By type
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
Skipping self-checking
2021-06-21 08:06:08.406422 I | etcdmain: etcd Version: 3.2.24
2021-06-21 08:06:08.406567 I | etcdmain: Git SHA: 420a45226
2021-06-21 08:06:08.406573 I | etcdmain: Go Version: go1.8.7
2021-06-21 08:06:08.406577 I | etcdmain: Go OS/Arch: linux/amd64
2021-06-21 08:06:08.406590 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-06-21 08:06:08.406761 I | embed: listening for peers on http://0.0.0.0:2380
2021-06-21 08:06:08.406831 I | embed: listening for client requests on 0.0.0.0:2379
2021-06-21 08:06:08.605194 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd:2380 to 10.233.72.73:2380
2021-06-21 08:06:08.605830 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd:2380 to 10.233.72.73:2380
2021-06-21 08:06:08.611681 I | etcdserver: name = onap-oof-has-etcd-2
2021-06-21 08:06:08.611705 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-06-21 08:06:08.611712 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-06-21 08:06:08.611723 I | etcdserver: heartbeat = 100ms
2021-06-21 08:06:08.611727 I | etcdserver: election = 1000ms
2021-06-21 08:06:08.611731 I | etcdserver: snapshot count = 100000
2021-06-21 08:06:08.611742 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-2.oof-has-etcd:2379
2021-06-21 08:06:08.611751 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-06-21 08:06:08.611782 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-06-21 08:06:08.701828 I | etcdserver: starting member 2d249ba41c7e44fa in cluster e8b03869cbf54258
2021-06-21 08:06:08.702030 I | raft: 2d249ba41c7e44fa became follower at term 0
2021-06-21 08:06:08.702115 I | raft: newRaft 2d249ba41c7e44fa [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-06-21 08:06:08.702169 I | raft: 2d249ba41c7e44fa became follower at term 1
2021-06-21 08:06:08.800295 W | auth: simple token is not cryptographically signed
2021-06-21 08:06:08.805008 I | rafthttp: starting peer 72b38cc930a2fa6f...
2021-06-21 08:06:08.805140 I | rafthttp: started HTTP pipelining with peer 72b38cc930a2fa6f
2021-06-21 08:06:08.806132 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-06-21 08:06:08.806356 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-06-21 08:06:08.901052 I | rafthttp: started peer 72b38cc930a2fa6f
2021-06-21 08:06:08.901115 I | rafthttp: added peer 72b38cc930a2fa6f
2021-06-21 08:06:08.901138 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-06-21 08:06:08.901154 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-06-21 08:06:08.901178 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-06-21 08:06:08.901200 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream Message reader)
2021-06-21 08:06:08.903381 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-06-21 08:06:08.999615 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-06-21 08:06:09.000171 I | rafthttp: started peer 8aae4c350a2413a5
2021-06-21 08:06:09.000227 I | rafthttp: added peer 8aae4c350a2413a5
2021-06-21 08:06:09.000270 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-06-21 08:06:09.001185 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-06-21 08:06:09.099472 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-06-21 08:06:09.099743 I | rafthttp: peer 72b38cc930a2fa6f became active
2021-06-21 08:06:09.099775 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-06-21 08:06:09.105107 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream Message reader)
2021-06-21 08:06:09.105623 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-06-21 08:06:09.105802 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-06-21 08:06:09.105938 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-06-21 08:06:09.200288 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream Message writer)
2021-06-21 08:06:09.200520 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream MsgApp v2 writer)
2021-06-21 08:06:09.865745 I | raft: 2d249ba41c7e44fa [term: 1] received a MsgVote message with higher term from 72b38cc930a2fa6f [term: 3]
2021-06-21 08:06:09.865822 I | raft: 2d249ba41c7e44fa became follower at term 3
2021-06-21 08:06:09.865836 I | raft: 2d249ba41c7e44fa [logterm: 1, index: 3, vote: 0] cast MsgVote for 72b38cc930a2fa6f [logterm: 1, index: 3] at term 3
2021-06-21 08:06:09.867815 I | raft: raft.node: 2d249ba41c7e44fa elected leader 72b38cc930a2fa6f at term 3
2021-06-21 08:06:09.871940 I | etcdserver: published {Name:onap-oof-has-etcd-2 ClientURLs:[http://onap-oof-has-etcd-2.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-06-21 08:06:09.871981 I | embed: ready to serve client requests
2021-06-21 08:06:09.872418 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-06-21 08:06:09.900697 N | etcdserver/membership: set the initial cluster version to 3.0
2021-06-21 08:06:09.900791 I | etcdserver/api: enabled capabilities for version 3.0
2021-06-21 08:06:14.099751 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:19.100097 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:24.100395 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:29.100835 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:34.101174 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:39.101444 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:44.101828 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:49.102136 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:54.102479 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:59.102829 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:04.103115 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:09.103288 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:14.103600 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:19.103873 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:24.104154 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:29.104678 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:34.104937 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:39.105327 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:44.105604 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:49.105962 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:54.199537 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:54.804231 N | auth: added a new user: root
2021-06-21 08:07:54.804439 W | etcdserver: request "header: auth_user_add:" with result "size:27" took too long (1.300397193s) to execute
2021-06-21 08:07:56.407004 N | auth: added a new user: conductor
2021-06-21 08:07:56.407089 W | etcdserver: request "header: auth_user_add:" with result "size:27" took too long (1.151198543s) to execute
2021-06-21 08:07:56.854021 N | auth: Role conductor is created
2021-06-21 08:07:57.056483 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-06-21 08:07:57.351162 N | auth: granted role conductor to user conductor
2021-06-21 08:07:57.560365 N | auth: Role root is created
2021-06-21 08:07:57.562620 N | auth: granted role root to user root
2021-06-21 08:07:57.649846 N | auth: Authentication enabled
2021-06-21 08:07:59.199825 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:04.200142 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:09.200509 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:14.200905 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:19.201214 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:24.201520 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:29.201784 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:34.202062 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:39.202402 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:44.202677 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:49.202968 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:54.203304 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:59.203591 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:04.203870 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:09.204200 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:14.204482 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:15.304410 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.254944282s) to execute
2021-06-21 08:09:16.706182 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (557.841108ms) to execute
2021-06-21 08:09:18.199909 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (300.026509ms) to execute
2021-06-21 08:09:19.299567 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:23.901938 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (2.795126058s) to execute
2021-06-21 08:09:24.299820 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:25.205853 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.300679672s) to execute
2021-06-21 08:09:25.206203 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.301398283s) to execute
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-06-21 08:09:28.106229 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.706302895s) to execute
2021-06-21 08:09:29.300074 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:29.402929 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.296145188s) to execute
2021-06-21 08:09:29.403073 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (1.294610692s) to execute
2021-06-21 08:09:30.901897 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.351662036s) to execute
2021-06-21 08:09:30.903500 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.103646305s) to execute
2021-06-21 08:09:32.304754 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.205080104s) to execute
2021-06-21 08:09:33.803736 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.304063381s) to execute
2021-06-21 08:09:33.803933 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.404224409s) to execute
2021-06-21 08:09:34.300322 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:35.204412 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.397472505s) to execute
2021-06-21 08:09:35.347202 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (139.078278ms) to execute
2021-06-21 08:09:38.002118 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.154485373s) to execute
2021-06-21 08:09:39.300590 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:39.408599 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (706.725709ms) to execute
2021-06-21 08:09:40.808006 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.308104535s) to execute
2021-06-21 08:09:42.105970 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.203718514s) to execute
2021-06-21 08:09:42.347469 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (147.661975ms) to execute
2021-06-21 08:09:43.604059 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.254353172s) to execute
2021-06-21 08:09:44.300851 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:45.004516 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.20475764s) to execute
2021-06-21 08:09:46.306927 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.159663286s) to execute
2021-06-21 08:09:47.701923 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.252102269s) to execute
2021-06-21 08:09:49.001524 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.352597429s) to execute
2021-06-21 08:09:49.301023 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:51.803869 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.452321438s) to execute
2021-06-21 08:09:54.301232 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:55.907863 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (2.558880179s) to execute
2021-06-21 08:09:57.303397 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.2035183s) to execute
2021-06-21 08:09:57.303659 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.303925192s) to execute
2021-06-21 08:09:59.301476 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:01.104919 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (457.688081ms) to execute
2021-06-21 08:10:02.502346 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (255.210626ms) to execute
2021-06-21 08:10:04.301710 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:04.804488 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.004553257s) to execute
2021-06-21 08:10:06.106130 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.206407111s) to execute
2021-06-21 08:10:07.503831 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (301.758884ms) to execute
2021-06-21 08:10:09.301964 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:11.103593 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.256353877s) to execute
2021-06-21 08:10:13.901691 W | etcdserver: request "header: put:" with result "size:4" took too long (2.601992493s) to execute
2021-06-21 08:10:13.903569 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.703904083s) to execute
2021-06-21 08:10:14.302320 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:15.301871 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.397652716s) to execute
2021-06-21 08:10:15.302020 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.396198481s) to execute
2021-06-21 08:10:16.607906 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.608003012s) to execute
2021-06-21 08:10:16.699505 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (1.299767779s) to execute
2021-06-21 08:10:18.001159 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:588" took too long (2.596896174s) to execute
2021-06-21 08:10:18.001248 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.298794664s) to execute
2021-06-21 08:10:19.302516 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:19.305693 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.205927855s) to execute
2021-06-21 08:10:19.399530 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.099702171s) to execute
2021-06-21 08:10:20.704003 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.301209999s) to execute
2021-06-21 08:10:20.704132 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (803.038427ms) to execute
2021-06-21 08:10:22.103742 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (556.424046ms) to execute
2021-06-21 08:10:24.302705 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:25.501229 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (800.447718ms) to execute
2021-06-21 08:10:26.908103 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (606.320006ms) to execute
2021-06-21 08:10:28.306663 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.25951958s) to execute
2021-06-21 08:10:29.302893 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:31.101258 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.752287462s) to execute
2021-06-21 08:10:31.101692 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.60211423s) to execute
2021-06-21 08:10:32.502692 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.302968552s) to execute
2021-06-21 08:10:33.903670 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.204185197s) to execute
2021-06-21 08:10:34.303107 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:35.205504 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203269429s) to execute
2021-06-21 08:10:35.205625 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.205880779s) to execute
2021-06-21 08:10:35.347405 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (138.141103ms) to execute
2021-06-21 08:10:36.601809 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.252337381s) to execute
2021-06-21 08:10:37.905034 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.257320237s) to execute
2021-06-21 08:10:39.202806 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.295012955s) to execute
2021-06-21 08:10:39.203041 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.103169094s) to execute
2021-06-21 08:10:39.303350 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:42.008364 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (857.642229ms) to execute
2021-06-21 08:10:43.400916 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.30042274s) to execute
2021-06-21 08:10:44.303620 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:44.905087 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (403.831894ms) to execute
2021-06-21 08:10:46.302536 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.353513017s) to execute
2021-06-21 08:10:47.701012 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.395910914s) to execute
2021-06-21 08:10:49.201085 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.895380203s) to execute
2021-06-21 08:10:49.303837 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:50.604139 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.899819469s) to execute
2021-06-21 08:10:50.604434 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.900364884s) to execute
2021-06-21 08:10:50.748054 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (140.724331ms) to execute
2021-06-21 08:10:53.401090 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.254129833s) to execute
2021-06-21 08:10:53.646983 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (144.663923ms) to execute
2021-06-21 08:10:54.499831 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:55.199993 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.100138884s) to execute
2021-06-21 08:10:56.400288 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.196847816s) to execute
2021-06-21 08:10:57.900498 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (300.829602ms) to execute
2021-06-21 08:10:59.500106 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:04.500376 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:04.506286 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (459.202028ms) to execute
2021-06-21 08:11:07.402290 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.754896408s) to execute
2021-06-21 08:11:09.500646 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:10.101177 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.599856708s) to execute
2021-06-21 08:11:10.101408 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.696479398s) to execute
2021-06-21 08:11:12.806224 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.159028972s) to execute
2021-06-21 08:11:14.204889 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (856.878388ms) to execute
2021-06-21 08:11:14.500961 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:17.702553 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.253172097s) to execute
2021-06-21 08:11:19.099846 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (800.175534ms) to execute
2021-06-21 08:11:19.501195 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:20.502627 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (702.914495ms) to execute
2021-06-21 08:11:21.902258 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (455.162666ms) to execute
2021-06-21 08:11:24.501492 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:29.501824 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:34.502133 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:38.302689 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.954060847s) to execute
2021-06-21 08:11:38.447660 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (142.580827ms) to execute
2021-06-21 08:11:38.449142 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (143.378191ms) to execute
2021-06-21 08:11:39.599478 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:41.205715 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.258338179s) to execute
2021-06-21 08:11:44.200311 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.252958411s) to execute
2021-06-21 08:11:44.599708 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:45.599538 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.252204786s) to execute
2021-06-21 08:11:45.599965 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.300269057s) to execute
2021-06-21 08:11:45.747397 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (145.211459ms) to execute
2021-06-21 08:11:45.749422 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (146.968641ms) to execute
2021-06-21 08:11:49.599984 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:54.600696 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:11:58.650337 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.002983286s) to execute
2021-06-21 08:11:59.600890 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:00.201597 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (801.907265ms) to execute
2021-06-21 08:12:04.601061 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:05.903342 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.256218189s) to execute
2021-06-21 08:12:07.304807 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (405.098598ms) to execute
2021-06-21 08:12:08.604834 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.105175395s) to execute
2021-06-21 08:12:09.601320 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:12.900842 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.501161499s) to execute
2021-06-21 08:12:14.206789 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.303394516s) to execute
2021-06-21 08:12:14.207225 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.107420525s) to execute
2021-06-21 08:12:14.207328 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.303743958s) to execute
2021-06-21 08:12:14.601570 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:17.601594 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (801.333099ms) to execute
2021-06-21 08:12:17.948073 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.454396ms) to execute
2021-06-21 08:12:19.208553 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (460.993271ms) to execute
2021-06-21 08:12:19.601805 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:24.602045 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:26.508032 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.708359008s) to execute
2021-06-21 08:12:26.647402 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (136.686554ms) to execute
2021-06-21 08:12:26.747433 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (144.748691ms) to execute
2021-06-21 08:12:29.403917 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.256859419s) to execute
2021-06-21 08:12:29.547397 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (140.679203ms) to execute
2021-06-21 08:12:29.602317 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:31.002398 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (555.041075ms) to execute
2021-06-21 08:12:33.403779 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.250456805s) to execute
2021-06-21 08:12:34.602600 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:37.299830 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (952.860072ms) to execute
2021-06-21 08:12:38.800430 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (452.639253ms) to execute
2021-06-21 08:12:39.602984 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:42.306804 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (705.469713ms) to execute
2021-06-21 08:12:43.901780 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (454.652657ms) to execute
2021-06-21 08:12:44.603224 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:45.604440 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (256.987632ms) to execute
2021-06-21 08:12:47.202838 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (102.253987ms) to execute
2021-06-21 08:12:49.603541 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:51.700420 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.351316345s) to execute
2021-06-21 08:12:53.104877 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.355037276s) to execute
2021-06-21 08:12:54.502341 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.397365938s) to execute
2021-06-21 08:12:54.502558 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.799165607s) to execute
2021-06-21 08:12:54.502771 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.302826171s) to execute
2021-06-21 08:12:54.603793 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:54.647681 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.760092ms) to execute
2021-06-21 08:12:57.305879 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.655343137s) to execute
2021-06-21 08:12:58.705385 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.605675672s) to execute
2021-06-21 08:12:59.604023 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:00.100034 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.39227897s) to execute
2021-06-21 08:13:00.100216 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.200330452s) to execute
2021-06-21 08:13:00.100470 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.391537024s) to execute
2021-06-21 08:13:04.499900 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.752809685s) to execute
2021-06-21 08:13:04.699552 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:05.903811 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.400570949s) to execute
2021-06-21 08:13:05.999663 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.496670523s) to execute
2021-06-21 08:13:06.048437 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (141.381043ms) to execute
2021-06-21 08:13:06.048656 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.545290766s) to execute
2021-06-21 08:13:07.307655 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.254908836s) to execute
2021-06-21 08:13:07.399585 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (146.84234ms) to execute
2021-06-21 08:13:09.699807 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:09.804578 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (657.438179ms) to execute
2021-06-21 08:13:11.301457 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.301724998s) to execute
2021-06-21 08:13:12.703316 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.301255429s) to execute
2021-06-21 08:13:12.703464 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.303716971s) to execute
2021-06-21 08:13:14.699990 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:15.507005 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.800939946s) to execute
2021-06-21 08:13:15.507544 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.707863212s) to execute
2021-06-21 08:13:17.201343 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.599501162s) to execute
2021-06-21 08:13:17.201522 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.60180608s) to execute
2021-06-21 08:13:17.201590 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.601815963s) to execute
2021-06-21 08:13:18.700284 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.496255818s) to execute
2021-06-21 08:13:18.700791 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.49452941s) to execute
2021-06-21 08:13:19.700923 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:20.100588 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.353718367s) to execute
2021-06-21 08:13:21.502637 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.399046155s) to execute
2021-06-21 08:13:21.502734 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203013495s) to execute
2021-06-21 08:13:21.647147 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (141.451359ms) to execute
2021-06-21 08:13:24.602298 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.553641065s) to execute
2021-06-21 08:13:24.701304 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:24.747481 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (141.564144ms) to execute
2021-06-21 08:13:27.706015 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.257402009s) to execute
2021-06-21 08:13:29.200214 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.300206579s) to execute
2021-06-21 08:13:29.200540 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.398581517s) to execute
2021-06-21 08:13:29.349327 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (146.556433ms) to execute
2021-06-21 08:13:29.745159 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:33.504969 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.057797724s) to execute
2021-06-21 08:13:34.745436 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:35.001941 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.354889922s) to execute
2021-06-21 08:13:35.002153 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.402254373s) to execute
2021-06-21 08:13:35.147525 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.545117304s) to execute
2021-06-21 08:13:35.247231 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (145.148473ms) to execute
2021-06-21 08:13:35.247355 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (242.683366ms) to execute
2021-06-21 08:13:39.300804 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.642238319s) to execute
2021-06-21 08:13:39.745785 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:40.700766 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.397391916s) to execute
2021-06-21 08:13:40.700934 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.200911402s) to execute
2021-06-21 08:13:40.701116 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.301337964s) to execute
2021-06-21 08:13:44.799463 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:48.101585 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (5.894503028s) to execute
2021-06-21 08:13:49.799685 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:54.799923 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:59.607907 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.208147782s) to execute
2021-06-21 08:13:59.800235 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:02.504603 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.857050589s) to execute
2021-06-21 08:14:02.648316 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (141.094595ms) to execute
2021-06-21 08:14:02.650239 I | auth: deleting token ihzfUbeDeQayJqbZ.17 for user conductor
2021-06-21 08:14:03.650168 I | auth: deleting token tCsiEtqjbILoUnth.19 for user conductor
2021-06-21 08:14:04.199836 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.549998578s) to execute
2021-06-21 08:14:04.800658 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:05.604338 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.451865944s) to execute
2021-06-21 08:14:05.650209 I | auth: deleting token BEOCSFINnFBnzIos.21 for user conductor
2021-06-21 08:14:05.747168 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (140.275123ms) to execute
2021-06-21 08:14:07.106060 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.006298597s) to execute
2021-06-21 08:14:07.650147 I | auth: deleting token DCzumAOJYQlljpsp.23 for user conductor
2021-06-21 08:14:08.699452 I | auth: deleting token UFynMtsSSDHSbUmr.25 for user conductor
2021-06-21 08:14:09.800841 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:10.402304 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.354903152s) to execute
2021-06-21 08:14:11.702923 I | auth: deleting token CHGhVjmdrUxUNMqE.27 for user conductor
2021-06-21 08:14:11.805440 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (358.516376ms) to execute
2021-06-21 08:14:12.047446 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (143.786194ms) to execute
2021-06-21 08:14:12.650141 I | auth: deleting token BzYciCIOMsPikVRF.28 for user conductor
2021-06-21 08:14:13.404842 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (454.987889ms) to execute
2021-06-21 08:14:14.801063 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:14.906024 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (206.326065ms) to execute
2021-06-21 08:14:15.650234 I | auth: deleting token JvczVTOticznkwkq.29 for user conductor
2021-06-21 08:14:15.650280 I | auth: deleting token VXQMSKvmqDrsYQEY.30 for user conductor
2021-06-21 08:14:17.299779 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (899.959765ms) to execute
2021-06-21 08:14:17.650225 I | auth: deleting token YnkMTOFfyqZdSUSG.33 for user conductor
2021-06-21 08:14:17.650275 I | auth: deleting token QVmnfYYCsIIPfnuO.32 for user conductor
2021-06-21 08:14:18.650171 I | auth: deleting token AoAjiRqscESDOiLB.37 for user conductor
2021-06-21 08:14:18.650216 I | auth: deleting token PTwpJJZhSTKqkeny.35 for user conductor
2021-06-21 08:14:18.700458 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.25357982s) to execute
2021-06-21 08:14:18.847246 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (144.095534ms) to execute
2021-06-21 08:14:19.650184 I | auth: deleting token nrrwcnDXxKNBLvMO.40 for user conductor
2021-06-21 08:14:19.650235 I | auth: deleting token SLUweYEblpNKQmLf.39 for user conductor
2021-06-21 08:14:19.801296 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:21.700156 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.100486573s) to execute
2021-06-21 08:14:24.607082 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (959.843202ms) to execute
2021-06-21 08:14:24.650246 I | auth: deleting token hawOIBbJKPUWWsCC.43 for user conductor
2021-06-21 08:14:24.801568 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:25.650195 I | auth: deleting token WILiEWJCssGoeIoV.44 for user conductor
2021-06-21 08:14:25.650261 I | auth: deleting token eBGDVscMdTSguGWf.45 for user conductor
2021-06-21 08:14:25.650416 I | auth: deleting token KtNYsfxTbfolGXeW.47 for user conductor
2021-06-21 08:14:29.650153 I | auth: deleting token HuYCJjGHzvWWXsSG.51 for user conductor
2021-06-21 08:14:29.650192 I | auth: deleting token rLEaWlyoaFhcXlae.50 for user conductor
2021-06-21 08:14:29.650200 I | auth: deleting token CIrHQrvQzHUvqDde.49 for user conductor
2021-06-21 08:14:29.801880 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:31.650194 I | auth: deleting token oiMUfMkNRVvjYilE.53 for user conductor
2021-06-21 08:14:32.650225 I | auth: deleting token oYaiLtaBEMLuKxVd.56 for user conductor
2021-06-21 08:14:34.650208 I | auth: deleting token CBQLjoaJmuYAxLEJ.58 for user conductor
2021-06-21 08:14:34.650248 I | auth: deleting token BJMcFDkphEeksxxU.55 for user conductor
2021-06-21 08:14:34.650260 I | auth: deleting token icTvPFUpFMKPhxoX.59 for user conductor
2021-06-21 08:14:34.802172 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:35.650344 I | auth: deleting token VqSvnxPEXLgInIfN.63 for user conductor
2021-06-21 08:14:35.650399 I | auth: deleting token hCzJjEoIfIIMPUJF.62 for user conductor
2021-06-21 08:14:35.650411 I | auth: deleting token CPbBBTOHJPoXBXod.60 for user conductor
2021-06-21 08:14:38.699651 I | auth: deleting token wvDByrqCjgShsHdk.66 for user conductor
2021-06-21 08:14:38.699693 I | auth: deleting token aoIkFUueNGhEWNkG.68 for user conductor
2021-06-21 08:14:38.699707 I | auth: deleting token mhQrQbdqPTHACvuw.65 for user conductor
2021-06-21 08:14:39.200150 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.300436109s) to execute
2021-06-21 08:14:39.699543 I | auth: deleting token DCdWejukNSUjNcmZ.70 for user conductor
2021-06-21 08:14:39.802390 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:41.650193 I | auth: deleting token kOCjHhDqYVzWcleb.72 for user conductor
2021-06-21 08:14:42.650147 I | auth: deleting token zoUoBSBhObELLNOp.75 for user conductor
2021-06-21 08:14:42.650191 I | auth: deleting token aMsXKoXCHavcqPcL.76 for user conductor
2021-06-21 08:14:42.650203 I | auth: deleting token LykseNlSrObMfATo.73 for user conductor
2021-06-21 08:14:43.508236 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.457709965s) to execute
2021-06-21 08:14:44.802627 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:45.650202 I | auth: deleting token puxLRNYfppOygzIj.77 for user conductor
2021-06-21 08:14:45.650276 I | auth: deleting token TpQbIiINquHDBXoN.78 for user conductor
2021-06-21 08:14:46.650186 I | auth: deleting token cVNVOYvPeJfXgzJK.79 for user conductor
2021-06-21 08:14:46.650292 I | auth: deleting token GTmoXXHWaWxAXcFF.81 for user conductor
2021-06-21 08:14:46.650317 I | auth: deleting token CKQxVvuOpdvIXpbE.82 for user conductor
2021-06-21 08:14:48.303420 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.252171883s) to execute
2021-06-21 08:14:48.448276 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.318564ms) to execute
2021-06-21 08:14:49.650269 I | auth: deleting token PDuxTJajddObytuo.85 for user conductor
2021-06-21 08:14:49.650339 I | auth: deleting token IEVIZoxqeIwinmUX.84 for user conductor
2021-06-21 08:14:49.650352 I | auth: deleting token lVBSnVTwRzSnnghE.83 for user conductor
2021-06-21 08:14:49.802866 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:52.600868 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.198898297s) to execute
2021-06-21 08:14:52.650176 I | auth: deleting token aikhvbfVJBqfYpkr.89 for user conductor
2021-06-21 08:14:52.650224 I | auth: deleting token mteIhWssuXYEVUKg.87 for user conductor
2021-06-21 08:14:52.650236 I | auth: deleting token qHSqBKyUhQijVQru.91 for user conductor
2021-06-21 08:14:52.650243 I | auth: deleting token JvjnbJWrKhCNiZQR.88 for user conductor
2021-06-21 08:14:54.001219 W | etcdserver: request "header: