By type
Waiting for onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local to come up
Skipping self-checking
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
2022-04-11 04:49:12.987481 I | etcdmain: etcd Version: 3.2.24
2022-04-11 04:49:12.987804 I | etcdmain: Git SHA: 420a45226
2022-04-11 04:49:12.988088 I | etcdmain: Go Version: go1.8.7
2022-04-11 04:49:12.988290 I | etcdmain: Go OS/Arch: linux/amd64
2022-04-11 04:49:12.988409 I | etcdmain: setting maximum number of CPUs to 8, total number of available CPUs is 8
2022-04-11 04:49:12.988755 I | embed: listening for peers on http://0.0.0.0:2380
2022-04-11 04:49:12.988951 I | embed: listening for client requests on 0.0.0.0:2379
2022-04-11 04:49:13.002093 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.68.139:2380
2022-04-11 04:49:13.002363 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.68.139:2380
2022-04-11 04:49:13.007681 I | etcdserver: name = onap-oof-has-etcd-1
2022-04-11 04:49:13.007851 I | etcdserver: data dir = /var/run/etcd/default.etcd
2022-04-11 04:49:13.007893 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2022-04-11 04:49:13.008199 I | etcdserver: heartbeat = 100ms
2022-04-11 04:49:13.008262 I | etcdserver: election = 1000ms
2022-04-11 04:49:13.008317 I | etcdserver: snapshot count = 100000
2022-04-11 04:49:13.008527 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2379
2022-04-11 04:49:13.008941 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380
2022-04-11 04:49:13.009061 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380
2022-04-11 04:49:13.025874 I | etcdserver: starting member b26940d7cb32fe32 in cluster d98d265e45b06c28
2022-04-11 04:49:13.026164 I | raft: b26940d7cb32fe32 became follower at term 0
2022-04-11 04:49:13.026692 I | raft: newRaft b26940d7cb32fe32 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2022-04-11 04:49:13.026871 I | raft: b26940d7cb32fe32 became follower at term 1
2022-04-11 04:49:13.034429 W | auth: simple token is not cryptographically signed
2022-04-11 04:49:13.037165 I | rafthttp: starting peer c2223c5e03eaf5...
2022-04-11 04:49:13.037248 I | rafthttp: started HTTP pipelining with peer c2223c5e03eaf5
2022-04-11 04:49:13.038050 I | rafthttp: started streaming with peer c2223c5e03eaf5 (writer)
2022-04-11 04:49:13.038362 I | rafthttp: started streaming with peer c2223c5e03eaf5 (writer)
2022-04-11 04:49:13.041528 I | rafthttp: started peer c2223c5e03eaf5
2022-04-11 04:49:13.041568 I | rafthttp: added peer c2223c5e03eaf5
2022-04-11 04:49:13.041586 I | rafthttp: starting peer cfa74bd0084c532f...
2022-04-11 04:49:13.041612 I | rafthttp: started streaming with peer c2223c5e03eaf5 (stream Message reader)
2022-04-11 04:49:13.041697 I | rafthttp: started streaming with peer c2223c5e03eaf5 (stream MsgApp v2 reader)
2022-04-11 04:49:13.042385 I | rafthttp: started HTTP pipelining with peer cfa74bd0084c532f
2022-04-11 04:49:13.042777 I | rafthttp: started streaming with peer cfa74bd0084c532f (writer)
2022-04-11 04:49:13.055182 I | rafthttp: started streaming with peer cfa74bd0084c532f (writer)
2022-04-11 04:49:13.058183 I | rafthttp: peer c2223c5e03eaf5 became active
2022-04-11 04:49:13.058223 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream Message reader)
2022-04-11 04:49:13.058285 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream MsgApp v2 reader)
2022-04-11 04:49:13.058864 I | rafthttp: started peer cfa74bd0084c532f
2022-04-11 04:49:13.058903 I | rafthttp: added peer cfa74bd0084c532f
2022-04-11 04:49:13.058941 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2022-04-11 04:49:13.059254 I | rafthttp: started streaming with peer cfa74bd0084c532f (stream MsgApp v2 reader)
2022-04-11 04:49:13.059330 I | rafthttp: started streaming with peer cfa74bd0084c532f (stream Message reader)
2022-04-11 04:49:13.060382 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream MsgApp v2 writer)
2022-04-11 04:49:13.060424 I | rafthttp: peer cfa74bd0084c532f became active
2022-04-11 04:49:13.060440 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream Message writer)
2022-04-11 04:49:13.060466 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream Message writer)
2022-04-11 04:49:13.060499 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream MsgApp v2 writer)
2022-04-11 04:49:13.061945 I | etcdserver/membership: added member c2223c5e03eaf5 [http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-04-11 04:49:13.062128 I | etcdserver/membership: added member b26940d7cb32fe32 [http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-04-11 04:49:13.062330 I | etcdserver/membership: added member cfa74bd0084c532f [http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-04-11 04:49:13.063395 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream Message reader)
2022-04-11 04:49:13.063570 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream MsgApp v2 reader)
2022-04-11 04:49:13.081631 I | raft: b26940d7cb32fe32 [term: 1] received a MsgHeartbeat message with higher term from cfa74bd0084c532f [term: 3]
2022-04-11 04:49:13.081959 I | raft: b26940d7cb32fe32 became follower at term 3
2022-04-11 04:49:13.082083 I | raft: raft.node: b26940d7cb32fe32 elected leader cfa74bd0084c532f at term 3
2022-04-11 04:49:13.086033 N | etcdserver/membership: set the initial cluster version to 3.0
2022-04-11 04:49:13.086109 I | etcdserver/api: enabled capabilities for version 3.0
2022-04-11 04:49:13.087168 I | etcdserver: published {Name:onap-oof-has-etcd-1 ClientURLs:[http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2379]} to cluster d98d265e45b06c28
2022-04-11 04:49:13.087395 I | embed: ready to serve client requests
2022-04-11 04:49:13.088019 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2022-04-11 04:49:13.109832 I | etcdserver: b26940d7cb32fe32 initialzed peer connection; fast-forwarding 8 ticks (election ticks 10) with 2 active peer(s)
2022-04-11 04:49:15.802318 N | etcdserver/membership: updated the cluster version from 3.0 to 3.2
2022-04-11 04:49:15.802509 I | etcdserver/api: enabled capabilities for version 3.2
2022-04-11 04:49:17.505213 N | auth: added a new user: root
2022-04-11 04:49:17.629581 N | auth: added a new user: conductor
2022-04-11 04:49:17.657979 N | auth: Role conductor is created
2022-04-11 04:49:17.682510 N | auth: role conductor's permission of key conductor is updated as READWRITE
2022-04-11 04:49:17.710171 N | auth: granted role conductor to user conductor
2022-04-11 04:49:17.739575 N | auth: Role root is created
2022-04-11 04:49:17.742759 N | auth: granted role root to user root
2022-04-11 04:49:17.745354 N | auth: Authentication enabled
2022-04-11 04:49:18.059813 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.057971472s > 1s]
2022-04-11 04:49:48.060017 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.059083507s > 1s]
2022-04-11 04:50:18.060251 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.060567188s > 1s]
2022-04-11 04:50:48.060551 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.061188148s > 1s]
2022-04-11 04:51:18.060921 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.062923741s > 1s]
2022-04-11 04:51:48.061154 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.06703815s > 1s]
2022-04-11 04:52:18.061463 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.065792385s > 1s]
2022-04-11 04:52:48.061805 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.067322862s > 1s]
2022-04-11 04:53:18.062205 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.068718831s > 1s]
2022-04-11 04:53:48.062522 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.069990277s > 1s]
2022-04-11 04:54:18.062796 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.071449528s > 1s]
2022-04-11 04:54:48.063049 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.072656579s > 1s]
2022-04-11 04:55:18.063412 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.07423249s > 1s]
2022-04-11 04:55:48.063702 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.075450197s > 1s]
2022-04-11 04:56:18.063968 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.077126224s > 1s]
2022-04-11 04:56:48.064255 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.078496142s > 1s]
2022-04-11 04:57:18.064672 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.079407119s > 1s]
2022-04-11 04:57:40.229048 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (128.972031ms) to execute
2022-04-11 04:57:41.490959 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (108.652057ms) to execute
2022-04-11 04:57:42.912254 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (131.1211ms) to execute
2022-04-11 04:57:43.189079 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (202.808109ms) to execute
2022-04-11 04:57:43.797453 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (250.784894ms) to execute
2022-04-11 04:57:45.234033 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (207.457169ms) to execute
2022-04-11 04:57:45.611839 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (197.87734ms) to execute
2022-04-11 04:57:46.929322 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (139.445449ms) to execute
2022-04-11 04:57:48.064930 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.080245492s > 1s]
2022-04-11 04:57:48.263916 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (106.227545ms) to execute
2022-04-11 04:57:48.604286 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (135.768199ms) to execute
2022-04-11 04:57:51.595261 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (108.895872ms) to execute
2022-04-11 04:57:54.268585 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (155.427233ms) to execute
2022-04-11 04:58:03.516690 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (335.031549ms) to execute
2022-04-11 04:58:03.991934 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (445.924606ms) to execute
2022-04-11 04:58:04.575524 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (148.144785ms) to execute
2022-04-11 04:58:05.442287 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (131.896595ms) to execute
2022-04-11 04:58:05.998000 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (274.140494ms) to execute
2022-04-11 04:58:06.584000 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (234.184615ms) to execute
2022-04-11 04:58:07.212498 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (211.13762ms) to execute
2022-04-11 04:58:07.396123 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (158.310201ms) to execute
2022-04-11 04:58:07.584154 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (114.324395ms) to execute
2022-04-11 04:58:08.872232 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (166.401251ms) to execute
2022-04-11 04:58:09.214180 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (146.716528ms) to execute
2022-04-11 04:58:09.413843 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (133.48306ms) to execute
2022-04-11 04:58:10.884183 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (265.647345ms) to execute
2022-04-11 04:58:11.091574 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (192.332797ms) to execute
2022-04-11 04:58:11.467663 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (209.311791ms) to execute
2022-04-11 04:58:11.746649 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (179.270082ms) to execute
2022-04-11 04:58:13.717995 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (267.959035ms) to execute
2022-04-11 04:58:14.336712 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (174.920893ms) to execute
2022-04-11 04:58:15.122943 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (521.0262ms) to execute
2022-04-11 04:58:16.684316 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (388.045351ms) to execute
2022-04-11 04:58:17.218174 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (240.520931ms) to execute
2022-04-11 04:58:17.632684 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (106.402663ms) to execute
2022-04-11 04:58:18.069792 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.087933843s > 1s]
2022-04-11 04:58:18.687711 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (918.695733ms) to execute
2022-04-11 04:58:18.849240 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (148.795034ms) to execute
2022-04-11 04:58:18.849460 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (138.758345ms) to execute
2022-04-11 04:58:29.931488 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (253.590408ms) to execute
2022-04-11 04:58:31.429956 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (155.044342ms) to execute
2022-04-11 04:58:31.824222 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (128.097365ms) to execute
2022-04-11 04:58:33.213612 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (138.430363ms) to execute
2022-04-11 04:58:34.086225 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (700.025516ms) to execute
2022-04-11 04:58:34.379470 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (137.154098ms) to execute
2022-04-11 04:58:34.980866 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (306.817804ms) to execute
2022-04-11 04:58:36.048174 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (242.013429ms) to execute
2022-04-11 04:58:36.251982 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (125.954159ms) to execute
2022-04-11 04:58:36.252224 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (123.675464ms) to execute
2022-04-11 04:58:36.618414 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (308.503205ms) to execute
2022-04-11 04:58:37.171543 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (521.826375ms) to execute
2022-04-11 04:58:37.172006 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (293.051676ms) to execute
2022-04-11 04:58:38.934888 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (195.679614ms) to execute
2022-04-11 04:58:39.253725 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (283.64936ms) to execute
2022-04-11 04:58:39.625893 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (158.982343ms) to execute
2022-04-11 04:58:39.883803 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (210.341549ms) to execute
2022-04-11 04:58:39.884355 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (172.407444ms) to execute
2022-04-11 04:58:40.225826 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (282.172179ms) to execute
2022-04-11 04:58:40.226156 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (294.403686ms) to execute
2022-04-11 04:58:40.743645 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (469.652443ms) to execute
2022-04-11 04:58:41.097469 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (316.563125ms) to execute
2022-04-11 04:58:41.097899 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (348.447467ms) to execute
2022-04-11 04:58:41.291526 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (157.628071ms) to execute
2022-04-11 04:58:41.601251 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (458.616452ms) to execute
2022-04-11 04:58:41.601844 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (112.10442ms) to execute
2022-04-11 04:58:41.783449 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (130.863703ms) to execute
2022-04-11 04:58:43.236826 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (291.040635ms) to execute
2022-04-11 04:58:43.237085 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (291.223863ms) to execute
2022-04-11 04:58:44.057156 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (538.092042ms) to execute
2022-04-11 04:58:44.374813 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (122.977258ms) to execute
2022-04-11 04:58:44.847058 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (164.916659ms) to execute
2022-04-11 04:58:47.820318 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (222.553914ms) to execute
2022-04-11 04:58:48.077885 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.082868958s > 1s]
2022-04-11 04:58:50.932805 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (535.768418ms) to execute
2022-04-11 04:58:51.205142 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (111.834308ms) to execute
2022-04-11 04:58:52.674482 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.078286377s) to execute
2022-04-11 04:58:53.045165 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (270.444075ms) to execute
2022-04-11 04:58:53.866113 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (236.278691ms) to execute
2022-04-11 04:58:55.910443 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (131.631833ms) to execute
2022-04-11 04:58:56.587962 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (395.370394ms) to execute
2022-04-11 04:58:57.453208 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (389.323285ms) to execute
2022-04-11 04:58:58.030307 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (210.926611ms) to execute
2022-04-11 04:58:58.592093 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (253.243248ms) to execute
2022-04-11 04:58:59.530901 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (309.860383ms) to execute
2022-04-11 04:59:02.348860 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (506.083806ms) to execute
2022-04-11 04:59:03.365461 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (231.084446ms) to execute
2022-04-11 04:59:06.414863 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (442.364325ms) to execute
2022-04-11 04:59:06.682691 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (224.916541ms) to execute
2022-04-11 04:59:06.683734 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (248.934602ms) to execute
2022-04-11 04:59:07.149854 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (200.780209ms) to execute
2022-04-11 04:59:07.782889 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (256.796221ms) to execute
2022-04-11 04:59:07.910786 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (103.687025ms) to execute
2022-04-11 04:59:08.217463 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (195.824848ms) to execute
2022-04-11 04:59:08.411510 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (166.740745ms) to execute
2022-04-11 04:59:08.708795 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (287.467944ms) to execute
2022-04-11 04:59:08.709773 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (291.48927ms) to execute
2022-04-11 04:59:08.905453 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (180.554271ms) to execute
2022-04-11 04:59:08.906012 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (190.27736ms) to execute
2022-04-11 04:59:08.906648 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (183.446167ms) to execute
2022-04-11 04:59:10.465238 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (314.59035ms) to execute
2022-04-11 04:59:10.799751 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (285.620934ms) to execute
2022-04-11 04:59:11.169047 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (166.703349ms) to execute
2022-04-11 04:59:11.169933 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (197.113994ms) to execute
2022-04-11 04:59:11.463698 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (243.221247ms) to execute
2022-04-11 04:59:12.839477 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (169.134302ms) to execute
2022-04-11 04:59:12.997322 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (138.951933ms) to execute
2022-04-11 04:59:13.128327 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (127.281494ms) to execute
2022-04-11 04:59:13.128936 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (116.453323ms) to execute
2022-04-11 04:59:13.338544 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (151.923958ms) to execute
2022-04-11 04:59:13.558747 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (200.745771ms) to execute
2022-04-11 04:59:13.685977 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (117.18442ms) to execute
2022-04-11 04:59:13.686221 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (121.097488ms) to execute
2022-04-11 04:59:17.493451 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (118.969407ms) to execute
2022-04-11 04:59:18.078145 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.079020751s > 1s]
2022-04-11 04:59:18.973917 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (188.180635ms) to execute
2022-04-11 04:59:19.201905 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (183.605995ms) to execute
2022-04-11 04:59:20.700595 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (118.511565ms) to execute
2022-04-11 04:59:21.917076 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (123.963233ms) to execute
2022-04-11 04:59:23.306884 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (102.717611ms) to execute
2022-04-11 04:59:24.665745 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (175.838158ms) to execute
2022-04-11 04:59:24.794179 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (100.264203ms) to execute
2022-04-11 04:59:24.794329 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (112.407265ms) to execute
2022-04-11 04:59:25.390390 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (381.174739ms) to execute
2022-04-11 04:59:26.297664 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (598.01313ms) to execute
2022-04-11 04:59:26.604350 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (107.42516ms) to execute
2022-04-11 04:59:35.091615 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (101.361981ms) to execute
2022-04-11 04:59:41.886391 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (109.268432ms) to execute
2022-04-11 04:59:43.405214 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (133.832281ms) to execute
2022-04-11 04:59:48.081814 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.082262084s > 1s]
2022-04-11 04:59:48.474481 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (118.163309ms) to execute
2022-04-11 04:59:48.900521 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (108.227457ms) to execute
2022-04-11 04:59:51.808079 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (182.222028ms) to execute
2022-04-11 04:59:54.406614 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (224.671051ms) to execute
2022-04-11 04:59:54.785619 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (258.990763ms) to execute
2022-04-11 04:59:54.906302 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (229.381026ms) to execute
2022-04-11 04:59:55.029063 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (111.525596ms) to execute
2022-04-11 04:59:55.029781 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (119.067702ms) to execute
2022-04-11 04:59:55.036387 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (125.540382ms) to execute
2022-04-11 04:59:56.249795 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (117.89914ms) to execute
2022-04-11 04:59:56.469294 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (103.651608ms) to execute
2022-04-11 05:00:08.543711 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (130.513152ms) to execute
2022-04-11 05:00:08.931934 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (188.886269ms) to execute
2022-04-11 05:00:12.083497 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (104.065363ms) to execute
2022-04-11 05:00:17.107577 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (162.70473ms) to execute
2022-04-11 05:00:18.082518 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.085980668s > 1s]
2022-04-11 05:00:27.736562 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (106.157022ms) to execute
2022-04-11 05:00:30.268523 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (106.517643ms) to execute
2022-04-11 05:00:31.438258 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (109.244806ms) to execute
2022-04-11 05:00:31.744305 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (129.592676ms) to execute
2022-04-11 05:00:34.088295 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (123.040247ms) to execute
2022-04-11 05:00:36.942810 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (222.286218ms) to execute
2022-04-11 05:00:37.508826 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (321.277219ms) to execute
2022-04-11 05:00:38.559710 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (157.543571ms) to execute
2022-04-11 05:00:38.916230 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (186.321064ms) to execute
2022-04-11 05:00:40.391792 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (322.583879ms) to execute
2022-04-11 05:00:40.826163 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (256.334932ms) to execute
2022-04-11 05:00:41.709254 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (135.497238ms) to execute
2022-04-11 05:00:42.121351 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (144.860737ms) to execute
2022-04-11 05:00:44.112000 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (233.181174ms) to execute
2022-04-11 05:00:44.408745 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (133.944243ms) to execute
2022-04-11 05:00:44.822016 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (148.941091ms) to execute
2022-04-11 05:00:47.096596 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (130.046109ms) to execute
2022-04-11 05:00:47.558288 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (266.794335ms) to execute
2022-04-11 05:00:48.089553 W | rafthttp: the clock difference against peer cfa74bd0084c532f is too high [1.088169237s > 1s]
2022-04-11 05:00:48.923175 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (158.090662ms) to execute
2022-04-11 05:00:57.666177 W | etcdserver: request "header: authenticate: