Results

By type

          Policy Management (no pidfile) is NOT running
ln: /home/policy/.m2/settings.xml: Read-only file system
VM settings:
    Max. Heap Size (Estimated): 7.84G
    Using VM: OpenJDK 64-Bit Server VM

[2025-04-03T06:22:15.299+00:00|INFO|LifecycleFsm|main] The mandatory Policy Types are [onap.policies.controlloop.operational.common.Drools]. Compliance is false
[2025-04-03T06:22:15.355+00:00|INFO|OrderedServiceImpl|main] ***** OrderedServiceImpl implementers:
 [org.onap.policy.drools.lifecycle.LifecycleFeature@3d246ea3, DistributedLockManager [pdpName=null, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}], org.onap.policy.drools.apps.controlloop.feature.usecases.UsecasesFeature@341814d3, org.onap.policy.drools.healthcheck.HealthCheckFeature@4397ad89]
[2025-04-03T06:22:15.385+00:00|INFO|PolicyContainer|main] PolicyContainer.main: configDir=config
[2025-04-03T06:22:15.389+00:00|INFO|OrderedServiceImpl|main] ***** OrderedServiceImpl implementers:
 []
[2025-04-03T06:22:15.417+00:00|INFO|IndexedKafkaTopicSourceFactory|main] IndexedKafkaTopicSourceFactory []: no topic for KAFKA Source
[2025-04-03T06:22:15.424+00:00|INFO|IndexedKafkaTopicSinkFactory|main] IndexedKafkaTopicSinkFactory []: no topic for KAFKA Sink
[2025-04-03T06:22:16.220+00:00|INFO|PolicyEngineManager|main] overridden lock manager is DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:22:16.900+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-1
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:17.139+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:18.046+00:00|INFO|AbstractLogin|main] Successfully logged in.
[2025-04-03T06:22:18.178+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:18.181+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:18.182+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661338175
[2025-04-03T06:22:18.188+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-1, groupId=policy-drools-pdp] Subscribed to topic(s): a1-p-rsp
[2025-04-03T06:22:18.189+00:00|INFO|IndexedKafkaTopicSinkFactory|main] IndexedKafkaTopicSinkFactory []: no topic for KAFKA Sink
[2025-04-03T06:22:18.189+00:00|INFO|IndexedKafkaTopicSourceFactory|main] IndexedKafkaTopicSourceFactory [a1-p-rsp]: no topic for KAFKA Source
[2025-04-03T06:22:18.198+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-2
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:18.199+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:18.236+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:18.237+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:18.237+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661338236
[2025-04-03T06:22:18.238+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-2, groupId=policy-drools-pdp] Subscribed to topic(s): appc-cl
[2025-04-03T06:22:18.240+00:00|INFO|IndexedKafkaTopicSourceFactory|main] IndexedKafkaTopicSourceFactory [appc-cl, a1-p-rsp]: no topic for KAFKA Source
[2025-04-03T06:22:18.245+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-3
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:18.246+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:18.288+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:18.290+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:18.293+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661338288
[2025-04-03T06:22:18.295+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-3, groupId=policy-drools-pdp] Subscribed to topic(s): appc-lcm-write
[2025-04-03T06:22:18.296+00:00|INFO|IndexedKafkaTopicSinkFactory|main] IndexedKafkaTopicSinkFactory [appc-cl, appc-lcm-read, a1-p]: no topic for KAFKA Sink
[2025-04-03T06:22:18.297+00:00|INFO|IndexedKafkaTopicSourceFactory|main] IndexedKafkaTopicSourceFactory [appc-cl, a1-p-rsp, appc-lcm-write]: no topic for KAFKA Source
[2025-04-03T06:22:18.303+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-4
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:18.308+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:18.387+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:18.388+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:18.388+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661338387
[2025-04-03T06:22:18.390+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-4, groupId=policy-drools-pdp] Subscribed to topic(s): unauthenticated.dcae_cl_output
[2025-04-03T06:22:18.390+00:00|INFO|IndexedKafkaTopicSinkFactory|main] IndexedKafkaTopicSinkFactory [appc-cl, appc-lcm-read, dcae_cl_rsp, a1-p]: no topic for KAFKA Sink
[2025-04-03T06:22:18.391+00:00|INFO|IndexedKafkaTopicSourceFactory|main] IndexedKafkaTopicSourceFactory [dcae_topic, appc-cl, a1-p-rsp, appc-lcm-write]: no topic for KAFKA Source
[2025-04-03T06:22:18.401+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-5
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:18.402+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:18.428+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:18.429+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:18.429+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661338428
[2025-04-03T06:22:18.430+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-5, groupId=policy-drools-pdp] Subscribed to topic(s): sdnr-cl-rsp
[2025-04-03T06:22:18.430+00:00|INFO|IndexedKafkaTopicSinkFactory|main] IndexedKafkaTopicSinkFactory [appc-cl, policy-cl-mgt, appc-lcm-read, dcae_cl_rsp, a1-p]: no topic for KAFKA Sink
[2025-04-03T06:22:18.430+00:00|INFO|IndexedKafkaTopicSourceFactory|main] IndexedKafkaTopicSourceFactory [dcae_topic, appc-cl, a1-p-rsp, appc-lcm-write, sdnr-cl-rsp]: no topic for KAFKA Source
[2025-04-03T06:22:19.167+00:00|WARN|IndexedHttpClientFactory|main] No HTTP port for client in VFC
[2025-04-03T06:22:19.196+00:00|INFO|JettyServletServer|main] JettyJerseyServer [Jerseyservlets={/metrics=io.prometheus.client.servlet.jakarta.exporter.MetricsServlet-7a560583==io.prometheus.client.servlet.jakarta.exporter.MetricsServlet@13d55d35{jsp=null,order=-1,inst=false,async=true,src=EMBEDDED:null,STOPPED}, /*=org.glassfish.jersey.servlet.ServletContainer-180da663==org.glassfish.jersey.servlet.ServletContainer@a507cf1b{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}}, swaggerId=swagger-9696, toString()=JettyServletServer(name=CONFIG, host=0.0.0.0, port=9696, sniHostCheck=false, user=null, password=null, contextPath=/, jettyServer=Server@2dddc1b9{STOPPED}[11.0.24,sto=0], context=o.e.j.s.ServletContextHandler@65a5d4f9{/,null,STOPPED}, connector=CONFIG@767e20cf{HTTP/1.1, (http/1.1)}{0.0.0.0:9696}, jettyThread=null, servlets={/metrics=io.prometheus.client.servlet.jakarta.exporter.MetricsServlet-7a560583==io.prometheus.client.servlet.jakarta.exporter.MetricsServlet@13d55d35{jsp=null,order=-1,inst=false,async=true,src=EMBEDDED:null,STOPPED}, /*=org.glassfish.jersey.servlet.ServletContainer-180da663==org.glassfish.jersey.servlet.ServletContainer@a507cf1b{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}})]: WAITED-START
[2025-04-03T06:22:19.269+00:00|INFO|JettyServletServer|main] JettyJerseyServer [Jerseyservlets={/metrics=io.prometheus.client.servlet.jakarta.exporter.MetricsServlet-7a560583==io.prometheus.client.servlet.jakarta.exporter.MetricsServlet@13d55d35{jsp=null,order=-1,inst=false,async=true,src=EMBEDDED:null,STOPPED}, /*=org.glassfish.jersey.servlet.ServletContainer-180da663==org.glassfish.jersey.servlet.ServletContainer@a507cf1b{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}}, swaggerId=swagger-9696, toString()=JettyServletServer(name=CONFIG, host=0.0.0.0, port=9696, sniHostCheck=false, user=null, password=null, contextPath=/, jettyServer=Server@2dddc1b9{STOPPED}[11.0.24,sto=0], context=o.e.j.s.ServletContextHandler@65a5d4f9{/,null,STOPPED}, connector=CONFIG@767e20cf{HTTP/1.1, (http/1.1)}{0.0.0.0:9696}, jettyThread=null, servlets={/metrics=io.prometheus.client.servlet.jakarta.exporter.MetricsServlet-7a560583==io.prometheus.client.servlet.jakarta.exporter.MetricsServlet@13d55d35{jsp=null,order=-1,inst=false,async=true,src=EMBEDDED:null,STOPPED}, /*=org.glassfish.jersey.servlet.ServletContainer-180da663==org.glassfish.jersey.servlet.ServletContainer@a507cf1b{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}})]: STARTING
[2025-04-03T06:22:19.282+00:00|INFO|JettyServletServer|CONFIG-9696] JettyJerseyServer [Jerseyservlets={/metrics=io.prometheus.client.servlet.jakarta.exporter.MetricsServlet-7a560583==io.prometheus.client.servlet.jakarta.exporter.MetricsServlet@13d55d35{jsp=null,order=-1,inst=false,async=true,src=EMBEDDED:null,STOPPED}, /*=org.glassfish.jersey.servlet.ServletContainer-180da663==org.glassfish.jersey.servlet.ServletContainer@a507cf1b{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}}, swaggerId=swagger-9696, toString()=JettyServletServer(name=CONFIG, host=0.0.0.0, port=9696, sniHostCheck=false, user=null, password=null, contextPath=/, jettyServer=Server@2dddc1b9{STOPPED}[11.0.24,sto=0], context=o.e.j.s.ServletContextHandler@65a5d4f9{/,null,STOPPED}, connector=CONFIG@767e20cf{HTTP/1.1, (http/1.1)}{0.0.0.0:9696}, jettyThread=Thread[CONFIG-9696,5,main], servlets={/metrics=io.prometheus.client.servlet.jakarta.exporter.MetricsServlet-7a560583==io.prometheus.client.servlet.jakarta.exporter.MetricsServlet@13d55d35{jsp=null,order=-1,inst=false,async=true,src=EMBEDDED:null,STOPPED}, /*=org.glassfish.jersey.servlet.ServletContainer-180da663==org.glassfish.jersey.servlet.ServletContainer@a507cf1b{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}})]: STARTING
[2025-04-03T06:22:19.291+00:00|INFO|Server|CONFIG-9696] jetty-11.0.24; built: 2024-08-26T18:11:22.448Z; git: 5dfc59a691b748796f922208956bd1f2794bcd16; jvm 17.0.13+11-alpine-r0
[2025-04-03T06:22:19.443+00:00|INFO|DefaultSessionIdManager|CONFIG-9696] Session workerName=node0
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.DefaultApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.InputsApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.PropertiesApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.TopicsApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.SwitchesApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.EnvironmentApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.SwaggerApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.LifecycleApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.PolicyApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.ControllersApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.LegacyApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.ToolsApi cannot be instantiated and will be ignored.
Apr 03, 2025 6:22:20 AM org.glassfish.jersey.server.ResourceModelConfigurator bindProvidersAndResources
WARNING: Component of class interface org.onap.policy.drools.server.restful.FeaturesApi cannot be instantiated and will be ignored.
[2025-04-03T06:22:21.506+00:00|INFO|GsonMessageBodyHandler|CONFIG-9696] Using GSON for REST calls
[2025-04-03T06:22:21.506+00:00|INFO|JacksonHandler|CONFIG-9696] Using GSON with Jackson behaviors for REST calls
[2025-04-03T06:22:21.512+00:00|INFO|YamlMessageBodyHandler|CONFIG-9696] Accepting YAML for REST calls
[2025-04-03T06:22:21.977+00:00|INFO|ContextHandler|CONFIG-9696] Started o.e.j.s.ServletContextHandler@65a5d4f9{/,null,AVAILABLE}
[2025-04-03T06:22:21.991+00:00|INFO|AbstractConnector|CONFIG-9696] Started CONFIG@767e20cf{HTTP/1.1, (http/1.1)}{0.0.0.0:9696}
[2025-04-03T06:22:21.994+00:00|INFO|Server|CONFIG-9696] Started Server@2dddc1b9{STARTING}[11.0.24,sto=0] @9707ms
[2025-04-03T06:22:21.995+00:00|INFO|JettyServletServer|main] JettyJerseyServer [Jerseyservlets={/metrics=io.prometheus.client.servlet.jakarta.exporter.MetricsServlet-7a560583==io.prometheus.client.servlet.jakarta.exporter.MetricsServlet@13d55d35{jsp=null,order=-1,inst=false,async=true,src=EMBEDDED:null,STARTED}, /*=org.glassfish.jersey.servlet.ServletContainer-180da663==org.glassfish.jersey.servlet.ServletContainer@a507cf1b{jsp=null,order=0,inst=true,async=true,src=EMBEDDED:null,STARTED}}, swaggerId=swagger-9696, toString()=JettyServletServer(name=CONFIG, host=0.0.0.0, port=9696, sniHostCheck=false, user=null, password=null, contextPath=/, jettyServer=Server@2dddc1b9{STARTED}[11.0.24,sto=0], context=o.e.j.s.ServletContextHandler@65a5d4f9{/,null,AVAILABLE}, connector=CONFIG@767e20cf{HTTP/1.1, (http/1.1)}{0.0.0.0:9696}, jettyThread=Thread[CONFIG-9696,5,main], servlets={/metrics=io.prometheus.client.servlet.jakarta.exporter.MetricsServlet-7a560583==io.prometheus.client.servlet.jakarta.exporter.MetricsServlet@13d55d35{jsp=null,order=-1,inst=false,async=true,src=EMBEDDED:null,STARTED}, /*=org.glassfish.jersey.servlet.ServletContainer-180da663==org.glassfish.jersey.servlet.ServletContainer@a507cf1b{jsp=null,order=0,inst=true,async=true,src=EMBEDDED:null,STARTED}})]: pending time is 7286 ms.
[2025-04-03T06:22:22.001+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=dcae.policy.shared, consumerInstance=6c44c261-9407-4e5e-973c-22b964f9c7fb, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=false, locked=false, uebThread=null, topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=dcae_topic, effectiveTopic=unauthenticated.dcae_cl_output, #recentEvents=0, locked=false, #topicListeners=0]]]]: starting
[2025-04-03T06:22:22.050+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-6
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:22.051+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.075+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.075+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.075+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342075
[2025-04-03T06:22:22.076+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Subscribed to topic(s): unauthenticated.dcae_cl_output
[2025-04-03T06:22:22.078+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=d796aaba-f3c2-4be1-948f-a7d9927be426, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=false, locked=false, uebThread=null, topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=appc-cl, effectiveTopic=appc-cl, #recentEvents=0, locked=false, #topicListeners=0]]]]: starting
[2025-04-03T06:22:22.079+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-7
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:22.080+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.112+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.113+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.114+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342112
[2025-04-03T06:22:22.116+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Subscribed to topic(s): appc-cl
[2025-04-03T06:22:22.119+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=cf14034c-73c9-4da7-a250-224601c4dddc, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=false, locked=false, uebThread=null, topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=a1-p-rsp, effectiveTopic=a1-p-rsp, #recentEvents=0, locked=false, #topicListeners=0]]]]: starting
[2025-04-03T06:22:22.123+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-8
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:22.125+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.146+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.147+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.147+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342146
[2025-04-03T06:22:22.148+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Subscribed to topic(s): a1-p-rsp
[2025-04-03T06:22:22.154+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=b603c080-b941-4804-abf5-9b80891b6c5c, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=false, locked=false, uebThread=null, topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=appc-lcm-write, effectiveTopic=appc-lcm-write, #recentEvents=0, locked=false, #topicListeners=0]]]]: starting
[2025-04-03T06:22:22.157+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-9
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:22.160+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.180+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.181+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.182+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342180
[2025-04-03T06:22:22.183+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Subscribed to topic(s): appc-lcm-write
[2025-04-03T06:22:22.189+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=a3da4d9a-0ee1-4ced-b9c8-2ea6690af92a, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=false, locked=false, uebThread=null, topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=sdnr-cl-rsp, effectiveTopic=sdnr-cl-rsp, #recentEvents=0, locked=false, #topicListeners=0]]]]: starting
[2025-04-03T06:22:22.191+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-10
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:22.194+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.210+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.211+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.212+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342210
[2025-04-03T06:22:22.213+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Subscribed to topic(s): sdnr-cl-rsp
[2025-04-03T06:22:22.214+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=c22b2546-18e7-4629-9ed5-bebf6cfe84fe, alive=false, publisher=null]]: starting
[2025-04-03T06:22:22.259+00:00|INFO|ProducerConfig|main] ProducerConfig values: 
	acks = -1
	auto.include.jmx.reporter = true
	batch.size = 16384
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	buffer.memory = 33554432
	client.dns.lookup = use_all_dns_ips
	client.id = producer-1
	compression.gzip.level = -1
	compression.lz4.level = 9
	compression.type = none
	compression.zstd.level = 3
	connections.max.idle.ms = 540000
	delivery.timeout.ms = 120000
	enable.idempotence = true
	enable.metrics.push = true
	interceptor.classes = []
	key.serializer = class org.apache.kafka.common.serialization.StringSerializer
	linger.ms = 0
	max.block.ms = 60000
	max.in.flight.requests.per.connection = 5
	max.request.size = 1048576
	metadata.max.age.ms = 300000
	metadata.max.idle.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partitioner.adaptive.partitioning.enable = true
	partitioner.availability.timeout.ms = 0
	partitioner.class = null
	partitioner.ignore.keys = false
	receive.buffer.bytes = 32768
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retries = 2147483647
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	transaction.timeout.ms = 60000
	transactional.id = null
	value.serializer = class org.apache.kafka.common.serialization.StringSerializer

[2025-04-03T06:22:22.270+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.305+00:00|INFO|KafkaProducer|main] [Producer clientId=producer-1] Instantiated an idempotent producer.
[2025-04-03T06:22:22.353+00:00|INFO|ProducerConfig|main] These configurations '[group.id]' were supplied but are not used yet.
[2025-04-03T06:22:22.354+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.354+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.354+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342353
[2025-04-03T06:22:22.354+00:00|INFO|InlineKafkaTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=c22b2546-18e7-4629-9ed5-bebf6cfe84fe, alive=false, publisher=KafkaPublisherWrapper []]]: KAFKA SINK created
[2025-04-03T06:22:22.354+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=4075b72a-29f3-4c96-b524-3d33ab0b1ed6, alive=false, publisher=null]]: starting
[2025-04-03T06:22:22.355+00:00|INFO|ProducerConfig|main] ProducerConfig values: 
	acks = -1
	auto.include.jmx.reporter = true
	batch.size = 16384
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	buffer.memory = 33554432
	client.dns.lookup = use_all_dns_ips
	client.id = producer-2
	compression.gzip.level = -1
	compression.lz4.level = 9
	compression.type = none
	compression.zstd.level = 3
	connections.max.idle.ms = 540000
	delivery.timeout.ms = 120000
	enable.idempotence = true
	enable.metrics.push = true
	interceptor.classes = []
	key.serializer = class org.apache.kafka.common.serialization.StringSerializer
	linger.ms = 0
	max.block.ms = 60000
	max.in.flight.requests.per.connection = 5
	max.request.size = 1048576
	metadata.max.age.ms = 300000
	metadata.max.idle.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partitioner.adaptive.partitioning.enable = true
	partitioner.availability.timeout.ms = 0
	partitioner.class = null
	partitioner.ignore.keys = false
	receive.buffer.bytes = 32768
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retries = 2147483647
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	transaction.timeout.ms = 60000
	transactional.id = null
	value.serializer = class org.apache.kafka.common.serialization.StringSerializer

[2025-04-03T06:22:22.355+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.356+00:00|INFO|KafkaProducer|main] [Producer clientId=producer-2] Instantiated an idempotent producer.
[2025-04-03T06:22:22.389+00:00|INFO|ProducerConfig|main] These configurations '[group.id]' were supplied but are not used yet.
[2025-04-03T06:22:22.389+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.389+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.390+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342389
[2025-04-03T06:22:22.391+00:00|INFO|InlineKafkaTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=4075b72a-29f3-4c96-b524-3d33ab0b1ed6, alive=false, publisher=KafkaPublisherWrapper []]]: KAFKA SINK created
[2025-04-03T06:22:22.391+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=5d237110-2e73-436d-8c12-7fbecba255eb, alive=false, publisher=null]]: starting
[2025-04-03T06:22:22.393+00:00|INFO|ProducerConfig|main] ProducerConfig values: 
	acks = -1
	auto.include.jmx.reporter = true
	batch.size = 16384
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	buffer.memory = 33554432
	client.dns.lookup = use_all_dns_ips
	client.id = producer-3
	compression.gzip.level = -1
	compression.lz4.level = 9
	compression.type = none
	compression.zstd.level = 3
	connections.max.idle.ms = 540000
	delivery.timeout.ms = 120000
	enable.idempotence = true
	enable.metrics.push = true
	interceptor.classes = []
	key.serializer = class org.apache.kafka.common.serialization.StringSerializer
	linger.ms = 0
	max.block.ms = 60000
	max.in.flight.requests.per.connection = 5
	max.request.size = 1048576
	metadata.max.age.ms = 300000
	metadata.max.idle.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partitioner.adaptive.partitioning.enable = true
	partitioner.availability.timeout.ms = 0
	partitioner.class = null
	partitioner.ignore.keys = false
	receive.buffer.bytes = 32768
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retries = 2147483647
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	transaction.timeout.ms = 60000
	transactional.id = null
	value.serializer = class org.apache.kafka.common.serialization.StringSerializer

[2025-04-03T06:22:22.395+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.396+00:00|INFO|KafkaProducer|main] [Producer clientId=producer-3] Instantiated an idempotent producer.
[2025-04-03T06:22:22.405+00:00|INFO|ProducerConfig|main] These configurations '[group.id]' were supplied but are not used yet.
[2025-04-03T06:22:22.405+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.405+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.405+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342405
[2025-04-03T06:22:22.406+00:00|INFO|InlineKafkaTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=5d237110-2e73-436d-8c12-7fbecba255eb, alive=false, publisher=KafkaPublisherWrapper []]]: KAFKA SINK created
[2025-04-03T06:22:22.406+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=0b45c7b0-36ce-45c0-a498-15bde764e359, alive=false, publisher=null]]: starting
[2025-04-03T06:22:22.408+00:00|INFO|ProducerConfig|main] ProducerConfig values: 
	acks = -1
	auto.include.jmx.reporter = true
	batch.size = 16384
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	buffer.memory = 33554432
	client.dns.lookup = use_all_dns_ips
	client.id = producer-4
	compression.gzip.level = -1
	compression.lz4.level = 9
	compression.type = none
	compression.zstd.level = 3
	connections.max.idle.ms = 540000
	delivery.timeout.ms = 120000
	enable.idempotence = true
	enable.metrics.push = true
	interceptor.classes = []
	key.serializer = class org.apache.kafka.common.serialization.StringSerializer
	linger.ms = 0
	max.block.ms = 60000
	max.in.flight.requests.per.connection = 5
	max.request.size = 1048576
	metadata.max.age.ms = 300000
	metadata.max.idle.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partitioner.adaptive.partitioning.enable = true
	partitioner.availability.timeout.ms = 0
	partitioner.class = null
	partitioner.ignore.keys = false
	receive.buffer.bytes = 32768
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retries = 2147483647
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	transaction.timeout.ms = 60000
	transactional.id = null
	value.serializer = class org.apache.kafka.common.serialization.StringSerializer

[2025-04-03T06:22:22.408+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.410+00:00|INFO|KafkaProducer|main] [Producer clientId=producer-4] Instantiated an idempotent producer.
[2025-04-03T06:22:22.422+00:00|INFO|ProducerConfig|main] These configurations '[group.id]' were supplied but are not used yet.
[2025-04-03T06:22:22.423+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.423+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.423+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342422
[2025-04-03T06:22:22.423+00:00|INFO|InlineKafkaTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=0b45c7b0-36ce-45c0-a498-15bde764e359, alive=false, publisher=KafkaPublisherWrapper []]]: KAFKA SINK created
[2025-04-03T06:22:22.424+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=620babfb-8e69-4952-96d2-7a0337264ce0, alive=false, publisher=null]]: starting
[2025-04-03T06:22:22.425+00:00|INFO|ProducerConfig|main] ProducerConfig values: 
	acks = -1
	auto.include.jmx.reporter = true
	batch.size = 16384
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	buffer.memory = 33554432
	client.dns.lookup = use_all_dns_ips
	client.id = producer-5
	compression.gzip.level = -1
	compression.lz4.level = 9
	compression.type = none
	compression.zstd.level = 3
	connections.max.idle.ms = 540000
	delivery.timeout.ms = 120000
	enable.idempotence = true
	enable.metrics.push = true
	interceptor.classes = []
	key.serializer = class org.apache.kafka.common.serialization.StringSerializer
	linger.ms = 0
	max.block.ms = 60000
	max.in.flight.requests.per.connection = 5
	max.request.size = 1048576
	metadata.max.age.ms = 300000
	metadata.max.idle.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partitioner.adaptive.partitioning.enable = true
	partitioner.availability.timeout.ms = 0
	partitioner.class = null
	partitioner.ignore.keys = false
	receive.buffer.bytes = 32768
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retries = 2147483647
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	transaction.timeout.ms = 60000
	transactional.id = null
	value.serializer = class org.apache.kafka.common.serialization.StringSerializer

[2025-04-03T06:22:22.426+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.427+00:00|INFO|KafkaProducer|main] [Producer clientId=producer-5] Instantiated an idempotent producer.
[2025-04-03T06:22:22.442+00:00|INFO|ProducerConfig|main] These configurations '[group.id]' were supplied but are not used yet.
[2025-04-03T06:22:22.442+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.442+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.442+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342442
[2025-04-03T06:22:22.443+00:00|INFO|InlineKafkaTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=620babfb-8e69-4952-96d2-7a0337264ce0, alive=false, publisher=KafkaPublisherWrapper []]]: KAFKA SINK created
[2025-04-03T06:22:22.443+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=3a507303-c1e6-45bc-8495-72ee63d37dbc, alive=false, publisher=null]]: starting
[2025-04-03T06:22:22.444+00:00|INFO|ProducerConfig|main] ProducerConfig values: 
	acks = -1
	auto.include.jmx.reporter = true
	batch.size = 16384
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	buffer.memory = 33554432
	client.dns.lookup = use_all_dns_ips
	client.id = producer-6
	compression.gzip.level = -1
	compression.lz4.level = 9
	compression.type = none
	compression.zstd.level = 3
	connections.max.idle.ms = 540000
	delivery.timeout.ms = 120000
	enable.idempotence = true
	enable.metrics.push = true
	interceptor.classes = []
	key.serializer = class org.apache.kafka.common.serialization.StringSerializer
	linger.ms = 0
	max.block.ms = 60000
	max.in.flight.requests.per.connection = 5
	max.request.size = 1048576
	metadata.max.age.ms = 300000
	metadata.max.idle.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partitioner.adaptive.partitioning.enable = true
	partitioner.availability.timeout.ms = 0
	partitioner.class = null
	partitioner.ignore.keys = false
	receive.buffer.bytes = 32768
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retries = 2147483647
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	transaction.timeout.ms = 60000
	transactional.id = null
	value.serializer = class org.apache.kafka.common.serialization.StringSerializer

[2025-04-03T06:22:22.445+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.446+00:00|INFO|KafkaProducer|main] [Producer clientId=producer-6] Instantiated an idempotent producer.
[2025-04-03T06:22:22.457+00:00|INFO|ProducerConfig|main] These configurations '[group.id]' were supplied but are not used yet.
[2025-04-03T06:22:22.457+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.457+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.457+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342457
[2025-04-03T06:22:22.457+00:00|INFO|InlineKafkaTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=3a507303-c1e6-45bc-8495-72ee63d37dbc, alive=false, publisher=KafkaPublisherWrapper []]]: KAFKA SINK created
[2025-04-03T06:22:22.463+00:00|INFO|LifecycleFsm|main] lifecycle event: start engine
[2025-04-03T06:22:22.466+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-11
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:22.467+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.477+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.477+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.477+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342477
[2025-04-03T06:22:22.478+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-11, groupId=policy-drools-pdp] Subscribed to topic(s): policy-pdp-pap
[2025-04-03T06:22:22.478+00:00|INFO|TopicBase|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=20b7e245-add2-4474-b1d8-3c7eb14c404b, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=false, locked=false, uebThread=null, topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=policy-pdp-pap, effectiveTopic=policy-pdp-pap, #recentEvents=0, locked=false, #topicListeners=0]]]]: registering org.onap.policy.common.endpoints.listeners.MessageTypeDispatcher@3c35c345
[2025-04-03T06:22:22.479+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=20b7e245-add2-4474-b1d8-3c7eb14c404b, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=false, locked=false, uebThread=null, topicListeners=1, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=policy-pdp-pap, effectiveTopic=policy-pdp-pap, #recentEvents=0, locked=false, #topicListeners=1]]]]: starting
[2025-04-03T06:22:22.479+00:00|INFO|ConsumerConfig|main] ConsumerConfig values: 
	allow.auto.create.topics = true
	auto.commit.interval.ms = 5000
	auto.include.jmx.reporter = true
	auto.offset.reset = latest
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	check.crcs = true
	client.dns.lookup = use_all_dns_ips
	client.id = consumer-policy-drools-pdp-12
	client.rack = 
	connections.max.idle.ms = 540000
	default.api.timeout.ms = 60000
	enable.auto.commit = true
	enable.metrics.push = true
	exclude.internal.topics = true
	fetch.max.bytes = 52428800
	fetch.max.wait.ms = 500
	fetch.min.bytes = 1
	group.id = policy-drools-pdp
	group.instance.id = null
	group.protocol = classic
	group.remote.assignor = null
	heartbeat.interval.ms = 3000
	interceptor.classes = []
	internal.leave.group.on.close = true
	internal.throw.on.fetch.stable.offset.unsupported = false
	isolation.level = read_uncommitted
	key.deserializer = class org.apache.kafka.common.serialization.StringDeserializer
	max.partition.fetch.bytes = 1048576
	max.poll.interval.ms = 300000
	max.poll.records = 500
	metadata.max.age.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor, class org.apache.kafka.clients.consumer.CooperativeStickyAssignor]
	receive.buffer.bytes = 65536
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	session.timeout.ms = 45000
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	value.deserializer = class org.apache.kafka.common.serialization.StringDeserializer

[2025-04-03T06:22:22.480+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.489+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.489+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.489+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342489
[2025-04-03T06:22:22.489+00:00|INFO|LegacyKafkaConsumer|main] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Subscribed to topic(s): policy-pdp-pap
[2025-04-03T06:22:22.495+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=20b7e245-add2-4474-b1d8-3c7eb14c404b, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-policy-pdp-pap,5,main], topicListeners=1, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=policy-pdp-pap, effectiveTopic=policy-pdp-pap, #recentEvents=0, locked=false, #topicListeners=1]]]]: starting
[2025-04-03T06:22:22.501+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=8f26039d-c071-45de-b2be-67393424c17c, alive=false, publisher=null]]: starting
[2025-04-03T06:22:22.502+00:00|INFO|ProducerConfig|main] ProducerConfig values: 
	acks = -1
	auto.include.jmx.reporter = true
	batch.size = 16384
	bootstrap.servers = [onap-strimzi-kafka-bootstrap:9092]
	buffer.memory = 33554432
	client.dns.lookup = use_all_dns_ips
	client.id = producer-7
	compression.gzip.level = -1
	compression.lz4.level = 9
	compression.type = none
	compression.zstd.level = 3
	connections.max.idle.ms = 540000
	delivery.timeout.ms = 120000
	enable.idempotence = true
	enable.metrics.push = true
	interceptor.classes = []
	key.serializer = class org.apache.kafka.common.serialization.StringSerializer
	linger.ms = 0
	max.block.ms = 60000
	max.in.flight.requests.per.connection = 5
	max.request.size = 1048576
	metadata.max.age.ms = 300000
	metadata.max.idle.ms = 300000
	metadata.recovery.strategy = none
	metric.reporters = []
	metrics.num.samples = 2
	metrics.recording.level = INFO
	metrics.sample.window.ms = 30000
	partitioner.adaptive.partitioning.enable = true
	partitioner.availability.timeout.ms = 0
	partitioner.class = null
	partitioner.ignore.keys = false
	receive.buffer.bytes = 32768
	reconnect.backoff.max.ms = 1000
	reconnect.backoff.ms = 50
	request.timeout.ms = 30000
	retries = 2147483647
	retry.backoff.max.ms = 1000
	retry.backoff.ms = 100
	sasl.client.callback.handler.class = null
	sasl.jaas.config = [hidden]
	sasl.kerberos.kinit.cmd = /usr/bin/kinit
	sasl.kerberos.min.time.before.relogin = 60000
	sasl.kerberos.service.name = null
	sasl.kerberos.ticket.renew.jitter = 0.05
	sasl.kerberos.ticket.renew.window.factor = 0.8
	sasl.login.callback.handler.class = null
	sasl.login.class = null
	sasl.login.connect.timeout.ms = null
	sasl.login.read.timeout.ms = null
	sasl.login.refresh.buffer.seconds = 300
	sasl.login.refresh.min.period.seconds = 60
	sasl.login.refresh.window.factor = 0.8
	sasl.login.refresh.window.jitter = 0.05
	sasl.login.retry.backoff.max.ms = 10000
	sasl.login.retry.backoff.ms = 100
	sasl.mechanism = SCRAM-SHA-512
	sasl.oauthbearer.clock.skew.seconds = 30
	sasl.oauthbearer.expected.audience = null
	sasl.oauthbearer.expected.issuer = null
	sasl.oauthbearer.jwks.endpoint.refresh.ms = 3600000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.max.ms = 10000
	sasl.oauthbearer.jwks.endpoint.retry.backoff.ms = 100
	sasl.oauthbearer.jwks.endpoint.url = null
	sasl.oauthbearer.scope.claim.name = scope
	sasl.oauthbearer.sub.claim.name = sub
	sasl.oauthbearer.token.endpoint.url = null
	security.protocol = SASL_PLAINTEXT
	security.providers = null
	send.buffer.bytes = 131072
	socket.connection.setup.timeout.max.ms = 30000
	socket.connection.setup.timeout.ms = 10000
	ssl.cipher.suites = null
	ssl.enabled.protocols = [TLSv1.2, TLSv1.3]
	ssl.endpoint.identification.algorithm = https
	ssl.engine.factory.class = null
	ssl.key.password = null
	ssl.keymanager.algorithm = SunX509
	ssl.keystore.certificate.chain = null
	ssl.keystore.key = null
	ssl.keystore.location = null
	ssl.keystore.password = null
	ssl.keystore.type = JKS
	ssl.protocol = TLSv1.3
	ssl.provider = null
	ssl.secure.random.implementation = null
	ssl.trustmanager.algorithm = PKIX
	ssl.truststore.certificates = null
	ssl.truststore.location = null
	ssl.truststore.password = null
	ssl.truststore.type = JKS
	transaction.timeout.ms = 60000
	transactional.id = null
	value.serializer = class org.apache.kafka.common.serialization.StringSerializer

[2025-04-03T06:22:22.504+00:00|INFO|KafkaMetricsCollector|main] initializing Kafka metrics collector
[2025-04-03T06:22:22.506+00:00|INFO|KafkaProducer|main] [Producer clientId=producer-7] Instantiated an idempotent producer.
[2025-04-03T06:22:22.533+00:00|INFO|ProducerConfig|main] These configurations '[group.id]' were supplied but are not used yet.
[2025-04-03T06:22:22.535+00:00|INFO|AppInfoParser|main] Kafka version: 3.8.1
[2025-04-03T06:22:22.535+00:00|INFO|AppInfoParser|main] Kafka commitId: 70d6ff42debf7e17
[2025-04-03T06:22:22.535+00:00|INFO|AppInfoParser|main] Kafka startTimeMs: 1743661342535
[2025-04-03T06:22:22.536+00:00|INFO|InlineKafkaTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=8f26039d-c071-45de-b2be-67393424c17c, alive=false, publisher=KafkaPublisherWrapper []]]: KAFKA SINK created
[2025-04-03T06:22:22.554+00:00|INFO|LifecycleStateDefault|main] LifecycleStateTerminated(): state-change from TERMINATED to PASSIVE
[2025-04-03T06:22:22.555+00:00|INFO|LifecycleFsm|pool-2-thread-1] lifecycle event: status
[2025-04-03T06:22:22.555+00:00|INFO|LifecycleStateRunning|pool-2-thread-1] Not all expected policy types are registered yet, current=[onap.policies.native.drools.Controller, onap.policies.native.drools.Artifact], expected=[onap.policies.controlloop.operational.common.Drools]
[2025-04-03T06:22:22.573+00:00|INFO|DistributedLockManager|pool-3-thread-1] deleting all expired locks from the DB
[2025-04-03T06:22:22.603+00:00|INFO|JettyServletServer|main] JettyJerseyServer [Jerseyservlets={/*=org.glassfish.jersey.servlet.ServletContainer-6428591a==org.glassfish.jersey.servlet.ServletContainer@d9be7406{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}}, swaggerId=swagger-6969, toString()=JettyServletServer(name=HEALTHCHECK, host=0.0.0.0, port=6969, sniHostCheck=false, user=null, password=null, contextPath=/, jettyServer=Server@37b57b54{STOPPED}[11.0.24,sto=0], context=o.e.j.s.ServletContextHandler@5c1f6d57{/,null,STOPPED}, connector=HEALTHCHECK@52d6cd34{HTTP/1.1, (http/1.1)}{0.0.0.0:6969}, jettyThread=null, servlets={/*=org.glassfish.jersey.servlet.ServletContainer-6428591a==org.glassfish.jersey.servlet.ServletContainer@d9be7406{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}})]: STARTING
[2025-04-03T06:22:22.606+00:00|INFO|MdcTransactionImpl|main] 
c2848999-10e3-4f3a-97f4-94eb8d184255||Main|PDP-D|2025-04-03T06:22:19.185+00:00|2025-04-03T06:22:22.606+00:00|null||onap-policy-drools-pdp-0|COMPLETE|||||engine|start|onap-policy-drools-pdp-0||onap-policy-drools-pdp-0||||||INFO|main| 
[2025-04-03T06:22:22.608+00:00|INFO|JettyServletServer|HEALTHCHECK-6969] JettyJerseyServer [Jerseyservlets={/*=org.glassfish.jersey.servlet.ServletContainer-6428591a==org.glassfish.jersey.servlet.ServletContainer@d9be7406{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}}, swaggerId=swagger-6969, toString()=JettyServletServer(name=HEALTHCHECK, host=0.0.0.0, port=6969, sniHostCheck=false, user=null, password=null, contextPath=/, jettyServer=Server@37b57b54{STOPPED}[11.0.24,sto=0], context=o.e.j.s.ServletContextHandler@5c1f6d57{/,null,STOPPED}, connector=HEALTHCHECK@52d6cd34{HTTP/1.1, (http/1.1)}{0.0.0.0:6969}, jettyThread=Thread[HEALTHCHECK-6969,5,main], servlets={/*=org.glassfish.jersey.servlet.ServletContainer-6428591a==org.glassfish.jersey.servlet.ServletContainer@d9be7406{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}})]: STARTING
[2025-04-03T06:22:22.609+00:00|INFO|Server|HEALTHCHECK-6969] jetty-11.0.24; built: 2024-08-26T18:11:22.448Z; git: 5dfc59a691b748796f922208956bd1f2794bcd16; jvm 17.0.13+11-alpine-r0
[2025-04-03T06:22:22.622+00:00|INFO|OrderedServiceImpl|main] ***** OrderedServiceImpl implementers:
 [org.onap.policy.drools.lifecycle.LifecycleFeature@3d246ea3, org.onap.policy.drools.apps.controlloop.feature.trans.ControlLoopMetricsFeature@472698d]
[2025-04-03T06:22:22.651+00:00|INFO|OrderedServiceImpl|main] ***** OrderedServiceImpl implementers:
 [org.onap.policy.drools.lifecycle.LifecycleFeature@3d246ea3]
[2025-04-03T06:22:22.655+00:00|INFO|DefaultSessionIdManager|HEALTHCHECK-6969] Session workerName=node0
[2025-04-03T06:22:22.657+00:00|INFO|MavenDroolsController|main] drools-controller instantiation [org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0]
[2025-04-03T06:22:22.799+00:00|WARN|MavenSettings|main] Environment variable M2_HOME is not set
[2025-04-03T06:22:22.835+00:00|INFO|GsonMessageBodyHandler|HEALTHCHECK-6969] Using GSON for REST calls
[2025-04-03T06:22:22.835+00:00|INFO|JacksonHandler|HEALTHCHECK-6969] Using GSON with Jackson behaviors for REST calls
[2025-04-03T06:22:22.836+00:00|INFO|YamlMessageBodyHandler|HEALTHCHECK-6969] Accepting YAML for REST calls
[2025-04-03T06:22:22.855+00:00|INFO|ContextHandler|HEALTHCHECK-6969] Started o.e.j.s.ServletContextHandler@5c1f6d57{/,null,AVAILABLE}
[2025-04-03T06:22:22.857+00:00|INFO|AbstractConnector|HEALTHCHECK-6969] Started HEALTHCHECK@52d6cd34{HTTP/1.1, (http/1.1)}{0.0.0.0:6969}
[2025-04-03T06:22:22.858+00:00|INFO|Server|HEALTHCHECK-6969] Started Server@37b57b54{STARTING}[11.0.24,sto=0] @10571ms
[2025-04-03T06:22:23.062+00:00|WARN|DistributedLockManager|pool-3-thread-1] failed to delete expired locks from the DB
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 13
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeUpdate(PgPreparedStatement.java:155)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeUpdate(DelegatingPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeUpdate(DelegatingPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeUpdate(DelegatingPreparedStatement.java:137)
	at org.onap.policy.distributed.locking.DistributedLockManager.deleteExpiredDbLocks(DistributedLockManager.java:205)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:22:24.218+00:00|INFO|Metadata|kafka-producer-network-thread | producer-2] [Producer clientId=producer-2] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.220+00:00|INFO|TransactionManager|kafka-producer-network-thread | producer-2] [Producer clientId=producer-2] ProducerId set to 2001 with epoch 0
[2025-04-03T06:22:24.218+00:00|INFO|Metadata|kafka-producer-network-thread | producer-5] [Producer clientId=producer-5] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.221+00:00|INFO|TransactionManager|kafka-producer-network-thread | producer-5] [Producer clientId=producer-5] ProducerId set to 1007 with epoch 0
[2025-04-03T06:22:24.330+00:00|INFO|Metadata|kafka-producer-network-thread | producer-6] [Producer clientId=producer-6] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.336+00:00|INFO|Metadata|kafka-producer-network-thread | producer-1] [Producer clientId=producer-1] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.337+00:00|INFO|TransactionManager|kafka-producer-network-thread | producer-1] [Producer clientId=producer-1] ProducerId set to 2 with epoch 0
[2025-04-03T06:22:24.338+00:00|INFO|TransactionManager|kafka-producer-network-thread | producer-6] [Producer clientId=producer-6] ProducerId set to 2002 with epoch 0
[2025-04-03T06:22:24.341+00:00|INFO|Metadata|kafka-producer-network-thread | producer-7] [Producer clientId=producer-7] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.342+00:00|INFO|TransactionManager|kafka-producer-network-thread | producer-7] [Producer clientId=producer-7] ProducerId set to 2003 with epoch 0
[2025-04-03T06:22:24.346+00:00|INFO|Metadata|kafka-producer-network-thread | producer-3] [Producer clientId=producer-3] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.347+00:00|INFO|TransactionManager|kafka-producer-network-thread | producer-3] [Producer clientId=producer-3] ProducerId set to 3 with epoch 0
[2025-04-03T06:22:24.361+00:00|INFO|Metadata|kafka-producer-network-thread | producer-4] [Producer clientId=producer-4] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.363+00:00|INFO|TransactionManager|kafka-producer-network-thread | producer-4] [Producer clientId=producer-4] ProducerId set to 4 with epoch 0
[2025-04-03T06:22:24.391+00:00|INFO|Metadata|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.393+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Discovered group coordinator onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2147483647 rack: null)
[2025-04-03T06:22:24.394+00:00|WARN|NetworkClient|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 2 : {a1-p-rsp=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.395+00:00|INFO|Metadata|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.395+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Discovered group coordinator onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2147483647 rack: null)
[2025-04-03T06:22:24.396+00:00|WARN|NetworkClient|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 2 : {appc-lcm-write=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.402+00:00|INFO|Metadata|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.403+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Discovered group coordinator onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2147483647 rack: null)
[2025-04-03T06:22:24.419+00:00|WARN|NetworkClient|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 2 : {sdnr-cl-rsp=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.419+00:00|WARN|NetworkClient|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 2 : {appc-cl=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.419+00:00|INFO|Metadata|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.420+00:00|INFO|Metadata|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.420+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Discovered group coordinator onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2147483647 rack: null)
[2025-04-03T06:22:24.421+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Discovered group coordinator onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2147483647 rack: null)
[2025-04-03T06:22:24.426+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.426+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.429+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.430+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.432+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.466+00:00|WARN|NetworkClient|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 2 : {unauthenticated.dcae_cl_output=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.466+00:00|INFO|Metadata|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Cluster ID: Fk6Wdl4NRfCb0P7hVJ6xQg
[2025-04-03T06:22:24.467+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Discovered group coordinator onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2147483647 rack: null)
[2025-04-03T06:22:24.480+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.592+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Request joining group due to: need to re-join with the given member-id: consumer-policy-drools-pdp-6-0bedf315-b7f5-4235-889d-bab8ab6fa23b
[2025-04-03T06:22:24.593+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.614+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Request joining group due to: need to re-join with the given member-id: consumer-policy-drools-pdp-12-231cc0a9-f527-4452-bd8f-60d1504a40d7
[2025-04-03T06:22:24.615+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.647+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Request joining group due to: need to re-join with the given member-id: consumer-policy-drools-pdp-9-1744de8a-3540-46a2-ab09-18686c1d0455
[2025-04-03T06:22:24.648+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.653+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Request joining group due to: need to re-join with the given member-id: consumer-policy-drools-pdp-7-5c91eb36-3bbb-49e0-aa58-3e034b411433
[2025-04-03T06:22:24.653+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.651+00:00|WARN|NetworkClient|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 7 : {appc-lcm-write=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.660+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Request joining group due to: need to re-join with the given member-id: consumer-policy-drools-pdp-8-f9340f23-ac63-4716-bce9-7f8fa24465b1
[2025-04-03T06:22:24.660+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.669+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Request joining group due to: need to re-join with the given member-id: consumer-policy-drools-pdp-10-de87d249-2122-4a83-8081-c62b0d4dc3ad
[2025-04-03T06:22:24.669+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] (Re-)joining group
[2025-04-03T06:22:24.672+00:00|WARN|NetworkClient|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 7 : {sdnr-cl-rsp=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.682+00:00|WARN|NetworkClient|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 7 : {appc-cl=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.683+00:00|WARN|NetworkClient|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 7 : {a1-p-rsp=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.693+00:00|WARN|NetworkClient|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 8 : {unauthenticated.dcae_cl_output=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.888+00:00|WARN|NetworkClient|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 9 : {sdnr-cl-rsp=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.908+00:00|WARN|NetworkClient|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 9 : {appc-cl=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:24.927+00:00|WARN|NetworkClient|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Error while fetching metadata with correlation id 9 : {unauthenticated.dcae_cl_output=LEADER_NOT_AVAILABLE}
[2025-04-03T06:22:26.483+00:00|INFO|InternalKieModuleProvider|main] Creating KieModule for artifact org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0
[2025-04-03T06:22:26.502+00:00|INFO|CanonicalKieModuleProvider|main] Artifact org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0 has executable model
[2025-04-03T06:22:30.470+00:00|WARN|MavenRepository|main] Unable to resolve artifact: com.google.inject:guice:4.2.2
[2025-04-03T06:22:30.626+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Successfully joined group with generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-8-f9340f23-ac63-4716-bce9-7f8fa24465b1', protocol='range'}
[2025-04-03T06:22:30.626+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Successfully joined group with generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-9-1744de8a-3540-46a2-ab09-18686c1d0455', protocol='range'}
[2025-04-03T06:22:30.629+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Successfully joined group with generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-6-0bedf315-b7f5-4235-889d-bab8ab6fa23b', protocol='range'}
[2025-04-03T06:22:30.632+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Successfully joined group with generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-7-5c91eb36-3bbb-49e0-aa58-3e034b411433', protocol='range'}
[2025-04-03T06:22:30.633+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Successfully joined group with generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-10-de87d249-2122-4a83-8081-c62b0d4dc3ad', protocol='range'}
[2025-04-03T06:22:30.633+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Successfully joined group with generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-12-231cc0a9-f527-4452-bd8f-60d1504a40d7', protocol='range'}
[2025-04-03T06:22:30.729+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Finished assignment for group at generation 1: {consumer-policy-drools-pdp-6-0bedf315-b7f5-4235-889d-bab8ab6fa23b=Assignment(partitions=[unauthenticated.dcae_cl_output-0, unauthenticated.dcae_cl_output-1, unauthenticated.dcae_cl_output-2, unauthenticated.dcae_cl_output-3, unauthenticated.dcae_cl_output-4, unauthenticated.dcae_cl_output-5]), consumer-policy-drools-pdp-12-231cc0a9-f527-4452-bd8f-60d1504a40d7=Assignment(partitions=[policy-pdp-pap-0, policy-pdp-pap-1, policy-pdp-pap-2, policy-pdp-pap-3, policy-pdp-pap-4, policy-pdp-pap-5, policy-pdp-pap-6, policy-pdp-pap-7, policy-pdp-pap-8, policy-pdp-pap-9]), consumer-policy-drools-pdp-10-de87d249-2122-4a83-8081-c62b0d4dc3ad=Assignment(partitions=[sdnr-cl-rsp-0, sdnr-cl-rsp-1, sdnr-cl-rsp-2, sdnr-cl-rsp-3, sdnr-cl-rsp-4, sdnr-cl-rsp-5]), consumer-policy-drools-pdp-7-5c91eb36-3bbb-49e0-aa58-3e034b411433=Assignment(partitions=[appc-cl-0, appc-cl-1, appc-cl-2, appc-cl-3, appc-cl-4, appc-cl-5]), consumer-policy-drools-pdp-9-1744de8a-3540-46a2-ab09-18686c1d0455=Assignment(partitions=[appc-lcm-write-0, appc-lcm-write-1, appc-lcm-write-2, appc-lcm-write-3, appc-lcm-write-4, appc-lcm-write-5]), consumer-policy-drools-pdp-8-f9340f23-ac63-4716-bce9-7f8fa24465b1=Assignment(partitions=[a1-p-rsp-0, a1-p-rsp-1, a1-p-rsp-2, a1-p-rsp-3, a1-p-rsp-4, a1-p-rsp-5])}
[2025-04-03T06:22:30.755+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Successfully synced group in generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-9-1744de8a-3540-46a2-ab09-18686c1d0455', protocol='range'}
[2025-04-03T06:22:30.755+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Successfully synced group in generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-8-f9340f23-ac63-4716-bce9-7f8fa24465b1', protocol='range'}
[2025-04-03T06:22:30.755+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Successfully synced group in generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-10-de87d249-2122-4a83-8081-c62b0d4dc3ad', protocol='range'}
[2025-04-03T06:22:30.755+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Successfully synced group in generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-12-231cc0a9-f527-4452-bd8f-60d1504a40d7', protocol='range'}
[2025-04-03T06:22:30.756+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Notifying assignor about the new Assignment(partitions=[policy-pdp-pap-0, policy-pdp-pap-1, policy-pdp-pap-2, policy-pdp-pap-3, policy-pdp-pap-4, policy-pdp-pap-5, policy-pdp-pap-6, policy-pdp-pap-7, policy-pdp-pap-8, policy-pdp-pap-9])
[2025-04-03T06:22:30.756+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Successfully synced group in generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-6-0bedf315-b7f5-4235-889d-bab8ab6fa23b', protocol='range'}
[2025-04-03T06:22:30.756+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Notifying assignor about the new Assignment(partitions=[appc-lcm-write-0, appc-lcm-write-1, appc-lcm-write-2, appc-lcm-write-3, appc-lcm-write-4, appc-lcm-write-5])
[2025-04-03T06:22:30.756+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Notifying assignor about the new Assignment(partitions=[unauthenticated.dcae_cl_output-0, unauthenticated.dcae_cl_output-1, unauthenticated.dcae_cl_output-2, unauthenticated.dcae_cl_output-3, unauthenticated.dcae_cl_output-4, unauthenticated.dcae_cl_output-5])
[2025-04-03T06:22:30.757+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Notifying assignor about the new Assignment(partitions=[a1-p-rsp-0, a1-p-rsp-1, a1-p-rsp-2, a1-p-rsp-3, a1-p-rsp-4, a1-p-rsp-5])
[2025-04-03T06:22:30.757+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Successfully synced group in generation Generation{generationId=1, memberId='consumer-policy-drools-pdp-7-5c91eb36-3bbb-49e0-aa58-3e034b411433', protocol='range'}
[2025-04-03T06:22:30.758+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Notifying assignor about the new Assignment(partitions=[sdnr-cl-rsp-0, sdnr-cl-rsp-1, sdnr-cl-rsp-2, sdnr-cl-rsp-3, sdnr-cl-rsp-4, sdnr-cl-rsp-5])
[2025-04-03T06:22:30.758+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Notifying assignor about the new Assignment(partitions=[appc-cl-0, appc-cl-1, appc-cl-2, appc-cl-3, appc-cl-4, appc-cl-5])
[2025-04-03T06:22:30.763+00:00|INFO|ConsumerRebalanceListenerInvoker|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Adding newly assigned partitions: policy-pdp-pap-0, policy-pdp-pap-1, policy-pdp-pap-2, policy-pdp-pap-3, policy-pdp-pap-4, policy-pdp-pap-5, policy-pdp-pap-6, policy-pdp-pap-7, policy-pdp-pap-8, policy-pdp-pap-9
[2025-04-03T06:22:30.763+00:00|INFO|ConsumerRebalanceListenerInvoker|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Adding newly assigned partitions: sdnr-cl-rsp-0, sdnr-cl-rsp-1, sdnr-cl-rsp-2, sdnr-cl-rsp-3, sdnr-cl-rsp-4, sdnr-cl-rsp-5
[2025-04-03T06:22:30.763+00:00|INFO|ConsumerRebalanceListenerInvoker|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Adding newly assigned partitions: appc-cl-0, appc-cl-1, appc-cl-2, appc-cl-3, appc-cl-4, appc-cl-5
[2025-04-03T06:22:30.763+00:00|INFO|ConsumerRebalanceListenerInvoker|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Adding newly assigned partitions: appc-lcm-write-0, appc-lcm-write-1, appc-lcm-write-2, appc-lcm-write-3, appc-lcm-write-4, appc-lcm-write-5
[2025-04-03T06:22:30.770+00:00|INFO|ConsumerRebalanceListenerInvoker|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Adding newly assigned partitions: a1-p-rsp-0, a1-p-rsp-1, a1-p-rsp-2, a1-p-rsp-3, a1-p-rsp-4, a1-p-rsp-5
[2025-04-03T06:22:30.774+00:00|INFO|ConsumerRebalanceListenerInvoker|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Adding newly assigned partitions: unauthenticated.dcae_cl_output-0, unauthenticated.dcae_cl_output-1, unauthenticated.dcae_cl_output-2, unauthenticated.dcae_cl_output-3, unauthenticated.dcae_cl_output-4, unauthenticated.dcae_cl_output-5
[2025-04-03T06:22:30.792+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Found no committed offset for partition unauthenticated.dcae_cl_output-0
[2025-04-03T06:22:30.792+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Found no committed offset for partition unauthenticated.dcae_cl_output-2
[2025-04-03T06:22:30.792+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Found no committed offset for partition unauthenticated.dcae_cl_output-1
[2025-04-03T06:22:30.792+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Found no committed offset for partition unauthenticated.dcae_cl_output-4
[2025-04-03T06:22:30.792+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Found no committed offset for partition unauthenticated.dcae_cl_output-3
[2025-04-03T06:22:30.793+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Found no committed offset for partition sdnr-cl-rsp-5
[2025-04-03T06:22:30.793+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Found no committed offset for partition sdnr-cl-rsp-2
[2025-04-03T06:22:30.793+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Found no committed offset for partition sdnr-cl-rsp-1
[2025-04-03T06:22:30.793+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Found no committed offset for partition sdnr-cl-rsp-4
[2025-04-03T06:22:30.793+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Found no committed offset for partition sdnr-cl-rsp-3
[2025-04-03T06:22:30.793+00:00|INFO|ConsumerCoordinator|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Found no committed offset for partition sdnr-cl-rsp-0
[2025-04-03T06:22:30.793+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Found no committed offset for partition appc-cl-2
[2025-04-03T06:22:30.793+00:00|INFO|ConsumerCoordinator|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Found no committed offset for partition unauthenticated.dcae_cl_output-5
[2025-04-03T06:22:30.793+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Found no committed offset for partition appc-cl-3
[2025-04-03T06:22:30.794+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Found no committed offset for partition appc-cl-4
[2025-04-03T06:22:30.792+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Found no committed offset for partition appc-lcm-write-1
[2025-04-03T06:22:30.794+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Found no committed offset for partition appc-lcm-write-2
[2025-04-03T06:22:30.794+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Found no committed offset for partition appc-lcm-write-0
[2025-04-03T06:22:30.795+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Found no committed offset for partition appc-cl-5
[2025-04-03T06:22:30.795+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Found no committed offset for partition appc-cl-0
[2025-04-03T06:22:30.795+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Found no committed offset for partition appc-cl-1
[2025-04-03T06:22:30.795+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Found no committed offset for partition appc-lcm-write-5
[2025-04-03T06:22:30.795+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Found no committed offset for partition appc-lcm-write-3
[2025-04-03T06:22:30.796+00:00|INFO|ConsumerCoordinator|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Found no committed offset for partition appc-lcm-write-4
[2025-04-03T06:22:30.799+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Found no committed offset for partition policy-pdp-pap-9
[2025-04-03T06:22:30.799+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Found no committed offset for partition policy-pdp-pap-6
[2025-04-03T06:22:30.800+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Found no committed offset for partition policy-pdp-pap-5
[2025-04-03T06:22:30.800+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Found no committed offset for partition policy-pdp-pap-8
[2025-04-03T06:22:30.801+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Found no committed offset for partition policy-pdp-pap-7
[2025-04-03T06:22:30.801+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Found no committed offset for partition policy-pdp-pap-2
[2025-04-03T06:22:30.801+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Found no committed offset for partition policy-pdp-pap-1
[2025-04-03T06:22:30.802+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Found no committed offset for partition policy-pdp-pap-4
[2025-04-03T06:22:30.803+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Found no committed offset for partition policy-pdp-pap-3
[2025-04-03T06:22:30.804+00:00|INFO|ConsumerCoordinator|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Found no committed offset for partition policy-pdp-pap-0
[2025-04-03T06:22:30.818+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Found no committed offset for partition a1-p-rsp-1
[2025-04-03T06:22:30.818+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Found no committed offset for partition a1-p-rsp-2
[2025-04-03T06:22:30.818+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Found no committed offset for partition a1-p-rsp-0
[2025-04-03T06:22:30.818+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Found no committed offset for partition a1-p-rsp-5
[2025-04-03T06:22:30.818+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Found no committed offset for partition a1-p-rsp-3
[2025-04-03T06:22:30.819+00:00|INFO|ConsumerCoordinator|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Found no committed offset for partition a1-p-rsp-4
[2025-04-03T06:22:30.857+00:00|INFO|SubscriptionState|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Resetting offset for partition sdnr-cl-rsp-3 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.857+00:00|INFO|SubscriptionState|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Resetting offset for partition appc-cl-4 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.858+00:00|INFO|SubscriptionState|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Resetting offset for partition a1-p-rsp-0 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.859+00:00|INFO|SubscriptionState|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Resetting offset for partition sdnr-cl-rsp-0 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.860+00:00|INFO|SubscriptionState|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Resetting offset for partition appc-cl-1 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.860+00:00|INFO|SubscriptionState|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Resetting offset for partition unauthenticated.dcae_cl_output-1 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.861+00:00|INFO|SubscriptionState|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Resetting offset for partition appc-lcm-write-2 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.861+00:00|INFO|SubscriptionState|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Resetting offset for partition appc-lcm-write-5 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.860+00:00|INFO|SubscriptionState|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Resetting offset for partition unauthenticated.dcae_cl_output-4 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.863+00:00|INFO|SubscriptionState|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Resetting offset for partition a1-p-rsp-3 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.869+00:00|INFO|SubscriptionState|kafka-coordinator-heartbeat-thread | policy-drools-pdp] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Resetting offset for partition policy-pdp-pap-7 to position FetchPosition{offset=2, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.870+00:00|INFO|SubscriptionState|kafka-coordinator-heartbeat-thread | policy-drools-pdp] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Resetting offset for partition policy-pdp-pap-1 to position FetchPosition{offset=1, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.870+00:00|INFO|SubscriptionState|kafka-coordinator-heartbeat-thread | policy-drools-pdp] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Resetting offset for partition policy-pdp-pap-4 to position FetchPosition{offset=1, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.888+00:00|WARN|MavenRepository|main] Unable to resolve artifact: com.google.guava:guava:25.1-android
[2025-04-03T06:22:30.889+00:00|WARN|MavenRepository|main] Unable to resolve artifact: com.google.guava:guava:pom:25.1-android
[2025-04-03T06:22:30.890+00:00|WARN|MavenRepository|main] Unable to resolve artifact: com.google.guava:guava:25.1-android
[2025-04-03T06:22:30.891+00:00|WARN|MavenRepository|main] Unable to resolve artifact: org.ow2.asm:asm:7.0
[2025-04-03T06:22:30.891+00:00|WARN|MavenRepository|main] Unable to resolve artifact: org.ow2.asm:asm:pom:7.0
[2025-04-03T06:22:30.892+00:00|WARN|MavenRepository|main] Unable to resolve artifact: org.ow2.asm:asm:7.0
[2025-04-03T06:22:30.893+00:00|WARN|MavenRepository|main] Unable to resolve artifact: cglib:cglib:3.2.9
[2025-04-03T06:22:30.895+00:00|WARN|MavenRepository|main] Unable to resolve artifact: cglib:cglib:pom:3.2.9
[2025-04-03T06:22:30.896+00:00|WARN|MavenRepository|main] Unable to resolve artifact: cglib:cglib:3.2.9
[2025-04-03T06:22:30.945+00:00|INFO|SubscriptionState|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Resetting offset for partition appc-lcm-write-1 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.946+00:00|INFO|SubscriptionState|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Resetting offset for partition appc-lcm-write-4 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.949+00:00|INFO|SubscriptionState|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Resetting offset for partition a1-p-rsp-2 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.949+00:00|INFO|SubscriptionState|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Resetting offset for partition a1-p-rsp-5 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.950+00:00|INFO|SubscriptionState|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Resetting offset for partition appc-lcm-write-0 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.951+00:00|INFO|SubscriptionState|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Resetting offset for partition appc-lcm-write-3 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.960+00:00|INFO|SubscriptionState|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Resetting offset for partition sdnr-cl-rsp-5 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.960+00:00|INFO|SubscriptionState|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Resetting offset for partition sdnr-cl-rsp-2 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.960+00:00|INFO|SubscriptionState|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Resetting offset for partition sdnr-cl-rsp-1 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.961+00:00|INFO|SubscriptionState|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Resetting offset for partition sdnr-cl-rsp-4 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.962+00:00|INFO|SubscriptionState|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Resetting offset for partition a1-p-rsp-1 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.963+00:00|INFO|SubscriptionState|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Resetting offset for partition a1-p-rsp-4 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.968+00:00|INFO|SubscriptionState|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Resetting offset for partition unauthenticated.dcae_cl_output-2 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.969+00:00|INFO|SubscriptionState|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Resetting offset for partition unauthenticated.dcae_cl_output-5 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.969+00:00|INFO|SubscriptionState|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Resetting offset for partition policy-pdp-pap-5 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.970+00:00|INFO|SubscriptionState|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Resetting offset for partition policy-pdp-pap-8 to position FetchPosition{offset=1, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.972+00:00|INFO|SubscriptionState|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Resetting offset for partition policy-pdp-pap-2 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.976+00:00|INFO|SubscriptionState|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Resetting offset for partition unauthenticated.dcae_cl_output-0 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.976+00:00|INFO|SubscriptionState|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Resetting offset for partition policy-pdp-pap-9 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.977+00:00|INFO|SubscriptionState|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Resetting offset for partition policy-pdp-pap-6 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.977+00:00|INFO|SubscriptionState|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Resetting offset for partition policy-pdp-pap-3 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.977+00:00|INFO|SubscriptionState|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Resetting offset for partition unauthenticated.dcae_cl_output-3 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-0.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 0 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.978+00:00|INFO|SubscriptionState|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Resetting offset for partition policy-pdp-pap-0 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.986+00:00|INFO|SubscriptionState|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Resetting offset for partition appc-cl-3 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.987+00:00|INFO|SubscriptionState|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Resetting offset for partition appc-cl-0 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-1.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 1 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.988+00:00|INFO|SubscriptionState|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Resetting offset for partition appc-cl-2 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:30.988+00:00|INFO|SubscriptionState|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Resetting offset for partition appc-cl-5 to position FetchPosition{offset=0, offsetEpoch=Optional.empty, currentLeader=LeaderAndEpoch{leader=Optional[onap-strimzi-kafka-2.onap-strimzi-kafka-brokers.onap.svc:9092 (id: 2 rack: null)], epoch=0}}.
[2025-04-03T06:22:31.167+00:00|INFO|MavenProjectLoader|main] Could not find artifact org.onap.policy.drools-applications.controlloop.common:rules-test:jar:3.1.0
org.eclipse.aether.resolution.ArtifactResolutionException: Could not find artifact org.onap.policy.drools-applications.controlloop.common:rules-test:jar:3.1.0
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolve(DefaultArtifactResolver.java:425)
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolveArtifacts(DefaultArtifactResolver.java:229)
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolveArtifact(DefaultArtifactResolver.java:207)
	at org.eclipse.aether.internal.impl.DefaultRepositorySystem.resolveArtifact(DefaultRepositorySystem.java:262)
	at org.kie.maven.integration.embedder.MavenProjectLoader.resolve(MavenProjectLoader.java:135)
	at org.kie.maven.integration.embedder.MavenProjectLoader.parseMavenPom(MavenProjectLoader.java:103)
	at org.kie.maven.integration.embedder.MavenProjectLoader.parseMavenPom(MavenProjectLoader.java:84)
	at org.kie.maven.integration.MavenPomModelGenerator.parse(MavenPomModelGenerator.java:34)
	at org.kie.util.maven.support.PomModel$Parser.parse(PomModel.java:110)
	at org.drools.compiler.kie.builder.impl.AbstractKieModule.getPomModel(AbstractKieModule.java:366)
	at org.drools.modelcompiler.CanonicalKieModule.getPomModel(CanonicalKieModule.java:887)
	at org.kie.scanner.MavenClassLoaderResolver.getClassLoader(MavenClassLoaderResolver.java:69)
	at org.drools.compiler.kie.builder.impl.InternalKieModule.createModuleClassLoader(InternalKieModule.java:155)
	at org.drools.modelcompiler.CanonicalKieModule.getModuleClassLoader(CanonicalKieModule.java:403)
	at org.drools.modelcompiler.CanonicalKieModule.getModuleClassLoader(CanonicalKieModule.java:107)
	at org.drools.compiler.kie.builder.impl.KieServicesImpl.newKieContainer(KieServicesImpl.java:195)
	at org.drools.compiler.kie.builder.impl.KieServicesImpl.newKieContainer(KieServicesImpl.java:178)
	at org.onap.policy.drools.core.PolicyContainer.(PolicyContainer.java:119)
	at org.onap.policy.drools.core.PolicyContainer.(PolicyContainer.java:100)
	at org.onap.policy.drools.controller.internal.MavenDroolsController.makePolicyContainer(MavenDroolsController.java:1000)
	at org.onap.policy.drools.controller.internal.MavenDroolsController.(MavenDroolsController.java:158)
	at org.onap.policy.drools.controller.IndexedDroolsControllerFactory.build(IndexedDroolsControllerFactory.java:168)
	at org.onap.policy.drools.controller.IndexedDroolsControllerFactory.build(IndexedDroolsControllerFactory.java:112)
	at org.onap.policy.drools.system.internal.AggregatedPolicyController.initDrools(AggregatedPolicyController.java:207)
	at org.onap.policy.drools.system.internal.AggregatedPolicyController.(AggregatedPolicyController.java:153)
	at org.onap.policy.drools.system.IndexedPolicyControllerFactory.newPolicyController(IndexedPolicyControllerFactory.java:398)
	at org.onap.policy.drools.system.IndexedPolicyControllerFactory.build(IndexedPolicyControllerFactory.java:79)
	at org.onap.policy.drools.system.PolicyEngineManager.createPolicyController(PolicyEngineManager.java:484)
	at org.onap.policy.drools.system.Main.createAndStartControllers(Main.java:195)
	at org.onap.policy.drools.system.Main.main(Main.java:104)
Caused by: org.eclipse.aether.transfer.ArtifactNotFoundException: Could not find artifact org.onap.policy.drools-applications.controlloop.common:rules-test:jar:3.1.0
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolve(DefaultArtifactResolver.java:415)
	... 29 common frames omitted
[2025-04-03T06:22:31.167+00:00|ERROR|MavenProjectLoader|main] Artifact can't be resolved org.onap.policy.drools-applications.controlloop.common:rules-test:jar:3.1.0:test'
[2025-04-03T06:22:31.168+00:00|INFO|MavenProjectLoader|main] Could not find artifact com.h2database:h2:jar:2.2.224
org.eclipse.aether.resolution.ArtifactResolutionException: Could not find artifact com.h2database:h2:jar:2.2.224
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolve(DefaultArtifactResolver.java:425)
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolveArtifacts(DefaultArtifactResolver.java:229)
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolveArtifact(DefaultArtifactResolver.java:207)
	at org.eclipse.aether.internal.impl.DefaultRepositorySystem.resolveArtifact(DefaultRepositorySystem.java:262)
	at org.kie.maven.integration.embedder.MavenProjectLoader.resolve(MavenProjectLoader.java:135)
	at org.kie.maven.integration.embedder.MavenProjectLoader.parseMavenPom(MavenProjectLoader.java:103)
	at org.kie.maven.integration.embedder.MavenProjectLoader.parseMavenPom(MavenProjectLoader.java:84)
	at org.kie.maven.integration.MavenPomModelGenerator.parse(MavenPomModelGenerator.java:34)
	at org.kie.util.maven.support.PomModel$Parser.parse(PomModel.java:110)
	at org.drools.compiler.kie.builder.impl.AbstractKieModule.getPomModel(AbstractKieModule.java:366)
	at org.drools.modelcompiler.CanonicalKieModule.getPomModel(CanonicalKieModule.java:887)
	at org.kie.scanner.MavenClassLoaderResolver.getClassLoader(MavenClassLoaderResolver.java:69)
	at org.drools.compiler.kie.builder.impl.InternalKieModule.createModuleClassLoader(InternalKieModule.java:155)
	at org.drools.modelcompiler.CanonicalKieModule.getModuleClassLoader(CanonicalKieModule.java:403)
	at org.drools.modelcompiler.CanonicalKieModule.getModuleClassLoader(CanonicalKieModule.java:107)
	at org.drools.compiler.kie.builder.impl.KieServicesImpl.newKieContainer(KieServicesImpl.java:195)
	at org.drools.compiler.kie.builder.impl.KieServicesImpl.newKieContainer(KieServicesImpl.java:178)
	at org.onap.policy.drools.core.PolicyContainer.(PolicyContainer.java:119)
	at org.onap.policy.drools.core.PolicyContainer.(PolicyContainer.java:100)
	at org.onap.policy.drools.controller.internal.MavenDroolsController.makePolicyContainer(MavenDroolsController.java:1000)
	at org.onap.policy.drools.controller.internal.MavenDroolsController.(MavenDroolsController.java:158)
	at org.onap.policy.drools.controller.IndexedDroolsControllerFactory.build(IndexedDroolsControllerFactory.java:168)
	at org.onap.policy.drools.controller.IndexedDroolsControllerFactory.build(IndexedDroolsControllerFactory.java:112)
	at org.onap.policy.drools.system.internal.AggregatedPolicyController.initDrools(AggregatedPolicyController.java:207)
	at org.onap.policy.drools.system.internal.AggregatedPolicyController.(AggregatedPolicyController.java:153)
	at org.onap.policy.drools.system.IndexedPolicyControllerFactory.newPolicyController(IndexedPolicyControllerFactory.java:398)
	at org.onap.policy.drools.system.IndexedPolicyControllerFactory.build(IndexedPolicyControllerFactory.java:79)
	at org.onap.policy.drools.system.PolicyEngineManager.createPolicyController(PolicyEngineManager.java:484)
	at org.onap.policy.drools.system.Main.createAndStartControllers(Main.java:195)
	at org.onap.policy.drools.system.Main.main(Main.java:104)
Caused by: org.eclipse.aether.transfer.ArtifactNotFoundException: Could not find artifact com.h2database:h2:jar:2.2.224
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolve(DefaultArtifactResolver.java:415)
	... 29 common frames omitted
[2025-04-03T06:22:31.168+00:00|ERROR|MavenProjectLoader|main] Artifact can't be resolved com.h2database:h2:jar:2.2.224:test'
[2025-04-03T06:22:31.169+00:00|INFO|MavenProjectLoader|main] Could not find artifact org.springframework:spring-test:jar:6.1.16
org.eclipse.aether.resolution.ArtifactResolutionException: Could not find artifact org.springframework:spring-test:jar:6.1.16
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolve(DefaultArtifactResolver.java:425)
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolveArtifacts(DefaultArtifactResolver.java:229)
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolveArtifact(DefaultArtifactResolver.java:207)
	at org.eclipse.aether.internal.impl.DefaultRepositorySystem.resolveArtifact(DefaultRepositorySystem.java:262)
	at org.kie.maven.integration.embedder.MavenProjectLoader.resolve(MavenProjectLoader.java:135)
	at org.kie.maven.integration.embedder.MavenProjectLoader.parseMavenPom(MavenProjectLoader.java:103)
	at org.kie.maven.integration.embedder.MavenProjectLoader.parseMavenPom(MavenProjectLoader.java:84)
	at org.kie.maven.integration.MavenPomModelGenerator.parse(MavenPomModelGenerator.java:34)
	at org.kie.util.maven.support.PomModel$Parser.parse(PomModel.java:110)
	at org.drools.compiler.kie.builder.impl.AbstractKieModule.getPomModel(AbstractKieModule.java:366)
	at org.drools.modelcompiler.CanonicalKieModule.getPomModel(CanonicalKieModule.java:887)
	at org.kie.scanner.MavenClassLoaderResolver.getClassLoader(MavenClassLoaderResolver.java:69)
	at org.drools.compiler.kie.builder.impl.InternalKieModule.createModuleClassLoader(InternalKieModule.java:155)
	at org.drools.modelcompiler.CanonicalKieModule.getModuleClassLoader(CanonicalKieModule.java:403)
	at org.drools.modelcompiler.CanonicalKieModule.getModuleClassLoader(CanonicalKieModule.java:107)
	at org.drools.compiler.kie.builder.impl.KieServicesImpl.newKieContainer(KieServicesImpl.java:195)
	at org.drools.compiler.kie.builder.impl.KieServicesImpl.newKieContainer(KieServicesImpl.java:178)
	at org.onap.policy.drools.core.PolicyContainer.(PolicyContainer.java:119)
	at org.onap.policy.drools.core.PolicyContainer.(PolicyContainer.java:100)
	at org.onap.policy.drools.controller.internal.MavenDroolsController.makePolicyContainer(MavenDroolsController.java:1000)
	at org.onap.policy.drools.controller.internal.MavenDroolsController.(MavenDroolsController.java:158)
	at org.onap.policy.drools.controller.IndexedDroolsControllerFactory.build(IndexedDroolsControllerFactory.java:168)
	at org.onap.policy.drools.controller.IndexedDroolsControllerFactory.build(IndexedDroolsControllerFactory.java:112)
	at org.onap.policy.drools.system.internal.AggregatedPolicyController.initDrools(AggregatedPolicyController.java:207)
	at org.onap.policy.drools.system.internal.AggregatedPolicyController.(AggregatedPolicyController.java:153)
	at org.onap.policy.drools.system.IndexedPolicyControllerFactory.newPolicyController(IndexedPolicyControllerFactory.java:398)
	at org.onap.policy.drools.system.IndexedPolicyControllerFactory.build(IndexedPolicyControllerFactory.java:79)
	at org.onap.policy.drools.system.PolicyEngineManager.createPolicyController(PolicyEngineManager.java:484)
	at org.onap.policy.drools.system.Main.createAndStartControllers(Main.java:195)
	at org.onap.policy.drools.system.Main.main(Main.java:104)
Caused by: org.eclipse.aether.transfer.ArtifactNotFoundException: Could not find artifact org.springframework:spring-test:jar:6.1.16
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolve(DefaultArtifactResolver.java:415)
	... 29 common frames omitted
[2025-04-03T06:22:31.169+00:00|ERROR|MavenProjectLoader|main] Artifact can't be resolved org.springframework:spring-test:jar:6.1.16:test'
[2025-04-03T06:22:31.170+00:00|INFO|MavenProjectLoader|main] Could not find artifact org.assertj:assertj-core:jar:3.25.3
org.eclipse.aether.resolution.ArtifactResolutionException: Could not find artifact org.assertj:assertj-core:jar:3.25.3
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolve(DefaultArtifactResolver.java:425)
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolveArtifacts(DefaultArtifactResolver.java:229)
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolveArtifact(DefaultArtifactResolver.java:207)
	at org.eclipse.aether.internal.impl.DefaultRepositorySystem.resolveArtifact(DefaultRepositorySystem.java:262)
	at org.kie.maven.integration.embedder.MavenProjectLoader.resolve(MavenProjectLoader.java:135)
	at org.kie.maven.integration.embedder.MavenProjectLoader.parseMavenPom(MavenProjectLoader.java:103)
	at org.kie.maven.integration.embedder.MavenProjectLoader.parseMavenPom(MavenProjectLoader.java:84)
	at org.kie.maven.integration.MavenPomModelGenerator.parse(MavenPomModelGenerator.java:34)
	at org.kie.util.maven.support.PomModel$Parser.parse(PomModel.java:110)
	at org.drools.compiler.kie.builder.impl.AbstractKieModule.getPomModel(AbstractKieModule.java:366)
	at org.drools.modelcompiler.CanonicalKieModule.getPomModel(CanonicalKieModule.java:887)
	at org.kie.scanner.MavenClassLoaderResolver.getClassLoader(MavenClassLoaderResolver.java:69)
	at org.drools.compiler.kie.builder.impl.InternalKieModule.createModuleClassLoader(InternalKieModule.java:155)
	at org.drools.modelcompiler.CanonicalKieModule.getModuleClassLoader(CanonicalKieModule.java:403)
	at org.drools.modelcompiler.CanonicalKieModule.getModuleClassLoader(CanonicalKieModule.java:107)
	at org.drools.compiler.kie.builder.impl.KieServicesImpl.newKieContainer(KieServicesImpl.java:195)
	at org.drools.compiler.kie.builder.impl.KieServicesImpl.newKieContainer(KieServicesImpl.java:178)
	at org.onap.policy.drools.core.PolicyContainer.(PolicyContainer.java:119)
	at org.onap.policy.drools.core.PolicyContainer.(PolicyContainer.java:100)
	at org.onap.policy.drools.controller.internal.MavenDroolsController.makePolicyContainer(MavenDroolsController.java:1000)
	at org.onap.policy.drools.controller.internal.MavenDroolsController.(MavenDroolsController.java:158)
	at org.onap.policy.drools.controller.IndexedDroolsControllerFactory.build(IndexedDroolsControllerFactory.java:168)
	at org.onap.policy.drools.controller.IndexedDroolsControllerFactory.build(IndexedDroolsControllerFactory.java:112)
	at org.onap.policy.drools.system.internal.AggregatedPolicyController.initDrools(AggregatedPolicyController.java:207)
	at org.onap.policy.drools.system.internal.AggregatedPolicyController.(AggregatedPolicyController.java:153)
	at org.onap.policy.drools.system.IndexedPolicyControllerFactory.newPolicyController(IndexedPolicyControllerFactory.java:398)
	at org.onap.policy.drools.system.IndexedPolicyControllerFactory.build(IndexedPolicyControllerFactory.java:79)
	at org.onap.policy.drools.system.PolicyEngineManager.createPolicyController(PolicyEngineManager.java:484)
	at org.onap.policy.drools.system.Main.createAndStartControllers(Main.java:195)
	at org.onap.policy.drools.system.Main.main(Main.java:104)
Caused by: org.eclipse.aether.transfer.ArtifactNotFoundException: Could not find artifact org.assertj:assertj-core:jar:3.25.3
	at org.eclipse.aether.internal.impl.DefaultArtifactResolver.resolve(DefaultArtifactResolver.java:415)
	... 29 common frames omitted
[2025-04-03T06:22:31.170+00:00|ERROR|MavenProjectLoader|main] Artifact can't be resolved org.assertj:assertj-core:jar:3.25.3:test'
[2025-04-03T06:22:31.423+00:00|WARN|KieBuilderImpl|main] File 'drools1.drl' is in folder '' but declares package 'org.onap.policy.drools.core'. It is advised to have a correspondance between package and folder names.
[2025-04-03T06:22:33.307+00:00|INFO|KieContainerImpl|main] Start creation of KieBase: defaultKieBase
[2025-04-03T06:22:33.415+00:00|INFO|KieContainerImpl|main] End creation of KieBase: defaultKieBase
[2025-04-03T06:22:33.415+00:00|INFO|KieContainerImpl|main] Start creation of KieBase: onap.policies.controlloop.operational.common.Drools
[2025-04-03T06:22:33.706+00:00|INFO|KieContainerImpl|main] End creation of KieBase: onap.policies.controlloop.operational.common.Drools
[2025-04-03T06:22:33.708+00:00|INFO|PolicyContainer|main] Add a new kieContainer in containers: releaseId: org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0
[2025-04-03T06:22:33.708+00:00|INFO|MavenDroolsController|main] INIT-CODERS: MavenDroolsController [policyContainer=org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:, alive=false, locked=, modelClassLoaderHash=0]
[2025-04-03T06:22:33.717+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.controlloop.util.Serialization
[2025-04-03T06:22:33.718+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.controlloop.CanonicalOnset
[2025-04-03T06:22:33.723+00:00|INFO|MultiplexorEventProtocolCoder|main] MultiplexorEventProtocolCoder(decoders=EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[], reverseCoders=[]]), encoders=EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[], reverseCoders=[]])): add-decoder org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic:org.onap.policy.controlloop.CanonicalOnset:org.onap.policy.drools.protocol.coders.JsonProtocolFilter@7866ffa:TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gson)):1493772379
[2025-04-03T06:22:33.729+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[], reverseCoders=[]]): adding coders for new org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=dcae_topic, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.controlloop.CanonicalOnset, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@7866ffa, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gson))]]
[2025-04-03T06:22:33.742+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic], reverseCoders=[]]): adding toolset for reverse key dcae_topic:org.onap.policy.controlloop.CanonicalOnset: [GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=dcae_topic, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.controlloop.CanonicalOnset, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@7866ffa, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gson))]]]
[2025-04-03T06:22:33.745+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.controlloop.CanonicalAbated
[2025-04-03T06:22:33.745+00:00|INFO|MultiplexorEventProtocolCoder|main] MultiplexorEventProtocolCoder(decoders=EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalOnset]]), encoders=EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[], reverseCoders=[]])): add-decoder org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic:org.onap.policy.controlloop.CanonicalAbated:org.onap.policy.drools.protocol.coders.JsonProtocolFilter@7daf167:TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gson)):1493772379
[2025-04-03T06:22:33.745+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalOnset]]): adding coders for existing org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=dcae_topic, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.controlloop.CanonicalOnset, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@7866ffa, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gson))]]
[2025-04-03T06:22:33.746+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalOnset]]): adding new reverse coders (multiple classes case) for dcae_topic:org.onap.policy.controlloop.CanonicalAbated:org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=dcae_topic, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.controlloop.CanonicalOnset, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@7866ffa, modelClassLoaderHash=1493772379], CoderFilters [factClass=org.onap.policy.controlloop.CanonicalAbated, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@7daf167, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gson))]]
[2025-04-03T06:22:33.747+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.appc.util.Serialization
[2025-04-03T06:22:33.748+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.appc.Response
[2025-04-03T06:22:33.752+00:00|INFO|MultiplexorEventProtocolCoder|main] MultiplexorEventProtocolCoder(decoders=EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalAbated, dcae_topic:org.onap.policy.controlloop.CanonicalOnset]]), encoders=EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[], reverseCoders=[]])): add-decoder org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl:org.onap.policy.appc.Response:org.onap.policy.drools.protocol.coders.JsonProtocolFilter@6408a8ac:TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appc.util.Serialization, staticCoderField=gsonPretty)):1493772379
[2025-04-03T06:22:33.754+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalAbated, dcae_topic:org.onap.policy.controlloop.CanonicalOnset]]): adding coders for new org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=appc-cl, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.appc.Response, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@6408a8ac, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appc.util.Serialization, staticCoderField=gsonPretty))]]
[2025-04-03T06:22:33.755+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalAbated, dcae_topic:org.onap.policy.controlloop.CanonicalOnset]]): adding toolset for reverse key appc-cl:org.onap.policy.appc.Response: [GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=appc-cl, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.appc.Response, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@6408a8ac, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appc.util.Serialization, staticCoderField=gsonPretty))]]]
[2025-04-03T06:22:33.755+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.appclcm.util.Serialization
[2025-04-03T06:22:33.755+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.appclcm.AppcLcmMessageWrapper
[2025-04-03T06:22:33.755+00:00|INFO|MultiplexorEventProtocolCoder|main] MultiplexorEventProtocolCoder(decoders=EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalAbated, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]), encoders=EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[], reverseCoders=[]])): add-decoder org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write:org.onap.policy.appclcm.AppcLcmMessageWrapper:org.onap.policy.drools.protocol.coders.JsonProtocolFilter@58fadccb:TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appclcm.util.Serialization, staticCoderField=gson)):1493772379
[2025-04-03T06:22:33.756+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalAbated, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]): adding coders for new org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=appc-lcm-write, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.appclcm.AppcLcmMessageWrapper, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@58fadccb, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appclcm.util.Serialization, staticCoderField=gson))]]
[2025-04-03T06:22:33.756+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalAbated, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]): adding toolset for reverse key appc-lcm-write:org.onap.policy.appclcm.AppcLcmMessageWrapper: [GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=appc-lcm-write, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.appclcm.AppcLcmMessageWrapper, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@58fadccb, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appclcm.util.Serialization, staticCoderField=gson))]]]
[2025-04-03T06:22:33.759+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.sdnr.util.Serialization
[2025-04-03T06:22:33.759+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.sdnr.PciResponseWrapper
[2025-04-03T06:22:33.759+00:00|INFO|MultiplexorEventProtocolCoder|main] MultiplexorEventProtocolCoder(decoders=EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalAbated, appc-lcm-write:org.onap.policy.appclcm.AppcLcmMessageWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]), encoders=EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[], reverseCoders=[]])): add-decoder org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl-rsp:org.onap.policy.sdnr.PciResponseWrapper:org.onap.policy.drools.protocol.coders.JsonProtocolFilter@75693526:TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.sdnr.util.Serialization, staticCoderField=gson)):1493772379
[2025-04-03T06:22:33.760+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalAbated, appc-lcm-write:org.onap.policy.appclcm.AppcLcmMessageWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]): adding coders for new org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl-rsp: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=sdnr-cl-rsp, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl-rsp, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.sdnr.PciResponseWrapper, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@75693526, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.sdnr.util.Serialization, staticCoderField=gson))]]
[2025-04-03T06:22:33.760+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl-rsp, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write], reverseCoders=[dcae_topic:org.onap.policy.controlloop.CanonicalAbated, appc-lcm-write:org.onap.policy.appclcm.AppcLcmMessageWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]): adding toolset for reverse key sdnr-cl-rsp:org.onap.policy.sdnr.PciResponseWrapper: [GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=sdnr-cl-rsp, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl-rsp, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.sdnr.PciResponseWrapper, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@75693526, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.sdnr.util.Serialization, staticCoderField=gson))]]]
[2025-04-03T06:22:33.760+00:00|INFO|MavenDroolsController|main] INIT-CODERS: MavenDroolsController [policyContainer=org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:, alive=false, locked=, modelClassLoaderHash=0]
[2025-04-03T06:22:33.760+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.appc.util.Serialization
[2025-04-03T06:22:33.760+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.appc.Request
[2025-04-03T06:22:33.760+00:00|INFO|MultiplexorEventProtocolCoder|main] MultiplexorEventProtocolCoder(decoders=EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl-rsp, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write], reverseCoders=[sdnr-cl-rsp:org.onap.policy.sdnr.PciResponseWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalAbated, appc-lcm-write:org.onap.policy.appclcm.AppcLcmMessageWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]), encoders=EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[], reverseCoders=[]])): add-decoder org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl:org.onap.policy.appc.Request:org.onap.policy.drools.protocol.coders.JsonProtocolFilter@39a1c200:TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appc.util.Serialization, staticCoderField=gsonPretty)):1493772379
[2025-04-03T06:22:33.760+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[], reverseCoders=[]]): adding coders for new org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=appc-cl, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.appc.Request, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@39a1c200, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appc.util.Serialization, staticCoderField=gsonPretty))]]
[2025-04-03T06:22:33.761+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[]]): adding toolset for reverse key appc-cl:org.onap.policy.appc.Request: [GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=appc-cl, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.appc.Request, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@39a1c200, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appc.util.Serialization, staticCoderField=gsonPretty))]]]
[2025-04-03T06:22:33.761+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.appclcm.util.Serialization
[2025-04-03T06:22:33.761+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.appclcm.AppcLcmMessageWrapper
[2025-04-03T06:22:33.761+00:00|INFO|MultiplexorEventProtocolCoder|main] MultiplexorEventProtocolCoder(decoders=EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl-rsp, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write], reverseCoders=[sdnr-cl-rsp:org.onap.policy.sdnr.PciResponseWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalAbated, appc-lcm-write:org.onap.policy.appclcm.AppcLcmMessageWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]), encoders=EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-cl:org.onap.policy.appc.Request]])): add-decoder org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper:org.onap.policy.drools.protocol.coders.JsonProtocolFilter@603a34e5:TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appclcm.util.Serialization, staticCoderField=gson)):1493772379
[2025-04-03T06:22:33.762+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-cl:org.onap.policy.appc.Request]]): adding coders for new org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=appc-lcm-read, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.appclcm.AppcLcmMessageWrapper, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@603a34e5, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appclcm.util.Serialization, staticCoderField=gson))]]
[2025-04-03T06:22:33.762+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-cl:org.onap.policy.appc.Request]]): adding toolset for reverse key appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper: [GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=appc-lcm-read, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.appclcm.AppcLcmMessageWrapper, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@603a34e5, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.appclcm.util.Serialization, staticCoderField=gson))]]]
[2025-04-03T06:22:33.762+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.controlloop.util.Serialization
[2025-04-03T06:22:33.762+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.controlloop.VirtualControlLoopNotification
[2025-04-03T06:22:33.763+00:00|INFO|MultiplexorEventProtocolCoder|main] MultiplexorEventProtocolCoder(decoders=EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl-rsp, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write], reverseCoders=[sdnr-cl-rsp:org.onap.policy.sdnr.PciResponseWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalAbated, appc-lcm-write:org.onap.policy.appclcm.AppcLcmMessageWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]), encoders=EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper, appc-cl:org.onap.policy.appc.Request]])): add-decoder org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt:org.onap.policy.controlloop.VirtualControlLoopNotification:org.onap.policy.drools.protocol.coders.JsonProtocolFilter@1d77d9c6:TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gsonPretty)):1493772379
[2025-04-03T06:22:33.763+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper, appc-cl:org.onap.policy.appc.Request]]): adding coders for new org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=policy-cl-mgt, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.controlloop.VirtualControlLoopNotification, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@1d77d9c6, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gsonPretty))]]
[2025-04-03T06:22:33.763+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper, appc-cl:org.onap.policy.appc.Request]]): adding toolset for reverse key policy-cl-mgt:org.onap.policy.controlloop.VirtualControlLoopNotification: [GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=policy-cl-mgt, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.controlloop.VirtualControlLoopNotification, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@1d77d9c6, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gsonPretty))]]]
[2025-04-03T06:22:33.764+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.sdnr.util.Serialization
[2025-04-03T06:22:33.765+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.sdnr.PciRequestWrapper
[2025-04-03T06:22:33.765+00:00|INFO|MultiplexorEventProtocolCoder|main] MultiplexorEventProtocolCoder(decoders=EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl-rsp, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write], reverseCoders=[sdnr-cl-rsp:org.onap.policy.sdnr.PciResponseWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalAbated, appc-lcm-write:org.onap.policy.appclcm.AppcLcmMessageWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]), encoders=EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper, appc-cl:org.onap.policy.appc.Request, policy-cl-mgt:org.onap.policy.controlloop.VirtualControlLoopNotification]])): add-decoder org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl:org.onap.policy.sdnr.PciRequestWrapper:org.onap.policy.drools.protocol.coders.JsonProtocolFilter@55589ef5:TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.sdnr.util.Serialization, staticCoderField=gson)):1493772379
[2025-04-03T06:22:33.765+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper, appc-cl:org.onap.policy.appc.Request, policy-cl-mgt:org.onap.policy.controlloop.VirtualControlLoopNotification]]): adding coders for new org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=sdnr-cl, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.sdnr.PciRequestWrapper, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@55589ef5, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.sdnr.util.Serialization, staticCoderField=gson))]]
[2025-04-03T06:22:33.765+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper, appc-cl:org.onap.policy.appc.Request, policy-cl-mgt:org.onap.policy.controlloop.VirtualControlLoopNotification]]): adding toolset for reverse key sdnr-cl:org.onap.policy.sdnr.PciRequestWrapper: [GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=sdnr-cl, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.sdnr.PciRequestWrapper, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@55589ef5, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.sdnr.util.Serialization, staticCoderField=gson))]]]
[2025-04-03T06:22:33.766+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.controlloop.util.Serialization
[2025-04-03T06:22:33.766+00:00|INFO|MavenDroolsController|main] CLASS FETCHED org.onap.policy.controlloop.ControlLoopResponse
[2025-04-03T06:22:33.766+00:00|INFO|MultiplexorEventProtocolCoder|main] MultiplexorEventProtocolCoder(decoders=EventProtocolDecoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_topic, org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl-rsp, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-write], reverseCoders=[sdnr-cl-rsp:org.onap.policy.sdnr.PciResponseWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalAbated, appc-lcm-write:org.onap.policy.appclcm.AppcLcmMessageWrapper, dcae_topic:org.onap.policy.controlloop.CanonicalOnset, appc-cl:org.onap.policy.appc.Response]]), encoders=EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper, appc-cl:org.onap.policy.appc.Request, policy-cl-mgt:org.onap.policy.controlloop.VirtualControlLoopNotification, sdnr-cl:org.onap.policy.sdnr.PciRequestWrapper]])): add-decoder org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_cl_rsp:org.onap.policy.controlloop.ControlLoopResponse:org.onap.policy.drools.protocol.coders.JsonProtocolFilter@793248d:TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gsonPretty)):1493772379
[2025-04-03T06:22:33.767+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper, appc-cl:org.onap.policy.appc.Request, policy-cl-mgt:org.onap.policy.controlloop.VirtualControlLoopNotification, sdnr-cl:org.onap.policy.sdnr.PciRequestWrapper]]): adding coders for new org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_cl_rsp: GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=dcae_cl_rsp, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_cl_rsp, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.controlloop.ControlLoopResponse, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@793248d, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gsonPretty))]]
[2025-04-03T06:22:33.767+00:00|INFO|GenericEventProtocolCoder|main] EventProtocolEncoder(super=GenericEventProtocolCoder [coders=[org.onap.policy.drools-applications.controlloop.common:controller-usecases:sdnr-cl, org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_cl_rsp, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-lcm-read, org.onap.policy.drools-applications.controlloop.common:controller-usecases:policy-cl-mgt, org.onap.policy.drools-applications.controlloop.common:controller-usecases:appc-cl], reverseCoders=[appc-lcm-read:org.onap.policy.appclcm.AppcLcmMessageWrapper, appc-cl:org.onap.policy.appc.Request, policy-cl-mgt:org.onap.policy.controlloop.VirtualControlLoopNotification, sdnr-cl:org.onap.policy.sdnr.PciRequestWrapper]]): adding toolset for reverse key dcae_cl_rsp:org.onap.policy.controlloop.ControlLoopResponse: [GsonProtocolCoderToolset [toString()=ProtocolCoderToolset [topic=dcae_cl_rsp, controllerId=org.onap.policy.drools-applications.controlloop.common:controller-usecases:dcae_cl_rsp, groupId=org.onap.policy.drools-applications.controlloop.common, artifactId=controller-usecases, coders=[CoderFilters [factClass=org.onap.policy.controlloop.ControlLoopResponse, filter=org.onap.policy.drools.protocol.coders.JsonProtocolFilter@793248d, modelClassLoaderHash=1493772379]], customCoder=TopicCoderFilterConfiguration.CustomGsonCoder(super=TopicCoderFilterConfiguration.CustomCoder(classContainer=org.onap.policy.controlloop.util.Serialization, staticCoderField=gsonPretty))]]]
[2025-04-03T06:22:33.772+00:00|INFO|FileSystemPersistence|main] FileSystemPersistence(configurationPath=config): noop: a properties file with the same contents exists for controller usecases.
[2025-04-03T06:22:33.775+00:00|INFO|AggregatedPolicyController|main] AggregatedPolicyController(name=usecases, alive=false, locked=false, droolsController=MavenDroolsController [policyContainer=org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:, alive=false, locked=, modelClassLoaderHash=1493772379]): start
[2025-04-03T06:22:33.783+00:00|INFO|MavenDroolsController|main] START: MavenDroolsController [policyContainer=org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:, alive=false, locked=, modelClassLoaderHash=1493772379]
[2025-04-03T06:22:33.784+00:00|INFO|PolicyContainer|main] activatePolicySession:name :usecases
[2025-04-03T06:22:33.888+00:00|INFO|PolicyContainer|main] activatePolicySession:new session was added in sessions with name usecases
[2025-04-03T06:22:33.889+00:00|INFO|PolicyContainer|main] activatePolicySession:session - org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases is returned.
[2025-04-03T06:22:33.890+00:00|INFO|PolicySession|main] starting ThreadModel for session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases
[2025-04-03T06:22:33.890+00:00|INFO|TopicBase|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=dcae.policy.shared, consumerInstance=6c44c261-9407-4e5e-973c-22b964f9c7fb, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-dcae_topic,5,main], topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=dcae_topic, effectiveTopic=unauthenticated.dcae_cl_output, #recentEvents=0, locked=false, #topicListeners=0]]]]: registering AggregatedPolicyController(name=usecases, alive=true, locked=false, droolsController=MavenDroolsController [policyContainer=org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:, alive=true, locked=, modelClassLoaderHash=1493772379])
[2025-04-03T06:22:33.890+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=dcae.policy.shared, consumerInstance=6c44c261-9407-4e5e-973c-22b964f9c7fb, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-dcae_topic,5,main], topicListeners=1, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=dcae_topic, effectiveTopic=unauthenticated.dcae_cl_output, #recentEvents=0, locked=false, #topicListeners=1]]]]: register: start not attempted
[2025-04-03T06:22:33.891+00:00|INFO|TopicBase|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=d796aaba-f3c2-4be1-948f-a7d9927be426, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-appc-cl,5,main], topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=appc-cl, effectiveTopic=appc-cl, #recentEvents=0, locked=false, #topicListeners=0]]]]: registering AggregatedPolicyController(name=usecases, alive=true, locked=false, droolsController=MavenDroolsController [policyContainer=org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:, alive=true, locked=, modelClassLoaderHash=1493772379])
[2025-04-03T06:22:33.891+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=d796aaba-f3c2-4be1-948f-a7d9927be426, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-appc-cl,5,main], topicListeners=1, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=appc-cl, effectiveTopic=appc-cl, #recentEvents=0, locked=false, #topicListeners=1]]]]: register: start not attempted
[2025-04-03T06:22:33.891+00:00|INFO|TopicBase|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=b603c080-b941-4804-abf5-9b80891b6c5c, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-appc-lcm-write,5,main], topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=appc-lcm-write, effectiveTopic=appc-lcm-write, #recentEvents=0, locked=false, #topicListeners=0]]]]: registering AggregatedPolicyController(name=usecases, alive=true, locked=false, droolsController=MavenDroolsController [policyContainer=org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:, alive=true, locked=, modelClassLoaderHash=1493772379])
[2025-04-03T06:22:33.891+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=b603c080-b941-4804-abf5-9b80891b6c5c, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-appc-lcm-write,5,main], topicListeners=1, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=appc-lcm-write, effectiveTopic=appc-lcm-write, #recentEvents=0, locked=false, #topicListeners=1]]]]: register: start not attempted
[2025-04-03T06:22:33.891+00:00|INFO|TopicBase|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=a3da4d9a-0ee1-4ced-b9c8-2ea6690af92a, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-sdnr-cl-rsp,5,main], topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=sdnr-cl-rsp, effectiveTopic=sdnr-cl-rsp, #recentEvents=0, locked=false, #topicListeners=0]]]]: registering AggregatedPolicyController(name=usecases, alive=true, locked=false, droolsController=MavenDroolsController [policyContainer=org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:, alive=true, locked=, modelClassLoaderHash=1493772379])
[2025-04-03T06:22:33.891+00:00|INFO|SingleThreadedBusTopicSource|main] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=a3da4d9a-0ee1-4ced-b9c8-2ea6690af92a, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-sdnr-cl-rsp,5,main], topicListeners=1, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=sdnr-cl-rsp, effectiveTopic=sdnr-cl-rsp, #recentEvents=0, locked=false, #topicListeners=1]]]]: register: start not attempted
[2025-04-03T06:22:33.892+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=4075b72a-29f3-4c96-b524-3d33ab0b1ed6, alive=true, publisher=KafkaPublisherWrapper []]]: starting
[2025-04-03T06:22:33.892+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=0b45c7b0-36ce-45c0-a498-15bde764e359, alive=true, publisher=KafkaPublisherWrapper []]]: starting
[2025-04-03T06:22:33.892+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=5d237110-2e73-436d-8c12-7fbecba255eb, alive=true, publisher=KafkaPublisherWrapper []]]: starting
[2025-04-03T06:22:33.892+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=c22b2546-18e7-4629-9ed5-bebf6cfe84fe, alive=true, publisher=KafkaPublisherWrapper []]]: starting
[2025-04-03T06:22:33.892+00:00|INFO|InlineBusTopicSink|main] InlineKafkaTopicSink [getTopicCommInfrastructure()=KAFKA, toString()=InlineBusTopicSink [partitionId=620babfb-8e69-4952-96d2-7a0337264ce0, alive=true, publisher=KafkaPublisherWrapper []]]: starting
[2025-04-03T06:22:33.893+00:00|INFO|LifecycleFsm|main] lifecycle event: start controller: usecases
[2025-04-03T06:22:33.895+00:00|INFO|LifecycleFsm|main] policy-type onap.policies.controlloop.operational.common.Drools 1.0.0 added
[2025-04-03T06:22:33.896+00:00|INFO|MdcTransactionImpl|main] 
eae1f23d-6a13-4bc4-93b9-65bcc68b2175||Main|PDP-D|2025-04-03T06:22:22.611+00:00|2025-04-03T06:22:33.896+00:00|null||onap-policy-drools-pdp-0|COMPLETE||[org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases]|||controller:usecases|start|onap-policy-drools-pdp-0||onap-policy-drools-pdp-0||||||INFO|main| 
[2025-04-03T06:22:33.899+00:00|INFO|JettyServletServer|main] JettyJerseyServer [Jerseyservlets={/*=org.glassfish.jersey.servlet.ServletContainer-107f4980==org.glassfish.jersey.servlet.ServletContainer@9cfa739{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}}, swaggerId=swagger-6968, toString()=JettyServletServer(name=LIVENESS, host=0.0.0.0, port=6968, sniHostCheck=false, user=null, password=null, contextPath=/, jettyServer=Server@193d73d3{STOPPED}[11.0.24,sto=0], context=o.e.j.s.ServletContextHandler@5cb4ba80{/,null,STOPPED}, connector=LIVENESS@1abfe081{HTTP/1.1, (http/1.1)}{0.0.0.0:6968}, jettyThread=null, servlets={/*=org.glassfish.jersey.servlet.ServletContainer-107f4980==org.glassfish.jersey.servlet.ServletContainer@9cfa739{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}})]: STARTING
[2025-04-03T06:22:33.905+00:00|INFO|Main|main] Started policy-drools-pdp service successfully.
[2025-04-03T06:22:33.906+00:00|INFO|JettyServletServer|LIVENESS-6968] JettyJerseyServer [Jerseyservlets={/*=org.glassfish.jersey.servlet.ServletContainer-107f4980==org.glassfish.jersey.servlet.ServletContainer@9cfa739{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}}, swaggerId=swagger-6968, toString()=JettyServletServer(name=LIVENESS, host=0.0.0.0, port=6968, sniHostCheck=false, user=null, password=null, contextPath=/, jettyServer=Server@193d73d3{STOPPED}[11.0.24,sto=0], context=o.e.j.s.ServletContextHandler@5cb4ba80{/,null,STOPPED}, connector=LIVENESS@1abfe081{HTTP/1.1, (http/1.1)}{0.0.0.0:6968}, jettyThread=Thread[LIVENESS-6968,5,main], servlets={/*=org.glassfish.jersey.servlet.ServletContainer-107f4980==org.glassfish.jersey.servlet.ServletContainer@9cfa739{jsp=null,order=0,inst=false,async=true,src=EMBEDDED:null,STOPPED}})]: STARTING
[2025-04-03T06:22:33.907+00:00|INFO|Server|LIVENESS-6968] jetty-11.0.24; built: 2024-08-26T18:11:22.448Z; git: 5dfc59a691b748796f922208956bd1f2794bcd16; jvm 17.0.13+11-alpine-r0
[2025-04-03T06:22:33.921+00:00|INFO|DefaultSessionIdManager|LIVENESS-6968] Session workerName=node0
[2025-04-03T06:22:33.922+00:00|INFO|controlloop|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] CREATE.EVENT.SERVICES
[2025-04-03T06:22:34.026+00:00|WARN|ActorService|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] duplicate actor names for APPC: AppcLcmActor, ignoring AppcActor
[2025-04-03T06:22:34.034+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing actors
[2025-04-03T06:22:34.035+00:00|INFO|ActorService|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] configuring actors
[2025-04-03T06:22:34.038+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing SDNC
[2025-04-03T06:22:34.038+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] configuring operations for actor SDNC
[2025-04-03T06:22:34.045+00:00|INFO|GsonMessageBodyHandler|LIVENESS-6968] Using GSON for REST calls
[2025-04-03T06:22:34.045+00:00|INFO|JacksonHandler|LIVENESS-6968] Using GSON with Jackson behaviors for REST calls
[2025-04-03T06:22:34.045+00:00|INFO|YamlMessageBodyHandler|LIVENESS-6968] Accepting YAML for REST calls
[2025-04-03T06:22:34.081+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing SDNC.BandwidthOnDemand
[2025-04-03T06:22:34.087+00:00|INFO|ContextHandler|LIVENESS-6968] Started o.e.j.s.ServletContextHandler@5cb4ba80{/,null,AVAILABLE}
[2025-04-03T06:22:34.088+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing SDNC.Reroute
[2025-04-03T06:22:34.088+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing A1P
[2025-04-03T06:22:34.088+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] configuring operations for actor A1P
[2025-04-03T06:22:34.090+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing A1P.any
[2025-04-03T06:22:34.092+00:00|INFO|AbstractConnector|LIVENESS-6968] Started LIVENESS@1abfe081{HTTP/1.1, (http/1.1)}{0.0.0.0:6968}
[2025-04-03T06:22:34.092+00:00|INFO|Server|LIVENESS-6968] Started Server@193d73d3{STARTING}[11.0.24,sto=0] @21805ms
[2025-04-03T06:22:34.099+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing VFC
[2025-04-03T06:22:34.099+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] configuring operations for actor VFC
[2025-04-03T06:22:34.100+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing VFC.Restart
[2025-04-03T06:22:34.103+00:00|WARN|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] failed to configure operation VFC.Restart
java.lang.IllegalArgumentException: Http Client VFC not found
	at org.onap.policy.common.endpoints.http.client.IndexedHttpClientFactory.get(IndexedHttpClientFactory.java:130)
	at org.onap.policy.controlloop.actorserviceprovider.parameters.HttpConfig.(HttpConfig.java:57)
	at org.onap.policy.controlloop.actorserviceprovider.parameters.HttpPollingConfig.(HttpPollingConfig.java:60)
	at org.onap.policy.controlloop.actorserviceprovider.impl.HttpPollingOperator.makeConfiguration(HttpPollingOperator.java:73)
	at org.onap.policy.controlloop.actorserviceprovider.impl.HttpPollingOperator.makeConfiguration(HttpPollingOperator.java:36)
	at org.onap.policy.controlloop.actorserviceprovider.impl.TypedOperator.doConfigure(TypedOperator.java:75)
	at org.onap.policy.controlloop.actorserviceprovider.impl.TypedOperator.doConfigure(TypedOperator.java:34)
	at org.onap.policy.controlloop.actorserviceprovider.impl.StartConfigPartial.configure(StartConfigPartial.java:80)
	at org.onap.policy.controlloop.actorserviceprovider.impl.ActorImpl.doConfigure(ActorImpl.java:135)
	at org.onap.policy.controlloop.actorserviceprovider.impl.ActorImpl.doConfigure(ActorImpl.java:39)
	at org.onap.policy.controlloop.actorserviceprovider.impl.StartConfigPartial.configure(StartConfigPartial.java:80)
	at org.onap.policy.controlloop.actorserviceprovider.ActorService.doConfigure(ActorService.java:150)
	at org.onap.policy.controlloop.actorserviceprovider.ActorService.doConfigure(ActorService.java:46)
	at org.onap.policy.controlloop.actorserviceprovider.impl.StartConfigPartial.configure(StartConfigPartial.java:80)
	at org.onap.policy.controlloop.eventmanager.EventManagerServices.startActorService(EventManagerServices.java:88)
	at org.onap.policy.controlloop.eventmanager.EventManagerServices.(EventManagerServices.java:64)
	at org.onap.policy.controlloop.PF7.LambdaConsequenceF7CF8FADFBF703482B96F6F02FA00BFA.execute(LambdaConsequenceF7CF8FADFBF703482B96F6F02FA00BFA.java:51)
	at org.onap.policy.controlloop.PF7.LambdaConsequenceF7CF8FADFBF703482B96F6F02FA00BFA.execute(LambdaConsequenceF7CF8FADFBF703482B96F6F02FA00BFA.java:1)
	at org.drools.model.functions.Block1$Impl.execute(Block1.java:40)
	at org.drools.modelcompiler.consequence.LambdaConsequence.evaluate(LambdaConsequence.java:69)
	at org.drools.modelcompiler.consequence.LambdaConsequence.evaluate(LambdaConsequence.java:35)
	at org.drools.core.phreak.RuleExecutor.fireActivationEvent(RuleExecutor.java:406)
	at org.drools.core.phreak.RuleExecutor.fireActivation(RuleExecutor.java:366)
	at org.drools.core.phreak.RuleExecutor.fire(RuleExecutor.java:156)
	at org.drools.core.phreak.RuleExecutor.evaluateNetworkAndFire(RuleExecutor.java:108)
	at org.drools.core.concurrent.AbstractRuleEvaluator.internalEvaluateAndFire(AbstractRuleEvaluator.java:33)
	at org.drools.core.concurrent.SequentialRuleEvaluator.evaluateAndFire(SequentialRuleEvaluator.java:43)
	at org.drools.kiesession.agenda.DefaultAgenda.fireLoop(DefaultAgenda.java:698)
	at org.drools.kiesession.agenda.DefaultAgenda.internalFireUntilHalt(DefaultAgenda.java:623)
	at org.drools.kiesession.agenda.DefaultAgenda.fireUntilHalt(DefaultAgenda.java:613)
	at org.drools.kiesession.session.StatefulKnowledgeSessionImpl.fireUntilHalt(StatefulKnowledgeSessionImpl.java:1130)
	at org.drools.kiesession.session.StatefulKnowledgeSessionImpl.fireUntilHalt(StatefulKnowledgeSessionImpl.java:1109)
	at org.onap.policy.drools.core.PolicySession$DefaultThreadModel.run(PolicySession.java:479)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:22:34.103+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing SDNR
[2025-04-03T06:22:34.103+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] configuring operations for actor SDNR
[2025-04-03T06:22:34.104+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing SDNR.any
[2025-04-03T06:22:34.105+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing CDS
[2025-04-03T06:22:34.105+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] configuring operations for actor CDS
[2025-04-03T06:22:34.106+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing CDS.any
[2025-04-03T06:22:34.111+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing AAI
[2025-04-03T06:22:34.111+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] configuring operations for actor AAI
[2025-04-03T06:22:34.112+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing AAI.Tenant
[2025-04-03T06:22:34.113+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing AAI.CustomQuery
[2025-04-03T06:22:34.113+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing AAI.Pnf
[2025-04-03T06:22:34.114+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing SO
[2025-04-03T06:22:34.114+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] configuring operations for actor SO
[2025-04-03T06:22:34.115+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing SO.VF Module Create
[2025-04-03T06:22:34.116+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing SO.Modify NSSI
[2025-04-03T06:22:34.117+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing SO.VF Module Delete
[2025-04-03T06:22:34.117+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing SO.ModifyCloudLeasedLine
[2025-04-03T06:22:34.118+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing APPC
[2025-04-03T06:22:34.118+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] configuring operations for actor APPC
[2025-04-03T06:22:34.119+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing APPC.ConfigModify
[2025-04-03T06:22:34.120+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing APPC.ModifyConfig
[2025-04-03T06:22:34.120+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing APPC.Migrate
[2025-04-03T06:22:34.121+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing APPC.Restart
[2025-04-03T06:22:34.121+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing APPC.Rebuild
[2025-04-03T06:22:34.122+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing XACML
[2025-04-03T06:22:34.122+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] configuring operations for actor XACML
[2025-04-03T06:22:34.124+00:00|WARN|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] missing configuration parameters for operation XACML.Configure; operation cannot be started
[2025-04-03T06:22:34.124+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] initializing XACML.Guard
[2025-04-03T06:22:34.129+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting actors
[2025-04-03T06:22:34.129+00:00|INFO|ActorService|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting actors
[2025-04-03T06:22:34.129+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting SDNC
[2025-04-03T06:22:34.129+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting operations for actor SDNC
[2025-04-03T06:22:34.130+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting SDNC.BandwidthOnDemand
[2025-04-03T06:22:34.130+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting SDNC.Reroute
[2025-04-03T06:22:34.130+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting A1P
[2025-04-03T06:22:34.131+00:00|INFO|TopicBase|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=cf14034c-73c9-4da7-a250-224601c4dddc, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-a1-p-rsp,5,main], topicListeners=0, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=a1-p-rsp, effectiveTopic=a1-p-rsp, #recentEvents=0, locked=false, #topicListeners=0]]]]: registering org.onap.policy.controlloop.actorserviceprovider.topic.TopicListenerImpl@4f52612
[2025-04-03T06:22:34.132+00:00|INFO|SingleThreadedBusTopicSource|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=cf14034c-73c9-4da7-a250-224601c4dddc, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-a1-p-rsp,5,main], topicListeners=1, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=a1-p-rsp, effectiveTopic=a1-p-rsp, #recentEvents=0, locked=false, #topicListeners=1]]]]: register: start not attempted
[2025-04-03T06:22:34.132+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting operations for actor A1P
[2025-04-03T06:22:34.132+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting A1P.any
[2025-04-03T06:22:34.132+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting VFC
[2025-04-03T06:22:34.132+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting operations for actor VFC
[2025-04-03T06:22:34.132+00:00|WARN|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] not starting unconfigured operation VFC.Restart
[2025-04-03T06:22:34.132+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting SDNR
[2025-04-03T06:22:34.133+00:00|INFO|TopicBase|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=a3da4d9a-0ee1-4ced-b9c8-2ea6690af92a, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-sdnr-cl-rsp,5,main], topicListeners=1, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=sdnr-cl-rsp, effectiveTopic=sdnr-cl-rsp, #recentEvents=0, locked=false, #topicListeners=1]]]]: registering org.onap.policy.controlloop.actorserviceprovider.topic.TopicListenerImpl@7ba479b7
[2025-04-03T06:22:34.133+00:00|INFO|SingleThreadedBusTopicSource|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=a3da4d9a-0ee1-4ced-b9c8-2ea6690af92a, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-sdnr-cl-rsp,5,main], topicListeners=2, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=sdnr-cl-rsp, effectiveTopic=sdnr-cl-rsp, #recentEvents=0, locked=false, #topicListeners=2]]]]: register: start not attempted
[2025-04-03T06:22:34.133+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting operations for actor SDNR
[2025-04-03T06:22:34.133+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting SDNR.any
[2025-04-03T06:22:34.133+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting CDS
[2025-04-03T06:22:34.133+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting operations for actor CDS
[2025-04-03T06:22:34.133+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting CDS.any
[2025-04-03T06:22:34.134+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting AAI
[2025-04-03T06:22:34.134+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting operations for actor AAI
[2025-04-03T06:22:34.134+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting AAI.Tenant
[2025-04-03T06:22:34.134+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting AAI.CustomQuery
[2025-04-03T06:22:34.134+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting AAI.Pnf
[2025-04-03T06:22:34.134+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting SO
[2025-04-03T06:22:34.134+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting operations for actor SO
[2025-04-03T06:22:34.134+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting SO.VF Module Create
[2025-04-03T06:22:34.134+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting SO.Modify NSSI
[2025-04-03T06:22:34.134+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting SO.VF Module Delete
[2025-04-03T06:22:34.135+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting SO.ModifyCloudLeasedLine
[2025-04-03T06:22:34.135+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting APPC
[2025-04-03T06:22:34.135+00:00|INFO|TopicBase|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=d796aaba-f3c2-4be1-948f-a7d9927be426, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-appc-cl,5,main], topicListeners=1, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=appc-cl, effectiveTopic=appc-cl, #recentEvents=0, locked=false, #topicListeners=1]]]]: registering org.onap.policy.controlloop.actorserviceprovider.topic.TopicListenerImpl@47a97a98
[2025-04-03T06:22:34.135+00:00|INFO|SingleThreadedBusTopicSource|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=d796aaba-f3c2-4be1-948f-a7d9927be426, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-appc-cl,5,main], topicListeners=2, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=appc-cl, effectiveTopic=appc-cl, #recentEvents=0, locked=false, #topicListeners=2]]]]: register: start not attempted
[2025-04-03T06:22:34.135+00:00|INFO|TopicBase|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=b603c080-b941-4804-abf5-9b80891b6c5c, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-appc-lcm-write,5,main], topicListeners=1, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=appc-lcm-write, effectiveTopic=appc-lcm-write, #recentEvents=0, locked=false, #topicListeners=1]]]]: registering org.onap.policy.controlloop.actorserviceprovider.topic.TopicListenerImpl@736abb05
[2025-04-03T06:22:34.135+00:00|INFO|SingleThreadedBusTopicSource|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] SingleThreadedKafkaTopicSource [getTopicCommInfrastructure()=KAFKA, toString()=SingleThreadedBusTopicSource [consumerGroup=b603c080-b941-4804-abf5-9b80891b6c5c, consumerInstance=onap-policy-drools-pdp-0, fetchTimeout=15000, fetchLimit=100, consumer=KafkaConsumerWrapper [fetchTimeout=15000], alive=true, locked=false, uebThread=Thread[KAFKA-source-appc-lcm-write,5,main], topicListeners=2, toString()=BusTopicBase [apiKey=null, apiSecret=null, useHttps=false, allowSelfSignedCerts=false, toString()=TopicBase [servers=[onap-strimzi-kafka-bootstrap:9092], topic=appc-lcm-write, effectiveTopic=appc-lcm-write, #recentEvents=0, locked=false, #topicListeners=2]]]]: register: start not attempted
[2025-04-03T06:22:34.135+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting operations for actor APPC
[2025-04-03T06:22:34.136+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting APPC.ConfigModify
[2025-04-03T06:22:34.136+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting APPC.ModifyConfig
[2025-04-03T06:22:34.136+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting APPC.Migrate
[2025-04-03T06:22:34.136+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting APPC.Restart
[2025-04-03T06:22:34.136+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting APPC.Rebuild
[2025-04-03T06:22:34.136+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting XACML
[2025-04-03T06:22:34.136+00:00|INFO|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting operations for actor XACML
[2025-04-03T06:22:34.136+00:00|WARN|ActorImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] not starting unconfigured operation XACML.Configure
[2025-04-03T06:22:34.136+00:00|INFO|StartConfigPartial|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] starting XACML.Guard
[2025-04-03T06:22:34.141+00:00|INFO|OperationHistoryDataManagerImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] Starting persistence unit OperationsHistoryPU
[2025-04-03T06:22:34.141+00:00|INFO|OperationHistoryDataManagerImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] Properties {jakarta.persistence.jdbc.url=jdbc:postgresql://policy-pg-primary:5432/operationshistory, jakarta.persistence.jdbc.user=policy-user, jakarta.persistence.jdbc.driver=org.postgresql.Driver, jakarta.persistence.jdbc.password=YipnSite3!Rafo}
[2025-04-03T06:22:34.345+00:00|INFO|LogHelper|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HHH000204: Processing PersistenceUnitInfo [name: OperationsHistoryPU]
[2025-04-03T06:22:34.444+00:00|INFO|Version|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HHH000412: Hibernate ORM core version 6.5.3.Final
[2025-04-03T06:22:34.509+00:00|INFO|RegionFactoryInitiator|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HHH000026: Second-level cache disabled
[2025-04-03T06:22:34.837+00:00|WARN|pooling|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HHH10001002: Using built-in connection pool (not intended for production use)
[2025-04-03T06:22:34.837+00:00|INFO|pooling|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HHH10001005: Loaded JDBC driver class: org.postgresql.Driver
[2025-04-03T06:22:34.837+00:00|INFO|pooling|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HHH10001012: Connecting with JDBC URL [jdbc:postgresql://policy-pg-primary:5432/operationshistory]
[2025-04-03T06:22:34.838+00:00|INFO|pooling|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HHH10001001: Connection properties: {password=****, user=policy-user}
[2025-04-03T06:22:34.838+00:00|INFO|pooling|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HHH10001003: Autocommit mode: false
[2025-04-03T06:22:34.842+00:00|INFO|pooling|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HHH10001115: Connection pool size: 20 (min=1)
[2025-04-03T06:22:36.030+00:00|INFO|Version|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HV000001: Hibernate Validator 8.0.1.Final
[2025-04-03T06:22:37.472+00:00|INFO|JtaPlatformInitiator|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] HHH000489: No JTA platform available (set 'hibernate.transaction.jta.platform' to enable JTA platform integration)
[2025-04-03T06:22:37.481+00:00|INFO|OperationHistoryDataManagerImpl|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:3.1.0:usecases] start operation history thread
[2025-04-03T06:23:25.611+00:00|INFO|OrderedServiceImpl|KAFKA-source-policy-pdp-pap] ***** OrderedServiceImpl implementers:
 []
[2025-04-03T06:23:25.615+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"xacml","state":"PASSIVE","healthy":"HEALTHY","policies":[],"messageName":"PDP_STATUS","requestId":"d3cc78d3-f38b-44b4-adb1-f822485550e4","timestampMs":1743661405174,"name":"xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f","pdpGroup":"defaultGroup"}
[2025-04-03T06:23:25.625+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:24:22.252+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"apex","state":"PASSIVE","healthy":"HEALTHY","description":"Pdp Heartbeat","messageName":"PDP_STATUS","requestId":"9331f07b-d912-4447-a2f6-38241332e0e1","timestampMs":1743661479169,"name":"apex-0915d3d3-9932-4ec7-ab23-3580b61c5cfc","pdpGroup":"defaultGroup"}
[2025-04-03T06:24:22.253+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:24:22.543+00:00|INFO|LifecycleFsm|pool-2-thread-1] lifecycle event: status
[2025-04-03T06:24:22.560+00:00|INFO|network|pool-2-thread-1] [OUT|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"PASSIVE","healthy":"HEALTHY","policies":[],"messageName":"PDP_STATUS","requestId":"a0feee51-24f8-46d6-b4e7-2c465788fcb5","timestampMs":1743661462548,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup"}
[2025-04-03T06:24:22.719+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"PASSIVE","healthy":"HEALTHY","policies":[],"messageName":"PDP_STATUS","requestId":"a0feee51-24f8-46d6-b4e7-2c465788fcb5","timestampMs":1743661462548,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup"}
[2025-04-03T06:24:22.719+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:24:25.631+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"xacml","state":"PASSIVE","healthy":"HEALTHY","policies":[],"messageName":"PDP_STATUS","requestId":"9dbabda8-b381-4680-8442-c269f8d26a91","timestampMs":1743661465267,"name":"xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f","pdpGroup":"defaultGroup"}
[2025-04-03T06:24:25.632+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:24:31.121+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"source":"pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9","pdpHeartbeatIntervalMs":12000000,"policiesToBeDeployed":[{"type":"onap.policies.Naming","type_version":"1.0.0","properties":{"policy-instance-name":"ONAP_NF_NAMING_TIMESTAMP","naming-models":[{"naming-type":"VNF","naming-recipe":"AIC_CLOUD_REGION|DELIMITER|CONSTANT|DELIMITER|TIMESTAMP","name-operation":"to_lower_case()","naming-properties":[{"property-name":"AIC_CLOUD_REGION"},{"property-name":"CONSTANT","property-value":"onap-nf"},{"property-name":"TIMESTAMP"},{"property-value":"-","property-name":"DELIMITER"}]},{"naming-type":"VNFC","naming-recipe":"VNF_NAME|DELIMITER|NFC_NAMING_CODE|DELIMITER|SEQUENCE","name-operation":"to_lower_case()","naming-properties":[{"property-name":"VNF_NAME"},{"property-name":"SEQUENCE","increment-sequence":{"max":"zzz","scope":"ENTIRETY","start-value":"1","length":"3","increment":"1","sequence-type":"alpha-numeric"}},{"property-name":"NFC_NAMING_CODE"},{"property-value":"-","property-name":"DELIMITER"}]},{"naming-type":"VF-MODULE","naming-recipe":"VNF_NAME|DELIMITER|VF_MODULE_LABEL|DELIMITER|VF_MODULE_TYPE|DELIMITER|SEQUENCE","name-operation":"to_lower_case()","naming-properties":[{"property-name":"VNF_NAME"},{"property-value":"-","property-name":"DELIMITER"},{"property-name":"VF_MODULE_LABEL"},{"property-name":"VF_MODULE_TYPE"},{"property-name":"SEQUENCE","increment-sequence":{"max":"zzz","scope":"PRECEEDING","start-value":"1","length":"3","increment":"1","sequence-type":"alpha-numeric"}}]}]},"name":"SDNC_Policy.ONAP_NF_NAMING_TIMESTAMP","version":"1.0.0","metadata":{"policy-id":"SDNC_Policy.ONAP_NF_NAMING_TIMESTAMP","policy-version":"1.0.0"}}],"messageName":"PDP_UPDATE","requestId":"3371690b-9466-4ee0-b415-16f7003d3945","timestampMs":1743661487614,"name":"xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f","pdpGroup":"defaultGroup","pdpSubgroup":"xacml"}
[2025-04-03T06:24:31.131+00:00|WARN|LifecycleFsm|KAFKA-source-policy-pdp-pap] pdp-update from KAFKA:policy-pdp-pap is invalid: PdpUpdate(super=PdpMessage(messageName=PDP_UPDATE, requestId=3371690b-9466-4ee0-b415-16f7003d3945, timestampMs=1743661487614, name=xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f, pdpGroup=defaultGroup, pdpSubgroup=xacml), source=pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9, description=null, pdpHeartbeatIntervalMs=12000000, policiesToBeDeployed=[ToscaPolicy(super=ToscaWithTypeAndObjectProperties(type=onap.policies.Naming, typeVersion=1.0.0, properties={policy-instance-name=ONAP_NF_NAMING_TIMESTAMP, naming-models=[{naming-type=VNF, naming-recipe=AIC_CLOUD_REGION|DELIMITER|CONSTANT|DELIMITER|TIMESTAMP, name-operation=to_lower_case(), naming-properties=[{property-name=AIC_CLOUD_REGION}, {property-name=CONSTANT, property-value=onap-nf}, {property-name=TIMESTAMP}, {property-value=-, property-name=DELIMITER}]}, {naming-type=VNFC, naming-recipe=VNF_NAME|DELIMITER|NFC_NAMING_CODE|DELIMITER|SEQUENCE, name-operation=to_lower_case(), naming-properties=[{property-name=VNF_NAME}, {property-name=SEQUENCE, increment-sequence={max=zzz, scope=ENTIRETY, start-value=1, length=3, increment=1, sequence-type=alpha-numeric}}, {property-name=NFC_NAMING_CODE}, {property-value=-, property-name=DELIMITER}]}, {naming-type=VF-MODULE, naming-recipe=VNF_NAME|DELIMITER|VF_MODULE_LABEL|DELIMITER|VF_MODULE_TYPE|DELIMITER|SEQUENCE, name-operation=to_lower_case(), naming-properties=[{property-name=VNF_NAME}, {property-value=-, property-name=DELIMITER}, {property-name=VF_MODULE_LABEL}, {property-name=VF_MODULE_TYPE}, {property-name=SEQUENCE, increment-sequence={max=zzz, scope=PRECEEDING, start-value=1, length=3, increment=1, sequence-type=alpha-numeric}}]}]}))], policiesToBeUndeployed=[])
[2025-04-03T06:24:31.711+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"xacml","state":"PASSIVE","healthy":"HEALTHY","policies":[{"name":"SDNC_Policy.ONAP_NF_NAMING_TIMESTAMP","version":"1.0.0"}],"response":{"responseTo":"3371690b-9466-4ee0-b415-16f7003d3945","responseStatus":"SUCCESS"},"messageName":"PDP_STATUS","requestId":"f02471f9-7dbb-4372-b6e5-4a31866f1f11","timestampMs":1743661471338,"name":"xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f","pdpGroup":"defaultGroup","pdpSubgroup":"xacml"}
[2025-04-03T06:24:31.711+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:24:31.730+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"xacml","state":"PASSIVE","healthy":"HEALTHY","policies":[{"name":"SDNC_Policy.ONAP_NF_NAMING_TIMESTAMP","version":"1.0.0"}],"messageName":"PDP_STATUS","requestId":"6a94b5bf-6f26-45fa-9412-610e556ea10a","timestampMs":1743661471408,"name":"xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f","pdpGroup":"defaultGroup","pdpSubgroup":"xacml"}
[2025-04-03T06:24:31.731+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:24:31.802+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"source":"pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9","state":"ACTIVE","messageName":"PDP_STATE_CHANGE","requestId":"d6b6a3dd-b6c8-46c3-b693-9910b2fced62","timestampMs":1743661487615,"name":"xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f","pdpGroup":"defaultGroup","pdpSubgroup":"xacml"}
[2025-04-03T06:24:31.804+00:00|WARN|LifecycleFsm|KAFKA-source-policy-pdp-pap] pdp-state-chage from KAFKA:policy-pdp-pap is invalid: PdpStateChange(super=PdpMessage(messageName=PDP_STATE_CHANGE, requestId=d6b6a3dd-b6c8-46c3-b693-9910b2fced62, timestampMs=1743661487615, name=xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f, pdpGroup=defaultGroup, pdpSubgroup=xacml), source=pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9, state=ACTIVE)
[2025-04-03T06:24:31.823+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"xacml","state":"ACTIVE","healthy":"HEALTHY","response":{"responseTo":"d6b6a3dd-b6c8-46c3-b693-9910b2fced62","responseStatus":"SUCCESS"},"messageName":"PDP_STATUS","requestId":"42d86626-8c8b-462a-a87f-5ecec2e27d09","timestampMs":1743661471498,"name":"xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f","pdpGroup":"defaultGroup","pdpSubgroup":"xacml"}
[2025-04-03T06:24:31.824+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:24:36.250+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"source":"pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9","pdpHeartbeatIntervalMs":12000000,"policiesToBeDeployed":[],"policiesToBeUndeployed":[],"messageName":"PDP_UPDATE","requestId":"6d8b0adb-4307-4cc2-ac83-274b42c9f995","timestampMs":1743661492869,"name":"xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f","pdpGroup":"defaultGroup","pdpSubgroup":"xacml"}
[2025-04-03T06:24:36.251+00:00|WARN|LifecycleFsm|KAFKA-source-policy-pdp-pap] pdp-update from KAFKA:policy-pdp-pap is invalid: PdpUpdate(super=PdpMessage(messageName=PDP_UPDATE, requestId=6d8b0adb-4307-4cc2-ac83-274b42c9f995, timestampMs=1743661492869, name=xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f, pdpGroup=defaultGroup, pdpSubgroup=xacml), source=pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9, description=null, pdpHeartbeatIntervalMs=12000000, policiesToBeDeployed=[], policiesToBeUndeployed=[])
[2025-04-03T06:24:36.281+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"xacml","state":"ACTIVE","healthy":"HEALTHY","policies":[{"name":"SDNC_Policy.ONAP_NF_NAMING_TIMESTAMP","version":"1.0.0"}],"response":{"responseTo":"6d8b0adb-4307-4cc2-ac83-274b42c9f995","responseStatus":"SUCCESS"},"messageName":"PDP_STATUS","requestId":"899cdd65-0c6e-4a2e-9395-2c108d5394f4","timestampMs":1743661475955,"name":"xacml-54bddaec-0452-4ae2-a71f-f406bf12a53f","pdpGroup":"defaultGroup","pdpSubgroup":"xacml"}
[2025-04-03T06:24:36.282+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:24:59.437+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"messageName":"PDP_STATUS","pdpType":"opa","state":"PASSIVE","healthy":"HEALTHY","description":"Pdp Status Registration Message","response":null,"policies":[],"name":"opa-9f1712a0-6392-4856-acba-ce73e670c6af","requestId":"8a9c5c63-48ca-490b-a886-ed81b5355299","pdpGroup":"opaGroup","pdpSubgroup":null,"timestampMs":"1743661515691","deploymentInstanceInfo":""}
[2025-04-03T06:24:59.437+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:25:59.412+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"messageName":"PDP_STATUS","pdpType":"opa","state":"PASSIVE","healthy":"HEALTHY","description":"Pdp Status Registration Message","response":null,"policies":[],"name":"opa-9f1712a0-6392-4856-acba-ce73e670c6af","requestId":"025475ea-991f-411f-9c34-afdf0a3d65b5","pdpGroup":"opaGroup","pdpSubgroup":null,"timestampMs":"1743661575692","deploymentInstanceInfo":""}
[2025-04-03T06:25:59.412+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:25:59.630+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"source":"pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9","pdpHeartbeatIntervalMs":12000000,"policiesToBeDeployed":[],"messageName":"PDP_UPDATE","requestId":"de1cc113-ba0b-4c31-84fe-80c968434253","timestampMs":1743661576213,"name":"opa-9f1712a0-6392-4856-acba-ce73e670c6af","pdpGroup":"opaGroup","pdpSubgroup":"opa"}
[2025-04-03T06:25:59.631+00:00|WARN|LifecycleFsm|KAFKA-source-policy-pdp-pap] pdp-update from KAFKA:policy-pdp-pap is invalid: PdpUpdate(super=PdpMessage(messageName=PDP_UPDATE, requestId=de1cc113-ba0b-4c31-84fe-80c968434253, timestampMs=1743661576213, name=opa-9f1712a0-6392-4856-acba-ce73e670c6af, pdpGroup=opaGroup, pdpSubgroup=opa), source=pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9, description=null, pdpHeartbeatIntervalMs=12000000, policiesToBeDeployed=[], policiesToBeUndeployed=[])
[2025-04-03T06:25:59.692+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"messageName":"PDP_STATUS","pdpType":"opa","state":"PASSIVE","healthy":"HEALTHY","description":"Pdp Status Response Message For Pdp Update","response":{"responseTo":"de1cc113-ba0b-4c31-84fe-80c968434253","responseStatus":"SUCCESS","responseMessage":"PDP UPDATE is successfull"},"policies":[],"name":"opa-9f1712a0-6392-4856-acba-ce73e670c6af","requestId":"7b2fe841-1b8f-41d0-aee4-ae6ea1df8872","pdpGroup":"opaGroup","pdpSubgroup":"opa","timestampMs":"1743661575949","deploymentInstanceInfo":""}
[2025-04-03T06:25:59.692+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:25:59.720+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"source":"pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9","state":"ACTIVE","messageName":"PDP_STATE_CHANGE","requestId":"e8388448-cc97-40ae-a373-a81b0927e433","timestampMs":1743661576213,"name":"opa-9f1712a0-6392-4856-acba-ce73e670c6af","pdpGroup":"opaGroup","pdpSubgroup":"opa"}
[2025-04-03T06:25:59.721+00:00|WARN|LifecycleFsm|KAFKA-source-policy-pdp-pap] pdp-state-chage from KAFKA:policy-pdp-pap is invalid: PdpStateChange(super=PdpMessage(messageName=PDP_STATE_CHANGE, requestId=e8388448-cc97-40ae-a373-a81b0927e433, timestampMs=1743661576213, name=opa-9f1712a0-6392-4856-acba-ce73e670c6af, pdpGroup=opaGroup, pdpSubgroup=opa), source=pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9, state=ACTIVE)
[2025-04-03T06:25:59.774+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"messageName":"PDP_STATUS","pdpType":"opa","state":"ACTIVE","healthy":"HEALTHY","description":"Pdp Status Response Message to Pdp State Change","response":{"responseTo":"e8388448-cc97-40ae-a373-a81b0927e433","responseStatus":"SUCCESS","responseMessage":"PDP State Changed From PASSIVE TO Active"},"policies":[],"name":"opa-9f1712a0-6392-4856-acba-ce73e670c6af","requestId":"805137d0-69c7-4091-9dc2-c772be6c6be7","pdpGroup":"opaGroup","pdpSubgroup":"opa","timestampMs":"1743661576038","deploymentInstanceInfo":""}
[2025-04-03T06:25:59.774+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:26:05.141+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:06:26:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:26:22.197+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"apex","state":"PASSIVE","healthy":"HEALTHY","description":"Pdp Heartbeat","messageName":"PDP_STATUS","requestId":"250d26f7-f9fb-464b-967a-6c32b8caa90e","timestampMs":1743661599169,"name":"apex-0915d3d3-9932-4ec7-ab23-3580b61c5cfc","pdpGroup":"defaultGroup"}
[2025-04-03T06:26:22.197+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:26:22.543+00:00|INFO|LifecycleFsm|pool-2-thread-1] lifecycle event: status
[2025-04-03T06:26:22.544+00:00|INFO|network|pool-2-thread-1] [OUT|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"PASSIVE","healthy":"HEALTHY","policies":[],"messageName":"PDP_STATUS","requestId":"913bfd42-babb-4fef-b775-60fa489dbbf5","timestampMs":1743661582544,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup"}
[2025-04-03T06:26:22.570+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"PASSIVE","healthy":"HEALTHY","policies":[],"messageName":"PDP_STATUS","requestId":"913bfd42-babb-4fef-b775-60fa489dbbf5","timestampMs":1743661582544,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup"}
[2025-04-03T06:26:22.571+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:27:04.935+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:06:27:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:28:04.935+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:06:28:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:28:22.190+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"apex","state":"PASSIVE","healthy":"HEALTHY","description":"Pdp Heartbeat","messageName":"PDP_STATUS","requestId":"fdd622fb-8f40-401d-a32b-862810c5b2cf","timestampMs":1743661719169,"name":"apex-0915d3d3-9932-4ec7-ab23-3580b61c5cfc","pdpGroup":"defaultGroup"}
[2025-04-03T06:28:22.192+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:28:22.544+00:00|INFO|LifecycleFsm|pool-2-thread-1] lifecycle event: status
[2025-04-03T06:28:22.545+00:00|INFO|network|pool-2-thread-1] [OUT|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"PASSIVE","healthy":"HEALTHY","policies":[],"messageName":"PDP_STATUS","requestId":"84c493a8-9f3c-4cbf-ab2e-c46532425d3a","timestampMs":1743661702545,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup"}
[2025-04-03T06:28:22.564+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"PASSIVE","healthy":"HEALTHY","policies":[],"messageName":"PDP_STATUS","requestId":"84c493a8-9f3c-4cbf-ab2e-c46532425d3a","timestampMs":1743661702545,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup"}
[2025-04-03T06:28:22.564+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:28:22.686+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"source":"pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9","pdpHeartbeatIntervalMs":12000000,"policiesToBeDeployed":[],"messageName":"PDP_UPDATE","requestId":"e18d537e-8484-48d1-92e4-f06bd598d2e2","timestampMs":1743661719369,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup","pdpSubgroup":"drools"}
[2025-04-03T06:28:22.694+00:00|INFO|LifecycleFsm|KAFKA-source-policy-pdp-pap] lifecycle event: update
[2025-04-03T06:28:22.700+00:00|INFO|LifecycleStateRunning|KAFKA-source-policy-pdp-pap] reapply-native-artifact-policies: nothing to reapply, no new native controller policies
[2025-04-03T06:28:22.702+00:00|INFO|LifecycleStateRunning|KAFKA-source-policy-pdp-pap] reapply-non-native-policies: nothing to reapply, no new native artifact policies
[2025-04-03T06:28:22.703+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [OUT|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"PASSIVE","healthy":"HEALTHY","policies":[],"response":{"responseTo":"e18d537e-8484-48d1-92e4-f06bd598d2e2","responseStatus":"SUCCESS","responseMessage":"[]"},"messageName":"PDP_STATUS","requestId":"e18d537e-8484-48d1-92e4-f06bd598d2e2","timestampMs":1743661702703,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup","pdpSubgroup":"drools"}
[2025-04-03T06:28:22.718+00:00|INFO|LifecycleFsm|pool-2-thread-1] lifecycle event: status
[2025-04-03T06:28:22.719+00:00|INFO|network|pool-2-thread-1] [OUT|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"PASSIVE","healthy":"HEALTHY","policies":[],"messageName":"PDP_STATUS","requestId":"274a6637-2361-4a0d-83ec-4a5be3f3db12","timestampMs":1743661702718,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup","pdpSubgroup":"drools"}
[2025-04-03T06:28:22.734+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"PASSIVE","healthy":"HEALTHY","policies":[],"response":{"responseTo":"e18d537e-8484-48d1-92e4-f06bd598d2e2","responseStatus":"SUCCESS","responseMessage":"[]"},"messageName":"PDP_STATUS","requestId":"e18d537e-8484-48d1-92e4-f06bd598d2e2","timestampMs":1743661702703,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup","pdpSubgroup":"drools"}
[2025-04-03T06:28:22.735+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:28:22.745+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"PASSIVE","healthy":"HEALTHY","policies":[],"messageName":"PDP_STATUS","requestId":"274a6637-2361-4a0d-83ec-4a5be3f3db12","timestampMs":1743661702718,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup","pdpSubgroup":"drools"}
[2025-04-03T06:28:22.745+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:28:22.804+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"source":"pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9","state":"ACTIVE","messageName":"PDP_STATE_CHANGE","requestId":"de3b8c90-af8d-4f90-85cc-b5d62be887d5","timestampMs":1743661719369,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup","pdpSubgroup":"drools"}
[2025-04-03T06:28:22.805+00:00|INFO|LifecycleFsm|KAFKA-source-policy-pdp-pap] lifecycle event: state-change
[2025-04-03T06:28:22.808+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [OUT|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"ACTIVE","healthy":"HEALTHY","policies":[],"response":{"responseTo":"de3b8c90-af8d-4f90-85cc-b5d62be887d5","responseStatus":"SUCCESS"},"messageName":"PDP_STATUS","requestId":"de3b8c90-af8d-4f90-85cc-b5d62be887d5","timestampMs":1743661702807,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup","pdpSubgroup":"drools"}
[2025-04-03T06:28:22.832+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"drools","state":"ACTIVE","healthy":"HEALTHY","policies":[],"response":{"responseTo":"de3b8c90-af8d-4f90-85cc-b5d62be887d5","responseStatus":"SUCCESS"},"messageName":"PDP_STATUS","requestId":"de3b8c90-af8d-4f90-85cc-b5d62be887d5","timestampMs":1743661702807,"name":"onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf","pdpGroup":"defaultGroup","pdpSubgroup":"drools"}
[2025-04-03T06:28:22.833+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:29:04.934+00:00|INFO|RequestLog|qtp7575494-71] 127.0.0.6 - - [03/Apr/2025:06:29:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:30:04.936+00:00|INFO|RequestLog|qtp7575494-70] 127.0.0.6 - - [03/Apr/2025:06:30:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:30:22.194+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"apex","state":"PASSIVE","healthy":"HEALTHY","description":"Pdp Heartbeat","messageName":"PDP_STATUS","requestId":"f1c7f2ad-5f68-4425-ba6d-187b65c7f778","timestampMs":1743661839168,"name":"apex-0915d3d3-9932-4ec7-ab23-3580b61c5cfc","pdpGroup":"defaultGroup"}
[2025-04-03T06:30:22.195+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:30:22.321+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"source":"pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9","pdpHeartbeatIntervalMs":12000000,"policiesToBeDeployed":[],"messageName":"PDP_UPDATE","requestId":"a66f3650-853f-4ce7-86ac-7e3da50c2d30","timestampMs":1743661839009,"name":"apex-0915d3d3-9932-4ec7-ab23-3580b61c5cfc","pdpGroup":"defaultGroup","pdpSubgroup":"apex"}
[2025-04-03T06:30:22.321+00:00|WARN|LifecycleFsm|KAFKA-source-policy-pdp-pap] pdp-update from KAFKA:policy-pdp-pap is invalid: PdpUpdate(super=PdpMessage(messageName=PDP_UPDATE, requestId=a66f3650-853f-4ce7-86ac-7e3da50c2d30, timestampMs=1743661839009, name=apex-0915d3d3-9932-4ec7-ab23-3580b61c5cfc, pdpGroup=defaultGroup, pdpSubgroup=apex), source=pap-9fffa40f-bb4d-4fa4-a2b2-4812bb40fcc9, description=null, pdpHeartbeatIntervalMs=12000000, policiesToBeDeployed=[], policiesToBeUndeployed=[])
[2025-04-03T06:30:22.339+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"apex","state":"PASSIVE","healthy":"HEALTHY","description":"Pdp Heartbeat","messageName":"PDP_STATUS","requestId":"ab460760-f699-4527-9672-804d5433bd40","timestampMs":1743661839317,"name":"apex-0915d3d3-9932-4ec7-ab23-3580b61c5cfc","pdpGroup":"defaultGroup"}
[2025-04-03T06:30:22.339+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:30:22.373+00:00|INFO|network|KAFKA-source-policy-pdp-pap] [IN|KAFKA|policy-pdp-pap]
{"pdpType":"apex","state":"PASSIVE","healthy":"HEALTHY","description":"Pdp status response message for PdpUpdate","policies":[],"response":{"responseTo":"a66f3650-853f-4ce7-86ac-7e3da50c2d30","responseStatus":"SUCCESS","responseMessage":"Pdp update successful."},"messageName":"PDP_STATUS","requestId":"fa317266-0f30-41ce-b53c-6f4c3c01c807","timestampMs":1743661839318,"name":"apex-0915d3d3-9932-4ec7-ab23-3580b61c5cfc","pdpGroup":"defaultGroup","pdpSubgroup":"apex"}
[2025-04-03T06:30:22.374+00:00|INFO|MessageTypeDispatcher|KAFKA-source-policy-pdp-pap] discarding event of type PDP_STATUS
[2025-04-03T06:31:04.949+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:06:31:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:31:24.522+00:00|INFO|NetworkClient|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:31:24.522+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-5] [Producer clientId=producer-5] Node -1 disconnected.
[2025-04-03T06:31:24.526+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-2] [Producer clientId=producer-2] Node -1 disconnected.
[2025-04-03T06:31:24.572+00:00|INFO|NetworkClient|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:31:24.620+00:00|INFO|NetworkClient|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:31:24.628+00:00|INFO|NetworkClient|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:31:24.629+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-3] [Producer clientId=producer-3] Node -1 disconnected.
[2025-04-03T06:31:24.648+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-1] [Producer clientId=producer-1] Node -1 disconnected.
[2025-04-03T06:31:24.651+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-4] [Producer clientId=producer-4] Node -1 disconnected.
[2025-04-03T06:31:24.653+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-6] [Producer clientId=producer-6] Node -1 disconnected.
[2025-04-03T06:31:24.867+00:00|INFO|NetworkClient|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:31:24.869+00:00|INFO|NetworkClient|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:31:53.027+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-7] [Producer clientId=producer-7] Node -1 disconnected.
[2025-04-03T06:32:04.937+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:06:32:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:33:04.939+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:06:33:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:34:04.941+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:06:34:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:35:04.936+00:00|INFO|RequestLog|qtp7575494-71] 127.0.0.6 - - [03/Apr/2025:06:35:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:36:04.937+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:06:36:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:37:04.934+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:06:37:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:37:22.574+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:37:22.588+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:37:22.592+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T06:38:04.936+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:06:38:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:38:22.591+00:00|INFO|DistributedLockManager|pool-3-thread-1] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:38:22.596+00:00|ERROR|DistributedLockManager|pool-3-thread-1] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:38:22.597+00:00|INFO|DistributedLockManager|pool-3-thread-1] done checking for expired locks
[2025-04-03T06:39:04.934+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:06:39:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:39:22.596+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:39:22.601+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:39:22.603+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T06:40:04.942+00:00|INFO|RequestLog|qtp7575494-71] 127.0.0.6 - - [03/Apr/2025:06:40:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:40:22.601+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:40:22.607+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:40:22.607+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T06:40:54.543+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-7] [Producer clientId=producer-7] Node 0 disconnected.
[2025-04-03T06:41:04.946+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:06:41:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:41:22.607+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:41:22.613+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:41:22.613+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T06:41:24.414+00:00|INFO|NetworkClient|KAFKA-source-sdnr-cl-rsp] [Consumer clientId=consumer-policy-drools-pdp-10, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:41:24.416+00:00|INFO|NetworkClient|KAFKA-source-appc-lcm-write] [Consumer clientId=consumer-policy-drools-pdp-9, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:41:24.446+00:00|INFO|NetworkClient|KAFKA-source-dcae_topic] [Consumer clientId=consumer-policy-drools-pdp-6, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:41:24.498+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-2] [Producer clientId=producer-2] Node -1 disconnected.
[2025-04-03T06:41:24.501+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-5] [Producer clientId=producer-5] Node -1 disconnected.
[2025-04-03T06:41:24.574+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-7] [Producer clientId=producer-7] Node -1 disconnected.
[2025-04-03T06:41:24.576+00:00|INFO|NetworkClient|KAFKA-source-a1-p-rsp] [Consumer clientId=consumer-policy-drools-pdp-8, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:41:24.581+00:00|INFO|NetworkClient|KAFKA-source-appc-cl] [Consumer clientId=consumer-policy-drools-pdp-7, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:41:24.582+00:00|INFO|NetworkClient|KAFKA-source-policy-pdp-pap] [Consumer clientId=consumer-policy-drools-pdp-12, groupId=policy-drools-pdp] Node -1 disconnected.
[2025-04-03T06:41:24.648+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-3] [Producer clientId=producer-3] Node -1 disconnected.
[2025-04-03T06:41:24.658+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-4] [Producer clientId=producer-4] Node -1 disconnected.
[2025-04-03T06:41:24.669+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-1] [Producer clientId=producer-1] Node -1 disconnected.
[2025-04-03T06:41:24.674+00:00|INFO|NetworkClient|kafka-producer-network-thread | producer-6] [Producer clientId=producer-6] Node -1 disconnected.
[2025-04-03T06:42:04.936+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:06:42:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:42:22.613+00:00|INFO|DistributedLockManager|pool-3-thread-1] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:42:22.618+00:00|ERROR|DistributedLockManager|pool-3-thread-1] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:42:22.618+00:00|INFO|DistributedLockManager|pool-3-thread-1] done checking for expired locks
[2025-04-03T06:43:04.934+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:06:43:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:43:22.618+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:43:22.624+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:43:22.624+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T06:44:04.936+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:06:44:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:44:22.625+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:44:22.630+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:44:22.631+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T06:45:04.949+00:00|INFO|RequestLog|qtp7575494-71] 127.0.0.6 - - [03/Apr/2025:06:45:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:45:22.631+00:00|INFO|DistributedLockManager|pool-3-thread-4] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:45:22.636+00:00|ERROR|DistributedLockManager|pool-3-thread-4] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:45:22.637+00:00|INFO|DistributedLockManager|pool-3-thread-4] done checking for expired locks
[2025-04-03T06:46:04.933+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:06:46:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:46:22.637+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:46:22.642+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:46:22.643+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T06:47:04.941+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:06:47:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:47:22.643+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:47:22.648+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:47:22.649+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T06:48:04.935+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:06:48:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:48:22.649+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:48:22.657+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:48:22.658+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T06:49:04.933+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:06:49:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:49:22.658+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:49:22.663+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:49:22.663+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T06:50:04.934+00:00|INFO|RequestLog|qtp7575494-71] 127.0.0.6 - - [03/Apr/2025:06:50:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:50:22.663+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:50:22.672+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:50:22.672+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T06:51:04.937+00:00|INFO|RequestLog|qtp7575494-70] 127.0.0.6 - - [03/Apr/2025:06:51:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:51:22.672+00:00|INFO|DistributedLockManager|pool-3-thread-1] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:51:22.677+00:00|ERROR|DistributedLockManager|pool-3-thread-1] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:51:22.677+00:00|INFO|DistributedLockManager|pool-3-thread-1] done checking for expired locks
[2025-04-03T06:52:04.938+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:06:52:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:52:22.678+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:52:22.692+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:52:22.693+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T06:53:04.934+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:06:53:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:53:22.693+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:53:22.703+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:53:22.703+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T06:54:04.937+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:06:54:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:54:22.703+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:54:22.708+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:54:22.708+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T06:55:04.933+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:06:55:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:55:22.708+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:55:22.713+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:55:22.713+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T06:56:04.935+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:06:56:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:56:22.714+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:56:22.718+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:56:22.718+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T06:57:04.934+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:06:57:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:57:22.719+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:57:22.726+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:57:22.726+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T06:58:04.940+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:06:58:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:58:22.726+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:58:22.731+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:58:22.731+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T06:59:04.936+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:06:59:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T06:59:22.731+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T06:59:22.736+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T06:59:22.736+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:00:04.937+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:00:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:00:22.737+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:00:22.741+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:00:22.741+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:01:04.933+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:01:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:01:22.742+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:01:22.747+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:01:22.747+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:02:04.932+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:02:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:02:22.747+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:02:22.751+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:02:22.752+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:03:04.935+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:03:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:03:22.752+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:03:22.758+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:03:22.758+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T07:04:04.932+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:07:04:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:04:22.758+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:04:22.765+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:04:22.766+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T07:05:04.935+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:05:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:05:22.766+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:05:22.772+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:05:22.773+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:06:04.935+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:06:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:06:22.773+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:06:22.782+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:06:22.782+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:07:04.935+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:07:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:07:22.783+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:07:22.789+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:07:22.789+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:08:04.936+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:08:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:08:22.789+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:08:22.794+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:08:22.794+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:09:04.934+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:07:09:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:09:22.794+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:09:22.800+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:09:22.800+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:10:04.939+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:10:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:10:22.800+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:10:22.805+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:10:22.806+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:11:04.935+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:11:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:11:22.806+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:11:22.812+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:11:22.812+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:12:04.933+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:12:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:12:22.812+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:12:22.817+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:12:22.818+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:13:04.937+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:13:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:13:22.818+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:13:22.822+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:13:22.823+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:14:04.933+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:07:14:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:14:22.823+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:14:22.828+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:14:22.828+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:15:04.935+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:15:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:15:22.828+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:15:22.834+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:15:22.834+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:16:04.934+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:16:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:16:22.834+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:16:22.842+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:16:22.842+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:17:04.936+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:17:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:17:22.843+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:17:22.847+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:17:22.848+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T07:18:04.933+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:18:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:18:22.848+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:18:22.852+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:18:22.853+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T07:19:04.946+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:07:19:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:19:22.853+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:19:22.860+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:19:22.860+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:20:04.943+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:20:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:20:22.860+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:20:22.868+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:20:22.869+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:21:04.937+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:21:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:21:22.869+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:21:22.873+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:21:22.874+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:22:04.938+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:22:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:22:22.874+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:22:22.880+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:22:22.880+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:23:04.937+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:23:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:23:22.881+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:23:22.893+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:23:22.893+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:24:04.936+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:07:24:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:24:22.893+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:24:22.898+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:24:22.898+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:25:04.936+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:25:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:25:22.899+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:25:22.903+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:25:22.903+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:26:04.942+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:26:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:26:22.904+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:26:22.909+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:26:22.909+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:27:04.937+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:27:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:27:22.909+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:27:22.914+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:27:22.915+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:28:04.931+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:28:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:28:22.915+00:00|INFO|DistributedLockManager|pool-3-thread-1] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:28:22.920+00:00|ERROR|DistributedLockManager|pool-3-thread-1] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:28:22.920+00:00|INFO|DistributedLockManager|pool-3-thread-1] done checking for expired locks
[2025-04-03T07:29:04.937+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:07:29:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:29:22.920+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:29:22.927+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:29:22.927+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:30:04.936+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:30:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:30:22.927+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:30:22.931+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:30:22.932+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:31:04.933+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:31:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:31:22.932+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:31:22.937+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:31:22.937+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:32:04.932+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:32:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:32:22.937+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:32:22.942+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:32:22.942+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:33:04.936+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:33:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:33:22.943+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:33:22.948+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:33:22.949+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:34:04.933+00:00|INFO|RequestLog|qtp7575494-75] 127.0.0.6 - - [03/Apr/2025:07:34:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:34:22.949+00:00|INFO|DistributedLockManager|pool-3-thread-4] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:34:22.954+00:00|ERROR|DistributedLockManager|pool-3-thread-4] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:34:22.954+00:00|INFO|DistributedLockManager|pool-3-thread-4] done checking for expired locks
[2025-04-03T07:35:04.940+00:00|INFO|RequestLog|qtp7575494-71] 127.0.0.6 - - [03/Apr/2025:07:35:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:35:22.954+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:35:22.959+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:35:22.959+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T07:36:04.935+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:36:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:36:22.959+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:36:22.964+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:36:22.964+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T07:37:04.936+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:37:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:37:22.965+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:37:22.971+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:37:22.972+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T07:38:04.934+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:38:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:38:22.972+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:38:22.977+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:38:22.977+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:39:04.939+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:39:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:39:22.977+00:00|INFO|DistributedLockManager|pool-3-thread-4] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:39:22.983+00:00|ERROR|DistributedLockManager|pool-3-thread-4] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:39:22.983+00:00|INFO|DistributedLockManager|pool-3-thread-4] done checking for expired locks
[2025-04-03T07:40:04.942+00:00|INFO|RequestLog|qtp7575494-70] 127.0.0.6 - - [03/Apr/2025:07:40:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:40:22.983+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:40:22.988+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:40:22.988+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:41:04.934+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:41:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:41:22.989+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:41:23.000+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:41:23.000+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:42:04.936+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:42:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:42:23.000+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:42:23.006+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:42:23.007+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T07:43:04.934+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:43:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:43:23.007+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:43:23.012+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:43:23.012+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:44:04.936+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:44:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:44:23.012+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:44:23.018+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:44:23.018+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:45:04.934+00:00|INFO|RequestLog|qtp7575494-70] 127.0.0.6 - - [03/Apr/2025:07:45:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:45:23.018+00:00|INFO|DistributedLockManager|pool-3-thread-1] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:45:23.024+00:00|ERROR|DistributedLockManager|pool-3-thread-1] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:45:23.024+00:00|INFO|DistributedLockManager|pool-3-thread-1] done checking for expired locks
[2025-04-03T07:46:04.936+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:46:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:46:23.025+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:46:23.032+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:46:23.032+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:47:04.936+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:47:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:47:23.032+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:47:23.046+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:47:23.046+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:48:04.937+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:48:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:48:23.046+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:48:23.052+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:48:23.052+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:49:04.938+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:49:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:49:23.052+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:49:23.057+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:49:23.057+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:50:04.934+00:00|INFO|RequestLog|qtp7575494-70] 127.0.0.6 - - [03/Apr/2025:07:50:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:50:23.057+00:00|INFO|DistributedLockManager|pool-3-thread-1] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:50:23.063+00:00|ERROR|DistributedLockManager|pool-3-thread-1] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:50:23.063+00:00|INFO|DistributedLockManager|pool-3-thread-1] done checking for expired locks
[2025-04-03T07:51:04.934+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:51:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:51:23.063+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:51:23.068+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:51:23.068+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T07:52:04.933+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:52:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:52:23.068+00:00|INFO|DistributedLockManager|pool-3-thread-3] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:52:23.076+00:00|ERROR|DistributedLockManager|pool-3-thread-3] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:52:23.077+00:00|INFO|DistributedLockManager|pool-3-thread-3] done checking for expired locks
[2025-04-03T07:53:04.933+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:53:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:53:23.077+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:53:23.082+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:53:23.082+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T07:54:04.931+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:54:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:54:23.083+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:54:23.087+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:54:23.088+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:55:04.934+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:07:55:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:55:23.088+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:55:23.093+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:55:23.093+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:56:04.936+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:07:56:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:56:23.093+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:56:23.098+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:56:23.098+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:57:04.933+00:00|INFO|RequestLog|qtp7575494-70] 127.0.0.6 - - [03/Apr/2025:07:57:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:57:23.098+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:57:23.103+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:57:23.104+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:58:04.936+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:07:58:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:58:23.104+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:58:23.109+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:58:23.109+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T07:59:04.943+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:07:59:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T07:59:23.110+00:00|INFO|DistributedLockManager|pool-3-thread-1] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T07:59:23.117+00:00|ERROR|DistributedLockManager|pool-3-thread-1] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T07:59:23.117+00:00|INFO|DistributedLockManager|pool-3-thread-1] done checking for expired locks
[2025-04-03T08:00:04.935+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:08:00:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T08:00:23.118+00:00|INFO|DistributedLockManager|pool-3-thread-1] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T08:00:23.122+00:00|ERROR|DistributedLockManager|pool-3-thread-1] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T08:00:23.123+00:00|INFO|DistributedLockManager|pool-3-thread-1] done checking for expired locks
[2025-04-03T08:01:04.933+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:08:01:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T08:01:23.123+00:00|INFO|DistributedLockManager|pool-3-thread-1] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T08:01:23.128+00:00|ERROR|DistributedLockManager|pool-3-thread-1] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T08:01:23.128+00:00|INFO|DistributedLockManager|pool-3-thread-1] done checking for expired locks
[2025-04-03T08:02:04.941+00:00|INFO|RequestLog|qtp7575494-70] 127.0.0.6 - - [03/Apr/2025:08:02:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T08:02:23.128+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T08:02:23.133+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T08:02:23.133+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T08:03:04.936+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:08:03:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T08:03:23.133+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T08:03:23.139+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T08:03:23.139+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T08:04:04.934+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:08:04:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T08:04:23.139+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T08:04:23.145+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T08:04:23.145+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T08:05:04.935+00:00|INFO|RequestLog|qtp7575494-73] 127.0.0.6 - - [03/Apr/2025:08:05:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T08:05:23.145+00:00|INFO|DistributedLockManager|pool-3-thread-2] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T08:05:23.154+00:00|ERROR|DistributedLockManager|pool-3-thread-2] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T08:05:23.154+00:00|INFO|DistributedLockManager|pool-3-thread-2] done checking for expired locks
[2025-04-03T08:06:04.934+00:00|INFO|RequestLog|qtp7575494-72] 127.0.0.6 - - [03/Apr/2025:08:06:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T08:06:23.154+00:00|INFO|DistributedLockManager|pool-3-thread-1] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T08:06:23.159+00:00|ERROR|DistributedLockManager|pool-3-thread-1] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T08:06:23.160+00:00|INFO|DistributedLockManager|pool-3-thread-1] done checking for expired locks
[2025-04-03T08:07:04.934+00:00|INFO|RequestLog|qtp7575494-70] 127.0.0.6 - - [03/Apr/2025:08:07:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T08:07:23.160+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T08:07:23.164+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T08:07:23.165+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T08:08:04.935+00:00|INFO|RequestLog|qtp7575494-76] 127.0.0.6 - - [03/Apr/2025:08:08:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"
[2025-04-03T08:08:23.165+00:00|INFO|DistributedLockManager|pool-3-thread-5] checking for expired locks: DistributedLockManager [pdpName=onap-policy-drools-pdp-0.fefe6387-9e7b-46de-9b9f-b54370f54cdf, uuidString=2f1dfac2-29cc-4068-9aab-f534202dd002, resource2lock={}]
[2025-04-03T08:08:23.170+00:00|ERROR|DistributedLockManager|pool-3-thread-5] error checking expired locks
org.postgresql.util.PSQLException: ERROR: relation "pooling.locks" does not exist
  Position: 24
	at org.postgresql.core.v3.QueryExecutorImpl.receiveErrorResponse(QueryExecutorImpl.java:2725)
	at org.postgresql.core.v3.QueryExecutorImpl.processResults(QueryExecutorImpl.java:2412)
	at org.postgresql.core.v3.QueryExecutorImpl.execute(QueryExecutorImpl.java:371)
	at org.postgresql.jdbc.PgStatement.executeInternal(PgStatement.java:502)
	at org.postgresql.jdbc.PgStatement.execute(PgStatement.java:419)
	at org.postgresql.jdbc.PgPreparedStatement.executeWithFlags(PgPreparedStatement.java:194)
	at org.postgresql.jdbc.PgPreparedStatement.executeQuery(PgPreparedStatement.java:137)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.apache.commons.dbcp2.DelegatingPreparedStatement.executeQuery(DelegatingPreparedStatement.java:123)
	at org.onap.policy.distributed.locking.DistributedLockManager.identifyDbLocks(DistributedLockManager.java:309)
	at org.onap.policy.distributed.locking.DistributedLockManager.checkExpired(DistributedLockManager.java:262)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:304)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
	at java.base/java.lang.Thread.run(Thread.java:840)
[2025-04-03T08:08:23.170+00:00|INFO|DistributedLockManager|pool-3-thread-5] done checking for expired locks
[2025-04-03T08:09:04.934+00:00|INFO|RequestLog|qtp7575494-77] 127.0.0.6 - - [03/Apr/2025:08:09:04 +0000] "GET /healthcheck/controllers HTTP/1.1" 200 526 "-" "kube-probe/1.28"