By type
Skipping self-checking
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
2022-06-24 04:58:18.455492 I | etcdmain: etcd Version: 3.2.24
2022-06-24 04:58:18.455803 I | etcdmain: Git SHA: 420a45226
2022-06-24 04:58:18.455821 I | etcdmain: Go Version: go1.8.7
2022-06-24 04:58:18.455832 I | etcdmain: Go OS/Arch: linux/amd64
2022-06-24 04:58:18.455844 I | etcdmain: setting maximum number of CPUs to 8, total number of available CPUs is 8
2022-06-24 04:58:18.456199 I | embed: listening for peers on http://0.0.0.0:2380
2022-06-24 04:58:18.456369 I | embed: listening for client requests on 0.0.0.0:2379
2022-06-24 04:58:18.484190 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.72.175:2380
2022-06-24 04:58:18.484279 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.72.175:2380
2022-06-24 04:58:18.497730 I | etcdserver: name = onap-oof-has-etcd-0
2022-06-24 04:58:18.497796 I | etcdserver: data dir = /var/run/etcd/default.etcd
2022-06-24 04:58:18.497819 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2022-06-24 04:58:18.497833 I | etcdserver: heartbeat = 100ms
2022-06-24 04:58:18.497846 I | etcdserver: election = 1000ms
2022-06-24 04:58:18.497860 I | etcdserver: snapshot count = 100000
2022-06-24 04:58:18.497912 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2379
2022-06-24 04:58:18.497934 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380
2022-06-24 04:58:18.498016 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380
2022-06-24 04:58:18.529242 I | etcdserver: starting member c2223c5e03eaf5 in cluster d98d265e45b06c28
2022-06-24 04:58:18.529386 I | raft: c2223c5e03eaf5 became follower at term 0
2022-06-24 04:58:18.529509 I | raft: newRaft c2223c5e03eaf5 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2022-06-24 04:58:18.529563 I | raft: c2223c5e03eaf5 became follower at term 1
2022-06-24 04:58:18.547134 W | auth: simple token is not cryptographically signed
2022-06-24 04:58:18.554477 I | rafthttp: starting peer b26940d7cb32fe32...
2022-06-24 04:58:18.554759 I | rafthttp: started HTTP pipelining with peer b26940d7cb32fe32
2022-06-24 04:58:18.556447 I | rafthttp: started streaming with peer b26940d7cb32fe32 (writer)
2022-06-24 04:58:18.558221 I | rafthttp: started streaming with peer b26940d7cb32fe32 (writer)
2022-06-24 04:58:18.559684 I | rafthttp: started peer b26940d7cb32fe32
2022-06-24 04:58:18.559757 I | rafthttp: added peer b26940d7cb32fe32
2022-06-24 04:58:18.559820 I | rafthttp: starting peer cfa74bd0084c532f...
2022-06-24 04:58:18.559969 I | rafthttp: started HTTP pipelining with peer cfa74bd0084c532f
2022-06-24 04:58:18.563641 I | rafthttp: started streaming with peer b26940d7cb32fe32 (stream Message reader)
2022-06-24 04:58:18.563689 I | rafthttp: started streaming with peer cfa74bd0084c532f (writer)
2022-06-24 04:58:18.563814 I | rafthttp: started streaming with peer b26940d7cb32fe32 (stream MsgApp v2 reader)
2022-06-24 04:58:18.570408 I | rafthttp: peer b26940d7cb32fe32 became active
2022-06-24 04:58:18.570595 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream Message reader)
2022-06-24 04:58:18.572389 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream MsgApp v2 reader)
2022-06-24 04:58:18.576250 I | rafthttp: started peer cfa74bd0084c532f
2022-06-24 04:58:18.576334 I | rafthttp: added peer cfa74bd0084c532f
2022-06-24 04:58:18.576414 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2022-06-24 04:58:18.577430 I | rafthttp: started streaming with peer cfa74bd0084c532f (writer)
2022-06-24 04:58:18.577551 I | rafthttp: started streaming with peer cfa74bd0084c532f (stream MsgApp v2 reader)
2022-06-24 04:58:18.580913 I | rafthttp: peer cfa74bd0084c532f became active
2022-06-24 04:58:18.580958 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream Message writer)
2022-06-24 04:58:18.581017 I | rafthttp: started streaming with peer cfa74bd0084c532f (stream Message reader)
2022-06-24 04:58:18.583006 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream MsgApp v2 writer)
2022-06-24 04:58:18.583616 I | raft: c2223c5e03eaf5 [term: 1] received a MsgHeartbeat message with higher term from cfa74bd0084c532f [term: 2]
2022-06-24 04:58:18.583688 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream MsgApp v2 writer)
2022-06-24 04:58:18.583768 I | raft: c2223c5e03eaf5 became follower at term 2
2022-06-24 04:58:18.583839 I | raft: raft.node: c2223c5e03eaf5 elected leader cfa74bd0084c532f at term 2
2022-06-24 04:58:18.583995 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream Message writer)
2022-06-24 04:58:18.584432 I | etcdserver/membership: added member c2223c5e03eaf5 [http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-06-24 04:58:18.584925 I | etcdserver/membership: added member b26940d7cb32fe32 [http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-06-24 04:58:18.587094 I | etcdserver/membership: added member cfa74bd0084c532f [http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-06-24 04:58:18.593452 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream MsgApp v2 reader)
2022-06-24 04:58:18.598946 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream Message reader)
2022-06-24 04:58:18.602300 N | etcdserver/membership: set the initial cluster version to 3.0
2022-06-24 04:58:18.602460 I | etcdserver/api: enabled capabilities for version 3.0
2022-06-24 04:58:18.606521 I | etcdserver: published {Name:onap-oof-has-etcd-0 ClientURLs:[http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2379]} to cluster d98d265e45b06c28
2022-06-24 04:58:18.607593 I | embed: ready to serve client requests
2022-06-24 04:58:18.610660 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2022-06-24 04:58:18.632018 I | etcdserver: c2223c5e03eaf5 initialzed peer connection; fast-forwarding 8 ticks (election ticks 10) with 2 active peer(s)
2022-06-24 04:58:20.907195 N | etcdserver/membership: updated the cluster version from 3.0 to 3.2
2022-06-24 04:58:20.907393 I | etcdserver/api: enabled capabilities for version 3.2
2022-06-24 04:58:23.563776 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.216051583s > 1s]
2022-06-24 04:58:29.693711 N | auth: added a new user: root
2022-06-24 04:58:29.694035 W | etcdserver: request "header: auth_user_add:" with result "size:26" took too long (128.911922ms) to execute
2022-06-24 04:58:29.839789 N | auth: added a new user: conductor
2022-06-24 04:58:29.839949 W | etcdserver: request "header: auth_user_add:" with result "size:26" took too long (125.56195ms) to execute
2022-06-24 04:58:29.849313 N | auth: Role conductor is created
2022-06-24 04:58:29.884810 N | auth: role conductor's permission of key conductor is updated as READWRITE
2022-06-24 04:58:29.907086 N | auth: granted role conductor to user conductor
2022-06-24 04:58:29.934199 N | auth: Role root is created
2022-06-24 04:58:29.938419 N | auth: granted role root to user root
2022-06-24 04:58:29.955964 N | auth: Authentication enabled
2022-06-24 04:58:53.564265 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.216489279s > 1s]
2022-06-24 04:59:23.564560 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.217516877s > 1s]
2022-06-24 04:59:53.565088 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.216543275s > 1s]
2022-06-24 05:00:23.565401 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.217799739s > 1s]
2022-06-24 05:00:53.565846 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.217291878s > 1s]
2022-06-24 05:01:23.566211 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.217426936s > 1s]
2022-06-24 05:01:53.566583 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.217529057s > 1s]
2022-06-24 05:02:23.567012 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.218783691s > 1s]
2022-06-24 05:02:53.567491 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.21728635s > 1s]
2022-06-24 05:03:23.567961 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.217795975s > 1s]
2022-06-24 05:03:53.568373 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.218407942s > 1s]
2022-06-24 05:04:23.569365 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.218135059s > 1s]
2022-06-24 05:04:53.569854 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.217423936s > 1s]
2022-06-24 05:05:23.570497 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.218323278s > 1s]
2022-06-24 05:05:53.570942 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.218061899s > 1s]
2022-06-24 05:06:23.571439 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.218300097s > 1s]
2022-06-24 05:06:53.571813 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.218352502s > 1s]
2022-06-24 05:07:23.572732 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.219615227s > 1s]
2022-06-24 05:07:23.757047 W | etcdserver: request "header: authenticate:" with result "size:47" took too long (115.300871ms) to execute
2022-06-24 05:07:26.609094 W | etcdserver: request "header: authenticate:" with result "size:47" took too long (105.283719ms) to execute
2022-06-24 05:07:38.543187 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (115.211008ms) to execute
2022-06-24 05:07:40.378581 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (124.105581ms) to execute
2022-06-24 05:07:41.252698 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (101.500658ms) to execute
2022-06-24 05:07:41.440135 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (117.597078ms) to execute
2022-06-24 05:07:43.504700 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (138.237757ms) to execute
2022-06-24 05:07:44.259284 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (187.548583ms) to execute
2022-06-24 05:07:44.887384 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (227.627314ms) to execute
2022-06-24 05:07:45.323411 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (195.445797ms) to execute
2022-06-24 05:07:45.520920 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (189.713441ms) to execute
2022-06-24 05:07:45.521220 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (146.12618ms) to execute
2022-06-24 05:07:46.821829 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (110.894439ms) to execute
2022-06-24 05:07:47.326925 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (261.85275ms) to execute
2022-06-24 05:07:47.572423 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (106.469108ms) to execute
2022-06-24 05:07:47.709960 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (103.848462ms) to execute
2022-06-24 05:07:53.573082 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.218389928s > 1s]
2022-06-24 05:08:00.122045 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (208.860525ms) to execute
2022-06-24 05:08:17.669249 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (311.701537ms) to execute
2022-06-24 05:08:18.111886 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (251.486993ms) to execute
2022-06-24 05:08:18.414475 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (181.28012ms) to execute
2022-06-24 05:08:18.933173 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (167.256965ms) to execute
2022-06-24 05:08:21.475377 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (263.953066ms) to execute
2022-06-24 05:08:21.639777 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (137.858703ms) to execute
2022-06-24 05:08:21.640312 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (154.870688ms) to execute
2022-06-24 05:08:21.741231 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (254.764811ms) to execute
2022-06-24 05:08:21.774761 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (113.095053ms) to execute
2022-06-24 05:08:21.957789 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (211.351631ms) to execute
2022-06-24 05:08:22.160060 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (122.840696ms) to execute
2022-06-24 05:08:22.403411 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (205.903946ms) to execute
2022-06-24 05:08:22.680458 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (223.288975ms) to execute
2022-06-24 05:08:22.923330 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (190.420885ms) to execute
2022-06-24 05:08:23.060679 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (103.53341ms) to execute
2022-06-24 05:08:23.061175 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (114.574852ms) to execute
2022-06-24 05:08:23.305305 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (230.23459ms) to execute
2022-06-24 05:08:23.354532 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (246.565129ms) to execute
2022-06-24 05:08:23.578707 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.224173609s > 1s]
2022-06-24 05:08:23.826314 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (185.889611ms) to execute
2022-06-24 05:08:23.965555 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (128.059009ms) to execute
2022-06-24 05:08:24.057334 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (219.398025ms) to execute
2022-06-24 05:08:24.153133 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (181.94861ms) to execute
2022-06-24 05:08:24.153752 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (115.803618ms) to execute
2022-06-24 05:08:24.533267 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (100.189986ms) to execute
2022-06-24 05:08:25.373709 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (172.357852ms) to execute
2022-06-24 05:08:25.666753 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (187.50885ms) to execute
2022-06-24 05:08:25.667392 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (210.916001ms) to execute
2022-06-24 05:08:26.449310 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (161.535628ms) to execute
2022-06-24 05:08:27.655712 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (277.851127ms) to execute
2022-06-24 05:08:35.435024 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (134.143209ms) to execute
2022-06-24 05:08:38.261648 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (129.269671ms) to execute
2022-06-24 05:08:38.973625 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (417.942106ms) to execute
2022-06-24 05:08:39.172379 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (165.078656ms) to execute
2022-06-24 05:08:39.626573 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (230.745467ms) to execute
2022-06-24 05:08:39.760403 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (122.681289ms) to execute
2022-06-24 05:08:40.351163 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (185.489068ms) to execute
2022-06-24 05:08:40.544211 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (103.119784ms) to execute
2022-06-24 05:08:40.544440 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (142.309359ms) to execute
2022-06-24 05:08:40.759317 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (172.033595ms) to execute
2022-06-24 05:08:40.976763 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (136.286718ms) to execute
2022-06-24 05:08:41.300057 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (125.015373ms) to execute
2022-06-24 05:08:42.150054 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (108.180544ms) to execute
2022-06-24 05:08:42.349881 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (169.780872ms) to execute
2022-06-24 05:08:42.563516 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (155.157821ms) to execute
2022-06-24 05:08:42.697975 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (129.545499ms) to execute
2022-06-24 05:08:42.930416 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (167.150389ms) to execute
2022-06-24 05:08:43.157483 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.958484ms) to execute
2022-06-24 05:08:48.823081 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (146.621583ms) to execute
2022-06-24 05:08:49.466384 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (179.576261ms) to execute
2022-06-24 05:08:52.068937 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (135.251173ms) to execute
2022-06-24 05:08:52.368935 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (160.965844ms) to execute
2022-06-24 05:08:53.579072 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.217438422s > 1s]
2022-06-24 05:08:55.312338 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (172.354258ms) to execute
2022-06-24 05:09:06.057371 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (116.00408ms) to execute
2022-06-24 05:09:06.301040 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (124.187706ms) to execute
2022-06-24 05:09:06.484279 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (113.749897ms) to execute
2022-06-24 05:09:06.822546 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (159.035336ms) to execute
2022-06-24 05:09:10.174285 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (152.09988ms) to execute
2022-06-24 05:09:14.503883 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (193.057686ms) to execute
2022-06-24 05:09:18.398480 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (134.777574ms) to execute
2022-06-24 05:09:22.207704 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (105.227481ms) to execute
2022-06-24 05:09:22.434572 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (116.871392ms) to execute
2022-06-24 05:09:23.579435 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.226134656s > 1s]
2022-06-24 05:09:27.350139 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (293.120522ms) to execute
2022-06-24 05:09:27.875505 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (258.310042ms) to execute
2022-06-24 05:09:28.133925 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (110.139515ms) to execute
2022-06-24 05:09:29.211641 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (109.764305ms) to execute
2022-06-24 05:09:29.567280 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (148.192767ms) to execute
2022-06-24 05:09:29.710757 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (106.285535ms) to execute
2022-06-24 05:09:29.711014 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (130.589303ms) to execute
2022-06-24 05:09:30.880935 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (121.453541ms) to execute
2022-06-24 05:09:31.046609 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (162.034111ms) to execute
2022-06-24 05:09:31.349071 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (213.95303ms) to execute
2022-06-24 05:09:32.696695 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (132.585441ms) to execute
2022-06-24 05:09:33.010470 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (110.017545ms) to execute
2022-06-24 05:09:34.230118 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (253.633627ms) to execute
2022-06-24 05:09:34.590669 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (346.180202ms) to execute
2022-06-24 05:09:35.004831 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (148.690363ms) to execute
2022-06-24 05:09:36.072876 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (141.893404ms) to execute
2022-06-24 05:09:36.235193 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (146.890583ms) to execute
2022-06-24 05:09:36.235521 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (138.517357ms) to execute
2022-06-24 05:09:36.353460 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (104.249895ms) to execute
2022-06-24 05:09:36.475570 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (101.3145ms) to execute
2022-06-24 05:09:36.476647 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (111.672772ms) to execute
2022-06-24 05:09:36.640817 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.032738ms) to execute
2022-06-24 05:09:36.762016 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (205.771751ms) to execute
2022-06-24 05:09:36.922495 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (157.242601ms) to execute
2022-06-24 05:09:36.922956 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (142.674413ms) to execute
2022-06-24 05:09:38.403645 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (285.984893ms) to execute
2022-06-24 05:09:38.935828 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (267.715717ms) to execute
2022-06-24 05:09:39.397230 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (236.932597ms) to execute
2022-06-24 05:09:39.845632 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (156.483879ms) to execute
2022-06-24 05:09:40.051622 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (150.644461ms) to execute
2022-06-24 05:09:40.298338 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (234.858511ms) to execute
2022-06-24 05:09:40.718909 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (251.500098ms) to execute
2022-06-24 05:09:42.019244 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (206.099332ms) to execute
2022-06-24 05:09:42.339686 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (116.628382ms) to execute
2022-06-24 05:09:43.482781 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (105.687816ms) to execute
2022-06-24 05:09:52.200146 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (112.448718ms) to execute
2022-06-24 05:09:53.579743 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.218379332s > 1s]
2022-06-24 05:09:58.152313 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (139.533344ms) to execute
2022-06-24 05:09:58.756316 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (131.438582ms) to execute
2022-06-24 05:10:00.949485 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (106.485736ms) to execute
2022-06-24 05:10:01.114284 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (101.768851ms) to execute
2022-06-24 05:10:09.647831 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (135.031052ms) to execute
2022-06-24 05:10:09.770912 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (118.549586ms) to execute
2022-06-24 05:10:10.085940 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (173.972333ms) to execute
2022-06-24 05:10:11.294438 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (161.000632ms) to execute
2022-06-24 05:10:11.458086 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (141.168323ms) to execute
2022-06-24 05:10:11.578443 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (109.308531ms) to execute
2022-06-24 05:10:11.733423 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (126.839599ms) to execute
2022-06-24 05:10:11.853668 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (104.171813ms) to execute
2022-06-24 05:10:11.970929 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (114.039147ms) to execute
2022-06-24 05:10:13.378351 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (290.094417ms) to execute
2022-06-24 05:10:13.585263 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (187.21312ms) to execute
2022-06-24 05:10:13.745984 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (199.08271ms) to execute
2022-06-24 05:10:13.869657 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (120.611256ms) to execute
2022-06-24 05:10:13.870281 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (103.125239ms) to execute
2022-06-24 05:10:23.582641 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.218432866s > 1s]
2022-06-24 05:10:24.757215 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (105.185241ms) to execute
2022-06-24 05:10:25.045743 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (110.551471ms) to execute
2022-06-24 05:10:25.445463 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (226.417968ms) to execute
2022-06-24 05:10:25.894174 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (289.83851ms) to execute
2022-06-24 05:10:27.342565 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (270.363404ms) to execute
2022-06-24 05:10:27.473384 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (126.289028ms) to execute
2022-06-24 05:10:27.474076 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (107.816133ms) to execute
2022-06-24 05:10:27.474223 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (125.442637ms) to execute
2022-06-24 05:10:27.853454 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (350.675669ms) to execute
2022-06-24 05:10:27.973646 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (227.40506ms) to execute
2022-06-24 05:10:28.092481 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (101.279884ms) to execute
2022-06-24 05:10:28.092918 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (114.078347ms) to execute
2022-06-24 05:10:28.093183 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (114.868365ms) to execute
2022-06-24 05:10:28.233741 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (120.826885ms) to execute
2022-06-24 05:10:28.383469 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (122.002063ms) to execute
2022-06-24 05:10:28.524939 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (123.480726ms) to execute
2022-06-24 05:10:28.673738 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (135.892777ms) to execute
2022-06-24 05:10:29.367860 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (114.160754ms) to execute
2022-06-24 05:10:29.669376 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (125.907731ms) to execute
2022-06-24 05:10:53.582974 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.219577772s > 1s]
2022-06-24 05:11:06.160730 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (142.353906ms) to execute
2022-06-24 05:11:07.360379 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (163.276225ms) to execute
2022-06-24 05:11:07.661282 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (108.433892ms) to execute
2022-06-24 05:11:08.940779 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (211.105261ms) to execute
2022-06-24 05:11:09.210743 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (111.624186ms) to execute
2022-06-24 05:11:09.689749 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (116.007351ms) to execute
2022-06-24 05:11:10.518454 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (113.967886ms) to execute
2022-06-24 05:11:11.353346 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (108.155318ms) to execute
2022-06-24 05:11:12.062238 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (237.255437ms) to execute
2022-06-24 05:11:12.374573 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (219.685495ms) to execute
2022-06-24 05:11:13.766091 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (281.936372ms) to execute
2022-06-24 05:11:14.221431 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (233.783052ms) to execute
2022-06-24 05:11:15.639839 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (249.287143ms) to execute
2022-06-24 05:11:16.067368 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (244.688638ms) to execute
2022-06-24 05:11:16.244222 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (140.383419ms) to execute
2022-06-24 05:11:21.810243 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (118.312432ms) to execute
2022-06-24 05:11:22.376441 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (103.565542ms) to execute
2022-06-24 05:11:22.792062 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (107.668804ms) to execute
2022-06-24 05:11:23.583285 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.219187951s > 1s]
2022-06-24 05:11:23.608080 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (105.550118ms) to execute
2022-06-24 05:11:24.931234 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (113.526348ms) to execute
2022-06-24 05:11:26.500348 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (112.982782ms) to execute
2022-06-24 05:11:26.783117 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (204.365452ms) to execute
2022-06-24 05:11:33.553147 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (119.282929ms) to execute
2022-06-24 05:11:33.968492 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (254.719364ms) to execute
2022-06-24 05:11:35.274948 W | etcdserver: request "header: authenticate: