By type
Waiting for onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local to come up
Waiting for onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local to come up
Skipping self-checking
2022-12-15 10:03:25.759795 I | etcdmain: etcd Version: 3.2.24
2022-12-15 10:03:25.759987 I | etcdmain: Git SHA: 420a45226
2022-12-15 10:03:25.760000 I | etcdmain: Go Version: go1.8.7
2022-12-15 10:03:25.760009 I | etcdmain: Go OS/Arch: linux/amd64
2022-12-15 10:03:25.760020 I | etcdmain: setting maximum number of CPUs to 8, total number of available CPUs is 8
2022-12-15 10:03:25.760291 I | embed: listening for peers on http://0.0.0.0:2380
2022-12-15 10:03:25.760372 I | embed: listening for client requests on 0.0.0.0:2379
2022-12-15 10:03:25.774187 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.71.97:2380
2022-12-15 10:03:25.774263 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380 to 10.233.71.97:2380
2022-12-15 10:03:26.032599 I | etcdserver: name = onap-oof-has-etcd-2
2022-12-15 10:03:26.032644 I | etcdserver: data dir = /var/run/etcd/default.etcd
2022-12-15 10:03:26.032654 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2022-12-15 10:03:26.032660 I | etcdserver: heartbeat = 100ms
2022-12-15 10:03:26.032665 I | etcdserver: election = 1000ms
2022-12-15 10:03:26.032670 I | etcdserver: snapshot count = 100000
2022-12-15 10:03:26.032717 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2379
2022-12-15 10:03:26.032728 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380
2022-12-15 10:03:26.032773 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380
2022-12-15 10:03:26.046624 I | etcdserver: starting member cfa74bd0084c532f in cluster d98d265e45b06c28
2022-12-15 10:03:26.046727 I | raft: cfa74bd0084c532f became follower at term 0
2022-12-15 10:03:26.046754 I | raft: newRaft cfa74bd0084c532f [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2022-12-15 10:03:26.046775 I | raft: cfa74bd0084c532f became follower at term 1
2022-12-15 10:03:26.056949 W | auth: simple token is not cryptographically signed
2022-12-15 10:03:26.062858 I | rafthttp: starting peer c2223c5e03eaf5...
2022-12-15 10:03:26.063118 I | rafthttp: started HTTP pipelining with peer c2223c5e03eaf5
2022-12-15 10:03:26.067323 I | rafthttp: started streaming with peer c2223c5e03eaf5 (writer)
2022-12-15 10:03:26.067409 I | rafthttp: started streaming with peer c2223c5e03eaf5 (writer)
2022-12-15 10:03:26.071559 I | rafthttp: started peer c2223c5e03eaf5
2022-12-15 10:03:26.071619 I | rafthttp: added peer c2223c5e03eaf5
2022-12-15 10:03:26.071662 I | rafthttp: starting peer b26940d7cb32fe32...
2022-12-15 10:03:26.071704 I | rafthttp: started HTTP pipelining with peer b26940d7cb32fe32
2022-12-15 10:03:26.071765 I | rafthttp: started streaming with peer c2223c5e03eaf5 (stream Message reader)
2022-12-15 10:03:26.073703 I | rafthttp: started streaming with peer c2223c5e03eaf5 (stream MsgApp v2 reader)
2022-12-15 10:03:26.074221 I | rafthttp: started streaming with peer b26940d7cb32fe32 (writer)
2022-12-15 10:03:26.074751 I | rafthttp: started streaming with peer b26940d7cb32fe32 (writer)
2022-12-15 10:03:26.076646 I | rafthttp: started peer b26940d7cb32fe32
2022-12-15 10:03:26.076724 I | rafthttp: added peer b26940d7cb32fe32
2022-12-15 10:03:26.076852 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2022-12-15 10:03:26.078235 I | rafthttp: started streaming with peer b26940d7cb32fe32 (stream Message reader)
2022-12-15 10:03:26.078805 I | rafthttp: started streaming with peer b26940d7cb32fe32 (stream MsgApp v2 reader)
2022-12-15 10:03:26.079704 I | etcdserver/membership: added member c2223c5e03eaf5 [http://onap-oof-has-etcd-0.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-12-15 10:03:26.080066 I | etcdserver/membership: added member b26940d7cb32fe32 [http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-12-15 10:03:26.080252 I | etcdserver/membership: added member cfa74bd0084c532f [http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2380] to cluster d98d265e45b06c28
2022-12-15 10:03:27.275630 I | rafthttp: peer c2223c5e03eaf5 became active
2022-12-15 10:03:27.275742 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream Message reader)
2022-12-15 10:03:27.275944 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream MsgApp v2 reader)
2022-12-15 10:03:27.282380 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream Message writer)
2022-12-15 10:03:27.284658 I | rafthttp: established a TCP streaming connection with peer c2223c5e03eaf5 (stream MsgApp v2 writer)
2022-12-15 10:03:27.348899 I | raft: cfa74bd0084c532f is starting a new election at term 1
2022-12-15 10:03:27.349074 I | raft: cfa74bd0084c532f became candidate at term 2
2022-12-15 10:03:27.349124 I | raft: cfa74bd0084c532f received MsgVoteResp from cfa74bd0084c532f at term 2
2022-12-15 10:03:27.349138 I | raft: cfa74bd0084c532f [logterm: 1, index: 3] sent MsgVote request to c2223c5e03eaf5 at term 2
2022-12-15 10:03:27.349156 I | raft: cfa74bd0084c532f [logterm: 1, index: 3] sent MsgVote request to b26940d7cb32fe32 at term 2
2022-12-15 10:03:27.354813 I | raft: cfa74bd0084c532f received MsgVoteResp from c2223c5e03eaf5 at term 2
2022-12-15 10:03:27.354857 I | raft: cfa74bd0084c532f [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections
2022-12-15 10:03:27.354884 I | raft: cfa74bd0084c532f became leader at term 2
2022-12-15 10:03:27.354907 I | raft: raft.node: cfa74bd0084c532f elected leader cfa74bd0084c532f at term 2
2022-12-15 10:03:27.386197 I | embed: ready to serve client requests
2022-12-15 10:03:27.386381 I | etcdserver: published {Name:onap-oof-has-etcd-2 ClientURLs:[http://onap-oof-has-etcd-2.oof-has-etcd.onap.svc.cluster.local:2379]} to cluster d98d265e45b06c28
2022-12-15 10:03:27.387342 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2022-12-15 10:03:27.483508 W | etcdserver: failed to unmarshal the response body got from the peerURL(http://onap-oof-has-etcd-1.oof-has-etcd.onap.svc.cluster.local:2380) of member b26940d7cb32fe32 (invalid character 'u' looking for beginning of value)
2022-12-15 10:03:27.483566 W | etcdserver: cannot get the version of member b26940d7cb32fe32 (invalid character 'u' looking for beginning of value)
2022-12-15 10:03:27.483717 I | etcdserver: setting up the initial cluster version to 3.0
2022-12-15 10:03:27.487089 N | etcdserver/membership: set the initial cluster version to 3.0
2022-12-15 10:03:27.487685 I | etcdserver/api: enabled capabilities for version 3.0
2022-12-15 10:03:28.652685 I | rafthttp: peer b26940d7cb32fe32 became active
2022-12-15 10:03:28.652748 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream Message reader)
2022-12-15 10:03:28.666658 I | etcdserver: cfa74bd0084c532f initialzed peer connection; fast-forwarding 8 ticks (election ticks 10) with 2 active peer(s)
2022-12-15 10:03:28.673026 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream MsgApp v2 reader)
2022-12-15 10:03:28.689567 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream MsgApp v2 writer)
2022-12-15 10:03:28.708314 I | rafthttp: established a TCP streaming connection with peer b26940d7cb32fe32 (stream Message writer)
2022-12-15 10:03:31.073836 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.473483098s > 1s]
2022-12-15 10:03:31.491021 I | etcdserver: updating the cluster version from 3.0 to 3.2
2022-12-15 10:03:31.494355 N | etcdserver/membership: updated the cluster version from 3.0 to 3.2
2022-12-15 10:03:31.494661 I | etcdserver/api: enabled capabilities for version 3.2
2022-12-15 10:03:51.734705 N | auth: added a new user: root
2022-12-15 10:03:51.957530 N | auth: added a new user: conductor
2022-12-15 10:03:52.000881 N | auth: Role conductor is created
2022-12-15 10:03:52.033774 N | auth: role conductor's permission of key conductor is updated as READWRITE
2022-12-15 10:03:52.079927 N | auth: granted role conductor to user conductor
2022-12-15 10:03:52.204318 N | auth: Role root is created
2022-12-15 10:03:52.213595 N | auth: granted role root to user root
2022-12-15 10:03:52.223430 N | auth: Authentication enabled
2022-12-15 10:04:01.074106 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.472437577s > 1s]
2022-12-15 10:04:31.074427 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.472530352s > 1s]
2022-12-15 10:05:01.074656 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.474639457s > 1s]
2022-12-15 10:05:31.074904 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.473962679s > 1s]
2022-12-15 10:06:01.075384 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.474502219s > 1s]
2022-12-15 10:06:31.075604 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.475165524s > 1s]
2022-12-15 10:07:01.075851 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.475703992s > 1s]
2022-12-15 10:07:31.076104 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.476131633s > 1s]
2022-12-15 10:08:01.076411 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.476953031s > 1s]
2022-12-15 10:08:31.076692 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.477589294s > 1s]
2022-12-15 10:09:01.076931 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.478647705s > 1s]
2022-12-15 10:09:31.078042 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.479216768s > 1s]
2022-12-15 10:10:01.078303 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.47986944s > 1s]
2022-12-15 10:10:31.078660 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.480848729s > 1s]
2022-12-15 10:11:01.078943 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.481234868s > 1s]
2022-12-15 10:11:31.079205 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.48209038s > 1s]
2022-12-15 10:11:49.902382 W | etcdserver: failed to send out heartbeat on time (exceeded the 100ms timeout for 50.92597ms)
2022-12-15 10:11:49.902450 W | etcdserver: server is likely overloaded
2022-12-15 10:11:49.902474 W | etcdserver: failed to send out heartbeat on time (exceeded the 100ms timeout for 51.03523ms)
2022-12-15 10:11:49.902483 W | etcdserver: server is likely overloaded
2022-12-15 10:11:50.253176 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (350.278304ms) to execute
2022-12-15 10:11:50.935353 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (233.866868ms) to execute
2022-12-15 10:11:51.105208 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (105.792157ms) to execute
2022-12-15 10:11:52.547613 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (197.772591ms) to execute
2022-12-15 10:11:53.804669 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (201.111989ms) to execute
2022-12-15 10:11:54.145011 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (104.854081ms) to execute
2022-12-15 10:11:54.148031 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (100.587611ms) to execute
2022-12-15 10:11:56.191344 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (139.459339ms) to execute
2022-12-15 10:12:00.922709 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (113.007831ms) to execute
2022-12-15 10:12:01.079394 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.482492735s > 1s]
2022-12-15 10:12:01.327547 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (182.963556ms) to execute
2022-12-15 10:12:01.327827 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (182.41571ms) to execute
2022-12-15 10:12:01.729653 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (301.744642ms) to execute
2022-12-15 10:12:03.069623 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (201.290358ms) to execute
2022-12-15 10:12:03.386672 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (188.963973ms) to execute
2022-12-15 10:12:04.919648 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (176.011944ms) to execute
2022-12-15 10:12:06.496305 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (232.397442ms) to execute
2022-12-15 10:12:06.711714 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (106.000921ms) to execute
2022-12-15 10:12:06.814088 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (148.995883ms) to execute
2022-12-15 10:12:07.123586 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (176.175684ms) to execute
2022-12-15 10:12:10.368865 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (106.876269ms) to execute
2022-12-15 10:12:10.983672 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (176.568392ms) to execute
2022-12-15 10:12:18.457986 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (177.551894ms) to execute
2022-12-15 10:12:31.079626 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.482880732s > 1s]
2022-12-15 10:12:33.096741 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (173.396327ms) to execute
2022-12-15 10:12:33.381208 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (176.506387ms) to execute
2022-12-15 10:12:34.793126 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (161.979009ms) to execute
2022-12-15 10:12:36.224930 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (165.903985ms) to execute
2022-12-15 10:12:42.705402 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (182.416724ms) to execute
2022-12-15 10:12:44.224134 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (239.669219ms) to execute
2022-12-15 10:12:45.826956 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (181.042461ms) to execute
2022-12-15 10:12:45.827273 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (179.922533ms) to execute
2022-12-15 10:12:46.246943 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (102.059002ms) to execute
2022-12-15 10:12:53.240409 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (186.957601ms) to execute
2022-12-15 10:12:54.446466 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (160.751289ms) to execute
2022-12-15 10:12:56.157331 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (101.612107ms) to execute
2022-12-15 10:12:56.615245 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (102.222769ms) to execute
2022-12-15 10:12:57.496288 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (108.343409ms) to execute
2022-12-15 10:12:57.735286 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (120.562581ms) to execute
2022-12-15 10:12:59.574769 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (103.245696ms) to execute
2022-12-15 10:12:59.776809 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (177.487288ms) to execute
2022-12-15 10:13:00.482952 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (101.90159ms) to execute
2022-12-15 10:13:01.079963 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.483790211s > 1s]
2022-12-15 10:13:02.232549 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (166.075352ms) to execute
2022-12-15 10:13:05.005519 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (207.591122ms) to execute
2022-12-15 10:13:05.369035 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (213.348019ms) to execute
2022-12-15 10:13:06.627283 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (105.297338ms) to execute
2022-12-15 10:13:08.158081 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (183.461416ms) to execute
2022-12-15 10:13:10.866267 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (100.841962ms) to execute
2022-12-15 10:13:11.210966 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (140.462877ms) to execute
2022-12-15 10:13:11.211177 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (136.224987ms) to execute
2022-12-15 10:13:12.423400 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (156.181965ms) to execute
2022-12-15 10:13:12.628995 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (128.657146ms) to execute
2022-12-15 10:13:13.889244 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (207.533859ms) to execute
2022-12-15 10:13:14.190213 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (208.53876ms) to execute
2022-12-15 10:13:15.493738 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (185.379771ms) to execute
2022-12-15 10:13:15.785161 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (180.115629ms) to execute
2022-12-15 10:13:17.294928 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (186.470818ms) to execute
2022-12-15 10:13:29.297129 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (116.721846ms) to execute
2022-12-15 10:13:30.544645 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (196.282893ms) to execute
2022-12-15 10:13:30.833632 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (179.241622ms) to execute
2022-12-15 10:13:31.080211 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.484093978s > 1s]
2022-12-15 10:13:32.255572 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (150.85141ms) to execute
2022-12-15 10:13:33.544685 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (192.199506ms) to execute
2022-12-15 10:13:50.374794 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (105.602614ms) to execute
2022-12-15 10:13:50.725917 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (102.113424ms) to execute
2022-12-15 10:13:50.726554 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (100.770275ms) to execute
2022-12-15 10:13:51.248490 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (113.693979ms) to execute
2022-12-15 10:13:51.982251 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (121.099423ms) to execute
2022-12-15 10:13:53.455608 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (101.429814ms) to execute
2022-12-15 10:13:54.885241 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (104.191479ms) to execute
2022-12-15 10:13:58.917795 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (102.684222ms) to execute
2022-12-15 10:13:59.069318 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (122.797431ms) to execute
2022-12-15 10:14:01.080404 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.485242487s > 1s]
2022-12-15 10:14:06.657143 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (144.697685ms) to execute
2022-12-15 10:14:06.956258 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (181.633315ms) to execute
2022-12-15 10:14:07.066352 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (107.552877ms) to execute
2022-12-15 10:14:07.066864 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (104.997988ms) to execute
2022-12-15 10:14:08.557211 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (180.19741ms) to execute
2022-12-15 10:14:09.780487 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (138.040067ms) to execute
2022-12-15 10:14:14.379926 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (178.389464ms) to execute
2022-12-15 10:14:14.801154 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (173.318574ms) to execute
2022-12-15 10:14:15.037707 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (104.938345ms) to execute
2022-12-15 10:14:17.075774 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (211.024692ms) to execute
2022-12-15 10:14:17.486302 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (267.419559ms) to execute
2022-12-15 10:14:18.121876 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (112.594413ms) to execute
2022-12-15 10:14:18.746992 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (120.80253ms) to execute
2022-12-15 10:14:20.292407 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (269.658332ms) to execute
2022-12-15 10:14:20.628179 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (273.954876ms) to execute
2022-12-15 10:14:25.416087 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (138.768569ms) to execute
2022-12-15 10:14:25.618383 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (103.901215ms) to execute
2022-12-15 10:14:25.834859 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (107.232688ms) to execute
2022-12-15 10:14:26.744233 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (100.297451ms) to execute
2022-12-15 10:14:28.068971 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (100.646662ms) to execute
2022-12-15 10:14:28.606561 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (316.973349ms) to execute
2022-12-15 10:14:31.080650 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.485761664s > 1s]
2022-12-15 10:14:31.476915 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (173.611282ms) to execute
2022-12-15 10:14:33.814591 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (148.384044ms) to execute
2022-12-15 10:14:35.917881 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (177.541205ms) to execute
2022-12-15 10:14:37.318521 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (191.607233ms) to execute
2022-12-15 10:14:37.609333 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (178.962128ms) to execute
2022-12-15 10:14:38.821941 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (117.763979ms) to execute
2022-12-15 10:14:39.123458 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (100.47366ms) to execute
2022-12-15 10:14:45.976184 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (200.579449ms) to execute
2022-12-15 10:14:52.874767 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (194.570239ms) to execute
2022-12-15 10:14:53.105790 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (102.346752ms) to execute
2022-12-15 10:14:54.449689 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (274.244485ms) to execute
2022-12-15 10:14:54.758618 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (189.505601ms) to execute
2022-12-15 10:14:56.398582 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (192.924378ms) to execute
2022-12-15 10:14:57.615496 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (166.570403ms) to execute
2022-12-15 10:14:57.839124 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (127.435823ms) to execute
2022-12-15 10:14:59.445078 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (174.782537ms) to execute
2022-12-15 10:15:01.008454 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (102.171908ms) to execute
2022-12-15 10:15:01.080858 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.486716443s > 1s]
2022-12-15 10:15:02.359790 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (128.597257ms) to execute
2022-12-15 10:15:02.565381 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (115.272729ms) to execute
2022-12-15 10:15:15.857336 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (159.285669ms) to execute
2022-12-15 10:15:16.058073 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (156.450549ms) to execute
2022-12-15 10:15:18.524261 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (179.177711ms) to execute
2022-12-15 10:15:18.524926 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (177.110666ms) to execute
2022-12-15 10:15:18.812405 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (180.397344ms) to execute
2022-12-15 10:15:20.344917 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (190.387203ms) to execute
2022-12-15 10:15:20.644566 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (180.368189ms) to execute
2022-12-15 10:15:21.985958 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (274.025993ms) to execute
2022-12-15 10:15:22.376619 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (312.707435ms) to execute
2022-12-15 10:15:31.083863 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.486937727s > 1s]
2022-12-15 10:15:33.646217 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (107.598763ms) to execute
2022-12-15 10:15:34.012795 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (109.639154ms) to execute
2022-12-15 10:15:34.444411 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (214.152091ms) to execute
2022-12-15 10:15:35.718703 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (230.843834ms) to execute
2022-12-15 10:15:35.954367 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (229.981653ms) to execute
2022-12-15 10:15:35.954825 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (222.994249ms) to execute
2022-12-15 10:15:36.393569 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (301.672159ms) to execute
2022-12-15 10:15:37.049649 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (101.673401ms) to execute
2022-12-15 10:15:38.341366 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (124.605872ms) to execute
2022-12-15 10:15:38.613903 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (129.85329ms) to execute
2022-12-15 10:16:00.612969 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (198.630441ms) to execute
2022-12-15 10:16:00.854873 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (117.84167ms) to execute
2022-12-15 10:16:01.072947 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (186.193996ms) to execute
2022-12-15 10:16:01.084099 W | rafthttp: the clock difference against peer c2223c5e03eaf5 is too high [1.487791125s > 1s]
2022-12-15 10:16:01.298291 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (163.47973ms) to execute
2022-12-15 10:16:09.445925 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (188.020435ms) to execute
2022-12-15 10:16:10.793682 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (190.019481ms) to execute
2022-12-15 10:16:11.141241 W | etcdserver: request "header: authenticate: