By type
Waiting for onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local to come up
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
Skipping self-checking
2022-11-05 02:42:22.842428 I | etcdmain: etcd Version: 3.2.24
2022-11-05 02:42:22.842641 I | etcdmain: Git SHA: 420a45226
2022-11-05 02:42:22.842653 I | etcdmain: Go Version: go1.8.7
2022-11-05 02:42:22.842663 I | etcdmain: Go OS/Arch: linux/amd64
2022-11-05 02:42:22.842672 I | etcdmain: setting maximum number of CPUs to 8, total number of available CPUs is 8
2022-11-05 02:42:22.842926 I | embed: listening for peers on http://0.0.0.0:2380
2022-11-05 02:42:22.843088 I | embed: listening for client requests on 0.0.0.0:2379
2022-11-05 02:42:22.858911 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.72.41:2380
2022-11-05 02:42:22.859033 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.72.41:2380
2022-11-05 02:42:22.863163 I | etcdserver: name = onap-oof-has-etcd-2
2022-11-05 02:42:22.863199 I | etcdserver: data dir = /var/run/etcd/default.etcd
2022-11-05 02:42:22.863208 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2022-11-05 02:42:22.863214 I | etcdserver: heartbeat = 100ms
2022-11-05 02:42:22.863218 I | etcdserver: election = 1000ms
2022-11-05 02:42:22.863255 I | etcdserver: snapshot count = 100000
2022-11-05 02:42:22.863350 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2379
2022-11-05 02:42:22.863373 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380
2022-11-05 02:42:22.863432 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380
2022-11-05 02:42:22.876395 I | etcdserver: starting member cfa74bd0084c532f in cluster d98d265e45b06c28
2022-11-05 02:42:22.876706 I | raft: cfa74bd0084c532f became follower at term 0
2022-11-05 02:42:22.876791 I | raft: newRaft cfa74bd0084c532f [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2022-11-05 02:42:22.876810 I | raft: cfa74bd0084c532f became follower at term 1
2022-11-05 02:42:22.886868 W | auth: simple token is not cryptographically signed
2022-11-05 02:42:22.890766 I | rafthttp: starting peer c2223c5e03eaf5...
2022-11-05 02:42:22.890875 I | rafthttp: started HTTP pipelining with peer c2223c5e03eaf5
2022-11-05 02:42:22.892349 I | rafthttp: started streaming with peer c2223c5e03eaf5 (writer)
2022-11-05 02:42:22.892565 I | rafthttp: started streaming with peer c2223c5e03eaf5 (writer)
2022-11-05 02:42:22.895533 I | rafthttp: started peer c2223c5e03eaf5
2022-11-05 02:42:22.895589 I | rafthttp: added peer c2223c5e03eaf5
2022-11-05 02:42:22.895623 I | rafthttp: starting peer b26940d7cb32fe32...
2022-11-05 02:42:22.895653 I | rafthttp: started streaming with peer c2223c5e03eaf5 (stream Message reader)
2022-11-05 02:42:22.895839 I | rafthttp: started streaming with peer c2223c5e03eaf5 (stream MsgApp v2 reader)
2022-11-05 02:42:22.895971 I | rafthttp: started HTTP pipelining with peer b26940d7cb32fe32
2022-11-05 02:42:22.897387 I | rafthttp: started streaming with peer b26940d7cb32fe32 (writer)
2022-11-05 02:42:22.898361 I | rafthttp: started streaming with peer b26940d7cb32fe32 (writer)
2022-11-05 02:42:22.900189 I | rafthttp: started peer b26940d7cb32fe32
2022-11-05 02:42:22.900219 I | rafthttp: added peer b26940d7cb32fe32
2022-11-05 02:42:22.900248 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2022-11-05 02:42:22.900320 I | rafthttp: started streaming with peer b26940d7cb32fe32 (stream Message reader)
2022-11-05 02:42:22.900709 I | rafthttp: started streaming with peer b26940d7cb32fe32 (stream MsgApp v2 reader)
2022-11-05 02:42:22.901613 I | etcdserver/membership: added member c2223c5e03eaf5 [http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-11-05 02:42:22.901808 I | etcdserver/membership: added member b26940d7cb32fe32 [http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-11-05 02:42:22.902047 I | etcdserver/membership: added member cfa74bd0084c532f [http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-11-05 02:42:24.279695 I | raft: cfa74bd0084c532f is starting a new election at term 1
2022-11-05 02:42:24.279904 I | raft: cfa74bd0084c532f became candidate at term 2
2022-11-05 02:42:24.279932 I | raft: cfa74bd0084c532f received MsgVoteResp from cfa74bd0084c532f at term 2
2022-11-05 02:42:24.279945 I | raft: cfa74bd0084c532f [logterm: 1, index: 3] sent MsgVote request to c2223c5e03eaf5 at term 2
2022-11-05 02:42:24.279958 I | raft: cfa74bd0084c532f [logterm: 1, index: 3] sent MsgVote request to b26940d7cb32fe32 at term 2
2022-11-05 02:42:25.379736 I | raft: cfa74bd0084c532f is starting a new election at term 2
2022-11-05 02:42:25.380192 I | raft: cfa74bd0084c532f became candidate at term 3
2022-11-05 02:42:25.380300 I | raft: cfa74bd0084c532f received MsgVoteResp from cfa74bd0084c532f at term 3
2022-11-05 02:42:25.380585 I | raft: cfa74bd0084c532f [logterm: 1, index: 3] sent MsgVote request to c2223c5e03eaf5 at term 3
2022-11-05 02:42:25.380726 I | raft: cfa74bd0084c532f [logterm: 1, index: 3] sent MsgVote request to b26940d7cb32fe32 at term 3
2022-11-05 02:42:26.679827 I | raft: cfa74bd0084c532f is starting a new election at term 3
2022-11-05 02:42:26.679911 I | raft: cfa74bd0084c532f became candidate at term 4
2022-11-05 02:42:26.679930 I | raft: cfa74bd0084c532f received MsgVoteResp from cfa74bd0084c532f at term 4
2022-11-05 02:42:26.679946 I | raft: cfa74bd0084c532f [logterm: 1, index: 3] sent MsgVote request to b26940d7cb32fe32 at term 4
2022-11-05 02:42:26.680004 I | raft: cfa74bd0084c532f [logterm: 1, index: 3] sent MsgVote request to c2223c5e03eaf5 at term 4
2022-11-05 02:42:27.267304 I | rafthttp: peer c2223c5e03eaf5 became active
2022-11-05 02:42:27.267350 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream MsgApp v2 reader)
2022-11-05 02:42:27.267404 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream Message reader)
2022-11-05 02:42:27.268450 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream Message writer)
2022-11-05 02:42:27.268734 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream MsgApp v2 writer)
2022-11-05 02:42:27.895898 W | rafthttp: health check for peer c2223c5e03eaf5 could not connect: dial tcp 10.233.68.128:2380: getsockopt: connection refused
2022-11-05 02:42:27.900853 W | rafthttp: health check for peer b26940d7cb32fe32 could not connect: dial tcp 10.233.69.207:2380: getsockopt: connection refused
2022-11-05 02:42:27.977778 I | rafthttp: peer b26940d7cb32fe32 became active
2022-11-05 02:42:27.977848 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream Message writer)
2022-11-05 02:42:27.978040 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream MsgApp v2 reader)
2022-11-05 02:42:27.978167 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream Message reader)
2022-11-05 02:42:27.979775 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream MsgApp v2 writer)
2022-11-05 02:42:28.021906 I | raft: cfa74bd0084c532f [term: 4] ignored a MsgVote message with lower term from c2223c5e03eaf5 [term: 2]
2022-11-05 02:42:28.079788 I | raft: cfa74bd0084c532f is starting a new election at term 4
2022-11-05 02:42:28.079852 I | raft: cfa74bd0084c532f became candidate at term 5
2022-11-05 02:42:28.079869 I | raft: cfa74bd0084c532f received MsgVoteResp from cfa74bd0084c532f at term 5
2022-11-05 02:42:28.079882 I | raft: cfa74bd0084c532f [logterm: 1, index: 3] sent MsgVote request to c2223c5e03eaf5 at term 5
2022-11-05 02:42:28.079894 I | raft: cfa74bd0084c532f [logterm: 1, index: 3] sent MsgVote request to b26940d7cb32fe32 at term 5
2022-11-05 02:42:28.749559 I | raft: cfa74bd0084c532f [term: 5] ignored a MsgVote message with lower term from b26940d7cb32fe32 [term: 3]
2022-11-05 02:42:29.250249 I | raft: cfa74bd0084c532f [logterm: 1, index: 3, vote: cfa74bd0084c532f] rejected MsgVote from c2223c5e03eaf5 [logterm: 2, index: 5] at term 5
2022-11-05 02:42:29.252171 I | raft: cfa74bd0084c532f became follower at term 5
2022-11-05 02:42:29.252223 I | raft: raft.node: cfa74bd0084c532f elected leader c2223c5e03eaf5 at term 5
2022-11-05 02:42:29.256448 I | etcdserver: published {Name:onap-oof-has-etcd-2 ClientURLs:[http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2379]} to cluster d98d265e45b06c28
2022-11-05 02:42:29.256620 I | embed: ready to serve client requests
2022-11-05 02:42:29.257168 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2022-11-05 02:42:29.263717 N | etcdserver/membership: set the initial cluster version to 3.2
2022-11-05 02:42:29.263837 I | etcdserver/api: enabled capabilities for version 3.2
2022-11-05 02:42:32.896144 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.459494324s > 1s]
2022-11-05 02:42:37.364569 N | auth: added a new user: root
2022-11-05 02:42:37.477938 N | auth: added a new user: conductor
2022-11-05 02:42:37.504982 N | auth: Role conductor is created
2022-11-05 02:42:37.530603 N | auth: role conductor's permission of key conductor is updated as READWRITE
2022-11-05 02:42:37.553796 N | auth: granted role conductor to user conductor
2022-11-05 02:42:37.582866 N | auth: Role root is created
2022-11-05 02:42:37.586719 N | auth: granted role root to user root
2022-11-05 02:42:37.590673 N | auth: Authentication enabled
2022-11-05 02:43:02.896400 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.459779605s > 1s]
2022-11-05 02:43:32.896660 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.459946451s > 1s]
2022-11-05 02:44:02.896910 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.460481097s > 1s]
2022-11-05 02:44:32.897260 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.460760172s > 1s]
2022-11-05 02:45:02.897513 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.4610899s > 1s]
2022-11-05 02:45:32.898015 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.461421833s > 1s]
2022-11-05 02:46:02.898247 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.462032369s > 1s]
2022-11-05 02:46:32.898644 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.462752104s > 1s]
2022-11-05 02:47:02.898905 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.462864727s > 1s]
2022-11-05 02:47:32.899253 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.463331709s > 1s]
2022-11-05 02:48:02.899534 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.463800656s > 1s]
2022-11-05 02:48:32.899778 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.464070512s > 1s]
2022-11-05 02:49:02.899977 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.464682997s > 1s]
2022-11-05 02:49:32.900159 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.46504164s > 1s]
2022-11-05 02:50:02.900547 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.465587877s > 1s]
2022-11-05 02:50:32.900811 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.466284593s > 1s]
2022-11-05 02:51:02.900986 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.466528947s > 1s]
2022-11-05 02:51:32.901211 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.466931673s > 1s]
2022-11-05 02:52:02.901461 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.466250219s > 1s]
2022-11-05 02:52:32.901709 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.467634402s > 1s]
2022-11-05 02:53:02.902163 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.47101886s > 1s]
2022-11-05 02:53:12.856849 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (103.926338ms) to execute
2022-11-05 02:53:14.750254 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (141.49947ms) to execute
2022-11-05 02:53:15.010102 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (113.538302ms) to execute
2022-11-05 02:53:20.692102 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (115.392064ms) to execute
2022-11-05 02:53:20.918617 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (123.173387ms) to execute
2022-11-05 02:53:21.108983 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (103.305958ms) to execute
2022-11-05 02:53:22.713838 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (217.074623ms) to execute
2022-11-05 02:53:24.075965 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (173.772348ms) to execute
2022-11-05 02:53:24.374505 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (172.669842ms) to execute
2022-11-05 02:53:24.626292 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (241.299572ms) to execute
2022-11-05 02:53:24.628511 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (251.650621ms) to execute
2022-11-05 02:53:24.761632 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (118.971876ms) to execute
2022-11-05 02:53:24.761879 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (109.125686ms) to execute
2022-11-05 02:53:24.762094 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (109.021021ms) to execute
2022-11-05 02:53:26.969136 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (154.651981ms) to execute
2022-11-05 02:53:27.648701 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (215.161233ms) to execute
2022-11-05 02:53:27.649126 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (212.534349ms) to execute
2022-11-05 02:53:27.649308 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (108.932884ms) to execute
2022-11-05 02:53:27.761281 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.524426ms) to execute
2022-11-05 02:53:28.035635 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (101.751991ms) to execute
2022-11-05 02:53:29.481455 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (121.626328ms) to execute
2022-11-05 02:53:29.481625 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (109.999849ms) to execute
2022-11-05 02:53:29.812081 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (195.469658ms) to execute
2022-11-05 02:53:31.227990 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (213.713742ms) to execute
2022-11-05 02:53:31.679516 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (194.506448ms) to execute
2022-11-05 02:53:32.902706 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.470774662s > 1s]
2022-11-05 02:53:33.000757 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (153.277289ms) to execute
2022-11-05 02:53:33.330536 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (105.661392ms) to execute
2022-11-05 02:53:33.453468 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (115.441914ms) to execute
2022-11-05 02:53:35.238710 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (233.226211ms) to execute
2022-11-05 02:53:35.485588 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (194.217469ms) to execute
2022-11-05 02:53:36.058119 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (112.976255ms) to execute
2022-11-05 02:53:36.716533 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (102.7252ms) to execute
2022-11-05 02:53:37.678125 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (129.130801ms) to execute
2022-11-05 02:53:38.421158 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (382.408166ms) to execute
2022-11-05 02:53:38.639184 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (208.481611ms) to execute
2022-11-05 02:53:38.777748 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (112.868045ms) to execute
2022-11-05 02:53:38.778030 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (120.730086ms) to execute
2022-11-05 02:53:38.778499 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (348.534341ms) to execute
2022-11-05 02:53:39.373780 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (292.82058ms) to execute
2022-11-05 02:53:40.291147 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (205.877161ms) to execute
2022-11-05 02:53:40.656390 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (225.543646ms) to execute
2022-11-05 02:53:40.857618 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (191.974576ms) to execute
2022-11-05 02:53:40.857831 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (192.621713ms) to execute
2022-11-05 02:53:41.040009 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (119.964479ms) to execute
2022-11-05 02:53:41.040152 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (139.152614ms) to execute
2022-11-05 02:53:41.447914 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (108.214347ms) to execute
2022-11-05 02:53:42.989247 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (446.402002ms) to execute
2022-11-05 02:53:43.106655 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (107.024078ms) to execute
2022-11-05 02:53:43.108014 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (108.401595ms) to execute
2022-11-05 02:53:43.431977 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (139.146908ms) to execute
2022-11-05 02:53:43.923637 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (299.908203ms) to execute
2022-11-05 02:53:46.658766 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (306.783825ms) to execute
2022-11-05 02:53:47.543794 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (165.294322ms) to execute
2022-11-05 02:53:52.239348 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (175.597851ms) to execute
2022-11-05 02:53:52.538015 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (116.709475ms) to execute
2022-11-05 02:53:53.267391 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (137.993417ms) to execute
2022-11-05 02:53:55.544993 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (137.822044ms) to execute
2022-11-05 02:53:55.901920 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (251.529629ms) to execute
2022-11-05 02:53:56.517361 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (112.676231ms) to execute
2022-11-05 02:53:56.679178 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (140.765041ms) to execute
2022-11-05 02:53:57.199781 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (401.267116ms) to execute
2022-11-05 02:54:00.223161 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (178.529181ms) to execute
2022-11-05 02:54:00.927309 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (156.818253ms) to execute
2022-11-05 02:54:02.904920 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.469006767s > 1s]
2022-11-05 02:54:03.418489 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (122.464866ms) to execute
2022-11-05 02:54:03.925178 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (113.959975ms) to execute
2022-11-05 02:54:04.342266 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (109.676435ms) to execute
2022-11-05 02:54:05.075471 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (155.930786ms) to execute
2022-11-05 02:54:05.597055 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (140.40737ms) to execute
2022-11-05 02:54:05.597284 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (165.173019ms) to execute
2022-11-05 02:54:06.667750 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (258.723404ms) to execute
2022-11-05 02:54:06.909364 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (212.572965ms) to execute
2022-11-05 02:54:07.054832 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (124.520055ms) to execute
2022-11-05 02:54:07.055152 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (135.754531ms) to execute
2022-11-05 02:54:08.791392 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (211.516236ms) to execute
2022-11-05 02:54:09.138004 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (186.69006ms) to execute
2022-11-05 02:54:32.905146 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.467822415s > 1s]
2022-11-05 02:54:33.590675 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (227.7247ms) to execute
2022-11-05 02:54:33.591007 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.092593ms) to execute
2022-11-05 02:54:33.898250 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (181.229286ms) to execute
2022-11-05 02:54:36.241120 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (116.158624ms) to execute
2022-11-05 02:54:36.703134 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (133.435934ms) to execute
2022-11-05 02:54:52.734120 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (239.98853ms) to execute
2022-11-05 02:54:53.064861 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (274.431271ms) to execute
2022-11-05 02:54:55.718503 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (172.21177ms) to execute
2022-11-05 02:55:01.423883 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (188.072009ms) to execute
2022-11-05 02:55:01.732639 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (190.854282ms) to execute
2022-11-05 02:55:02.905440 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.469209766s > 1s]
2022-11-05 02:55:03.080985 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (204.302232ms) to execute
2022-11-05 02:55:03.464083 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (181.728782ms) to execute
2022-11-05 02:55:03.578942 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (287.191197ms) to execute
2022-11-05 02:55:03.579331 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (193.722183ms) to execute
2022-11-05 02:55:03.782268 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (198.376923ms) to execute
2022-11-05 02:55:04.000067 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (105.813508ms) to execute
2022-11-05 02:55:04.407086 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (201.164513ms) to execute
2022-11-05 02:55:05.213436 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (130.778644ms) to execute
2022-11-05 02:55:06.724892 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (178.686825ms) to execute
2022-11-05 02:55:13.847195 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (107.281666ms) to execute
2022-11-05 02:55:15.708772 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (172.7399ms) to execute
2022-11-05 02:55:17.033069 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (120.370124ms) to execute
2022-11-05 02:55:17.315695 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (152.268233ms) to execute
2022-11-05 02:55:23.747161 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (392.754686ms) to execute
2022-11-05 02:55:25.151228 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (255.62063ms) to execute
2022-11-05 02:55:25.681095 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (353.97612ms) to execute
2022-11-05 02:55:25.817193 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (126.240858ms) to execute
2022-11-05 02:55:25.817339 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (127.899196ms) to execute
2022-11-05 02:55:27.116675 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (143.261923ms) to execute
2022-11-05 02:55:27.957215 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (209.87ms) to execute
2022-11-05 02:55:28.142420 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (126.639753ms) to execute
2022-11-05 02:55:28.665919 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (207.515767ms) to execute
2022-11-05 02:55:30.377090 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (390.753971ms) to execute
2022-11-05 02:55:30.898197 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (379.967899ms) to execute
2022-11-05 02:55:32.155699 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (100.218684ms) to execute
2022-11-05 02:55:32.500046 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (184.988266ms) to execute
2022-11-05 02:55:32.910479 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.470311411s > 1s]
2022-11-05 02:55:44.219392 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (161.599598ms) to execute
2022-11-05 02:55:45.450021 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (189.738747ms) to execute
2022-11-05 02:55:45.796575 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (205.364108ms) to execute
2022-11-05 02:55:47.119528 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (252.891122ms) to execute
2022-11-05 02:55:47.506594 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (179.654113ms) to execute
2022-11-05 02:55:48.733503 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (105.496005ms) to execute
2022-11-05 02:55:49.056367 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (229.76459ms) to execute
2022-11-05 02:55:49.670620 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (101.460581ms) to execute
2022-11-05 02:55:52.159714 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (220.773188ms) to execute
2022-11-05 02:55:58.745838 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (108.504613ms) to execute
2022-11-05 02:56:02.910872 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.470349197s > 1s]
2022-11-05 02:56:04.182025 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (101.966261ms) to execute
2022-11-05 02:56:16.074283 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (125.272969ms) to execute
2022-11-05 02:56:17.286712 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (115.372325ms) to execute
2022-11-05 02:56:18.743950 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (214.185132ms) to execute
2022-11-05 02:56:18.974680 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (107.213174ms) to execute
2022-11-05 02:56:20.266410 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (141.750815ms) to execute
2022-11-05 02:56:24.842181 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (131.862044ms) to execute
2022-11-05 02:56:32.911251 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.473327003s > 1s]
2022-11-05 02:56:37.039741 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (176.496232ms) to execute
2022-11-05 02:56:37.385805 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (105.02066ms) to execute
2022-11-05 02:56:37.386135 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (108.440178ms) to execute
2022-11-05 02:56:38.681441 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (128.527353ms) to execute
2022-11-05 02:56:39.120393 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (278.150556ms) to execute
2022-11-05 02:56:40.501958 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (294.101486ms) to execute
2022-11-05 02:56:40.847984 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (204.141825ms) to execute
2022-11-05 02:56:42.176084 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (184.547577ms) to execute
2022-11-05 02:56:42.595937 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (274.098227ms) to execute
2022-11-05 02:56:42.736788 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (133.268908ms) to execute
2022-11-05 02:56:42.736989 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (133.522214ms) to execute
2022-11-05 02:56:42.744768 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (141.209786ms) to execute
2022-11-05 02:56:43.076838 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (143.139983ms) to execute
2022-11-05 02:56:44.256851 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (127.74194ms) to execute
2022-11-05 02:56:45.564317 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (229.605361ms) to execute
2022-11-05 02:56:45.682333 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (102.711508ms) to execute
2022-11-05 02:56:45.682458 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (112.188281ms) to execute
2022-11-05 02:56:45.819840 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (126.305661ms) to execute
2022-11-05 02:56:46.301748 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (129.439347ms) to execute
2022-11-05 02:56:46.641543 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (197.763133ms) to execute
2022-11-05 02:56:59.508231 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (108.477027ms) to execute
2022-11-05 02:57:02.912156 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.472041143s > 1s]
2022-11-05 02:57:04.392122 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (110.875435ms) to execute
2022-11-05 02:57:06.941016 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (133.45636ms) to execute
2022-11-05 02:57:23.269844 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (100.637039ms) to execute
2022-11-05 02:57:23.686861 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (195.902667ms) to execute
2022-11-05 02:57:24.993135 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (151.849529ms) to execute
2022-11-05 02:57:25.395740 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (312.153052ms) to execute
2022-11-05 02:57:25.954088 W | etcdserver: request "header: authenticate: