By type
Waiting for onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local to come up
Skipping self-checking
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
2022-09-12 04:43:09.798133 I | etcdmain: etcd Version: 3.2.24
2022-09-12 04:43:09.798299 I | etcdmain: Git SHA: 420a45226
2022-09-12 04:43:09.798312 I | etcdmain: Go Version: go1.8.7
2022-09-12 04:43:09.798351 I | etcdmain: Go OS/Arch: linux/amd64
2022-09-12 04:43:09.798365 I | etcdmain: setting maximum number of CPUs to 8, total number of available CPUs is 8
2022-09-12 04:43:09.798562 I | embed: listening for peers on http://0.0.0.0:2380
2022-09-12 04:43:09.798645 I | embed: listening for client requests on 0.0.0.0:2379
2022-09-12 04:43:09.813045 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.71.82:2380
2022-09-12 04:43:09.813154 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.71.82:2380
2022-09-12 04:43:09.819945 I | etcdserver: name = onap-oof-has-etcd-1
2022-09-12 04:43:09.820355 I | etcdserver: data dir = /var/run/etcd/default.etcd
2022-09-12 04:43:09.820563 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2022-09-12 04:43:09.820752 I | etcdserver: heartbeat = 100ms
2022-09-12 04:43:09.821026 I | etcdserver: election = 1000ms
2022-09-12 04:43:09.821210 I | etcdserver: snapshot count = 100000
2022-09-12 04:43:09.821410 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2379
2022-09-12 04:43:09.821628 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380
2022-09-12 04:43:09.821844 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380
2022-09-12 04:43:09.834557 I | etcdserver: starting member b26940d7cb32fe32 in cluster d98d265e45b06c28
2022-09-12 04:43:09.835060 I | raft: b26940d7cb32fe32 became follower at term 0
2022-09-12 04:43:09.835561 I | raft: newRaft b26940d7cb32fe32 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2022-09-12 04:43:09.835768 I | raft: b26940d7cb32fe32 became follower at term 1
2022-09-12 04:43:09.853072 W | auth: simple token is not cryptographically signed
2022-09-12 04:43:09.858271 I | rafthttp: starting peer c2223c5e03eaf5...
2022-09-12 04:43:09.858401 I | rafthttp: started HTTP pipelining with peer c2223c5e03eaf5
2022-09-12 04:43:09.859967 I | rafthttp: started streaming with peer c2223c5e03eaf5 (writer)
2022-09-12 04:43:09.862745 I | rafthttp: started peer c2223c5e03eaf5
2022-09-12 04:43:09.863094 I | rafthttp: added peer c2223c5e03eaf5
2022-09-12 04:43:09.863370 I | rafthttp: starting peer cfa74bd0084c532f...
2022-09-12 04:43:09.863618 I | rafthttp: started HTTP pipelining with peer cfa74bd0084c532f
2022-09-12 04:43:09.863900 I | rafthttp: started streaming with peer c2223c5e03eaf5 (stream MsgApp v2 reader)
2022-09-12 04:43:09.865248 I | rafthttp: started streaming with peer cfa74bd0084c532f (writer)
2022-09-12 04:43:09.865274 I | rafthttp: started streaming with peer c2223c5e03eaf5 (stream Message reader)
2022-09-12 04:43:09.865329 I | rafthttp: started peer cfa74bd0084c532f
2022-09-12 04:43:09.865665 I | rafthttp: started streaming with peer cfa74bd0084c532f (writer)
2022-09-12 04:43:09.865858 I | rafthttp: started streaming with peer cfa74bd0084c532f (stream Message reader)
2022-09-12 04:43:09.866119 I | rafthttp: added peer cfa74bd0084c532f
2022-09-12 04:43:09.866714 I | rafthttp: started streaming with peer c2223c5e03eaf5 (writer)
2022-09-12 04:43:09.866780 I | rafthttp: started streaming with peer cfa74bd0084c532f (stream MsgApp v2 reader)
2022-09-12 04:43:09.867020 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2022-09-12 04:43:09.872682 I | etcdserver/membership: added member c2223c5e03eaf5 [http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-09-12 04:43:09.873458 I | etcdserver/membership: added member b26940d7cb32fe32 [http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-09-12 04:43:09.873883 I | etcdserver/membership: added member cfa74bd0084c532f [http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-09-12 04:43:09.873931 I | rafthttp: peer c2223c5e03eaf5 became active
2022-09-12 04:43:09.873964 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream MsgApp v2 reader)
2022-09-12 04:43:09.874862 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream Message reader)
2022-09-12 04:43:09.876097 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream Message writer)
2022-09-12 04:43:09.876819 I | rafthttp: peer cfa74bd0084c532f became active
2022-09-12 04:43:09.876894 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream MsgApp v2 writer)
2022-09-12 04:43:09.877056 I | raft: b26940d7cb32fe32 [term: 1] received a MsgHeartbeat message with higher term from cfa74bd0084c532f [term: 2]
2022-09-12 04:43:09.877121 I | raft: b26940d7cb32fe32 became follower at term 2
2022-09-12 04:43:09.877186 I | raft: raft.node: b26940d7cb32fe32 elected leader cfa74bd0084c532f at term 2
2022-09-12 04:43:09.877230 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream Message writer)
2022-09-12 04:43:09.877332 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream MsgApp v2 writer)
2022-09-12 04:43:09.881368 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream Message reader)
2022-09-12 04:43:09.881575 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream MsgApp v2 reader)
2022-09-12 04:43:09.884715 N | etcdserver/membership: set the initial cluster version to 3.0
2022-09-12 04:43:09.884834 I | etcdserver/api: enabled capabilities for version 3.0
2022-09-12 04:43:09.886020 I | etcdserver: published {Name:onap-oof-has-etcd-1 ClientURLs:[http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2379]} to cluster d98d265e45b06c28
2022-09-12 04:43:09.886060 I | embed: ready to serve client requests
2022-09-12 04:43:09.886772 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2022-09-12 04:43:09.918523 I | etcdserver: b26940d7cb32fe32 initialzed peer connection; fast-forwarding 8 ticks (election ticks 10) with 2 active peer(s)
2022-09-12 04:43:11.456392 N | etcdserver/membership: updated the cluster version from 3.0 to 3.2
2022-09-12 04:43:11.456511 I | etcdserver/api: enabled capabilities for version 3.2
2022-09-12 04:43:14.866264 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.083073557s > 1s]
2022-09-12 04:43:15.286206 N | auth: added a new user: root
2022-09-12 04:43:15.382668 N | auth: added a new user: conductor
2022-09-12 04:43:15.382834 N | auth: Role conductor is created
2022-09-12 04:43:15.408915 N | auth: role conductor's permission of key conductor is updated as READWRITE
2022-09-12 04:43:15.432382 N | auth: granted role conductor to user conductor
2022-09-12 04:43:15.461656 N | auth: Role root is created
2022-09-12 04:43:15.462202 N | auth: granted role root to user root
2022-09-12 04:43:15.464487 N | auth: Authentication enabled
2022-09-12 04:43:44.866414 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.08493686s > 1s]
2022-09-12 04:44:14.866977 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.087493902s > 1s]
2022-09-12 04:44:44.867232 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.09001813s > 1s]
2022-09-12 04:45:14.867531 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.092453093s > 1s]
2022-09-12 04:45:44.867751 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.094839567s > 1s]
2022-09-12 04:46:14.867965 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.097430863s > 1s]
2022-09-12 04:46:44.868125 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.099901679s > 1s]
2022-09-12 04:47:14.868342 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.102500728s > 1s]
2022-09-12 04:47:44.868759 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.10465909s > 1s]
2022-09-12 04:48:14.868985 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.107400411s > 1s]
2022-09-12 04:48:44.869253 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.109505257s > 1s]
2022-09-12 04:49:14.869520 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.112262972s > 1s]
2022-09-12 04:49:44.870485 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.114983265s > 1s]
2022-09-12 04:50:14.870760 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.117434754s > 1s]
2022-09-12 04:50:32.992985 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (188.540162ms) to execute
2022-09-12 04:50:33.346056 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (193.592508ms) to execute
2022-09-12 04:50:34.853612 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (103.285357ms) to execute
2022-09-12 04:50:36.194447 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (105.306374ms) to execute
2022-09-12 04:50:36.311067 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (109.313495ms) to execute
2022-09-12 04:50:36.311448 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (114.740483ms) to execute
2022-09-12 04:50:36.422165 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.615417ms) to execute
2022-09-12 04:50:36.532027 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (103.874418ms) to execute
2022-09-12 04:50:36.642529 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (107.050705ms) to execute
2022-09-12 04:50:36.642921 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.511717ms) to execute
2022-09-12 04:50:36.858280 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (203.608636ms) to execute
2022-09-12 04:50:37.296608 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (107.264541ms) to execute
2022-09-12 04:50:38.958051 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (108.361927ms) to execute
2022-09-12 04:50:39.068683 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (104.436513ms) to execute
2022-09-12 04:50:39.173625 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (102.339124ms) to execute
2022-09-12 04:50:39.290159 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (106.304986ms) to execute
2022-09-12 04:50:42.204969 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (101.309087ms) to execute
2022-09-12 04:50:42.301745 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (161.452324ms) to execute
2022-09-12 04:50:42.529453 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (110.811828ms) to execute
2022-09-12 04:50:44.871032 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.119403384s > 1s]
2022-09-12 04:50:46.287281 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (100.035221ms) to execute
2022-09-12 04:50:46.576000 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (104.866828ms) to execute
2022-09-12 04:50:47.843906 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (183.122054ms) to execute
2022-09-12 04:50:48.113280 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (212.318882ms) to execute
2022-09-12 04:50:57.848416 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (104.634721ms) to execute
2022-09-12 04:50:58.095449 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (153.181933ms) to execute
2022-09-12 04:50:58.343670 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (107.223594ms) to execute
2022-09-12 04:50:58.491048 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (119.488812ms) to execute
2022-09-12 04:51:14.871340 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.12207128s > 1s]
2022-09-12 04:51:15.943349 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (170.416501ms) to execute
2022-09-12 04:51:16.182061 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (160.712767ms) to execute
2022-09-12 04:51:18.691187 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (102.439985ms) to execute
2022-09-12 04:51:18.933349 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (103.763342ms) to execute
2022-09-12 04:51:21.195570 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (122.350878ms) to execute
2022-09-12 04:51:24.138073 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (110.817534ms) to execute
2022-09-12 04:51:24.268407 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (115.468575ms) to execute
2022-09-12 04:51:24.268595 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (119.645114ms) to execute
2022-09-12 04:51:25.664372 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (106.247204ms) to execute
2022-09-12 04:51:29.643698 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (118.281228ms) to execute
2022-09-12 04:51:30.402780 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (101.481208ms) to execute
2022-09-12 04:51:44.875072 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.123869096s > 1s]
2022-09-12 04:51:51.150874 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (113.669345ms) to execute
2022-09-12 04:51:58.647325 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (113.944406ms) to execute
2022-09-12 04:52:02.080415 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (112.822002ms) to execute
2022-09-12 04:52:03.420197 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (104.107299ms) to execute
2022-09-12 04:52:09.073565 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (105.19139ms) to execute
2022-09-12 04:52:09.371603 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (122.134533ms) to execute
2022-09-12 04:52:10.713783 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (194.197942ms) to execute
2022-09-12 04:52:11.040244 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (215.485844ms) to execute
2022-09-12 04:52:12.427490 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (222.808251ms) to execute
2022-09-12 04:52:12.783159 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (177.737817ms) to execute
2022-09-12 04:52:14.875658 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.126492799s > 1s]
2022-09-12 04:52:19.790836 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (187.416274ms) to execute
2022-09-12 04:52:24.767298 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (163.784069ms) to execute
2022-09-12 04:52:26.124178 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (104.716832ms) to execute
2022-09-12 04:52:26.374379 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (205.40991ms) to execute
2022-09-12 04:52:27.748666 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (112.18035ms) to execute
2022-09-12 04:52:28.298080 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (105.354102ms) to execute
2022-09-12 04:52:29.855993 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (105.566845ms) to execute
2022-09-12 04:52:31.009090 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.871767ms) to execute
2022-09-12 04:52:31.324089 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (185.109671ms) to execute
2022-09-12 04:52:31.675361 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (219.612832ms) to execute
2022-09-12 04:52:32.018410 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (197.728303ms) to execute
2022-09-12 04:52:33.274843 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (120.266183ms) to execute
2022-09-12 04:52:33.541073 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (127.701275ms) to execute
2022-09-12 04:52:33.785312 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (113.834043ms) to execute
2022-09-12 04:52:44.567459 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (104.786516ms) to execute
2022-09-12 04:52:44.814591 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (130.057628ms) to execute
2022-09-12 04:52:44.879553 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.128970498s > 1s]
2022-09-12 04:52:46.866324 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (127.586144ms) to execute
2022-09-12 04:52:57.141570 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (121.735008ms) to execute
2022-09-12 04:52:57.260856 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (112.026902ms) to execute
2022-09-12 04:52:57.261059 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (113.860418ms) to execute
2022-09-12 04:52:57.547966 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (101.192773ms) to execute
2022-09-12 04:52:58.420441 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (116.384827ms) to execute
2022-09-12 04:53:10.155175 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (129.213483ms) to execute
2022-09-12 04:53:10.292080 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (116.674255ms) to execute
2022-09-12 04:53:11.677387 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (194.673097ms) to execute
2022-09-12 04:53:11.785766 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.967251ms) to execute
2022-09-12 04:53:11.789500 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (104.825509ms) to execute
2022-09-12 04:53:12.001081 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.880168ms) to execute
2022-09-12 04:53:12.431808 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (114.253966ms) to execute
2022-09-12 04:53:14.879841 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.132449464s > 1s]
2022-09-12 04:53:15.177902 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (104.572358ms) to execute
2022-09-12 04:53:15.786315 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (206.635758ms) to execute
2022-09-12 04:53:16.118674 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (243.832534ms) to execute
2022-09-12 04:53:17.688425 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (181.174974ms) to execute
2022-09-12 04:53:17.948600 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (100.714791ms) to execute
2022-09-12 04:53:22.808681 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (109.466996ms) to execute
2022-09-12 04:53:24.167378 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (177.486424ms) to execute
2022-09-12 04:53:24.397137 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (163.532903ms) to execute
2022-09-12 04:53:25.737745 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (166.261633ms) to execute
2022-09-12 04:53:29.467661 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (174.859339ms) to execute
2022-09-12 04:53:29.859445 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (183.275791ms) to execute
2022-09-12 04:53:30.793383 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (105.549268ms) to execute
2022-09-12 04:53:31.217732 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (305.317785ms) to execute
2022-09-12 04:53:31.347066 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (122.533208ms) to execute
2022-09-12 04:53:31.540114 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (185.026277ms) to execute
2022-09-12 04:53:31.751115 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (108.832185ms) to execute
2022-09-12 04:53:32.885232 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (108.983487ms) to execute
2022-09-12 04:53:33.014684 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (125.297934ms) to execute
2022-09-12 04:53:33.134742 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (112.593132ms) to execute
2022-09-12 04:53:33.135240 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (102.953417ms) to execute
2022-09-12 04:53:33.384523 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (111.108931ms) to execute
2022-09-12 04:53:34.530447 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (104.429541ms) to execute
2022-09-12 04:53:37.132649 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (229.162335ms) to execute
2022-09-12 04:53:37.375289 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (153.703314ms) to execute
2022-09-12 04:53:40.046290 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (127.075215ms) to execute
2022-09-12 04:53:44.881353 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.134293607s > 1s]
2022-09-12 04:53:45.262118 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (106.974773ms) to execute
2022-09-12 04:53:47.594730 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (104.961809ms) to execute
2022-09-12 04:53:47.951215 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (119.337204ms) to execute
2022-09-12 04:53:57.389479 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (105.79466ms) to execute
2022-09-12 04:54:01.299819 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (120.756974ms) to execute
2022-09-12 04:54:04.947655 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (125.883009ms) to execute
2022-09-12 04:54:05.068522 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (111.309662ms) to execute
2022-09-12 04:54:05.194265 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (121.947933ms) to execute
2022-09-12 04:54:05.641340 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (181.890356ms) to execute
2022-09-12 04:54:07.667730 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (132.438992ms) to execute
2022-09-12 04:54:07.851724 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (145.726568ms) to execute
2022-09-12 04:54:11.145925 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (359.335801ms) to execute
2022-09-12 04:54:11.432397 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (252.805362ms) to execute
2022-09-12 04:54:11.432852 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (176.299463ms) to execute
2022-09-12 04:54:11.646399 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (185.791658ms) to execute
2022-09-12 04:54:13.341541 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (128.708949ms) to execute
2022-09-12 04:54:13.457915 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (105.682466ms) to execute
2022-09-12 04:54:13.838854 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (179.258381ms) to execute
2022-09-12 04:54:14.351508 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (344.875425ms) to execute
2022-09-12 04:54:14.883923 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.144686602s > 1s]
2022-09-12 04:54:19.159498 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (137.906192ms) to execute
2022-09-12 04:54:20.242336 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (139.469518ms) to execute
2022-09-12 04:54:20.359861 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (114.057937ms) to execute
2022-09-12 04:54:20.727061 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (132.515474ms) to execute
2022-09-12 04:54:21.699376 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (131.995703ms) to execute
2022-09-12 04:54:22.977390 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (118.217643ms) to execute
2022-09-12 04:54:23.510553 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (154.161663ms) to execute
2022-09-12 04:54:24.037470 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (474.036302ms) to execute
2022-09-12 04:54:24.037851 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (473.941645ms) to execute
2022-09-12 04:54:24.579782 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (241.255479ms) to execute
2022-09-12 04:54:30.039342 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (112.392478ms) to execute
2022-09-12 04:54:35.305663 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (124.146022ms) to execute
2022-09-12 04:54:37.260610 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (112.324021ms) to execute
2022-09-12 04:54:37.566227 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (102.375924ms) to execute
2022-09-12 04:54:39.152469 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (100.050423ms) to execute
2022-09-12 04:54:40.606473 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (148.719143ms) to execute
2022-09-12 04:54:40.930485 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (110.467113ms) to execute
2022-09-12 04:54:41.057123 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (126.4742ms) to execute
2022-09-12 04:54:41.057310 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (124.279731ms) to execute
2022-09-12 04:54:41.235051 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (162.485477ms) to execute
2022-09-12 04:54:41.557908 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (297.963963ms) to execute
2022-09-12 04:54:41.918516 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (221.686138ms) to execute
2022-09-12 04:54:42.069659 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (133.260294ms) to execute
2022-09-12 04:54:44.167639 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (110.142284ms) to execute
2022-09-12 04:54:44.572369 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (210.203983ms) to execute
2022-09-12 04:54:44.886457 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.137583924s > 1s]
2022-09-12 04:54:51.471316 I | auth: deleting token TWNuEUhxagsNBbqr.19 for user conductor
2022-09-12 04:54:52.229519 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (111.179227ms) to execute
2022-09-12 04:54:52.464880 I | auth: deleting token YhsZjzFbVBgQCGYH.36 for user conductor
2022-09-12 04:54:52.464955 I | auth: deleting token JJHPNDtOunsoPdgt.28 for user conductor
2022-09-12 04:54:52.464984 I | auth: deleting token wOomiuWpbbyrvlXR.34 for user conductor
2022-09-12 04:54:52.465008 I | auth: deleting token sCTOtRLRYFLPvUem.23 for user conductor
2022-09-12 04:54:52.465024 I | auth: deleting token cpYiPhkiZPkWwOky.38 for user conductor
2022-09-12 04:54:52.465066 I | auth: deleting token uJRGJyLRyOReXwde.40 for user conductor
2022-09-12 04:54:52.465098 I | auth: deleting token EnllXpMxzoPUsMAJ.30 for user conductor
2022-09-12 04:54:52.465131 I | auth: deleting token GqIJPwFNxfPvMENV.21 for user conductor
2022-09-12 04:54:52.465194 I | auth: deleting token gJxDfhCcQyipBgbP.26 for user conductor
2022-09-12 04:54:52.465210 I | auth: deleting token orKoYKwxQBDtuBEr.32 for user conductor
2022-09-12 04:54:52.465235 I | auth: deleting token LIAzQBghWVQpWOSm.25 for user conductor
2022-09-12 04:54:53.465729 I | auth: deleting token hRkrZqbuqXnynPfY.42 for user conductor
2022-09-12 04:54:54.476666 I | auth: deleting token KEOZMhJuHCBzAxyq.43 for user conductor
2022-09-12 04:54:54.476768 I | auth: deleting token HMqQKLCAmRNVmnHL.45 for user conductor
2022-09-12 04:54:54.476819 I | auth: deleting token OOWjJdCAQBWVZSUU.47 for user conductor
2022-09-12 04:54:54.476868 I | auth: deleting token EBWxGrHmHRKvrsAT.46 for user conductor
2022-09-12 04:54:54.476916 I | auth: deleting token mBfOIcACvWVcuSYW.44 for user conductor
2022-09-12 04:54:55.173057 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (142.55047ms) to execute
2022-09-12 04:54:55.353820 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (131.547646ms) to execute
2022-09-12 04:54:55.464981 I | auth: deleting token VfQgmLrhgJutXSlQ.53 for user conductor
2022-09-12 04:54:55.465055 I | auth: deleting token tCKjNyFNAQVaeNJK.52 for user conductor
2022-09-12 04:54:55.465144 I | auth: deleting token GmkbFSoELrMYBZrB.49 for user conductor
2022-09-12 04:54:55.465163 I | auth: deleting token spuHDpdwyTdhIEQZ.51 for user conductor
2022-09-12 04:54:55.465200 I | auth: deleting token qoBCkzGZDQcWUujX.48 for user conductor
2022-09-12 04:54:55.465222 I | auth: deleting token VGzXJGBOeIydCYMu.50 for user conductor
2022-09-12 04:54:56.465064 I | auth: deleting token AgSWFOWgMupfiMxG.56 for user conductor
2022-09-12 04:54:56.465192 I | auth: deleting token UkkhNufSFnGfvVwf.57 for user conductor
2022-09-12 04:54:56.465220 I | auth: deleting token xqwOlNzJxEtNySgC.54 for user conductor
2022-09-12 04:54:56.465246 I | auth: deleting token RDvKaDNrzCpPsxNC.55 for user conductor
2022-09-12 04:54:57.465342 I | auth: deleting token bAEWRRstzxoULVeD.58 for user conductor
2022-09-12 04:54:57.465618 I | auth: deleting token HQtiwYCZoYwtNTpW.60 for user conductor
2022-09-12 04:54:57.466689 I | auth: deleting token MHlyMEFWJpVnWhvX.59 for user conductor
2022-09-12 04:54:57.466775 I | auth: deleting token LUlWvqFKoftbxtHb.61 for user conductor
2022-09-12 04:54:57.906347 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (116.713387ms) to execute
2022-09-12 04:54:58.237594 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (150.720036ms) to execute
2022-09-12 04:54:58.361224 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (117.815034ms) to execute
2022-09-12 04:54:58.361768 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (121.011239ms) to execute
2022-09-12 04:54:58.466747 I | auth: deleting token FDSyWanYHgDbkVHg.66 for user conductor
2022-09-12 04:54:58.467057 I | auth: deleting token ZgagkDJmXLtFprri.65 for user conductor
2022-09-12 04:54:58.473482 I | auth: deleting token TJDPxQTXKnMeJecI.62 for user conductor
2022-09-12 04:54:58.473737 I | auth: deleting token zXjoxERIkMJDjxTh.67 for user conductor
2022-09-12 04:54:58.475840 I | auth: deleting token PsIlZBcspVxppjwl.63 for user conductor
2022-09-12 04:54:58.475873 I | auth: deleting token mBYUgUxwzZZYehje.64 for user conductor
2022-09-12 04:54:58.631521 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (119.347674ms) to execute
2022-09-12 04:54:58.894780 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (131.468424ms) to execute
2022-09-12 04:54:59.073076 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (160.531191ms) to execute
2022-09-12 04:54:59.467690 I | auth: deleting token VVwCAHvUKQGSNzPC.71 for user conductor
2022-09-12 04:54:59.467769 I | auth: deleting token xcNWLYHvPHpKcvvV.69 for user conductor
2022-09-12 04:54:59.467791 I | auth: deleting token mnyPStpwSftGdkZb.72 for user conductor
2022-09-12 04:54:59.467805 I | auth: deleting token FNRogUUbePyDqcna.68 for user conductor
2022-09-12 04:54:59.467866 I | auth: deleting token qSMosKjQcxtXzBjC.70 for user conductor
2022-09-12 04:55:00.452607 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (108.927457ms) to execute
2022-09-12 04:55:00.467149 I | auth: deleting token SouvRBbVSiycgfmv.74 for user conductor
2022-09-12 04:55:00.467214 I | auth: deleting token WHhnxaJNMddiusAP.73 for user conductor
2022-09-12 04:55:00.467235 I | auth: deleting token egnOETRnWsjFbRBB.76 for user conductor
2022-09-12 04:55:00.467314 I | auth: deleting token zkcKtaZFvzQuyJhI.77 for user conductor
2022-09-12 04:55:00.692883 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (187.106501ms) to execute
2022-09-12 04:55:01.019217 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (115.609733ms) to execute
2022-09-12 04:55:01.172333 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (142.783859ms) to execute
2022-09-12 04:55:01.464965 I | auth: deleting token dEpVpfFbtfhsqUkE.92 for user conductor
2022-09-12 04:55:01.465068 I | auth: deleting token mUXHAFubXqfoqgNc.82 for user conductor
2022-09-12 04:55:01.465133 I | auth: deleting token rwqmgHjTsOWreREv.80 for user conductor
2022-09-12 04:55:01.465151 I | auth: deleting token GiipKbcVZynzNtmt.79 for user conductor
2022-09-12 04:55:01.465159 I | auth: deleting token JakGpbsXWsIlcVIF.83 for user conductor
2022-09-12 04:55:01.465204 I | auth: deleting token oizKJCrAwqYpNbKQ.96 for user conductor
2022-09-12 04:55:01.465216 I | auth: deleting token XpyFfWrFArMWIRng.84 for user conductor
2022-09-12 04:55:01.465244 I | auth: deleting token WaZuCBqLQvPZCqOh.90 for user conductor
2022-09-12 04:55:01.465324 I | auth: deleting token xswHOTmiKHGcXgJk.85 for user conductor
2022-09-12 04:55:01.465400 I | auth: deleting token farbbAXMlDceFSAY.87 for user conductor
2022-09-12 04:55:01.465484 I | auth: deleting token XKfzaGOMolXZhPtA.89 for user conductor
2022-09-12 04:55:01.465502 I | auth: deleting token qSBoOgGTYclpZcBU.94 for user conductor
2022-09-12 04:55:01.485260 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (306.241404ms) to execute
2022-09-12 04:55:01.487650 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (311.991611ms) to execute
2022-09-12 04:55:01.630362 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (132.998715ms) to execute
2022-09-12 04:55:01.630597 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (109.737642ms) to execute
2022-09-12 04:55:01.747467 W | etcdserver: request "header: authenticate: