diff --git a/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/ElasticsearchReconciler.java b/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/ElasticsearchReconciler.java
index d9d42a1268a60a7e2008ba8c28f92ef75a42d6d1..80d6f4ee4ad709698af67a072fb839751d64dada 100644
--- a/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/ElasticsearchReconciler.java
+++ b/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/ElasticsearchReconciler.java
@@ -27,14 +27,14 @@ public class ElasticsearchReconciler implements Reconciler<OzgCloudElasticsearch
 	public UpdateControl<OzgCloudElasticsearchCustomResource> reconcile(OzgCloudElasticsearchCustomResource resource,
 			Context<OzgCloudElasticsearchCustomResource> context) {
 		try {
-			LOG.info("{0}: Reconcile user", resource.getCRDName());
+			LOG.info("{}: Reconcile user", resource.getCRDName());
 			var namespace = resource.getMetadata().getNamespace();
 			var secret = service.getOrCreateCredentialSecret(resource, context);
 			service.createIndexIfMissing(namespace);
 			service.createSecurityRoleIfMissing(namespace);
 			service.createSecurityUserIfMissing(namespace, getPassword(secret));
 			service.createCertificateIfMissing(namespace);
-			LOG.info("{0}: Reconcile user successful.", resource.getCRDName());
+			LOG.info("{}: Reconcile user successful.", resource.getCRDName());
 			return OzgCloudElasticsearchUpdateControlBuilder.fromResource(resource).withStatus(CustomResourceStatus.OK).build();
 		} catch (Exception exception) {
 			LOG.warn(resource.getCRDName() + ": Reconcile user failed.", exception);
diff --git a/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/OzgCloudElasticsearchService.java b/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/OzgCloudElasticsearchService.java
index cc0a532ada6ad93ce775049769deb823715071ce..d5ce0f979511c5c1ea61b1d295370c7e53809660 100644
--- a/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/OzgCloudElasticsearchService.java
+++ b/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/OzgCloudElasticsearchService.java
@@ -29,14 +29,14 @@ public class OzgCloudElasticsearchService {
 
 	public Secret getOrCreateCredentialSecret(OzgCloudElasticsearchCustomResource resource, Context<OzgCloudElasticsearchCustomResource> context) {
 		try {
-			LOG.debug("{0}: Get or create secret.", resource.getCRDName());
+			LOG.debug("{}: Get or create secret.", resource.getCRDName());
 			var namespace = resource.getMetadata().getNamespace();
 			var secretResource = getCredentialsSecretResource(namespace);
 
 			if (Objects.isNull(secretResource.get())) {
-				LOG.info("{0}: Secret not exists, create one ...", resource.getCRDName());
+				LOG.info("{}: Secret not exists, create one ...", resource.getCRDName());
 				createCredentialSecret(secretResource, namespace);
-				LOG.info("{0}: Secret creation successful.", resource.getCRDName());
+				LOG.info("{}: Secret creation successful.", resource.getCRDName());
 			}
 			return secretResource.get();
 		} catch (Exception e) {
@@ -54,14 +54,14 @@ public class OzgCloudElasticsearchService {
 	}
 
 	public void createIndexIfMissing(String name) throws Exception {
-		LOG.debug("{0}: Check elasticsearch index...", name);
+		LOG.debug("{}: Check elasticsearch index...", name);
 		if (!remoteService.existsIndex(name)) {
 			remoteService.createIndex(name);
 		}
 	}
 
 	public void createSecurityRoleIfMissing(String roleName) throws Exception {
-		LOG.debug("{0}: Check elasticsearch role...", roleName);
+		LOG.debug("{}: Check elasticsearch role...", roleName);
 		if (!remoteService.existsSecurityRole(roleName)) {
 			remoteService.createSecurityRole(buildPutRoleRequestData(roleName));
 		}
@@ -76,7 +76,7 @@ public class OzgCloudElasticsearchService {
 	}
 
 	public void createSecurityUserIfMissing(String namespace, String password) throws Exception {
-		LOG.debug("{0}: Check elasticsearch user...", namespace);
+		LOG.debug("{}: Check elasticsearch user...", namespace);
 		if (!remoteService.existsSecurityUser(namespace)) {
 			remoteService.createSecurityUser(buildPutUserRequestData(namespace, password));
 		}
@@ -87,21 +87,21 @@ public class OzgCloudElasticsearchService {
 	}
 
 	public void deleteSecurityUserIfExists(String userName) throws Exception {
-		LOG.debug("{0}: Check delete elasticsearch user...", userName);
+		LOG.debug("{}: Check delete elasticsearch user...", userName);
 		if (remoteService.existsSecurityUser(userName)) {
 			remoteService.deleteSecurityUser(userName);
 		}
 	}
 
 	public void deleteSecurityRoleIfExists(String roleName) throws Exception {
-		LOG.debug("{0}: Check delete elasticsearch role...", roleName);
+		LOG.debug("{}: Check delete elasticsearch role...", roleName);
 		if (remoteService.existsSecurityRole(roleName)) {
 			remoteService.deleteSecurityRole(roleName);
 		}
 	}
 
 	public void deleteIndexIfExists(String indexName) throws Exception {
-		LOG.debug("{0}: Check delete elasticsearch index ...", indexName);
+		LOG.debug("{}: Check delete elasticsearch index ...", indexName);
 		if (remoteService.existsIndex(indexName)) {
 			remoteService.deleteIndex(indexName);
 		}
@@ -109,11 +109,11 @@ public class OzgCloudElasticsearchService {
 
 	public void createCertificateIfMissing(String namespace) {
 		try {
-			LOG.debug("{0}: Create certificate secret if missing...", namespace);
+			LOG.debug("{}: Create certificate secret if missing...", namespace);
 			var secretResource = kubernetesService.getSecretResource(namespace, properties.getCertificateSecretName());
 
 			if (Objects.isNull(secretResource.get())) {
-				LOG.info("{0}: Create certificate secret", namespace);
+				LOG.info("{}: Create certificate secret", namespace);
 				createCredentialSecret(namespace, secretResource);
 			}
 		} catch (Exception e) {
diff --git a/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/common/elasticsearch/ElasticsearchRemoteService.java b/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/common/elasticsearch/ElasticsearchRemoteService.java
index df911818b510fc33765ec243a4d14f2638ce22a8..cb28b3edef67c355f6505099d744c21e8eeb0a03 100644
--- a/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/common/elasticsearch/ElasticsearchRemoteService.java
+++ b/ozgcloud-elasticsearch-operator/src/main/java/de/ozgcloud/operator/common/elasticsearch/ElasticsearchRemoteService.java
@@ -23,9 +23,9 @@ public class ElasticsearchRemoteService {
 
 	public boolean existsIndex(String index) throws Exception {
 		try {
-			LOG.debug("Test if elasticsearch index {0} exits.", index);
+			LOG.debug("Test if elasticsearch index {} exits.", index);
 			var exists = client.indices().exists(builder -> builder.index(index)).value();
-			LOG.debug("Elasticsearch index exists: {0}", exists);
+			LOG.debug("Elasticsearch index exists: {}", exists);
 			return exists;
 		} catch (ElasticsearchException | IOException e) {
 			throw new RuntimeException("Error checking index '" + index, e);
@@ -34,9 +34,9 @@ public class ElasticsearchRemoteService {
 
 	public void createIndex(String indexName) throws Exception {
 		try {
-			LOG.info("Create elasticsearch index {0}", indexName);
+			LOG.info("Create elasticsearch index {}", indexName);
 			client.indices().create(builder -> builder.index(indexName));
-			LOG.info("Create elasticsearch index {0} successful", indexName);
+			LOG.info("Create elasticsearch index {} successful", indexName);
 		} catch (Exception e) {
 			throw new RuntimeException("Create elasticsearch index " + indexName + "failed.", e);
 		}
@@ -48,9 +48,9 @@ public class ElasticsearchRemoteService {
 
 	public void createSecurityRole(PutRoleRequestData requestData) throws Exception {
 		try {
-			LOG.info("Create elasticsearch role {0}", requestData.getName());
+			LOG.info("Create elasticsearch role {}", requestData.getName());
 			client.security().putRole(createPutRoleRequest(requestData));
-			LOG.info("Create elasticsearch role {0} successful", requestData.getName());
+			LOG.info("Create elasticsearch role {} successful", requestData.getName());
 		} catch (Exception e) {
 			throw new RuntimeException("Create elasticsearch role " + requestData.getName() + "failed.", e);
 		}
@@ -80,9 +80,9 @@ public class ElasticsearchRemoteService {
 
 	public void createSecurityUser(PutUserRequestData requestData) throws Exception {
 		try {
-			LOG.info("Create elasticsearch user {0}", requestData.getUsername());
+			LOG.info("Create elasticsearch user {}", requestData.getUsername());
 			client.security().putUser(createPutUserRequest(requestData));
-			LOG.info("Create elasticsearch user {0} successful", requestData.getUsername());
+			LOG.info("Create elasticsearch user {} successful", requestData.getUsername());
 		} catch (Exception e) {
 			throw new RuntimeException("Create elasticsearch user " + requestData.getUsername() + "failed.", e);
 		}
@@ -102,9 +102,9 @@ public class ElasticsearchRemoteService {
 
 	public void deleteIndex(String indexName) throws Exception {
 		try {
-			LOG.info("Delete elasticsearch index {0}", indexName);
+			LOG.info("Delete elasticsearch index {}", indexName);
 			client.indices().delete(builder -> builder.index(indexName));
-			LOG.info("Delete elasticsearch index {0} successful", indexName);
+			LOG.info("Delete elasticsearch index {} successful", indexName);
 		} catch (Exception e) {
 			throw new RuntimeException("Delete elasticsearch index " + indexName + "failed.", e);
 		}
@@ -112,9 +112,9 @@ public class ElasticsearchRemoteService {
 
 	public void deleteSecurityRole(String roleName) throws Exception {
 		try {
-			LOG.info("Delete elasticsearch role {0}", roleName);
+			LOG.info("Delete elasticsearch role {}", roleName);
 			client.security().deleteRole(builder -> builder.name(roleName));
-			LOG.info("Delete elasticsearch role {0} successful", roleName);
+			LOG.info("Delete elasticsearch role {} successful", roleName);
 		} catch (Exception e) {
 			throw new RuntimeException("Delete elasticsearch role " + roleName + "failed.", e);
 		}
@@ -122,9 +122,9 @@ public class ElasticsearchRemoteService {
 
 	public void deleteSecurityUser(String userName) throws Exception {
 		try {
-			LOG.info("Delete elasticsearch user {0}", userName);
+			LOG.info("Delete elasticsearch user {}", userName);
 			client.security().deleteUser(builder -> builder.username(userName));
-			LOG.info("Delete elasticsearch user {0} successful", userName);
+			LOG.info("Delete elasticsearch user {} successful", userName);
 		} catch (Exception e) {
 			throw new RuntimeException("Delete elasticsearch user " + userName + "failed.", e);
 		}