Solved

UMBRACO Log Manager

Posted on 2013-01-16
1
551 Views
Last Modified: 2013-01-23
Im trying to install the Log Manager package (http://our.umbraco.org/projects/developer-tools/log-manager) onto UMBRACO v4.7.0 and when I try to run it I receive the following error:   If anyone has any suggestions as to how I might fix it I would be very grateful.  Thanks


[ArgumentException: An entry with the same key already exists.]
   System.Collections.Generic.SortedList`2.Add(TKey key, TValue value) +8032807
   tswe.log.viewLog.InitControlItems() +2036
   tswe.log.manager.OnInit(EventArgs e) +271
   System.Web.UI.Control.InitRecursive(Control namingContainer) +133
   System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) +1970
0
Comment
Question by:citymarketing
1 Comment
 
LVL 19

Accepted Solution

by:
Daniel Van Der Werken earned 500 total points
ID: 38783210
I don't know if there is any way those of us who don't use UMBRACO or have this Log Manager installed can help. I'll do what I can.

First off, the problem appears to be the fact that you're adding an entry into a SortedList for a Key Value that already exists. So, you have something like:

SortedList<int, string> myList = new SortedList<int, string>();

then:

myList.Add( 1, "one" );
myList.Add( 1, "One" ); <== error -- entry with same key already exists.

So, there is some condition that is causing this to occur. If you do not have control over what is being placed into this list, what *do* you have control over? I wonder then, if you have some sort of old log or something that already exists and the application is attempting to fill in new information on top of old information and burping as a result?

Make sure you clean up any old files, etc. Maybe it's a configuration file that you've had that tells about reading in a log or something that should be deleted but isn't?

Hope this info is helpful.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

I've been asked to discuss some of the UX activities that I'm using with my team. Here I will share some details about how we approach UX projects.
Boost your ability to deliver ambitious and competitive web apps by choosing the right JavaScript framework to best suit your project’s needs.
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
The viewer will learn how to count occurrences of each item in an array.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now