillian.test.impl.TestContextHandler.createClassContext(TestContextHandler.java:83)
      -- 	at sun.reflect.GeneratedMethodAccessor89.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:95)
      -- 	at org.jboss.arquillian.test.impl.TestContextHandler.createSuiteContext(TestContextHandler.java:69)
      -- 	at sun.reflect.GeneratedMethodAccessor88.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:95)
      -- 	at org.jboss.arquillian.test.impl.TestContextHandler.createTestContext(TestContextHandler.java:116)
      -- 	at sun.reflect.GeneratedMethodAccessor163.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:95)
      -- 	at org.jboss.arquillian.core.impl.ManagerImpl.fire(ManagerImpl.java:133)
      -- 	at org.jboss.arquillian.test.impl.EventTestRunnerAdaptor.test(EventTestRunnerAdaptor.java:122)
      -- 	at org.jboss.arquillian.junit.MethodInvoker.invoke(MethodInvoker.java:15)
      -- 	at org.jboss.arquillian.junit.Arquillian$8.evaluate(Arquillian.java:332)
      -- 	at org.jboss.arquillian.junit.Arquillian$4.evaluate(Arquillian.java:204)
      -- 	at org.jboss.arquillian.junit.Arquillian.multiExecute(Arquillian.java:350)
      -- 	at org.jboss.arquillian.junit.Arquillian.access$200(Arquillian.java:54)
      -- 	at org.jboss.arquillian.junit.Arquillian$5.evaluate(Arquillian.java:215)
      -- 	at org.jboss.arquillian.junit.Arquillian$7$1.invoke(Arquillian.java:279)
      -- 	at org.jboss.arquillian.container.test.impl.execution.ClientBeforeAfterLifecycleEventExecuter.execute(ClientBeforeAfterLifecycleEventExecuter.java:88)
      -- 	at org.jboss.arquillian.container.test.impl.execution.ClientBeforeAfterLifecycleEventExecuter.on(ClientBeforeAfterLifecycleEventExecuter.java:66)
      -- 	at sun.reflect.GeneratedMethodAccessor191.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.invokeObservers(EventContextImpl.java:103)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:90)
      -- 	at org.jboss.arquillian.container.test.impl.client.ContainerEventController.createContext(ContainerEventController.java:128)
      -- 	at org.jboss.arquillian.container.test.impl.client.ContainerEventController.createBeforeContext(ContainerEventController.java:114)
      -- 	at sun.reflect.GeneratedMethodAccessor189.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:95)
      -- 	at org.jboss.arquillian.test.impl.TestContextHandler.createClassContext(TestContextHandler.java:83)
      -- 	at sun.reflect.GeneratedMethodAccessor89.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:95)
      -- 	at org.jboss.arquillian.test.impl.TestContextHandler.createSuiteContext(TestContextHandler.java:69)
      -- 	at sun.reflect.GeneratedMethodAccessor88.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:95)
      -- 	at org.jboss.arquillian.test.impl.TestContextHandler.createTestContext(TestContextHandler.java:116)
      -- 	at sun.reflect.GeneratedMethodAccessor163.invoke(Unknown Source)
      -- 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      -- 	at java.lang.reflect.Method.invoke(Method.java:498)
      -- 	at org.jboss.arquillian.core.impl.ObserverImpl.invoke(ObserverImpl.java:86)
      -- 	at org.jboss.arquillian.core.impl.EventContextImpl.proceed(EventContextImpl.java:95)
      -- 	at org.jboss.arquillian.core.impl.ManagerImpl.fire(ManagerImpl.java:133)
      -- 	at org.jboss.arquillian.core.impl.ManagerImpl.fire(ManagerImpl.java:105)
      -- 	at org.jboss.arquillian.test.impl.EventTestRunnerAdaptor.fireCustomLifecycle(EventTestRunnerAdaptor.java:142)
      -- 	at org.jboss.arquillian.junit.Arquillian$7.evaluate(Arquillian.java:273)
      -- 	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
      -- 	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
      -- 	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
      -- 	at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
      -- 	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
      -- 	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
      -- 	at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
      -- 	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
      -- 	at org.jboss.arquillian.junit.Arquillian$2.evaluate(Arquillian.java:166)
      -- 	at org.jboss.arquillian.junit.Arquillian.multiExecute(Arquillian.java:350)
      -- 	at org.jboss.arquillian.junit.Arquillian.access$200(Arquillian.java:54)
      -- 	at org.jboss.arquillian.junit.Arquillian$3.evaluate(Arquillian.java:177)
      -- 	at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
      -- 	at org.jboss.arquillian.junit.Arquillian.run(Arquillian.java:115)
      -- 	at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:367)
      -- 	at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:274)
      -- 	at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
      -- 	at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:161)
      -- 	at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:290)
      -- 	at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:242)
      -- 	at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:121)
      

        Gliffy Diagrams

          Attachments

            Activity

              People

              • Assignee:
                mposolda Marek Posolda
                Reporter:
                sebastian.laskawiec Sebastian Laskawiec
              • Votes:
                0 Vote for this issue
                Watchers:
                7 Start watching this issue

                Dates

                • Created:
                  Updated:
                  Resolved: