By type
Skipping self-checking
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local'
Waiting for onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local to come up
2023-01-12 04:58:27.945634 I | etcdmain: etcd Version: 3.2.24
2023-01-12 04:58:27.945887 I | etcdmain: Git SHA: 420a45226
2023-01-12 04:58:27.945901 I | etcdmain: Go Version: go1.8.7
2023-01-12 04:58:27.945912 I | etcdmain: Go OS/Arch: linux/amd64
2023-01-12 04:58:27.945922 I | etcdmain: setting maximum number of CPUs to 8, total number of available CPUs is 8
2023-01-12 04:58:27.946255 I | embed: listening for peers on http://0.0.0.0:2380
2023-01-12 04:58:27.946379 I | embed: listening for client requests on 0.0.0.0:2379
2023-01-12 04:58:27.992678 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.72.251:2380
2023-01-12 04:58:27.992805 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.72.251:2380
2023-01-12 04:58:28.009379 I | etcdserver: name = onap-oof-has-etcd-0
2023-01-12 04:58:28.009459 I | etcdserver: data dir = /var/run/etcd/default.etcd
2023-01-12 04:58:28.009480 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2023-01-12 04:58:28.009494 I | etcdserver: heartbeat = 100ms
2023-01-12 04:58:28.009504 I | etcdserver: election = 1000ms
2023-01-12 04:58:28.009515 I | etcdserver: snapshot count = 100000
2023-01-12 04:58:28.009556 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2379
2023-01-12 04:58:28.009575 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380
2023-01-12 04:58:28.009625 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380
2023-01-12 04:58:28.029686 I | etcdserver: starting member c2223c5e03eaf5 in cluster d98d265e45b06c28
2023-01-12 04:58:28.029865 I | raft: c2223c5e03eaf5 became follower at term 0
2023-01-12 04:58:28.029924 I | raft: newRaft c2223c5e03eaf5 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2023-01-12 04:58:28.029939 I | raft: c2223c5e03eaf5 became follower at term 1
2023-01-12 04:58:28.046712 W | auth: simple token is not cryptographically signed
2023-01-12 04:58:28.063675 I | rafthttp: starting peer b26940d7cb32fe32...
2023-01-12 04:58:28.063888 I | rafthttp: started HTTP pipelining with peer b26940d7cb32fe32
2023-01-12 04:58:28.075748 I | rafthttp: started streaming with peer b26940d7cb32fe32 (writer)
2023-01-12 04:58:28.076269 I | rafthttp: started streaming with peer b26940d7cb32fe32 (writer)
2023-01-12 04:58:28.085623 I | rafthttp: started peer b26940d7cb32fe32
2023-01-12 04:58:28.087564 I | rafthttp: added peer b26940d7cb32fe32
2023-01-12 04:58:28.087617 I | rafthttp: starting peer cfa74bd0084c532f...
2023-01-12 04:58:28.087662 I | rafthttp: started HTTP pipelining with peer cfa74bd0084c532f
2023-01-12 04:58:28.095094 I | rafthttp: started streaming with peer b26940d7cb32fe32 (stream MsgApp v2 reader)
2023-01-12 04:58:28.096917 I | rafthttp: started streaming with peer b26940d7cb32fe32 (stream Message reader)
2023-01-12 04:58:28.097418 I | rafthttp: started streaming with peer cfa74bd0084c532f (writer)
2023-01-12 04:58:28.097435 I | rafthttp: started streaming with peer cfa74bd0084c532f (writer)
2023-01-12 04:58:28.097740 I | rafthttp: started streaming with peer cfa74bd0084c532f (stream Message reader)
2023-01-12 04:58:28.098250 I | rafthttp: started streaming with peer cfa74bd0084c532f (stream MsgApp v2 reader)
2023-01-12 04:58:28.099025 I | rafthttp: started peer cfa74bd0084c532f
2023-01-12 04:58:28.099109 I | rafthttp: added peer cfa74bd0084c532f
2023-01-12 04:58:28.099907 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2023-01-12 04:58:28.104300 I | rafthttp: peer cfa74bd0084c532f became active
2023-01-12 04:58:28.104346 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream MsgApp v2 reader)
2023-01-12 04:58:28.108015 I | etcdserver/membership: added member c2223c5e03eaf5 [http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2023-01-12 04:58:28.108457 I | etcdserver/membership: added member b26940d7cb32fe32 [http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2023-01-12 04:58:28.108748 I | etcdserver/membership: added member cfa74bd0084c532f [http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2023-01-12 04:58:28.109796 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream Message writer)
2023-01-12 04:58:28.110001 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream MsgApp v2 writer)
2023-01-12 04:58:28.111563 I | rafthttp: established a TCP streaming connection with peer cfa74bd0084c532f (stream Message reader)
2023-01-12 04:58:28.138608 I | rafthttp: peer b26940d7cb32fe32 became active
2023-01-12 04:58:28.138655 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream Message writer)
2023-01-12 04:58:28.138701 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream MsgApp v2 writer)
2023-01-12 04:58:28.141337 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream MsgApp v2 reader)
2023-01-12 04:58:28.141870 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream Message reader)
2023-01-12 04:58:28.152136 I | etcdserver: c2223c5e03eaf5 initialzed peer connection; fast-forwarding 8 ticks (election ticks 10) with 2 active peer(s)
2023-01-12 04:58:28.622884 I | raft: c2223c5e03eaf5 [term: 1] received a MsgVote message with higher term from cfa74bd0084c532f [term: 5]
2023-01-12 04:58:28.622947 I | raft: c2223c5e03eaf5 became follower at term 5
2023-01-12 04:58:28.622975 I | raft: c2223c5e03eaf5 [logterm: 1, index: 3, vote: 0] cast MsgVote for cfa74bd0084c532f [logterm: 1, index: 3] at term 5
2023-01-12 04:58:28.625319 I | raft: raft.node: c2223c5e03eaf5 elected leader cfa74bd0084c532f at term 5
2023-01-12 04:58:28.633111 I | embed: ready to serve client requests
2023-01-12 04:58:28.633303 I | etcdserver: published {Name:onap-oof-has-etcd-0 ClientURLs:[http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2379]} to cluster d98d265e45b06c28
2023-01-12 04:58:28.634352 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2023-01-12 04:58:28.639583 N | etcdserver/membership: set the initial cluster version to 3.2
2023-01-12 04:58:28.639812 I | etcdserver/api: enabled capabilities for version 3.2
2023-01-12 04:58:30.100106 N | auth: added a new user: root
2023-01-12 04:58:30.100363 W | etcdserver: request "header: auth_user_add:" with result "size:26" took too long (100.94262ms) to execute
2023-01-12 04:58:30.225721 N | auth: added a new user: conductor
2023-01-12 04:58:30.251733 N | auth: Role conductor is created
2023-01-12 04:58:30.276853 N | auth: role conductor's permission of key conductor is updated as READWRITE
2023-01-12 04:58:30.304298 N | auth: granted role conductor to user conductor
2023-01-12 04:58:30.333608 N | auth: Role root is created
2023-01-12 04:58:30.336066 N | auth: granted role root to user root
2023-01-12 04:58:30.339405 N | auth: Authentication enabled
2023-01-12 04:58:33.096473 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.500619382s > 1s]
2023-01-12 04:59:03.096746 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.500611332s > 1s]
2023-01-12 04:59:33.097121 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.501568521s > 1s]
2023-01-12 05:00:03.097732 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.5019906s > 1s]
2023-01-12 05:00:33.100278 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.50417904s > 1s]
2023-01-12 05:01:03.100538 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.505488484s > 1s]
2023-01-12 05:01:33.100930 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.503741118s > 1s]
2023-01-12 05:02:03.101471 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.503943187s > 1s]
2023-01-12 05:02:33.101851 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.505616221s > 1s]
2023-01-12 05:03:03.102508 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.50593004s > 1s]
2023-01-12 05:03:33.103408 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.506558336s > 1s]
2023-01-12 05:04:03.103680 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.507223934s > 1s]
2023-01-12 05:04:33.103874 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.508210273s > 1s]
2023-01-12 05:05:03.104372 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.508639616s > 1s]
2023-01-12 05:05:33.104713 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.509137226s > 1s]
2023-01-12 05:06:03.104941 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.509318453s > 1s]
2023-01-12 05:06:33.105132 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.510563643s > 1s]
2023-01-12 05:06:57.430752 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (159.075953ms) to execute
2023-01-12 05:06:58.021861 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (216.242714ms) to execute
2023-01-12 05:06:59.501489 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (103.62576ms) to execute
2023-01-12 05:06:59.753947 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (178.799941ms) to execute
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2023-01-12 05:07:00.596556 W | etcdserver: request "header: put:" with result "size:4" took too long (105.064288ms) to execute
2023-01-12 05:07:03.105255 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.510586672s > 1s]
2023-01-12 05:07:05.619904 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (100.439082ms) to execute
2023-01-12 05:07:16.567912 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (171.25293ms) to execute
2023-01-12 05:07:20.470530 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (116.893842ms) to execute
2023-01-12 05:07:20.470693 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (106.414967ms) to execute
2023-01-12 05:07:20.820049 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (191.758943ms) to execute
2023-01-12 05:07:28.193278 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (104.877132ms) to execute
2023-01-12 05:07:33.115896 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.511496701s > 1s]
2023-01-12 05:07:33.126857 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (115.315887ms) to execute
2023-01-12 05:07:33.649091 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (101.046118ms) to execute
2023-01-12 05:07:39.655022 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (111.942921ms) to execute
2023-01-12 05:07:39.899830 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (106.881444ms) to execute
2023-01-12 05:07:42.370647 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (131.955638ms) to execute
2023-01-12 05:07:44.982256 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (107.756636ms) to execute
2023-01-12 05:07:56.683236 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (104.36929ms) to execute
2023-01-12 05:07:56.978622 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (111.61317ms) to execute
2023-01-12 05:07:58.162045 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (101.819845ms) to execute
2023-01-12 05:07:59.751697 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (138.404603ms) to execute
2023-01-12 05:08:00.102006 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (148.461723ms) to execute
2023-01-12 05:08:02.893211 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (142.073279ms) to execute
2023-01-12 05:08:03.116122 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.511901386s > 1s]
2023-01-12 05:08:05.663283 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (200.940149ms) to execute
2023-01-12 05:08:06.847978 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (135.136785ms) to execute
2023-01-12 05:08:15.000508 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (108.486901ms) to execute
2023-01-12 05:08:32.812004 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (122.66752ms) to execute
2023-01-12 05:08:33.116509 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.537190072s > 1s]
2023-01-12 05:08:35.224339 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (106.154788ms) to execute
2023-01-12 05:08:35.529824 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (105.824224ms) to execute
2023-01-12 05:08:38.005870 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (105.546715ms) to execute
2023-01-12 05:08:40.625464 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (100.650902ms) to execute
2023-01-12 05:08:42.082685 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (202.652119ms) to execute
2023-01-12 05:08:43.251639 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (103.791975ms) to execute
2023-01-12 05:08:43.372350 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (112.331687ms) to execute
2023-01-12 05:08:43.475252 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (142.371254ms) to execute
2023-01-12 05:08:48.816206 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (162.004906ms) to execute
2023-01-12 05:08:48.937545 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (117.410665ms) to execute
2023-01-12 05:08:48.937841 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (118.622661ms) to execute
2023-01-12 05:08:49.285100 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (201.123498ms) to execute
2023-01-12 05:08:51.805147 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (118.416538ms) to execute
2023-01-12 05:09:02.948386 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (105.570731ms) to execute
2023-01-12 05:09:03.116775 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.514903886s > 1s]
2023-01-12 05:09:03.321933 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (106.934357ms) to execute
2023-01-12 05:09:03.701490 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (100.272877ms) to execute
2023-01-12 05:09:03.701699 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (101.907405ms) to execute
2023-01-12 05:09:03.845541 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (109.761695ms) to execute
2023-01-12 05:09:03.984721 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (130.042928ms) to execute
2023-01-12 05:09:04.120096 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (116.700958ms) to execute
2023-01-12 05:09:05.275581 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (109.326863ms) to execute
2023-01-12 05:09:05.546409 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (145.091886ms) to execute
2023-01-12 05:09:06.629566 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (110.638625ms) to execute
2023-01-12 05:09:15.225754 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (250.93421ms) to execute
2023-01-12 05:09:17.843770 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (100.657364ms) to execute
2023-01-12 05:09:20.036808 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (101.364244ms) to execute
2023-01-12 05:09:20.264441 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (110.529407ms) to execute
2023-01-12 05:09:23.328516 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (106.788835ms) to execute
2023-01-12 05:09:23.508518 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (103.447035ms) to execute
2023-01-12 05:09:25.999585 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.434961ms) to execute
2023-01-12 05:09:28.678958 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (102.484575ms) to execute
2023-01-12 05:09:28.903431 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (156.589369ms) to execute
2023-01-12 05:09:32.669600 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (104.512986ms) to execute
2023-01-12 05:09:33.117786 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.51199568s > 1s]
2023-01-12 05:09:34.216775 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (186.350497ms) to execute
2023-01-12 05:09:34.440783 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (190.132449ms) to execute
2023-01-12 05:09:37.282037 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (211.944851ms) to execute
2023-01-12 05:09:40.024282 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (153.971423ms) to execute
2023-01-12 05:09:40.281977 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (104.865718ms) to execute
2023-01-12 05:09:43.228916 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (230.885189ms) to execute
2023-01-12 05:09:51.400493 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (237.43585ms) to execute
2023-01-12 05:09:51.694861 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (139.137273ms) to execute
2023-01-12 05:09:51.912289 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (144.235515ms) to execute
2023-01-12 05:09:52.123561 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (141.438703ms) to execute
2023-01-12 05:09:53.056372 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (381.55599ms) to execute
2023-01-12 05:09:53.244769 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (166.024029ms) to execute
2023-01-12 05:09:53.244987 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (167.232487ms) to execute
2023-01-12 05:09:53.464118 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (193.551065ms) to execute
2023-01-12 05:09:53.711908 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (196.111825ms) to execute
2023-01-12 05:09:53.833066 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (107.520666ms) to execute
2023-01-12 05:09:53.833728 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (109.839275ms) to execute
2023-01-12 05:09:54.386194 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (153.749873ms) to execute
2023-01-12 05:09:55.807097 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (103.759566ms) to execute
2023-01-12 05:09:56.330489 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (278.183123ms) to execute
2023-01-12 05:09:56.777282 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (280.92847ms) to execute
2023-01-12 05:09:57.256369 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (177.213501ms) to execute
2023-01-12 05:09:57.501564 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (105.943833ms) to execute
2023-01-12 05:09:58.932459 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (126.485623ms) to execute
2023-01-12 05:10:00.280200 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (115.008289ms) to execute
2023-01-12 05:10:03.034660 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (100.704937ms) to execute
2023-01-12 05:10:03.122565 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.51254859s > 1s]
2023-01-12 05:10:03.919609 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (107.542665ms) to execute
2023-01-12 05:10:05.376843 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (201.800831ms) to execute
2023-01-12 05:10:05.711205 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (193.959155ms) to execute
2023-01-12 05:10:05.861593 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (136.56989ms) to execute
2023-01-12 05:10:05.861862 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (143.630816ms) to execute
2023-01-12 05:10:06.009545 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (124.430738ms) to execute
2023-01-12 05:10:06.151118 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.388911ms) to execute
2023-01-12 05:10:06.302140 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (140.994947ms) to execute
2023-01-12 05:10:07.475368 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (104.46243ms) to execute
2023-01-12 05:10:08.433448 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (106.265682ms) to execute
2023-01-12 05:10:09.856797 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (157.996387ms) to execute
2023-01-12 05:10:10.125371 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (192.167663ms) to execute
2023-01-12 05:10:11.580906 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (207.666545ms) to execute
2023-01-12 05:10:12.870899 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (123.113527ms) to execute
2023-01-12 05:10:13.184470 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (247.027818ms) to execute
2023-01-12 05:10:13.184554 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (124.500276ms) to execute
2023-01-12 05:10:13.353688 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (115.981509ms) to execute
2023-01-12 05:10:19.968457 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (111.054624ms) to execute
2023-01-12 05:10:29.019697 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (103.774127ms) to execute
2023-01-12 05:10:30.769137 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (105.337984ms) to execute
2023-01-12 05:10:32.232901 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (106.16824ms) to execute
2023-01-12 05:10:32.370187 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (115.154179ms) to execute
2023-01-12 05:10:32.846349 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (110.561586ms) to execute
2023-01-12 05:10:33.122984 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.51960606s > 1s]
2023-01-12 05:10:34.016751 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (105.621803ms) to execute
2023-01-12 05:10:39.174311 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (133.436731ms) to execute
2023-01-12 05:10:39.297309 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (199.099425ms) to execute
2023-01-12 05:10:39.405533 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (105.417277ms) to execute
2023-01-12 05:10:39.611486 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (142.771414ms) to execute
2023-01-12 05:10:39.728689 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (114.694539ms) to execute
2023-01-12 05:10:41.523476 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (120.058405ms) to execute
2023-01-12 05:10:41.650161 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (114.380651ms) to execute
2023-01-12 05:10:41.986012 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (206.968746ms) to execute
2023-01-12 05:10:42.095387 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (104.885458ms) to execute
2023-01-12 05:10:42.371947 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (103.451147ms) to execute
2023-01-12 05:10:42.860939 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (100.333378ms) to execute
2023-01-12 05:10:43.357003 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (121.086789ms) to execute
2023-01-12 05:10:46.993738 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (102.024829ms) to execute
2023-01-12 05:10:47.236174 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (103.299878ms) to execute
2023-01-12 05:10:47.369567 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (121.538028ms) to execute
2023-01-12 05:10:47.369810 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (130.022452ms) to execute
2023-01-12 05:10:47.612104 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (140.250282ms) to execute
2023-01-12 05:10:48.772608 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (116.135365ms) to execute
2023-01-12 05:10:48.899916 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (105.696922ms) to execute
2023-01-12 05:10:52.612070 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (164.288152ms) to execute
2023-01-12 05:10:52.961350 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (103.026944ms) to execute
2023-01-12 05:11:03.123369 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.514320728s > 1s]
2023-01-12 05:11:12.504938 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (107.098408ms) to execute
2023-01-12 05:11:13.704488 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (103.397277ms) to execute
2023-01-12 05:11:13.927316 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (112.499004ms) to execute
2023-01-12 05:11:15.557176 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (426.157961ms) to execute
2023-01-12 05:11:16.444811 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (132.328998ms) to execute
2023-01-12 05:11:16.791468 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (216.500456ms) to execute
2023-01-12 05:11:16.958174 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (143.735216ms) to execute
2023-01-12 05:11:17.193553 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (207.670466ms) to execute
2023-01-12 05:11:17.506096 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (135.506924ms) to execute
2023-01-12 05:11:19.245964 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (165.814946ms) to execute
2023-01-12 05:11:19.880970 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (102.252357ms) to execute
2023-01-12 05:11:20.068249 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (130.880494ms) to execute
2023-01-12 05:11:20.189688 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (114.58866ms) to execute
2023-01-12 05:11:21.515982 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (228.551514ms) to execute
2023-01-12 05:11:21.678322 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (157.210155ms) to execute
2023-01-12 05:11:21.678588 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (158.772782ms) to execute
2023-01-12 05:11:21.821543 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (106.831664ms) to execute
2023-01-12 05:11:23.055105 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (105.377333ms) to execute
2023-01-12 05:11:24.558088 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (170.931592ms) to execute
2023-01-12 05:11:24.805199 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (140.819355ms) to execute
2023-01-12 05:11:29.844366 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (257.111068ms) to execute
2023-01-12 05:11:30.196404 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (247.95452ms) to execute
2023-01-12 05:11:31.340016 I | auth: deleting token VABMQaZmfURPrxBX.22 for user conductor
2023-01-12 05:11:31.340197 I | auth: deleting token xZlpkrPMCsObUgcW.18 for user conductor
2023-01-12 05:11:31.340341 I | auth: deleting token qKQZOEzUWXnZBOxx.20 for user conductor
2023-01-12 05:11:32.340224 I | auth: deleting token sGaqUBixNJgNKfya.30 for user conductor
2023-01-12 05:11:32.340484 I | auth: deleting token wxdzFSGzwKgCunBX.24 for user conductor
2023-01-12 05:11:32.342177 I | auth: deleting token MWOQbTKqitUjseNO.32 for user conductor
2023-01-12 05:11:32.342237 I | auth: deleting token iAHWtRYiEuqtnkUT.28 for user conductor
2023-01-12 05:11:32.342273 I | auth: deleting token NQPWvIMwHuwCFzFq.34 for user conductor
2023-01-12 05:11:32.342453 I | auth: deleting token WJszfJvoBMnyCkpR.26 for user conductor
2023-01-12 05:11:32.503740 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (105.864081ms) to execute
2023-01-12 05:11:32.698655 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (114.702591ms) to execute
2023-01-12 05:11:33.126602 W | rafthttp: the clock difference against peer b26940d7cb32fe32 is too high [1.519301858s > 1s]
2023-01-12 05:11:33.127340 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (107.333869ms) to execute
2023-01-12 05:11:33.381710 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (127.823141ms) to execute
2023-01-12 05:11:34.343040 I | auth: deleting token RUZzSxJZDbkfvuIH.41 for user conductor
2023-01-12 05:11:34.343135 I | auth: deleting token oicEclzIyMsUsOWe.39 for user conductor
2023-01-12 05:11:34.343150 I | auth: deleting token jfMVwYVTIpclHGQL.42 for user conductor
2023-01-12 05:11:34.343161 I | auth: deleting token rfbYoejsSlrbzikW.36 for user conductor
2023-01-12 05:11:34.343765 I | auth: deleting token zGPyazdLdcxgsqxl.38 for user conductor
2023-01-12 05:11:35.339860 I | auth: deleting token SfLAyjtmUCFlmKxW.44 for user conductor
2023-01-12 05:11:35.339920 I | auth: deleting token mUmJIrHOnWOsRwrE.49 for user conductor
2023-01-12 05:11:35.339949 I | auth: deleting token IWQlOcYYNBNQIzZs.57 for user conductor
2023-01-12 05:11:35.339972 I | auth: deleting token FhNBfbpSePGKupoe.46 for user conductor
2023-01-12 05:11:35.339981 I | auth: deleting token pZsyWAHBvxMZfpRc.45 for user conductor
2023-01-12 05:11:35.340000 I | auth: deleting token TuGCCSkOqczspefu.47 for user conductor
2023-01-12 05:11:35.340032 I | auth: deleting token usGyEvXqrYzHGqUp.53 for user conductor
2023-01-12 05:11:35.340059 I | auth: deleting token edAuhzFOUofOyLiz.59 for user conductor
2023-01-12 05:11:35.340068 I | auth: deleting token wcFRYGtpXnCeRLfE.55 for user conductor
2023-01-12 05:11:35.340079 I | auth: deleting token KLPaefYBeMvFowFw.51 for user conductor
2023-01-12 05:11:35.634497 W | etcdserver: request "header: authenticate: