By type
Service started with pid=7 | 2021-06-02T10:50:46.216Z | reactor.util.Loggers | DEBUG | Using Slf4j logging framework | | | | main | 2021-06-02T10:50:46.266Z | t.services.cbs.client.model.CbsClientConfiguration | INFO | CBS client will use http over TLS. | | | | main | 2021-06-02T10:50:46.278Z | t.services.cbs.client.model.CbsClientConfiguration | INFO | Path to cert files: /etc/ves-hv/ssl/ | | | | main | 2021-06-02T10:50:46.505Z | ollectors.veshv.config.impl.HvVesCommandLineParser | INFO | Healthcheck port missing on command line, using default: 6060 | | | | main | 2021-06-02T10:50:46.714Z | r.core.util.internal.logging.InternalLoggerFactory | DEBUG | Using SLF4J as the default logging framework | | | | main | 2021-06-02T10:50:47.171Z | ae.collectors.veshv.main.servers.HealthCheckServer | INFO | Health check server is up and listening on 0:0:0:0:0:0:0:0%0:6060 | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | reactor-http-epoll-1 | 2021-06-02T10:50:47.206Z | ae.collectors.veshv.config.api.ConfigurationModule | INFO | Using base configuration file: /etc/ves-hv/configuration/base.json | | | | main | 2021-06-02T10:50:47.229Z | ae.collectors.veshv.config.api.ConfigurationModule | INFO | Successfully parsed configuration file to: PartialConfiguration(listenPort=Some(6061), idleTimeoutSec=Some(60), firstRequestDelaySec=Some(10), requestIntervalSec=Some(5), sslDisable=Some(true), keyStoreFile=None, keyStorePasswordFile=None, trustStoreFile=None, trustStorePasswordFile=None, logLevel=Some(INFO), streamPublishers=None) | | | | main | 2021-06-02T10:50:47.682Z | rvices.sdk.rest.services.cbs.client.impl.CbsLookup | INFO | Config Binding Service address: config-binding-service:10443 | | | | main | 2021-06-02T10:50:47.684Z | dcae.collectors.veshv.config.impl.CbsClientAdapter | INFO | CBS client successfully created, first request will be sent in 10 s | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | main | 2021-06-02T10:50:58.336Z | lectors.veshv.config.impl.CbsConfigurationProvider | INFO | Received new configuration: {"cbs.requestIntervalSec":5,"logLevel":"INFO","security.keys.keyStoreFile":"/etc/ves-hv/ssl/cert.jks","security.keys.keyStorePasswordFile":"/etc/ves-hv/ssl/jks.pass","security.keys.trustStoreFile":"/etc/ves-hv/ssl/trust.jks","security.keys.trustStorePasswordFile":"/etc/ves-hv/ssl/trust.pass","security.sslDisable":false,"server.idleTimeoutSec":300,"server.listenPort":6061,"streams_publishes":{"perf3gpp":{"aaf_credentials":{"password":"admin_secret","username":"admin"},"kafka_info":{"bootstrap_servers":"message-router-kafka:9092","topic_name":"HV_VES_PERF3GPP"},"type":"kafka"},"ves-3gpp-fault-supervision":{"aaf_credentials":{"password":"admin_secret","username":"admin"},"kafka_info":{"bootstrap_servers":"message-router-kafka:9092","topic_name":"SEC_3GPP_FAULTSUPERVISION_OUTPUT"},"type":"kafka"},"ves-3gpp-heartbeat":{"aaf_credentials":{"password":"admin_secret","username":"admin"},"kafka_info":{"bootstrap_servers":"message-router-kafka:9092","topic_name":"SEC_3GPP_HEARTBEAT_OUTPUT"},"type":"kafka"},"ves-3gpp-performance-assurance":{"aaf_credentials":{"password":"admin_secret","username":"admin"},"kafka_info":{"bootstrap_servers":"message-router-kafka:9092","topic_name":"SEC_3GPP_PERFORMANCEASSURANCE_OUTPUT"},"type":"kafka"},"ves-3gpp-provisioning":{"aaf_credentials":{"password":"admin_secret","username":"admin"},"kafka_info":{"bootstrap_servers":"message-router-kafka:9092","topic_name":"SEC_3GPP_PROVISIONING_OUTPUT"},"type":"kafka"}}} | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | reactor-http-epoll-3 | 2021-06-02T10:50:58.417Z | lectors.veshv.config.impl.CbsConfigurationProvider | INFO | Successfully parsed configuration json to: PartialConfiguration(listenPort=Some(6061), idleTimeoutSec=Some(300), firstRequestDelaySec=None, requestIntervalSec=Some(5), sslDisable=Some(false), keyStoreFile=Some(/etc/ves-hv/ssl/cert.jks), keyStorePasswordFile=Some(/etc/ves-hv/ssl/jks.pass), trustStoreFile=Some(/etc/ves-hv/ssl/trust.jks), trustStorePasswordFile=Some(/etc/ves-hv/ssl/trust.pass), logLevel=Some(INFO), streamPublishers=Some([GsonKafka{name='perf3gpp', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=HV_VES_PERF3GPP, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-fault-supervision', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_FAULTSUPERVISION_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-heartbeat', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_HEARTBEAT_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-performance-assurance', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_PERFORMANCEASSURANCE_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-provisioning', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_PROVISIONING_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}])) | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | reactor-http-epoll-3 | 2021-06-02T10:50:58.419Z | ollectors.veshv.config.impl.ConfigurationValidator | INFO | About to validate configuration: PartialConfiguration(listenPort=Some(6061), idleTimeoutSec=Some(300), firstRequestDelaySec=Some(10), requestIntervalSec=Some(5), sslDisable=Some(false), keyStoreFile=Some(/etc/ves-hv/ssl/cert.jks), keyStorePasswordFile=Some(/etc/ves-hv/ssl/jks.pass), trustStoreFile=Some(/etc/ves-hv/ssl/trust.jks), trustStorePasswordFile=Some(/etc/ves-hv/ssl/trust.pass), logLevel=Some(INFO), streamPublishers=Some([GsonKafka{name='perf3gpp', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=HV_VES_PERF3GPP, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-fault-supervision', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_FAULTSUPERVISION_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-heartbeat', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_HEARTBEAT_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-performance-assurance', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_PERFORMANCEASSURANCE_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-provisioning', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_PROVISIONING_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}])) | | | | reactor-http-epoll-3 | 2021-06-02T10:50:58.436Z | dcae.collectors.veshv.config.impl.CbsClientAdapter | DEBUG | CBS request interval changed to: 5 s | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | reactor-http-epoll-3 | 2021-06-02T10:50:58.438Z | org.onap.dcae.collectors.veshv.main | INFO | Using updated configuration for new connections | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | elastic-2 | 2021-06-02T10:50:58.466Z | org.onap.dcae.collectors.veshv.impl.NettyTcpServer | INFO | Collector configured with SSL enabled | | | | elastic-2 | 2021-06-02T10:50:58.475Z | org.onap.dcae.collectors.veshv.impl.HvVesServer | INFO | HighVolume VES Collector is up and listening on 0:0:0:0:0:0:0:0%0:6061 | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | reactor-tcp-epoll-1 | 2021-06-02T11:24:30.957Z | lectors.veshv.config.impl.CbsConfigurationProvider | ERROR | Error while creating configuration: Request failed for URL 'https://config-binding-service:10443/service_component/dcae-hv-ves-collector'. Response code: 500 INTERNAL SERVER ERROR | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | reactor-http-epoll-3 | 2021-06-02T11:24:30.963Z | reactor.retry.DefaultRetry | DEBUG | Scheduling retry attempt, retry context: iteration=1 exception=org.onap.dcaegen2.services.sdk.rest.services.adapters.http.exceptions.HttpException: Request failed for URL 'https://config-binding-service:10443/service_component/dcae-hv-ves-collector'. Response code: 500 INTERNAL SERVER ERROR backoff={5079ms/300000ms} | | | | reactor-http-epoll-3 | 2021-06-02T11:24:30.965Z | lectors.veshv.config.impl.CbsConfigurationProvider | WARN | Exception from configuration provider client, retrying subscription | | org.onap.dcaegen2.services.sdk.rest.services.adapters.http.exceptions.HttpException: Request failed for URL 'https://config-binding-service:10443/service_component/dcae-hv-ves-collector'. Response code: 500 INTERNAL SERVER ERROR at org.onap.dcaegen2.services.sdk.rest.services.adapters.http.HttpResponse.throwIfUnsuccessful(HttpResponse.java:77) at reactor.core.publisher.FluxPeekFuseable$PeekFuseableSubscriber.onNext(FluxPeekFuseable.java:196) at reactor.core.publisher.Operators$MonoSubscriber.complete(Operators.java:1815) at reactor.core.publisher.MonoFlatMap$FlatMapInner.onNext(MonoFlatMap.java:249) at reactor.core.publisher.Operators$MonoSubscriber.complete(Operators.java:1815) at reactor.core.publisher.MonoFlatMap$FlatMapInner.onNext(MonoFlatMap.java:249) at reactor.core.publisher.FluxDoFinally$DoFinallySubscriber.onNext(FluxDoFinally.java:130) at reactor.core.publisher.FluxMap$MapSubscriber.onNext(FluxMap.java:120) at reactor.core.publisher.FluxMap$MapSubscriber.onNext(FluxMap.java:120) at reactor.core.publisher.FluxDefaultIfEmpty$DefaultIfEmptySubscriber.onNext(FluxDefaultIfEmpty.java:100) at reactor.core.publisher.FluxHandle$HandleSubscriber.onNext(FluxHandle.java:118) at reactor.core.publisher.FluxMap$MapConditionalSubscriber.onNext(FluxMap.java:220) at reactor.core.publisher.FluxDoFinally$DoFinallySubscriber.onNext(FluxDoFinally.java:130) at reactor.core.publisher.FluxHandleFuseable$HandleFuseableSubscriber.onNext(FluxHandleFuseable.java:184) at reactor.core.publisher.FluxContextWrite$ContextWriteSubscriber.onNext(FluxContextWrite.java:107) at reactor.core.publisher.Operators$MonoSubscriber.complete(Operators.java:1815) at reactor.core.publisher.MonoCollectList$MonoCollectListSubscriber.onComplete(MonoCollectList.java:128) at reactor.core.publisher.FluxPeek$PeekSubscriber.onComplete(FluxPeek.java:259) at reactor.core.publisher.FluxMap$MapSubscriber.onComplete(FluxMap.java:142) at reactor.netty.channel.FluxReceive.onInboundComplete(FluxReceive.java:401) at reactor.netty.channel.ChannelOperations.onInboundComplete(ChannelOperations.java:416) at reactor.netty.channel.ChannelOperations.terminate(ChannelOperations.java:470) at reactor.netty.http.client.HttpClientOperations.onInboundNext(HttpClientOperations.java:685) at reactor.netty.channel.ChannelOperationsHandler.channelRead(ChannelOperationsHandler.java:94) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) at io.netty.channel.CombinedChannelDuplexHandler$DelegatingChannelHandlerContext.fireChannelRead(CombinedChannelDuplexHandler.java:436) at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296) at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1534) at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1283) at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1330) at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:508) at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:447) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) at io.netty.channel.epoll.AbstractEpollStreamChannel$EpollStreamUnsafe.epollInReady(AbstractEpollStreamChannel.java:795) at io.netty.channel.epoll.EpollEventLoop.processReady(EpollEventLoop.java:480) at io.netty.channel.epoll.EpollEventLoop.run(EpollEventLoop.java:378) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) at java.base/java.lang.Thread.run(Unknown Source) | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | reactor-http-epoll-3 | 2021-06-02T11:24:36.054Z | rvices.sdk.rest.services.cbs.client.impl.CbsLookup | INFO | Config Binding Service address: config-binding-service:10443 | | | | parallel-1 | 2021-06-02T11:24:36.055Z | dcae.collectors.veshv.config.impl.CbsClientAdapter | INFO | CBS client successfully created, first request will be sent in 10 s | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | parallel-1 | 2021-06-02T11:24:46.080Z | lectors.veshv.config.impl.CbsConfigurationProvider | INFO | Received new configuration: {"cbs.requestIntervalSec":5,"logLevel":"INFO","security.keys.keyStoreFile":"/etc/ves-hv/ssl/cert.jks","security.keys.keyStorePasswordFile":"/etc/ves-hv/ssl/jks.pass","security.keys.trustStoreFile":"/etc/ves-hv/ssl/trust.jks","security.keys.trustStorePasswordFile":"/etc/ves-hv/ssl/trust.pass","security.sslDisable":false,"server.idleTimeoutSec":300,"server.listenPort":6061,"streams_publishes":{"perf3gpp":{"aaf_credentials":{"password":"admin_secret","username":"admin"},"kafka_info":{"bootstrap_servers":"message-router-kafka:9092","topic_name":"HV_VES_PERF3GPP"},"type":"kafka"},"ves-3gpp-fault-supervision":{"aaf_credentials":{"password":"admin_secret","username":"admin"},"kafka_info":{"bootstrap_servers":"message-router-kafka:9092","topic_name":"SEC_3GPP_FAULTSUPERVISION_OUTPUT"},"type":"kafka"},"ves-3gpp-heartbeat":{"aaf_credentials":{"password":"admin_secret","username":"admin"},"kafka_info":{"bootstrap_servers":"message-router-kafka:9092","topic_name":"SEC_3GPP_HEARTBEAT_OUTPUT"},"type":"kafka"},"ves-3gpp-performance-assurance":{"aaf_credentials":{"password":"admin_secret","username":"admin"},"kafka_info":{"bootstrap_servers":"message-router-kafka:9092","topic_name":"SEC_3GPP_PERFORMANCEASSURANCE_OUTPUT"},"type":"kafka"},"ves-3gpp-provisioning":{"aaf_credentials":{"password":"admin_secret","username":"admin"},"kafka_info":{"bootstrap_servers":"message-router-kafka:9092","topic_name":"SEC_3GPP_PROVISIONING_OUTPUT"},"type":"kafka"}}} | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | reactor-http-epoll-3 | 2021-06-02T11:24:46.083Z | lectors.veshv.config.impl.CbsConfigurationProvider | INFO | Successfully parsed configuration json to: PartialConfiguration(listenPort=Some(6061), idleTimeoutSec=Some(300), firstRequestDelaySec=None, requestIntervalSec=Some(5), sslDisable=Some(false), keyStoreFile=Some(/etc/ves-hv/ssl/cert.jks), keyStorePasswordFile=Some(/etc/ves-hv/ssl/jks.pass), trustStoreFile=Some(/etc/ves-hv/ssl/trust.jks), trustStorePasswordFile=Some(/etc/ves-hv/ssl/trust.pass), logLevel=Some(INFO), streamPublishers=Some([GsonKafka{name='perf3gpp', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=HV_VES_PERF3GPP, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-fault-supervision', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_FAULTSUPERVISION_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-heartbeat', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_HEARTBEAT_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-performance-assurance', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_PERFORMANCEASSURANCE_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-provisioning', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_PROVISIONING_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}])) | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | reactor-http-epoll-3 | 2021-06-02T11:24:46.084Z | ollectors.veshv.config.impl.ConfigurationValidator | INFO | About to validate configuration: PartialConfiguration(listenPort=Some(6061), idleTimeoutSec=Some(300), firstRequestDelaySec=Some(10), requestIntervalSec=Some(5), sslDisable=Some(false), keyStoreFile=Some(/etc/ves-hv/ssl/cert.jks), keyStorePasswordFile=Some(/etc/ves-hv/ssl/jks.pass), trustStoreFile=Some(/etc/ves-hv/ssl/trust.jks), trustStorePasswordFile=Some(/etc/ves-hv/ssl/trust.pass), logLevel=Some(INFO), streamPublishers=Some([GsonKafka{name='perf3gpp', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=HV_VES_PERF3GPP, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-fault-supervision', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_FAULTSUPERVISION_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-heartbeat', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_HEARTBEAT_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-performance-assurance', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_PERFORMANCEASSURANCE_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}, GsonKafka{name='ves-3gpp-provisioning', kafkaInfo=KafkaInfo{bootstrapServers=message-router-kafka:9092, topicName=SEC_3GPP_PROVISIONING_OUTPUT, consumerGroupId=null, clientRole=null, clientId=null, maxPayloadSizeBytes=1048576}, aafCredentials=AafCredentials{username=***, password=***}}])) | | | | reactor-http-epoll-3 | 2021-06-02T11:24:46.210Z | org.onap.dcae.collectors.veshv.main | INFO | Using updated configuration for new connections | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | elastic-2 | 2021-06-02T11:24:46.360Z | lectors.veshv.impl.adapters.kafka.KafkaSinkFactory | INFO | Message sinks flushed and closed | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | elastic-3 | 2021-06-02T11:24:46.361Z | org.onap.dcae.collectors.veshv.impl.NettyTcpServer | INFO | Netty TCP Server closed | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | elastic-3 | 2021-06-02T11:24:47.387Z | org.onap.dcae.collectors.veshv.impl.NettyTcpServer | INFO | Collector configured with SSL enabled | | | | parallel-1 | 2021-06-02T11:24:47.389Z | org.onap.dcae.collectors.veshv.impl.HvVesServer | INFO | HighVolume VES Collector is up and listening on 0:0:0:0:0:0:0:0%0:6061 | | | InstanceID=b56301ad-c478-4f4b-ab1e-a746808c9e7f, ServerFQDN=dcae-hv-ves-collector | reactor-tcp-epoll-4