Results

By type

          Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
Skipping self-checking
2021-06-21 08:06:08.406422 I | etcdmain: etcd Version: 3.2.24
2021-06-21 08:06:08.406567 I | etcdmain: Git SHA: 420a45226
2021-06-21 08:06:08.406573 I | etcdmain: Go Version: go1.8.7
2021-06-21 08:06:08.406577 I | etcdmain: Go OS/Arch: linux/amd64
2021-06-21 08:06:08.406590 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-06-21 08:06:08.406761 I | embed: listening for peers on http://0.0.0.0:2380
2021-06-21 08:06:08.406831 I | embed: listening for client requests on 0.0.0.0:2379
2021-06-21 08:06:08.605194 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd:2380 to 10.233.72.73:2380
2021-06-21 08:06:08.605830 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd:2380 to 10.233.72.73:2380
2021-06-21 08:06:08.611681 I | etcdserver: name = onap-oof-has-etcd-2
2021-06-21 08:06:08.611705 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-06-21 08:06:08.611712 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-06-21 08:06:08.611723 I | etcdserver: heartbeat = 100ms
2021-06-21 08:06:08.611727 I | etcdserver: election = 1000ms
2021-06-21 08:06:08.611731 I | etcdserver: snapshot count = 100000
2021-06-21 08:06:08.611742 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-2.oof-has-etcd:2379
2021-06-21 08:06:08.611751 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-06-21 08:06:08.611782 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-06-21 08:06:08.701828 I | etcdserver: starting member 2d249ba41c7e44fa in cluster e8b03869cbf54258
2021-06-21 08:06:08.702030 I | raft: 2d249ba41c7e44fa became follower at term 0
2021-06-21 08:06:08.702115 I | raft: newRaft 2d249ba41c7e44fa [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-06-21 08:06:08.702169 I | raft: 2d249ba41c7e44fa became follower at term 1
2021-06-21 08:06:08.800295 W | auth: simple token is not cryptographically signed
2021-06-21 08:06:08.805008 I | rafthttp: starting peer 72b38cc930a2fa6f...
2021-06-21 08:06:08.805140 I | rafthttp: started HTTP pipelining with peer 72b38cc930a2fa6f
2021-06-21 08:06:08.806132 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-06-21 08:06:08.806356 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-06-21 08:06:08.901052 I | rafthttp: started peer 72b38cc930a2fa6f
2021-06-21 08:06:08.901115 I | rafthttp: added peer 72b38cc930a2fa6f
2021-06-21 08:06:08.901138 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-06-21 08:06:08.901154 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-06-21 08:06:08.901178 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-06-21 08:06:08.901200 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream Message reader)
2021-06-21 08:06:08.903381 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-06-21 08:06:08.999615 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-06-21 08:06:09.000171 I | rafthttp: started peer 8aae4c350a2413a5
2021-06-21 08:06:09.000227 I | rafthttp: added peer 8aae4c350a2413a5
2021-06-21 08:06:09.000270 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-06-21 08:06:09.001185 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-06-21 08:06:09.099472 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-06-21 08:06:09.099743 I | rafthttp: peer 72b38cc930a2fa6f became active
2021-06-21 08:06:09.099775 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-06-21 08:06:09.105107 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream Message reader)
2021-06-21 08:06:09.105623 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-06-21 08:06:09.105802 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-06-21 08:06:09.105938 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-06-21 08:06:09.200288 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream Message writer)
2021-06-21 08:06:09.200520 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream MsgApp v2 writer)
2021-06-21 08:06:09.865745 I | raft: 2d249ba41c7e44fa [term: 1] received a MsgVote message with higher term from 72b38cc930a2fa6f [term: 3]
2021-06-21 08:06:09.865822 I | raft: 2d249ba41c7e44fa became follower at term 3
2021-06-21 08:06:09.865836 I | raft: 2d249ba41c7e44fa [logterm: 1, index: 3, vote: 0] cast MsgVote for 72b38cc930a2fa6f [logterm: 1, index: 3] at term 3
2021-06-21 08:06:09.867815 I | raft: raft.node: 2d249ba41c7e44fa elected leader 72b38cc930a2fa6f at term 3
2021-06-21 08:06:09.871940 I | etcdserver: published {Name:onap-oof-has-etcd-2 ClientURLs:[http://onap-oof-has-etcd-2.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-06-21 08:06:09.871981 I | embed: ready to serve client requests
2021-06-21 08:06:09.872418 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-06-21 08:06:09.900697 N | etcdserver/membership: set the initial cluster version to 3.0
2021-06-21 08:06:09.900791 I | etcdserver/api: enabled capabilities for version 3.0
2021-06-21 08:06:14.099751 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:19.100097 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:24.100395 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:29.100835 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:34.101174 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:39.101444 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:44.101828 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:49.102136 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:54.102479 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:06:59.102829 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:04.103115 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:09.103288 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:14.103600 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:19.103873 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:24.104154 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:29.104678 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:34.104937 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:39.105327 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:44.105604 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:49.105962 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:54.199537 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:07:54.804231 N | auth: added a new user: root
2021-06-21 08:07:54.804439 W | etcdserver: request "header: auth_user_add:" with result "size:27" took too long (1.300397193s) to execute
2021-06-21 08:07:56.407004 N | auth: added a new user: conductor
2021-06-21 08:07:56.407089 W | etcdserver: request "header: auth_user_add:" with result "size:27" took too long (1.151198543s) to execute
2021-06-21 08:07:56.854021 N | auth: Role conductor is created
2021-06-21 08:07:57.056483 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-06-21 08:07:57.351162 N | auth: granted role conductor to user conductor
2021-06-21 08:07:57.560365 N | auth: Role root is created
2021-06-21 08:07:57.562620 N | auth: granted role root to user root
2021-06-21 08:07:57.649846 N | auth: Authentication enabled
2021-06-21 08:07:59.199825 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:04.200142 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:09.200509 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:14.200905 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:19.201214 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:24.201520 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:29.201784 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:34.202062 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:39.202402 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:44.202677 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:49.202968 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:54.203304 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:08:59.203591 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:04.203870 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:09.204200 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:14.204482 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:15.304410 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.254944282s) to execute
2021-06-21 08:09:16.706182 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (557.841108ms) to execute
2021-06-21 08:09:18.199909 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (300.026509ms) to execute
2021-06-21 08:09:19.299567 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:23.901938 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (2.795126058s) to execute
2021-06-21 08:09:24.299820 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:25.205853 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.300679672s) to execute
2021-06-21 08:09:25.206203 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.301398283s) to execute
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-06-21 08:09:28.106229 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.706302895s) to execute
2021-06-21 08:09:29.300074 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:29.402929 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.296145188s) to execute
2021-06-21 08:09:29.403073 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (1.294610692s) to execute
2021-06-21 08:09:30.901897 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.351662036s) to execute
2021-06-21 08:09:30.903500 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.103646305s) to execute
2021-06-21 08:09:32.304754 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.205080104s) to execute
2021-06-21 08:09:33.803736 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.304063381s) to execute
2021-06-21 08:09:33.803933 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.404224409s) to execute
2021-06-21 08:09:34.300322 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:35.204412 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.397472505s) to execute
2021-06-21 08:09:35.347202 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (139.078278ms) to execute
2021-06-21 08:09:38.002118 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.154485373s) to execute
2021-06-21 08:09:39.300590 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:39.408599 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (706.725709ms) to execute
2021-06-21 08:09:40.808006 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.308104535s) to execute
2021-06-21 08:09:42.105970 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.203718514s) to execute
2021-06-21 08:09:42.347469 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (147.661975ms) to execute
2021-06-21 08:09:43.604059 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.254353172s) to execute
2021-06-21 08:09:44.300851 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:45.004516 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.20475764s) to execute
2021-06-21 08:09:46.306927 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.159663286s) to execute
2021-06-21 08:09:47.701923 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.252102269s) to execute
2021-06-21 08:09:49.001524 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.352597429s) to execute
2021-06-21 08:09:49.301023 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:51.803869 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.452321438s) to execute
2021-06-21 08:09:54.301232 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:09:55.907863 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (2.558880179s) to execute
2021-06-21 08:09:57.303397 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.2035183s) to execute
2021-06-21 08:09:57.303659 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.303925192s) to execute
2021-06-21 08:09:59.301476 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:01.104919 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (457.688081ms) to execute
2021-06-21 08:10:02.502346 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (255.210626ms) to execute
2021-06-21 08:10:04.301710 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:04.804488 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.004553257s) to execute
2021-06-21 08:10:06.106130 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.206407111s) to execute
2021-06-21 08:10:07.503831 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (301.758884ms) to execute
2021-06-21 08:10:09.301964 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:11.103593 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.256353877s) to execute
2021-06-21 08:10:13.901691 W | etcdserver: request "header: put:" with result "size:4" took too long (2.601992493s) to execute
2021-06-21 08:10:13.903569 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.703904083s) to execute
2021-06-21 08:10:14.302320 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:15.301871 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.397652716s) to execute
2021-06-21 08:10:15.302020 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.396198481s) to execute
2021-06-21 08:10:16.607906 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.608003012s) to execute
2021-06-21 08:10:16.699505 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (1.299767779s) to execute
2021-06-21 08:10:18.001159 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:588" took too long (2.596896174s) to execute
2021-06-21 08:10:18.001248 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.298794664s) to execute
2021-06-21 08:10:19.302516 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:19.305693 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.205927855s) to execute
2021-06-21 08:10:19.399530 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.099702171s) to execute
2021-06-21 08:10:20.704003 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.301209999s) to execute
2021-06-21 08:10:20.704132 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (803.038427ms) to execute
2021-06-21 08:10:22.103742 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (556.424046ms) to execute
2021-06-21 08:10:24.302705 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:25.501229 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (800.447718ms) to execute
2021-06-21 08:10:26.908103 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (606.320006ms) to execute
2021-06-21 08:10:28.306663 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.25951958s) to execute
2021-06-21 08:10:29.302893 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:31.101258 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.752287462s) to execute
2021-06-21 08:10:31.101692 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.60211423s) to execute
2021-06-21 08:10:32.502692 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.302968552s) to execute
2021-06-21 08:10:33.903670 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.204185197s) to execute
2021-06-21 08:10:34.303107 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:35.205504 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203269429s) to execute
2021-06-21 08:10:35.205625 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.205880779s) to execute
2021-06-21 08:10:35.347405 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (138.141103ms) to execute
2021-06-21 08:10:36.601809 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.252337381s) to execute
2021-06-21 08:10:37.905034 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.257320237s) to execute
2021-06-21 08:10:39.202806 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.295012955s) to execute
2021-06-21 08:10:39.203041 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.103169094s) to execute
2021-06-21 08:10:39.303350 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:42.008364 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (857.642229ms) to execute
2021-06-21 08:10:43.400916 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.30042274s) to execute
2021-06-21 08:10:44.303620 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:44.905087 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (403.831894ms) to execute
2021-06-21 08:10:46.302536 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.353513017s) to execute
2021-06-21 08:10:47.701012 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.395910914s) to execute
2021-06-21 08:10:49.201085 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.895380203s) to execute
2021-06-21 08:10:49.303837 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:50.604139 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.899819469s) to execute
2021-06-21 08:10:50.604434 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.900364884s) to execute
2021-06-21 08:10:50.748054 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (140.724331ms) to execute
2021-06-21 08:10:53.401090 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.254129833s) to execute
2021-06-21 08:10:53.646983 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (144.663923ms) to execute
2021-06-21 08:10:54.499831 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:10:55.199993 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.100138884s) to execute
2021-06-21 08:10:56.400288 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.196847816s) to execute
2021-06-21 08:10:57.900498 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (300.829602ms) to execute
2021-06-21 08:10:59.500106 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:04.500376 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:04.506286 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (459.202028ms) to execute
2021-06-21 08:11:07.402290 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.754896408s) to execute
2021-06-21 08:11:09.500646 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:10.101177 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.599856708s) to execute
2021-06-21 08:11:10.101408 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.696479398s) to execute
2021-06-21 08:11:12.806224 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.159028972s) to execute
2021-06-21 08:11:14.204889 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (856.878388ms) to execute
2021-06-21 08:11:14.500961 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:17.702553 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.253172097s) to execute
2021-06-21 08:11:19.099846 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (800.175534ms) to execute
2021-06-21 08:11:19.501195 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:20.502627 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (702.914495ms) to execute
2021-06-21 08:11:21.902258 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (455.162666ms) to execute
2021-06-21 08:11:24.501492 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:29.501824 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:34.502133 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:38.302689 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.954060847s) to execute
2021-06-21 08:11:38.447660 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (142.580827ms) to execute
2021-06-21 08:11:38.449142 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (143.378191ms) to execute
2021-06-21 08:11:39.599478 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:41.205715 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.258338179s) to execute
2021-06-21 08:11:44.200311 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.252958411s) to execute
2021-06-21 08:11:44.599708 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:45.599538 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.252204786s) to execute
2021-06-21 08:11:45.599965 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.300269057s) to execute
2021-06-21 08:11:45.747397 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (145.211459ms) to execute
2021-06-21 08:11:45.749422 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (146.968641ms) to execute
2021-06-21 08:11:49.599984 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:11:54.600696 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:11:58.650337 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.002983286s) to execute
2021-06-21 08:11:59.600890 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:00.201597 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (801.907265ms) to execute
2021-06-21 08:12:04.601061 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:05.903342 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.256218189s) to execute
2021-06-21 08:12:07.304807 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (405.098598ms) to execute
2021-06-21 08:12:08.604834 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.105175395s) to execute
2021-06-21 08:12:09.601320 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:12.900842 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.501161499s) to execute
2021-06-21 08:12:14.206789 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.303394516s) to execute
2021-06-21 08:12:14.207225 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.107420525s) to execute
2021-06-21 08:12:14.207328 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.303743958s) to execute
2021-06-21 08:12:14.601570 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:17.601594 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (801.333099ms) to execute
2021-06-21 08:12:17.948073 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.454396ms) to execute
2021-06-21 08:12:19.208553 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (460.993271ms) to execute
2021-06-21 08:12:19.601805 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:24.602045 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:26.508032 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.708359008s) to execute
2021-06-21 08:12:26.647402 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (136.686554ms) to execute
2021-06-21 08:12:26.747433 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (144.748691ms) to execute
2021-06-21 08:12:29.403917 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.256859419s) to execute
2021-06-21 08:12:29.547397 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (140.679203ms) to execute
2021-06-21 08:12:29.602317 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:31.002398 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (555.041075ms) to execute
2021-06-21 08:12:33.403779 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.250456805s) to execute
2021-06-21 08:12:34.602600 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:37.299830 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (952.860072ms) to execute
2021-06-21 08:12:38.800430 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (452.639253ms) to execute
2021-06-21 08:12:39.602984 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:42.306804 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (705.469713ms) to execute
2021-06-21 08:12:43.901780 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (454.652657ms) to execute
2021-06-21 08:12:44.603224 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:45.604440 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (256.987632ms) to execute
2021-06-21 08:12:47.202838 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (102.253987ms) to execute
2021-06-21 08:12:49.603541 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:51.700420 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.351316345s) to execute
2021-06-21 08:12:53.104877 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.355037276s) to execute
2021-06-21 08:12:54.502341 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.397365938s) to execute
2021-06-21 08:12:54.502558 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.799165607s) to execute
2021-06-21 08:12:54.502771 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.302826171s) to execute
2021-06-21 08:12:54.603793 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:12:54.647681 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.760092ms) to execute
2021-06-21 08:12:57.305879 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.655343137s) to execute
2021-06-21 08:12:58.705385 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.605675672s) to execute
2021-06-21 08:12:59.604023 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:00.100034 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.39227897s) to execute
2021-06-21 08:13:00.100216 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.200330452s) to execute
2021-06-21 08:13:00.100470 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.391537024s) to execute
2021-06-21 08:13:04.499900 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.752809685s) to execute
2021-06-21 08:13:04.699552 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:05.903811 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.400570949s) to execute
2021-06-21 08:13:05.999663 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.496670523s) to execute
2021-06-21 08:13:06.048437 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (141.381043ms) to execute
2021-06-21 08:13:06.048656 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.545290766s) to execute
2021-06-21 08:13:07.307655 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.254908836s) to execute
2021-06-21 08:13:07.399585 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (146.84234ms) to execute
2021-06-21 08:13:09.699807 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:09.804578 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (657.438179ms) to execute
2021-06-21 08:13:11.301457 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.301724998s) to execute
2021-06-21 08:13:12.703316 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.301255429s) to execute
2021-06-21 08:13:12.703464 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.303716971s) to execute
2021-06-21 08:13:14.699990 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:15.507005 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.800939946s) to execute
2021-06-21 08:13:15.507544 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.707863212s) to execute
2021-06-21 08:13:17.201343 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.599501162s) to execute
2021-06-21 08:13:17.201522 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.60180608s) to execute
2021-06-21 08:13:17.201590 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.601815963s) to execute
2021-06-21 08:13:18.700284 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.496255818s) to execute
2021-06-21 08:13:18.700791 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.49452941s) to execute
2021-06-21 08:13:19.700923 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:20.100588 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.353718367s) to execute
2021-06-21 08:13:21.502637 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.399046155s) to execute
2021-06-21 08:13:21.502734 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203013495s) to execute
2021-06-21 08:13:21.647147 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (141.451359ms) to execute
2021-06-21 08:13:24.602298 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.553641065s) to execute
2021-06-21 08:13:24.701304 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:24.747481 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (141.564144ms) to execute
2021-06-21 08:13:27.706015 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.257402009s) to execute
2021-06-21 08:13:29.200214 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.300206579s) to execute
2021-06-21 08:13:29.200540 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.398581517s) to execute
2021-06-21 08:13:29.349327 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (146.556433ms) to execute
2021-06-21 08:13:29.745159 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:33.504969 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.057797724s) to execute
2021-06-21 08:13:34.745436 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:35.001941 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.354889922s) to execute
2021-06-21 08:13:35.002153 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.402254373s) to execute
2021-06-21 08:13:35.147525 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.545117304s) to execute
2021-06-21 08:13:35.247231 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (145.148473ms) to execute
2021-06-21 08:13:35.247355 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (242.683366ms) to execute
2021-06-21 08:13:39.300804 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.642238319s) to execute
2021-06-21 08:13:39.745785 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:40.700766 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.397391916s) to execute
2021-06-21 08:13:40.700934 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.200911402s) to execute
2021-06-21 08:13:40.701116 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.301337964s) to execute
2021-06-21 08:13:44.799463 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:48.101585 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (5.894503028s) to execute
2021-06-21 08:13:49.799685 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:54.799923 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:13:59.607907 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.208147782s) to execute
2021-06-21 08:13:59.800235 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:02.504603 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.857050589s) to execute
2021-06-21 08:14:02.648316 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (141.094595ms) to execute
2021-06-21 08:14:02.650239 I | auth: deleting token ihzfUbeDeQayJqbZ.17 for user conductor
2021-06-21 08:14:03.650168 I | auth: deleting token tCsiEtqjbILoUnth.19 for user conductor
2021-06-21 08:14:04.199836 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.549998578s) to execute
2021-06-21 08:14:04.800658 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:05.604338 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.451865944s) to execute
2021-06-21 08:14:05.650209 I | auth: deleting token BEOCSFINnFBnzIos.21 for user conductor
2021-06-21 08:14:05.747168 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (140.275123ms) to execute
2021-06-21 08:14:07.106060 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.006298597s) to execute
2021-06-21 08:14:07.650147 I | auth: deleting token DCzumAOJYQlljpsp.23 for user conductor
2021-06-21 08:14:08.699452 I | auth: deleting token UFynMtsSSDHSbUmr.25 for user conductor
2021-06-21 08:14:09.800841 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:10.402304 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.354903152s) to execute
2021-06-21 08:14:11.702923 I | auth: deleting token CHGhVjmdrUxUNMqE.27 for user conductor
2021-06-21 08:14:11.805440 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (358.516376ms) to execute
2021-06-21 08:14:12.047446 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (143.786194ms) to execute
2021-06-21 08:14:12.650141 I | auth: deleting token BzYciCIOMsPikVRF.28 for user conductor
2021-06-21 08:14:13.404842 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (454.987889ms) to execute
2021-06-21 08:14:14.801063 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:14.906024 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (206.326065ms) to execute
2021-06-21 08:14:15.650234 I | auth: deleting token JvczVTOticznkwkq.29 for user conductor
2021-06-21 08:14:15.650280 I | auth: deleting token VXQMSKvmqDrsYQEY.30 for user conductor
2021-06-21 08:14:17.299779 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (899.959765ms) to execute
2021-06-21 08:14:17.650225 I | auth: deleting token YnkMTOFfyqZdSUSG.33 for user conductor
2021-06-21 08:14:17.650275 I | auth: deleting token QVmnfYYCsIIPfnuO.32 for user conductor
2021-06-21 08:14:18.650171 I | auth: deleting token AoAjiRqscESDOiLB.37 for user conductor
2021-06-21 08:14:18.650216 I | auth: deleting token PTwpJJZhSTKqkeny.35 for user conductor
2021-06-21 08:14:18.700458 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.25357982s) to execute
2021-06-21 08:14:18.847246 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (144.095534ms) to execute
2021-06-21 08:14:19.650184 I | auth: deleting token nrrwcnDXxKNBLvMO.40 for user conductor
2021-06-21 08:14:19.650235 I | auth: deleting token SLUweYEblpNKQmLf.39 for user conductor
2021-06-21 08:14:19.801296 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:21.700156 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.100486573s) to execute
2021-06-21 08:14:24.607082 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (959.843202ms) to execute
2021-06-21 08:14:24.650246 I | auth: deleting token hawOIBbJKPUWWsCC.43 for user conductor
2021-06-21 08:14:24.801568 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:25.650195 I | auth: deleting token WILiEWJCssGoeIoV.44 for user conductor
2021-06-21 08:14:25.650261 I | auth: deleting token eBGDVscMdTSguGWf.45 for user conductor
2021-06-21 08:14:25.650416 I | auth: deleting token KtNYsfxTbfolGXeW.47 for user conductor
2021-06-21 08:14:29.650153 I | auth: deleting token HuYCJjGHzvWWXsSG.51 for user conductor
2021-06-21 08:14:29.650192 I | auth: deleting token rLEaWlyoaFhcXlae.50 for user conductor
2021-06-21 08:14:29.650200 I | auth: deleting token CIrHQrvQzHUvqDde.49 for user conductor
2021-06-21 08:14:29.801880 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:31.650194 I | auth: deleting token oiMUfMkNRVvjYilE.53 for user conductor
2021-06-21 08:14:32.650225 I | auth: deleting token oYaiLtaBEMLuKxVd.56 for user conductor
2021-06-21 08:14:34.650208 I | auth: deleting token CBQLjoaJmuYAxLEJ.58 for user conductor
2021-06-21 08:14:34.650248 I | auth: deleting token BJMcFDkphEeksxxU.55 for user conductor
2021-06-21 08:14:34.650260 I | auth: deleting token icTvPFUpFMKPhxoX.59 for user conductor
2021-06-21 08:14:34.802172 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:35.650344 I | auth: deleting token VqSvnxPEXLgInIfN.63 for user conductor
2021-06-21 08:14:35.650399 I | auth: deleting token hCzJjEoIfIIMPUJF.62 for user conductor
2021-06-21 08:14:35.650411 I | auth: deleting token CPbBBTOHJPoXBXod.60 for user conductor
2021-06-21 08:14:38.699651 I | auth: deleting token wvDByrqCjgShsHdk.66 for user conductor
2021-06-21 08:14:38.699693 I | auth: deleting token aoIkFUueNGhEWNkG.68 for user conductor
2021-06-21 08:14:38.699707 I | auth: deleting token mhQrQbdqPTHACvuw.65 for user conductor
2021-06-21 08:14:39.200150 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.300436109s) to execute
2021-06-21 08:14:39.699543 I | auth: deleting token DCdWejukNSUjNcmZ.70 for user conductor
2021-06-21 08:14:39.802390 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:41.650193 I | auth: deleting token kOCjHhDqYVzWcleb.72 for user conductor
2021-06-21 08:14:42.650147 I | auth: deleting token zoUoBSBhObELLNOp.75 for user conductor
2021-06-21 08:14:42.650191 I | auth: deleting token aMsXKoXCHavcqPcL.76 for user conductor
2021-06-21 08:14:42.650203 I | auth: deleting token LykseNlSrObMfATo.73 for user conductor
2021-06-21 08:14:43.508236 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.457709965s) to execute
2021-06-21 08:14:44.802627 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:45.650202 I | auth: deleting token puxLRNYfppOygzIj.77 for user conductor
2021-06-21 08:14:45.650276 I | auth: deleting token TpQbIiINquHDBXoN.78 for user conductor
2021-06-21 08:14:46.650186 I | auth: deleting token cVNVOYvPeJfXgzJK.79 for user conductor
2021-06-21 08:14:46.650292 I | auth: deleting token GTmoXXHWaWxAXcFF.81 for user conductor
2021-06-21 08:14:46.650317 I | auth: deleting token CKQxVvuOpdvIXpbE.82 for user conductor
2021-06-21 08:14:48.303420 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.252171883s) to execute
2021-06-21 08:14:48.448276 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.318564ms) to execute
2021-06-21 08:14:49.650269 I | auth: deleting token PDuxTJajddObytuo.85 for user conductor
2021-06-21 08:14:49.650339 I | auth: deleting token IEVIZoxqeIwinmUX.84 for user conductor
2021-06-21 08:14:49.650352 I | auth: deleting token lVBSnVTwRzSnnghE.83 for user conductor
2021-06-21 08:14:49.802866 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:52.600868 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.198898297s) to execute
2021-06-21 08:14:52.650176 I | auth: deleting token aikhvbfVJBqfYpkr.89 for user conductor
2021-06-21 08:14:52.650224 I | auth: deleting token mteIhWssuXYEVUKg.87 for user conductor
2021-06-21 08:14:52.650236 I | auth: deleting token qHSqBKyUhQijVQru.91 for user conductor
2021-06-21 08:14:52.650243 I | auth: deleting token JvjnbJWrKhCNiZQR.88 for user conductor
2021-06-21 08:14:54.001219 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.398158597s) to execute
2021-06-21 08:14:54.001437 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.397843114s) to execute
2021-06-21 08:14:54.003205 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.399603512s) to execute
2021-06-21 08:14:54.803271 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:14:55.405404 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.401339177s) to execute
2021-06-21 08:14:55.405609 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.40214107s) to execute
2021-06-21 08:14:56.650195 I | auth: deleting token uYDkBzrdobuOsgaZ.94 for user conductor
2021-06-21 08:14:56.650243 I | auth: deleting token HViWRBaKHMIlWvUQ.93 for user conductor
2021-06-21 08:14:57.650211 I | auth: deleting token tcIpAcYfhUkcpOSr.95 for user conductor
2021-06-21 08:14:57.650334 I | auth: deleting token kQYJPETKxoKvDBjf.92 for user conductor
2021-06-21 08:14:57.650361 I | auth: deleting token RACysYCjKSrdCKcB.97 for user conductor
2021-06-21 08:14:58.203692 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.703778936s) to execute
2021-06-21 08:14:59.650165 I | auth: deleting token ErynwtMcHOkArjfn.99 for user conductor
2021-06-21 08:14:59.650207 I | auth: deleting token IqqQQxKQGYcUfvcc.98 for user conductor
2021-06-21 08:14:59.700162 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.19769924s) to execute
2021-06-21 08:14:59.700209 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.799002637s) to execute
2021-06-21 08:14:59.803558 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:01.164648 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.461750176s) to execute
2021-06-21 08:15:01.164872 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.365133405s) to execute
2021-06-21 08:15:01.165027 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (665.136553ms) to execute
2021-06-21 08:15:01.650212 I | auth: deleting token FcWbtsiOeIuYnGnz.101 for user conductor
2021-06-21 08:15:01.650262 I | auth: deleting token atOsNmPzYFchLYHL.100 for user conductor
2021-06-21 08:15:02.604464 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (504.842441ms) to execute
2021-06-21 08:15:02.650187 I | auth: deleting token TlOkJualqwMdEZOQ.103 for user conductor
2021-06-21 08:15:02.650262 I | auth: deleting token cfcFgEeMDMkgeetp.102 for user conductor
2021-06-21 08:15:04.201166 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (200.07563ms) to execute
2021-06-21 08:15:04.803787 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:05.650199 I | auth: deleting token PHDfeCOhpGNOLCGa.104 for user conductor
2021-06-21 08:15:06.650229 I | auth: deleting token hmqtpoceHcsdbFVj.108 for user conductor
2021-06-21 08:15:06.650281 I | auth: deleting token LFuwNsSEeCaImEMV.107 for user conductor
2021-06-21 08:15:06.650314 I | auth: deleting token mVljuiSsMbbEcVUC.106 for user conductor
2021-06-21 08:15:07.650176 I | auth: deleting token ddWiDrpUPCWTCwwp.110 for user conductor
2021-06-21 08:15:07.650257 I | auth: deleting token ZbUtVSGEsMvEyTYp.109 for user conductor
2021-06-21 08:15:09.804006 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:10.500550 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (800.942478ms) to execute
2021-06-21 08:15:11.650184 I | auth: deleting token snMJLSnfThwAjEeh.111 for user conductor
2021-06-21 08:15:11.650233 I | auth: deleting token fhJXJDtpNoaUMUAq.113 for user conductor
2021-06-21 08:15:14.604502 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.956455493s) to execute
2021-06-21 08:15:14.699537 I | auth: deleting token fRlUWanjOXrskckT.112 for user conductor
2021-06-21 08:15:14.747350 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (140.464386ms) to execute
2021-06-21 08:15:14.749054 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (141.590109ms) to execute
2021-06-21 08:15:14.749329 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (141.666579ms) to execute
2021-06-21 08:15:14.804247 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:15.650219 I | auth: deleting token wuXvgJRCmubRjvqJ.116 for user conductor
2021-06-21 08:15:15.650289 I | auth: deleting token QHXFnodjaWMeNaZm.115 for user conductor
2021-06-21 08:15:15.650304 I | auth: deleting token fNqcOOCWUCxzXlMm.117 for user conductor
2021-06-21 08:15:16.301075 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (751.545556ms) to execute
2021-06-21 08:15:17.701644 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.39648855s) to execute
2021-06-21 08:15:17.847492 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (142.997148ms) to execute
2021-06-21 08:15:18.650160 I | auth: deleting token DolJGQSZRQYZDfOT.119 for user conductor
2021-06-21 08:15:18.650208 I | auth: deleting token mvOtoOtcBrxokuZW.120 for user conductor
2021-06-21 08:15:19.650216 I | auth: deleting token PziftzEXgNHREJed.122 for user conductor
2021-06-21 08:15:19.650273 I | auth: deleting token FmxiZSQBmwtqIngf.121 for user conductor
2021-06-21 08:15:19.804597 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:21.699541 I | auth: deleting token TCFoDgkUfEIgyaoK.123 for user conductor
2021-06-21 08:15:21.699592 I | auth: deleting token gkcdpyYgqbsbsRPo.124 for user conductor
2021-06-21 08:15:21.699604 I | auth: deleting token BGOMUhFMohQIxdHQ.118 for user conductor
2021-06-21 08:15:22.650209 I | auth: deleting token mtJTaBeGVbDhifkx.126 for user conductor
2021-06-21 08:15:22.650252 I | auth: deleting token AokmPqruHJfOtgcW.127 for user conductor
2021-06-21 08:15:22.699663 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.550327837s) to execute
2021-06-21 08:15:23.650210 I | auth: deleting token AgjTkiiRVEPjNtMH.128 for user conductor
2021-06-21 08:15:24.804862 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:25.507211 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.707470508s) to execute
2021-06-21 08:15:25.507835 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.805627415s) to execute
2021-06-21 08:15:25.648225 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (138.561884ms) to execute
2021-06-21 08:15:25.662499 I | auth: deleting token qwpemFIGEQPIxYoH.130 for user conductor
2021-06-21 08:15:25.662537 I | auth: deleting token pcUSVAqChsRlBHUL.129 for user conductor
2021-06-21 08:15:25.747189 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (237.160443ms) to execute
2021-06-21 08:15:27.699577 I | auth: deleting token yfVHkVubCryZAvHM.131 for user conductor
2021-06-21 08:15:28.502992 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.503382951s) to execute
2021-06-21 08:15:28.699458 I | auth: deleting token kFPmPmJtdkFxTnyi.133 for user conductor
2021-06-21 08:15:29.899468 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:31.302672 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.25332601s) to execute
2021-06-21 08:15:31.650227 I | auth: deleting token tSZqoMDXcoIjkcpt.137 for user conductor
2021-06-21 08:15:31.650284 I | auth: deleting token UVePXIpkeZIuRIEr.135 for user conductor
2021-06-21 08:15:31.650293 I | auth: deleting token xORMowHlJfhRCyMO.136 for user conductor
2021-06-21 08:15:31.650312 I | auth: deleting token wvdtZRBcZatAndLD.134 for user conductor
2021-06-21 08:15:31.650321 I | auth: deleting token hXJmQCPwSGKwYUdc.132 for user conductor
2021-06-21 08:15:32.703255 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.301347411s) to execute
2021-06-21 08:15:32.703831 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.303968542s) to execute
2021-06-21 08:15:32.847290 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (140.97688ms) to execute
2021-06-21 08:15:34.650206 I | auth: deleting token HvlivNfPRzpAMzvO.140 for user conductor
2021-06-21 08:15:34.650260 I | auth: deleting token FzImGLAaAWGreelm.138 for user conductor
2021-06-21 08:15:34.899733 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:35.699419 I | auth: deleting token zkrQcqtaEWmdIqhK.141 for user conductor
2021-06-21 08:15:35.699463 I | auth: deleting token uJDKdrcmDNkNfZGq.139 for user conductor
2021-06-21 08:15:35.699471 I | auth: deleting token yvLywZfGraJPwQze.142 for user conductor
2021-06-21 08:15:37.004161 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.804525181s) to execute
2021-06-21 08:15:38.400846 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.39657031s) to execute
2021-06-21 08:15:38.400999 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.301310573s) to execute
2021-06-21 08:15:38.547138 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (143.656796ms) to execute
2021-06-21 08:15:38.548346 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (144.624075ms) to execute
2021-06-21 08:15:38.650115 I | auth: deleting token hsBKCBwnArcKzaIv.144 for user conductor
2021-06-21 08:15:38.650147 I | auth: deleting token taJuQTeiykuweVlQ.145 for user conductor
2021-06-21 08:15:38.650161 I | auth: deleting token dlPaCIDNzpJzOiXa.143 for user conductor
2021-06-21 08:15:39.650117 I | auth: deleting token yfTGXvCYEquzfEzM.148 for user conductor
2021-06-21 08:15:39.650176 I | auth: deleting token aPILrZAvoQBqCjnc.147 for user conductor
2021-06-21 08:15:39.650194 I | auth: deleting token gavYqRfyqwKTgqEZ.146 for user conductor
2021-06-21 08:15:39.900700 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:41.699478 I | auth: deleting token AyivliViVQlmsbZX.149 for user conductor
2021-06-21 08:15:42.608318 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.742992022s) to execute
2021-06-21 08:15:42.699597 I | auth: deleting token pZocyyzXIhsgQEWe.150 for user conductor
2021-06-21 08:15:43.650179 I | auth: deleting token baihtEiShLajuxTd.153 for user conductor
2021-06-21 08:15:43.650240 I | auth: deleting token KKpLNQXJktZlNfHC.151 for user conductor
2021-06-21 08:15:43.650259 I | auth: deleting token ZqKDzRckqlaDmpWt.152 for user conductor
2021-06-21 08:15:44.003541 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203943268s) to execute
2021-06-21 08:15:44.003792 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.38385596s) to execute
2021-06-21 08:15:44.004072 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.384091568s) to execute
2021-06-21 08:15:44.900908 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:45.508763 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.50167428s) to execute
2021-06-21 08:15:45.509247 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.502832564s) to execute
2021-06-21 08:15:45.650260 I | auth: deleting token HLxwIKJQkvavDfzV.154 for user conductor
2021-06-21 08:15:46.699520 I | auth: deleting token mookzaKVFKSPXmsg.156 for user conductor
2021-06-21 08:15:48.603105 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.00053599s) to execute
2021-06-21 08:15:48.603277 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.003587706s) to execute
2021-06-21 08:15:48.699534 I | auth: deleting token VdGYUEESWkAWEdah.155 for user conductor
2021-06-21 08:15:48.747227 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (141.739859ms) to execute
2021-06-21 08:15:49.901109 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:50.205287 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.598971384s) to execute
2021-06-21 08:15:50.205707 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.455716559s) to execute
2021-06-21 08:15:50.699539 I | auth: deleting token kZcbvdiuIOlBAQzt.157 for user conductor
2021-06-21 08:15:51.604545 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.253841952s) to execute
2021-06-21 08:15:51.699451 I | auth: deleting token SqGkGzmivCZtnwTz.161 for user conductor
2021-06-21 08:15:51.699507 I | auth: deleting token ImQyHdlZWyOsVnXQ.159 for user conductor
2021-06-21 08:15:51.699521 I | auth: deleting token SMdUOvZfhwQKhyNJ.158 for user conductor
2021-06-21 08:15:51.699529 I | auth: deleting token lVlhxOsAiFKHjpgD.160 for user conductor
2021-06-21 08:15:53.002946 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.253365742s) to execute
2021-06-21 08:15:53.003024 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (755.957123ms) to execute
2021-06-21 08:15:53.650202 I | auth: deleting token mlOUVvixqKsLxVAF.162 for user conductor
2021-06-21 08:15:53.650258 I | auth: deleting token moIQfTxjYVbztqvk.164 for user conductor
2021-06-21 08:15:53.650271 I | auth: deleting token EXzmxsVMFNIoSPcP.163 for user conductor
2021-06-21 08:15:54.604894 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (254.784891ms) to execute
2021-06-21 08:15:54.901395 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:15:55.650162 I | auth: deleting token CvjrXWHgpDWxsBkM.165 for user conductor
2021-06-21 08:15:56.650212 I | auth: deleting token UHZZAqpJYZxpKcDO.167 for user conductor
2021-06-21 08:15:56.650302 I | auth: deleting token fQAiKRuJsJtcELPZ.166 for user conductor
2021-06-21 08:15:56.650327 I | auth: deleting token QPWKwNkBYCoJZlWf.168 for user conductor
2021-06-21 08:15:58.650211 I | auth: deleting token yMDuxkejzNPYpFGI.170 for user conductor
2021-06-21 08:15:58.650268 I | auth: deleting token gpNQhhpCdVcTFUfo.169 for user conductor
2021-06-21 08:15:59.799718 I | auth: deleting token eakFClltCiUTAhMP.171 for user conductor
2021-06-21 08:15:59.901597 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:00.650178 I | auth: deleting token tRWERHwEzAKwiGvc.172 for user conductor
2021-06-21 08:16:01.699478 I | auth: deleting token rIfwMPFjOEWbbsAs.173 for user conductor
2021-06-21 08:16:01.803584 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.903773067s) to execute
2021-06-21 08:16:02.699543 I | auth: deleting token TQUwPvrglLLqcbOY.175 for user conductor
2021-06-21 08:16:02.699591 I | auth: deleting token EflkgwneRibdfAqq.174 for user conductor
2021-06-21 08:16:03.205516 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.358093716s) to execute
2021-06-21 08:16:04.650206 I | auth: deleting token kCsiTWUTPWEcNepo.176 for user conductor
2021-06-21 08:16:04.705698 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.305815946s) to execute
2021-06-21 08:16:04.705804 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.899880302s) to execute
2021-06-21 08:16:04.705843 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.49757993s) to execute
2021-06-21 08:16:04.901915 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:05.699501 I | auth: deleting token VwbJfabgyPKBPCRo.177 for user conductor
2021-06-21 08:16:06.205216 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.354963564s) to execute
2021-06-21 08:16:07.605973 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.758823351s) to execute
2021-06-21 08:16:07.699458 I | auth: deleting token WkpqKYzIOGYZpuzg.180 for user conductor
2021-06-21 08:16:07.699497 I | auth: deleting token xTJrFrzvufdNxUXJ.178 for user conductor
2021-06-21 08:16:07.847413 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (147.703447ms) to execute
2021-06-21 08:16:07.849697 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.046062ms) to execute
2021-06-21 08:16:09.902114 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:10.503074 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203250112s) to execute
2021-06-21 08:16:10.649503 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (144.003552ms) to execute
2021-06-21 08:16:10.650128 I | auth: deleting token lYfRleVworEuZgky.184 for user conductor
2021-06-21 08:16:10.650162 I | auth: deleting token wVHWitEWTVaxCgrA.182 for user conductor
2021-06-21 08:16:10.650170 I | auth: deleting token GIYqbZlByjPPASyQ.181 for user conductor
2021-06-21 08:16:10.650177 I | auth: deleting token lNltzNfycaDuWRuo.183 for user conductor
2021-06-21 08:16:10.650183 I | auth: deleting token tRnoCsYFYNtxLYZH.179 for user conductor
2021-06-21 08:16:11.699504 I | auth: deleting token ZMDYpDSpugfuztnU.185 for user conductor
2021-06-21 08:16:13.699488 I | auth: deleting token smroRVaEWCFhLfUw.186 for user conductor
2021-06-21 08:16:13.699536 I | auth: deleting token uyZIWEbfNPZAhSDO.187 for user conductor
2021-06-21 08:16:14.650249 I | auth: deleting token gTPvNZbYCUCbEwrw.188 for user conductor
2021-06-21 08:16:14.650307 I | auth: deleting token MUWFwsiixhVWSouP.189 for user conductor
2021-06-21 08:16:14.902352 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:15.403140 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.455956894s) to execute
2021-06-21 08:16:15.547328 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (141.081566ms) to execute
2021-06-21 08:16:15.650136 I | auth: deleting token JnahLKSBhUDmjtsE.190 for user conductor
2021-06-21 08:16:18.503363 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.5035782s) to execute
2021-06-21 08:16:18.647620 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (141.40904ms) to execute
2021-06-21 08:16:18.650197 I | auth: deleting token FbMRkJUGTkhEpsof.191 for user conductor
2021-06-21 08:16:18.650244 I | auth: deleting token OpfaUtEEmHGDzgRn.192 for user conductor
2021-06-21 08:16:19.650175 I | auth: deleting token cpiqUgCDkskfWVVa.193 for user conductor
2021-06-21 08:16:19.650229 I | auth: deleting token VQYwUfyvXgnyoPbO.194 for user conductor
2021-06-21 08:16:19.902712 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:20.099591 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (448.409971ms) to execute
2021-06-21 08:16:20.699450 I | auth: deleting token caQkoVVUUGjBAjMH.196 for user conductor
2021-06-21 08:16:20.699509 I | auth: deleting token zeHYzQzcEnQIFaaI.195 for user conductor
2021-06-21 08:16:21.401609 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.15303128s) to execute
2021-06-21 08:16:22.650169 I | auth: deleting token ZztRAHxyrJCOQghN.198 for user conductor
2021-06-21 08:16:22.650240 I | auth: deleting token kXpqkOqJHoqZqCfK.197 for user conductor
2021-06-21 08:16:22.803506 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.39945708s) to execute
2021-06-21 08:16:22.803586 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.303812879s) to execute
2021-06-21 08:16:23.650226 I | auth: deleting token igEFVZuKbnBImyIk.199 for user conductor
2021-06-21 08:16:24.902933 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:25.504539 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.60373268s) to execute
2021-06-21 08:16:25.699532 I | auth: deleting token ULFwWQCLkAGtIlOF.200 for user conductor
2021-06-21 08:16:26.699566 I | auth: deleting token snctjjxCmDIyPZmE.201 for user conductor
2021-06-21 08:16:26.806996 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.207281661s) to execute
2021-06-21 08:16:26.807135 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.299999848s) to execute
2021-06-21 08:16:28.301056 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.79363288s) to execute
2021-06-21 08:16:28.301107 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.301079892s) to execute
2021-06-21 08:16:28.301322 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.301082876s) to execute
2021-06-21 08:16:28.650196 I | auth: deleting token vBWVBkjFIFbXOYOl.202 for user conductor
2021-06-21 08:16:29.650215 I | auth: deleting token OlNFfIdvgXokZSMv.203 for user conductor
2021-06-21 08:16:29.703250 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.399628825s) to execute
2021-06-21 08:16:29.703703 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.396066938s) to execute
2021-06-21 08:16:29.903233 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:31.699418 I | auth: deleting token tGGriUtsekjwmBgz.204 for user conductor
2021-06-21 08:16:33.502030 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.40232917s) to execute
2021-06-21 08:16:33.650276 I | auth: deleting token AqXNyRIbDprBJAjf.205 for user conductor
2021-06-21 08:16:34.903471 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:35.005604 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (805.858756ms) to execute
2021-06-21 08:16:38.650175 I | auth: deleting token rippIFPGxLgUWHYU.210 for user conductor
2021-06-21 08:16:38.650223 I | auth: deleting token tJmFDfbEOSiFuezJ.211 for user conductor
2021-06-21 08:16:38.650234 I | auth: deleting token xFzwWTEkGXBzzbVY.207 for user conductor
2021-06-21 08:16:38.650241 I | auth: deleting token MrWHFQNJRLgyyfNC.208 for user conductor
2021-06-21 08:16:38.650248 I | auth: deleting token hflvkTGqpRqiqnil.209 for user conductor
2021-06-21 08:16:38.650258 I | auth: deleting token XXxlheDevorrkTOj.212 for user conductor
2021-06-21 08:16:38.904524 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.004668813s) to execute
2021-06-21 08:16:39.903710 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:40.301254 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.201423976s) to execute
2021-06-21 08:16:41.650190 I | auth: deleting token XCUYBLIgOChRpWCK.215 for user conductor
2021-06-21 08:16:41.650240 I | auth: deleting token bHaxauPbEyVtaApi.214 for user conductor
2021-06-21 08:16:41.650261 I | auth: deleting token rHWNscHDzvbMRlWp.216 for user conductor
2021-06-21 08:16:41.650267 I | auth: deleting token VgNgPaTAVKdomezz.217 for user conductor
2021-06-21 08:16:43.102745 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.503001885s) to execute
2021-06-21 08:16:43.299833 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.064267ms) to execute
2021-06-21 08:16:44.650198 I | auth: deleting token PWaMRhyLMCXvRHUz.220 for user conductor
2021-06-21 08:16:44.650245 I | auth: deleting token FBfaQBPDwAjbNmsF.218 for user conductor
2021-06-21 08:16:44.903948 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:45.699576 I | auth: deleting token BsAsjiCmZVeeQjHb.219 for user conductor
2021-06-21 08:16:45.699652 I | auth: deleting token PYqNBVUfPfztDfTD.222 for user conductor
2021-06-21 08:16:46.650184 I | auth: deleting token inmydyoNDeVnYkHT.221 for user conductor
2021-06-21 08:16:46.650252 I | auth: deleting token JxFrSzMLipzAerKO.223 for user conductor
2021-06-21 08:16:47.699500 I | auth: deleting token gURZexdPxqbOycIr.224 for user conductor
2021-06-21 08:16:48.665006 I | auth: deleting token blgIMtAkoTwcwtun.225 for user conductor
2021-06-21 08:16:49.103928 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.103461176s) to execute
2021-06-21 08:16:49.904151 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:50.600741 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.493664672s) to execute
2021-06-21 08:16:50.600985 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.494595953s) to execute
2021-06-21 08:16:50.603388 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.4968885s) to execute
2021-06-21 08:16:50.603423 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.496828394s) to execute
2021-06-21 08:16:50.699500 I | auth: deleting token koEYqcovZkPNkPhx.226 for user conductor
2021-06-21 08:16:52.650178 I | auth: deleting token FHfBmfNFuKRkMpVM.227 for user conductor
2021-06-21 08:16:54.650200 I | auth: deleting token xOBnuwJhoqVSXTYw.228 for user conductor
2021-06-21 08:16:54.999554 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:16:55.650152 I | auth: deleting token bCZAozWMBaYfcFel.229 for user conductor
2021-06-21 08:16:56.203156 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.100518477s) to execute
2021-06-21 08:16:56.664523 I | auth: deleting token UlgOqcEsgoyTqwTL.230 for user conductor
2021-06-21 08:16:57.607002 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.307265658s) to execute
2021-06-21 08:16:57.607441 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.307784241s) to execute
2021-06-21 08:16:57.701728 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.401905218s) to execute
2021-06-21 08:16:57.701909 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.40202813s) to execute
2021-06-21 08:16:58.699481 I | auth: deleting token DgEPLqJnaWUzQLIG.231 for user conductor
2021-06-21 08:16:59.650190 I | auth: deleting token HgzIYSzfSUOwFgxG.232 for user conductor
2021-06-21 08:16:59.999939 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:17:00.699472 I | auth: deleting token SDsHIdwWabsMdulQ.233 for user conductor
2021-06-21 08:17:00.699513 I | auth: deleting token nlfVTzYsnzpqdqQn.234 for user conductor
2021-06-21 08:17:00.703404 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.341210067s) to execute
2021-06-21 08:17:01.650200 I | auth: deleting token RmMTJpwSGQUMkCZw.235 for user conductor
2021-06-21 08:17:02.107940 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.054307969s) to execute
2021-06-21 08:17:03.503070 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.30308848s) to execute
2021-06-21 08:17:03.650269 I | auth: deleting token zcdsvpEwXxsuxufh.236 for user conductor
2021-06-21 08:17:05.000344 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:17:05.203925 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.697892828s) to execute
2021-06-21 08:17:05.204113 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.404448844s) to execute
2021-06-21 08:17:06.650159 I | auth: deleting token YofCKxMLEZpthtSb.237 for user conductor
2021-06-21 08:17:06.650206 I | auth: deleting token nmCuUMGMxwPAVvAZ.239 for user conductor
2021-06-21 08:17:06.650222 I | auth: deleting token ROmbgayvrPaxwAvE.238 for user conductor
2021-06-21 08:17:06.799941 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (652.859441ms) to execute
2021-06-21 08:17:07.654237 I | auth: deleting token gTXwiwflElmWNuwr.240 for user conductor
2021-06-21 08:17:08.404724 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (605.06764ms) to execute
2021-06-21 08:17:09.650190 I | auth: deleting token QYyQOhzJxqjmLhWM.242 for user conductor
2021-06-21 08:17:09.650244 I | auth: deleting token JtnNEuzsDEYIYGcd.243 for user conductor
2021-06-21 08:17:09.650256 I | auth: deleting token hAsWCzxgyGRgEEOQ.241 for user conductor
2021-06-21 08:17:10.000590 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:17:11.308547 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.155651228s) to execute
2021-06-21 08:17:12.803211 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (855.775817ms) to execute
2021-06-21 08:17:13.650219 I | auth: deleting token lhcxwlOErUtEQWsa.246 for user conductor
2021-06-21 08:17:13.650257 I | auth: deleting token DzgoBoRUkfkDxLNU.245 for user conductor
2021-06-21 08:17:13.650266 I | auth: deleting token rZgPYyPbxkIFzwVG.247 for user conductor
2021-06-21 08:17:14.650148 I | auth: deleting token lekVxquFXdcWRBOL.249 for user conductor
2021-06-21 08:17:14.650187 I | auth: deleting token XdBkGNEsXovsdysS.250 for user conductor
2021-06-21 08:17:14.650207 I | auth: deleting token GXAwxQymsZFFVNgZ.244 for user conductor
2021-06-21 08:17:14.650220 I | auth: deleting token DTPbZMKPsJKzcnAE.248 for user conductor
2021-06-21 08:17:15.000901 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:17:16.699485 I | auth: deleting token KUhKSRovMbqoWnBg.251 for user conductor
2021-06-21 08:17:17.650208 I | auth: deleting token lpdEbDBKZUxgxPbL.252 for user conductor
2021-06-21 08:17:18.650188 I | auth: deleting token txixFsBQAsXkbtjz.253 for user conductor
2021-06-21 08:17:19.004436 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203732808s) to execute
2021-06-21 08:17:19.147231 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (139.912472ms) to execute
2021-06-21 08:17:19.650322 I | auth: deleting token kqeDguDkKEHygsPU.254 for user conductor
2021-06-21 08:17:19.650380 I | auth: deleting token hFuYsnXkxZZpwjFz.255 for user conductor
2021-06-21 08:17:20.001163 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:17:20.499929 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (652.9154ms) to execute
2021-06-21 08:17:21.650153 I | auth: deleting token AasDcjLPbJHMxMpc.256 for user conductor
2021-06-21 08:17:21.650823 I | auth: deleting token fEmzDLiudztpHbyX.257 for user conductor
2021-06-21 08:17:21.805000 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.256551069s) to execute
2021-06-21 08:17:22.650157 I | auth: deleting token nvsjyUDeDJSXuMKl.258 for user conductor
2021-06-21 08:17:22.650222 I | auth: deleting token VGCMIYLvHDqpfBRM.259 for user conductor
2021-06-21 08:17:23.204780 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.39721917s) to execute
2021-06-21 08:17:23.204995 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.258029527s) to execute
2021-06-21 08:17:24.601054 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.29929275s) to execute
2021-06-21 08:17:24.601160 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.393102894s) to execute
2021-06-21 08:17:25.001347 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:17:25.908070 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.260568454s) to execute
2021-06-21 08:17:25.908387 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.304356293s) to execute
2021-06-21 08:17:26.650130 I | auth: deleting token MUUOZRCDbXKHuMnZ.263 for user conductor
2021-06-21 08:17:26.650170 I | auth: deleting token DwUhDNMYYBmonkat.261 for user conductor
2021-06-21 08:17:26.650180 I | auth: deleting token cRZRFcaozFtUUdOQ.260 for user conductor
2021-06-21 08:17:27.400782 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.490329454s) to execute
2021-06-21 08:17:27.699564 I | auth: deleting token HVJkqOvLQTNRmWFW.262 for user conductor
2021-06-21 08:17:27.699614 I | auth: deleting token isiJAVdwNJdPFrGk.264 for user conductor
2021-06-21 08:17:28.702666 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.699405916s) to execute
2021-06-21 08:17:28.702759 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.154408044s) to execute
2021-06-21 08:17:29.650139 I | auth: deleting token ijQsMmCfmpMXgCoz.267 for user conductor
2021-06-21 08:17:29.650174 I | auth: deleting token WJYwFHZnCaNyduEc.266 for user conductor
2021-06-21 08:17:29.650182 I | auth: deleting token maoluaFaZomHqtxi.265 for user conductor
2021-06-21 08:17:30.001562 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:17:30.102421 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.396579566s) to execute
2021-06-21 08:17:30.102555 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.202888729s) to execute
2021-06-21 08:17:31.650235 I | auth: deleting token XGcHCfxiqhheUAyx.269 for user conductor
2021-06-21 08:17:31.650303 I | auth: deleting token sRcudBqUJifLbowI.268 for user conductor
2021-06-21 08:17:32.605946 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (658.434446ms) to execute
2021-06-21 08:17:33.650148 I | auth: deleting token khxNpejhsfpSqIit.271 for user conductor
2021-06-21 08:17:33.650213 I | auth: deleting token RhKeODDclrniGzli.270 for user conductor
2021-06-21 08:17:34.203759 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (704.077782ms) to execute
2021-06-21 08:17:34.650161 I | auth: deleting token qCvKnbGGDfHsmdbq.272 for user conductor
2021-06-21 08:17:35.001763 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:17:35.501254 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.153780679s) to execute
2021-06-21 08:17:36.650342 I | auth: deleting token KNweKtczlILtRlZn.273 for user conductor
2021-06-21 08:17:37.001472 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.399205461s) to execute
2021-06-21 08:17:37.001711 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.497952651s) to execute
2021-06-21 08:17:37.147382 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (143.418269ms) to execute
2021-06-21 08:17:37.699432 I | auth: deleting token UvTSeFmDJwoGwRZi.275 for user conductor
2021-06-21 08:17:37.699481 I | auth: deleting token IqDnipkxmRNnZyGT.274 for user conductor
2021-06-21 08:17:38.547320 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (133.99002ms) to execute
2021-06-21 08:17:39.650240 I | auth: deleting token MPfQzkgtMoxNoiJB.277 for user conductor
2021-06-21 08:17:39.650300 I | auth: deleting token NwmQDRvbcsHMcPOG.276 for user conductor
2021-06-21 08:17:40.002083 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:17:40.650204 I | auth: deleting token uTQTCKXNFnadrLew.278 for user conductor
2021-06-21 08:17:42.650250 I | auth: deleting token VvoeukxoDhGWyKZe.279 for user conductor
2021-06-21 08:17:42.650309 I | auth: deleting token eWdrbNAGBFjcaPnE.280 for user conductor
2021-06-21 08:17:44.650185 I | auth: deleting token kXIflPhpBCuWlcVj.282 for user conductor
2021-06-21 08:17:44.650253 I | auth: deleting token VYTJYHVMCHlKfyjL.281 for user conductor
2021-06-21 08:17:45.002316 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:17:45.650216 I | auth: deleting token cmAgPnvCMLQhvbGV.283 for user conductor
2021-06-21 08:17:46.650165 I | auth: deleting token BKqUuKehsTcxFMkZ.284 for user conductor
2021-06-21 08:17:47.650180 I | auth: deleting token txGAhGDORFvZkQbk.286 for user conductor
2021-06-21 08:17:47.650244 I | auth: deleting token iISkTEeosCqjHHMj.285 for user conductor
2021-06-21 08:17:48.804912 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.404087723s) to execute
2021-06-21 08:17:49.650220 I | auth: deleting token NEBjeowSreyclKTc.287 for user conductor
2021-06-21 08:17:49.650290 I | auth: deleting token TGuJKtnMexUqdXWV.288 for user conductor
2021-06-21 08:17:50.002513 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:17:50.201456 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.354330019s) to execute
2021-06-21 08:17:50.201915 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.394066497s) to execute
2021-06-21 08:17:50.203791 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.395434404s) to execute
2021-06-21 08:17:52.650198 I | auth: deleting token YnkExABlEEOWjUCl.290 for user conductor
2021-06-21 08:17:53.002382 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.200182163s) to execute
2021-06-21 08:17:53.650194 I | auth: deleting token SdvUvimeJJkXIDvQ.289 for user conductor
2021-06-21 08:17:54.401004 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.396066261s) to execute
2021-06-21 08:17:54.401126 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.201394783s) to execute
2021-06-21 08:17:54.650189 I | auth: deleting token caMjbbeTVlgtBqBM.291 for user conductor
2021-06-21 08:17:54.650232 I | auth: deleting token hwJuItOdUMZhPqyP.293 for user conductor
2021-06-21 08:17:54.650241 I | auth: deleting token IaZkUIGSCJmOcFMh.292 for user conductor
2021-06-21 08:17:55.002783 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:17:55.650190 I | auth: deleting token mXYKddOwPoaUcdIR.294 for user conductor
2021-06-21 08:17:57.200705 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.351793636s) to execute
2021-06-21 08:17:58.503087 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.299851374s) to execute
2021-06-21 08:17:58.503280 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203631924s) to execute
2021-06-21 08:17:59.699511 I | auth: deleting token QkXstKgdlCbNPNLi.296 for user conductor
2021-06-21 08:17:59.699722 I | auth: deleting token qlZUDcVXHioLUOUU.295 for user conductor
2021-06-21 08:17:59.699861 I | auth: deleting token SGDujVbyFVCkbNkF.298 for user conductor
2021-06-21 08:17:59.903571 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.397419807s) to execute
2021-06-21 08:17:59.903835 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.256439385s) to execute
2021-06-21 08:18:00.003062 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:00.650199 I | auth: deleting token FejfxkgCKFiczNsQ.301 for user conductor
2021-06-21 08:18:00.650252 I | auth: deleting token vVpuhHZJPHuduBzf.299 for user conductor
2021-06-21 08:18:00.650269 I | auth: deleting token EncFbiuReFjQOVsy.300 for user conductor
2021-06-21 08:18:00.650275 I | auth: deleting token bAulgNHnngdXtwVe.297 for user conductor
2021-06-21 08:18:01.301316 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.394254075s) to execute
2021-06-21 08:18:01.301475 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.201817029s) to execute
2021-06-21 08:18:02.508965 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.162115136s) to execute
2021-06-21 08:18:02.509371 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.205601138s) to execute
2021-06-21 08:18:04.103726 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.256122891s) to execute
2021-06-21 08:18:04.650287 I | auth: deleting token LMSVZlNRJwZbSSmH.303 for user conductor
2021-06-21 08:18:04.650333 I | auth: deleting token MZYDMbSjhPAYJirM.305 for user conductor
2021-06-21 08:18:05.099579 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:05.600287 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.998109017s) to execute
2021-06-21 08:18:05.600397 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.493637417s) to execute
2021-06-21 08:18:05.600658 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.400901324s) to execute
2021-06-21 08:18:06.650190 I | auth: deleting token BQKfiOUfIjDEjqOe.307 for user conductor
2021-06-21 08:18:06.650260 I | auth: deleting token psKUfuqHTIrQxghe.306 for user conductor
2021-06-21 08:18:06.650290 I | auth: deleting token cTmvJQYTcfGpGING.304 for user conductor
2021-06-21 08:18:06.650303 I | auth: deleting token gqaYbXvXDmripzQe.302 for user conductor
2021-06-21 08:18:07.650182 I | auth: deleting token vZiGThpRVMeMmRXv.308 for user conductor
2021-06-21 08:18:07.650251 I | auth: deleting token LvEMRwycEuzJgdrP.309 for user conductor
2021-06-21 08:18:08.400538 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.693452573s) to execute
2021-06-21 08:18:08.400580 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.252067538s) to execute
2021-06-21 08:18:09.906427 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.104250013s) to execute
2021-06-21 08:18:10.099971 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:10.699529 I | auth: deleting token hRGLDyPxHHfgycyq.310 for user conductor
2021-06-21 08:18:11.300262 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.391109962s) to execute
2021-06-21 08:18:11.650269 I | auth: deleting token XulKhmOJpmDOGPPH.312 for user conductor
2021-06-21 08:18:12.701281 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.39831504s) to execute
2021-06-21 08:18:12.701676 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.201800541s) to execute
2021-06-21 08:18:13.650125 I | auth: deleting token jQytPSJVxChKOiug.311 for user conductor
2021-06-21 08:18:14.105969 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.401710397s) to execute
2021-06-21 08:18:14.106130 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.402129326s) to execute
2021-06-21 08:18:15.100650 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:15.601011 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.401364125s) to execute
2021-06-21 08:18:15.601166 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.401531732s) to execute
2021-06-21 08:18:15.650211 I | auth: deleting token XYzgrpbVfSCaXHQj.313 for user conductor
2021-06-21 08:18:17.001754 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.20200569s) to execute
2021-06-21 08:18:17.001897 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.30207909s) to execute
2021-06-21 08:18:17.699846 I | auth: deleting token BeRjjKpPcYlehoiq.316 for user conductor
2021-06-21 08:18:17.699888 I | auth: deleting token MxzqpmzmFavFvtiH.314 for user conductor
2021-06-21 08:18:17.699900 I | auth: deleting token jIjdqQZxucgwvNlv.315 for user conductor
2021-06-21 08:18:17.699907 I | auth: deleting token bXQHoTeqajOTLdrG.317 for user conductor
2021-06-21 08:18:18.404144 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.352908209s) to execute
2021-06-21 08:18:18.404254 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.057101181s) to execute
2021-06-21 08:18:20.100938 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:20.650194 I | auth: deleting token jvZBRujQbEoqNulh.318 for user conductor
2021-06-21 08:18:20.650326 I | auth: deleting token OhYsZQbVDnbLzprR.319 for user conductor
2021-06-21 08:18:21.650200 I | auth: deleting token qREtDosNEwWwCjdt.321 for user conductor
2021-06-21 08:18:21.650289 I | auth: deleting token pnUIcxrZPJmUMOzs.320 for user conductor
2021-06-21 08:18:22.650147 I | auth: deleting token wHzYqaeiHdsuCMji.322 for user conductor
2021-06-21 08:18:24.650149 I | auth: deleting token qBofnpnGecOtaZHj.324 for user conductor
2021-06-21 08:18:25.101295 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:25.650220 I | auth: deleting token HDuultEUgZZsjfxW.325 for user conductor
2021-06-21 08:18:25.699637 I | auth: deleting token GCMTBstugtcTywqd.323 for user conductor
2021-06-21 08:18:25.699775 I | auth: deleting token hkNGWLDKwzrCXZET.326 for user conductor
2021-06-21 08:18:26.602849 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.055003731s) to execute
2021-06-21 08:18:28.650347 I | auth: deleting token dmErDgaXMNMpfkOm.328 for user conductor
2021-06-21 08:18:29.650152 I | auth: deleting token YtDToWphubbGdpyV.327 for user conductor
2021-06-21 08:18:29.650202 I | auth: deleting token UQRhcxaJIpyWjhYf.331 for user conductor
2021-06-21 08:18:29.650211 I | auth: deleting token ElClnRZvmudQkVOP.330 for user conductor
2021-06-21 08:18:29.650225 I | auth: deleting token hrdkMTdDyeuPyBKH.329 for user conductor
2021-06-21 08:18:30.101561 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:30.701605 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.00186829s) to execute
2021-06-21 08:18:32.006060 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.30193081s) to execute
2021-06-21 08:18:32.006267 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.302445789s) to execute
2021-06-21 08:18:32.100973 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.395860159s) to execute
2021-06-21 08:18:32.101011 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.396047227s) to execute
2021-06-21 08:18:33.650306 I | auth: deleting token QBLEacaemhbCDXZv.335 for user conductor
2021-06-21 08:18:33.650359 I | auth: deleting token onoufLhcCvhNAxOq.332 for user conductor
2021-06-21 08:18:34.402800 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (603.056561ms) to execute
2021-06-21 08:18:35.101754 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:35.650189 I | auth: deleting token DykrmkZYrXeoVUQS.338 for user conductor
2021-06-21 08:18:35.650232 I | auth: deleting token qsoGamaDOrTIjxNW.334 for user conductor
2021-06-21 08:18:35.650251 I | auth: deleting token JEzFEiOMrKyNRfel.333 for user conductor
2021-06-21 08:18:35.650262 I | auth: deleting token psZwGREtGZNirCfe.337 for user conductor
2021-06-21 08:18:35.650276 I | auth: deleting token uSDLpJPygQHOhOgg.336 for user conductor
2021-06-21 08:18:35.704151 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.157114811s) to execute
2021-06-21 08:18:37.002843 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.298609315s) to execute
2021-06-21 08:18:37.003161 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.296536755s) to execute
2021-06-21 08:18:37.148775 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (143.389039ms) to execute
2021-06-21 08:18:38.400871 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.251255138s) to execute
2021-06-21 08:18:39.650213 I | auth: deleting token hhlhRNKnDlTupTMm.340 for user conductor
2021-06-21 08:18:39.650267 I | auth: deleting token YtrvqeBbhZtCthvM.342 for user conductor
2021-06-21 08:18:39.650278 I | auth: deleting token uPuzvOupzVHwThwf.339 for user conductor
2021-06-21 08:18:40.101977 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:41.103180 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.55606659s) to execute
2021-06-21 08:18:41.650142 I | auth: deleting token xIKREFNdYUQDidZI.344 for user conductor
2021-06-21 08:18:41.650200 I | auth: deleting token UIsEtWpQcsodtfkt.343 for user conductor
2021-06-21 08:18:41.650220 I | auth: deleting token cwUgXqMYgyRUxwxb.341 for user conductor
2021-06-21 08:18:42.503305 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (254.281539ms) to execute
2021-06-21 08:18:45.102449 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:47.402463 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (102.770911ms) to execute
2021-06-21 08:18:48.699537 I | auth: deleting token JeAKbWqLCQUZHuYj.346 for user conductor
2021-06-21 08:18:48.699595 I | auth: deleting token fFGSuMSQQsPNCKxJ.347 for user conductor
2021-06-21 08:18:48.699602 I | auth: deleting token gpcFDVghSOybSEza.345 for user conductor
2021-06-21 08:18:48.699608 I | auth: deleting token GPnHBeHHuqxYYYJm.349 for user conductor
2021-06-21 08:18:48.699618 I | auth: deleting token hanTDvstFdWDVMce.348 for user conductor
2021-06-21 08:18:50.102901 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:50.699514 I | auth: deleting token DfPEiMTyYWwWkwcI.350 for user conductor
2021-06-21 08:18:50.699570 I | auth: deleting token yZbuBXwYYsvCebjP.351 for user conductor
2021-06-21 08:18:51.606161 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.058976234s) to execute
2021-06-21 08:18:51.650145 I | auth: deleting token SxWXdqQPMAuxRlGP.352 for user conductor
2021-06-21 08:18:53.650289 I | auth: deleting token HVUpVqziHtRWdPgs.353 for user conductor
2021-06-21 08:18:53.650350 I | auth: deleting token dmzapoCevwVQUKwD.354 for user conductor
2021-06-21 08:18:55.002070 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.152994819s) to execute
2021-06-21 08:18:55.103112 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:18:55.699494 I | auth: deleting token qtEyOfidKgIzBuDT.355 for user conductor
2021-06-21 08:18:56.308053 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (460.641402ms) to execute
2021-06-21 08:18:57.650178 I | auth: deleting token EGFDSnFBBwRCJWGb.356 for user conductor
2021-06-21 08:18:57.799870 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.299154298s) to execute
2021-06-21 08:18:59.004531 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.204574681s) to execute
2021-06-21 08:18:59.099667 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.296399417s) to execute
2021-06-21 08:18:59.650278 I | auth: deleting token IkMyVJFsoLfWrNAq.357 for user conductor
2021-06-21 08:18:59.650359 I | auth: deleting token BfiVPmOlkoDrPTZQ.358 for user conductor
2021-06-21 08:19:00.103460 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:00.650181 I | auth: deleting token VPQWZDqfswFAaPin.359 for user conductor
2021-06-21 08:19:01.902593 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.202731124s) to execute
2021-06-21 08:19:02.650262 I | auth: deleting token kqJMmNlnDYeukuzo.360 for user conductor
2021-06-21 08:19:02.650314 I | auth: deleting token iUCdVTRjcexzZKtb.362 for user conductor
2021-06-21 08:19:02.650325 I | auth: deleting token saiXipsmlNVusZeL.361 for user conductor
2021-06-21 08:19:03.301819 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (854.619299ms) to execute
2021-06-21 08:19:03.650212 I | auth: deleting token iNbLeJRehWpGWZbc.363 for user conductor
2021-06-21 08:19:04.703366 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.30143766s) to execute
2021-06-21 08:19:05.103657 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:05.650169 I | auth: deleting token ROYnomLUjBkPOxHB.364 for user conductor
2021-06-21 08:19:06.001926 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.25300333s) to execute
2021-06-21 08:19:06.002082 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.295882549s) to execute
2021-06-21 08:19:06.700194 I | auth: deleting token QIVEhGlANiVSPJVV.365 for user conductor
2021-06-21 08:19:06.700349 I | auth: deleting token kUdOxHlywOVJfxNf.366 for user conductor
2021-06-21 08:19:07.650221 I | auth: deleting token AeXGnRIHcYrnmYWT.369 for user conductor
2021-06-21 08:19:07.650299 I | auth: deleting token VgrKRnkuUjBskdTx.368 for user conductor
2021-06-21 08:19:07.650316 I | auth: deleting token BJVpjIunyxjUKwDS.367 for user conductor
2021-06-21 08:19:07.699727 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.599004689s) to execute
2021-06-21 08:19:07.699960 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.695258095s) to execute
2021-06-21 08:19:09.004254 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.301861788s) to execute
2021-06-21 08:19:09.004472 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.300040338s) to execute
2021-06-21 08:19:10.103897 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:10.401490 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.20161582s) to execute
2021-06-21 08:19:10.650210 I | auth: deleting token CjrjRFMLajCcgGeR.372 for user conductor
2021-06-21 08:19:10.650261 I | auth: deleting token rmMbmzJwRjbrcFpR.371 for user conductor
2021-06-21 08:19:10.650269 I | auth: deleting token oUmrBVmWkznwUiDH.370 for user conductor
2021-06-21 08:19:12.650175 I | auth: deleting token izqcDWRTpSRBpNdB.374 for user conductor
2021-06-21 08:19:12.650210 I | auth: deleting token GgxylnxZypUUCEjL.373 for user conductor
2021-06-21 08:19:12.905961 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.459003047s) to execute
2021-06-21 08:19:12.906597 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.50269765s) to execute
2021-06-21 08:19:13.148981 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (146.082191ms) to execute
2021-06-21 08:19:13.650210 I | auth: deleting token CTWcYpoczcxvEcum.375 for user conductor
2021-06-21 08:19:13.650277 I | auth: deleting token IAwDtIAxYdtsPtrY.376 for user conductor
2021-06-21 08:19:15.104109 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:15.405687 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (957.058332ms) to execute
2021-06-21 08:19:15.650186 I | auth: deleting token gKyNGUKONtvmIiqD.377 for user conductor
2021-06-21 08:19:15.650237 I | auth: deleting token kvyqVhSWzlWNbayP.378 for user conductor
2021-06-21 08:19:16.703304 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203585479s) to execute
2021-06-21 08:19:17.650240 I | auth: deleting token HdFtCPnliAoplHxE.379 for user conductor
2021-06-21 08:19:19.404600 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.751878285s) to execute
2021-06-21 08:19:19.650233 I | auth: deleting token atUuAZXDjeAPmfFc.382 for user conductor
2021-06-21 08:19:19.650288 I | auth: deleting token mrfeDiXXRIpdbowE.381 for user conductor
2021-06-21 08:19:19.650299 I | auth: deleting token sfzzgVtbdkQrrJvh.380 for user conductor
2021-06-21 08:19:20.104340 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:22.650198 I | auth: deleting token hEYVYGDFwkrnEycC.384 for user conductor
2021-06-21 08:19:22.650246 I | auth: deleting token tadBJWerKzqSACZM.383 for user conductor
2021-06-21 08:19:22.650255 I | auth: deleting token oVSccHqVEOUnXAdT.386 for user conductor
2021-06-21 08:19:22.650267 I | auth: deleting token wnEjfCcJRAvBCfOB.385 for user conductor
2021-06-21 08:19:23.650429 I | auth: deleting token xHkdExcoKgobZqcp.387 for user conductor
2021-06-21 08:19:24.651217 I | auth: deleting token hoFcBBmJtwRyieiv.388 for user conductor
2021-06-21 08:19:25.104523 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:25.650204 I | auth: deleting token UjyRdEdaZzSICmTO.389 for user conductor
2021-06-21 08:19:25.650402 I | auth: deleting token IyXbREcPPTULwHjv.390 for user conductor
2021-06-21 08:19:27.107325 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (960.243018ms) to execute
2021-06-21 08:19:27.650206 I | auth: deleting token UjrJTwhOOrXKCioi.391 for user conductor
2021-06-21 08:19:28.405686 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.204499375s) to execute
2021-06-21 08:19:29.650229 I | auth: deleting token LuVAVRiAzPoXPHoQ.392 for user conductor
2021-06-21 08:19:29.900852 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.492597126s) to execute
2021-06-21 08:19:29.900922 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.399245849s) to execute
2021-06-21 08:19:30.104735 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:31.650200 I | auth: deleting token zaLhpAhrhiOvuzwe.393 for user conductor
2021-06-21 08:19:33.603116 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.303443433s) to execute
2021-06-21 08:19:33.699716 I | auth: deleting token FTmZrYJjbKNpbZhx.394 for user conductor
2021-06-21 08:19:34.650345 I | auth: deleting token oGjZzzIRCOHWIxAf.395 for user conductor
2021-06-21 08:19:35.199566 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:36.206859 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.407292759s) to execute
2021-06-21 08:19:36.207529 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.600984699s) to execute
2021-06-21 08:19:36.699451 I | auth: deleting token qxRKFyrPulpCxcKg.397 for user conductor
2021-06-21 08:19:36.699495 I | auth: deleting token eDTfCORxPeOcXbVD.396 for user conductor
2021-06-21 08:19:37.606861 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.207165829s) to execute
2021-06-21 08:19:38.907781 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.207130272s) to execute
2021-06-21 08:19:39.699483 I | auth: deleting token oAabRbsYtAaeXWdB.399 for user conductor
2021-06-21 08:19:39.699527 I | auth: deleting token mjnUfsmTwYdhNoAs.398 for user conductor
2021-06-21 08:19:39.699536 I | auth: deleting token fsXQOGmDVBUbDTHO.400 for user conductor
2021-06-21 08:19:40.199931 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:41.604482 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203527936s) to execute
2021-06-21 08:19:43.699480 I | auth: deleting token MoaAJaJbCbJltuGi.402 for user conductor
2021-06-21 08:19:43.699561 I | auth: deleting token oZvNqDiOjdSAPucn.404 for user conductor
2021-06-21 08:19:43.699590 I | auth: deleting token WgctLVjVHiLsgzFW.405 for user conductor
2021-06-21 08:19:43.699600 I | auth: deleting token NsQzqitYWogQUYti.401 for user conductor
2021-06-21 08:19:43.699607 I | auth: deleting token VxMuanAMupZAHuzV.406 for user conductor
2021-06-21 08:19:43.699614 I | auth: deleting token MXumYdhbNVUUanRB.403 for user conductor
2021-06-21 08:19:44.403787 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.25673837s) to execute
2021-06-21 08:19:44.547058 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (140.741868ms) to execute
2021-06-21 08:19:45.200199 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:45.699549 I | auth: deleting token gAEwxJJLqXVjDCGi.407 for user conductor
2021-06-21 08:19:46.650147 I | auth: deleting token gAARElXqYrOwPywH.408 for user conductor
2021-06-21 08:19:48.650240 I | auth: deleting token dLUcpHGfdNRpAVJE.410 for user conductor
2021-06-21 08:19:48.650291 I | auth: deleting token aVqQUCKrszjztMbS.409 for user conductor
2021-06-21 08:19:48.650300 I | auth: deleting token ALzQrLBDlElNNPTk.411 for user conductor
2021-06-21 08:19:49.202754 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.554124285s) to execute
2021-06-21 08:19:49.347376 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (141.484405ms) to execute
2021-06-21 08:19:50.200600 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:50.800989 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (354.073917ms) to execute
2021-06-21 08:19:52.007133 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.158562808s) to execute
2021-06-21 08:19:52.147222 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (137.626588ms) to execute
2021-06-21 08:19:52.699523 I | auth: deleting token nGlsibaFDhMSOWPI.415 for user conductor
2021-06-21 08:19:52.699574 I | auth: deleting token goEMvCNYaOahSyIw.412 for user conductor
2021-06-21 08:19:54.650172 I | auth: deleting token MXqSUZRCawKYKvbc.414 for user conductor
2021-06-21 08:19:54.650236 I | auth: deleting token mZxWQiUTRKiwhCkL.413 for user conductor
2021-06-21 08:19:54.902136 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.254906748s) to execute
2021-06-21 08:19:55.200949 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:19:55.650170 I | auth: deleting token cNNUWyeLWEwnyKSW.417 for user conductor
2021-06-21 08:19:55.650220 I | auth: deleting token cgTTiuZwoQvjlkUD.416 for user conductor
2021-06-21 08:19:56.304219 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.25679508s) to execute
2021-06-21 08:19:56.304616 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.39969868s) to execute
2021-06-21 08:19:56.650162 I | auth: deleting token MVaEIACGDRSAWwde.418 for user conductor
2021-06-21 08:19:58.907444 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.600395383s) to execute
2021-06-21 08:19:58.907951 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.601182815s) to execute
2021-06-21 08:20:00.201177 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:00.401888 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.402120525s) to execute
2021-06-21 08:20:00.402311 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.353104737s) to execute
2021-06-21 08:20:00.699447 I | auth: deleting token BfhMDXaXXEqwKqaq.421 for user conductor
2021-06-21 08:20:00.699574 I | auth: deleting token oxPDAGckbZyjrIZQ.419 for user conductor
2021-06-21 08:20:00.699686 I | auth: deleting token vVasythSKrWLgVst.420 for user conductor
2021-06-21 08:20:01.650320 I | auth: deleting token DbtDfshuBWnPSdIH.423 for user conductor
2021-06-21 08:20:01.650390 I | auth: deleting token bbQKOeTPBayMrJtn.422 for user conductor
2021-06-21 08:20:01.707305 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.807511714s) to execute
2021-06-21 08:20:02.650194 I | auth: deleting token FapPxDXtzETdbdxn.424 for user conductor
2021-06-21 08:20:03.699499 I | auth: deleting token cqpbgBLJCkjqjowK.425 for user conductor
2021-06-21 08:20:04.403704 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.256506039s) to execute
2021-06-21 08:20:04.650181 I | auth: deleting token sPMxkGyszwPwjNAN.426 for user conductor
2021-06-21 08:20:04.650281 I | auth: deleting token oxzNBAyZOynNOjYy.427 for user conductor
2021-06-21 08:20:05.201600 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:05.903566 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.254049452s) to execute
2021-06-21 08:20:06.650543 I | auth: deleting token ogBZJSsvATEHjstH.428 for user conductor
2021-06-21 08:20:07.300201 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.351320466s) to execute
2021-06-21 08:20:07.650182 I | auth: deleting token mdfMhxaTjICrJbKC.430 for user conductor
2021-06-21 08:20:08.650230 I | auth: deleting token BTYhUvitsHmZPHtt.429 for user conductor
2021-06-21 08:20:08.707264 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.055132143s) to execute
2021-06-21 08:20:09.650195 I | auth: deleting token MnJrmsTJSfeGNgEQ.431 for user conductor
2021-06-21 08:20:10.201830 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:10.699445 I | auth: deleting token RtJGMBBhXdXnrFAA.432 for user conductor
2021-06-21 08:20:11.201550 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (553.582426ms) to execute
2021-06-21 08:20:12.504230 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.155361394s) to execute
2021-06-21 08:20:13.903163 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.395415795s) to execute
2021-06-21 08:20:13.903294 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203609921s) to execute
2021-06-21 08:20:14.650117 I | auth: deleting token gonGtSymXWvbvkDs.437 for user conductor
2021-06-21 08:20:14.650173 I | auth: deleting token tZRwHPXAYIAEUMBN.434 for user conductor
2021-06-21 08:20:15.208822 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:15.650174 I | auth: deleting token OTwttJKsCeDrLcya.438 for user conductor
2021-06-21 08:20:15.650226 I | auth: deleting token dZmWaIsTYfgafGga.433 for user conductor
2021-06-21 08:20:15.650241 I | auth: deleting token GBaBWhKTxEMdDliP.435 for user conductor
2021-06-21 08:20:15.650249 I | auth: deleting token ynGkEBuCntuZLlHl.436 for user conductor
2021-06-21 08:20:16.699504 I | auth: deleting token JHzUGiWWLeSDuLvE.439 for user conductor
2021-06-21 08:20:16.700560 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.199745235s) to execute
2021-06-21 08:20:18.002050 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.15489105s) to execute
2021-06-21 08:20:18.002257 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.202550388s) to execute
2021-06-21 08:20:18.650219 I | auth: deleting token ejhqtGsToJusyhFl.441 for user conductor
2021-06-21 08:20:18.650275 I | auth: deleting token RynDMZwVcCNxZucK.440 for user conductor
2021-06-21 08:20:18.650287 I | auth: deleting token JUQMVeQncuChrdEX.442 for user conductor
2021-06-21 08:20:19.650186 I | auth: deleting token UssRcxZIAnrKfhzF.443 for user conductor
2021-06-21 08:20:19.650234 I | auth: deleting token ZGNLviTfkKextZBt.444 for user conductor
2021-06-21 08:20:20.209048 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:20.801076 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.351878635s) to execute
2021-06-21 08:20:23.650222 I | auth: deleting token yVRmSRhMKpfADfua.445 for user conductor
2021-06-21 08:20:25.209293 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:25.650186 I | auth: deleting token YlYYnQHuybVwrWtV.446 for user conductor
2021-06-21 08:20:25.650251 I | auth: deleting token ayABEexEtWJJVuFE.449 for user conductor
2021-06-21 08:20:25.650300 I | auth: deleting token XHxjNatsVhXgtMsb.447 for user conductor
2021-06-21 08:20:26.650130 I | auth: deleting token exzTfykbRufwbDEk.450 for user conductor
2021-06-21 08:20:26.650166 I | auth: deleting token liqvRXBoLCUmhhAn.448 for user conductor
2021-06-21 08:20:28.650192 I | auth: deleting token MvhVaaqDtrGnXpro.454 for user conductor
2021-06-21 08:20:28.650257 I | auth: deleting token gZGnwEyDxxuNdvjg.451 for user conductor
2021-06-21 08:20:28.650268 I | auth: deleting token TdhpXmzAvgpwssHV.452 for user conductor
2021-06-21 08:20:28.650278 I | auth: deleting token FXZwpJMmPWCMXexN.453 for user conductor
2021-06-21 08:20:30.209553 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:31.650149 I | auth: deleting token iuSZOCdIPlKcvOPO.456 for user conductor
2021-06-21 08:20:33.650273 I | auth: deleting token jIsjwMqMyJroopzV.458 for user conductor
2021-06-21 08:20:33.650359 I | auth: deleting token VybxMtuobXBEjjWA.459 for user conductor
2021-06-21 08:20:33.650374 I | auth: deleting token NXwHcTiOPyYlGNYF.457 for user conductor
2021-06-21 08:20:33.650400 I | auth: deleting token lDBdQhIvsGhtpPhc.455 for user conductor
2021-06-21 08:20:35.209753 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:36.407938 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.161143277s) to execute
2021-06-21 08:20:37.699675 I | auth: deleting token DIRbAjagTkOKXDTl.460 for user conductor
2021-06-21 08:20:38.650254 I | auth: deleting token IhxcuxnPacGgCnTe.463 for user conductor
2021-06-21 08:20:38.650312 I | auth: deleting token bUuHGqOmvmLMlfxA.462 for user conductor
2021-06-21 08:20:38.650320 I | auth: deleting token TiawyVjiVgQmHFrv.464 for user conductor
2021-06-21 08:20:38.650326 I | auth: deleting token AwKTnodEJroMCuUo.461 for user conductor
2021-06-21 08:20:38.650333 I | auth: deleting token iIqQBvQrQYAuMKZc.465 for user conductor
2021-06-21 08:20:39.107952 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.660745102s) to execute
2021-06-21 08:20:39.347240 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (147.535918ms) to execute
2021-06-21 08:20:40.210004 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:42.650213 I | auth: deleting token SRHDJTTDCmIMBCoy.469 for user conductor
2021-06-21 08:20:42.650277 I | auth: deleting token HhjlPwZtCLOupYtQ.466 for user conductor
2021-06-21 08:20:43.002090 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.155039504s) to execute
2021-06-21 08:20:43.650167 I | auth: deleting token YjdLATLDWZJQUKZN.467 for user conductor
2021-06-21 08:20:44.650220 I | auth: deleting token MyJJlcgKKbYXLDHO.471 for user conductor
2021-06-21 08:20:44.650296 I | auth: deleting token CVwWGJMduxBwkTMY.468 for user conductor
2021-06-21 08:20:45.210385 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:45.650200 I | auth: deleting token YzyLwMxUfZrmCjQR.470 for user conductor
2021-06-21 08:20:45.650253 I | auth: deleting token qFxraHOWZSRNgoyv.472 for user conductor
2021-06-21 08:20:45.805526 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.540986621s) to execute
2021-06-21 08:20:47.102875 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203279536s) to execute
2021-06-21 08:20:47.103072 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.295063176s) to execute
2021-06-21 08:20:48.403616 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.297683549s) to execute
2021-06-21 08:20:48.403839 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.204189009s) to execute
2021-06-21 08:20:48.650187 I | auth: deleting token hxYcIvlRQCRNMFhL.475 for user conductor
2021-06-21 08:20:49.650260 I | auth: deleting token mOCmLoMbymwKxYsy.473 for user conductor
2021-06-21 08:20:49.650306 I | auth: deleting token RTdNqWzhRKpfhvse.476 for user conductor
2021-06-21 08:20:49.650314 I | auth: deleting token qZbigqvAzoUmxkaH.474 for user conductor
2021-06-21 08:20:49.806478 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.257125636s) to execute
2021-06-21 08:20:49.806657 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.10680665s) to execute
2021-06-21 08:20:50.210617 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:50.699523 I | auth: deleting token LwjnCvquvtJLLuLI.478 for user conductor
2021-06-21 08:20:50.699589 I | auth: deleting token wisQmMHByFRRcCyv.477 for user conductor
2021-06-21 08:20:51.203378 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.301507838s) to execute
2021-06-21 08:20:51.203464 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (801.740973ms) to execute
2021-06-21 08:20:52.650213 I | auth: deleting token hZXxIQRYIIZtOAQN.479 for user conductor
2021-06-21 08:20:53.650182 I | auth: deleting token wGUfLXNIhpyulNfn.481 for user conductor
2021-06-21 08:20:53.650229 I | auth: deleting token DwRfCyFUSgyfFyAN.480 for user conductor
2021-06-21 08:20:54.650147 I | auth: deleting token wkFtYhaLPJSxYEIw.482 for user conductor
2021-06-21 08:20:55.210855 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:20:55.650198 I | auth: deleting token UrWRRfskpldXZTNf.483 for user conductor
2021-06-21 08:20:56.650234 I | auth: deleting token uRHJebaifPOkrqns.484 for user conductor
2021-06-21 08:20:58.650204 I | auth: deleting token VvHmneJhCZrXZXvC.485 for user conductor
2021-06-21 08:21:00.211112 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:02.650209 I | auth: deleting token wDLazUrbEhsisuSW.486 for user conductor
2021-06-21 08:21:03.650203 I | auth: deleting token BjhjWCByXILSExXq.487 for user conductor
2021-06-21 08:21:03.650251 I | auth: deleting token ecoZwSKqgoDiUHCi.488 for user conductor
2021-06-21 08:21:05.211380 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:05.650166 I | auth: deleting token FeimjPuxMZMnHojr.489 for user conductor
2021-06-21 08:21:05.650223 I | auth: deleting token aBIAHSOwyATkXViQ.490 for user conductor
2021-06-21 08:21:05.650238 I | auth: deleting token LtxJFIlubgZpcdGK.492 for user conductor
2021-06-21 08:21:05.650246 I | auth: deleting token tqpvHZKqbLKRBCUZ.491 for user conductor
2021-06-21 08:21:07.699516 I | auth: deleting token YScMNGWSDAOGcJHL.493 for user conductor
2021-06-21 08:21:08.699504 I | auth: deleting token VpBqfLtRDXyMHplk.495 for user conductor
2021-06-21 08:21:08.699563 I | auth: deleting token SaSkjaWuSAIPnQlz.494 for user conductor
2021-06-21 08:21:08.699574 I | auth: deleting token WSFGldOuzlEvJiqN.496 for user conductor
2021-06-21 08:21:10.211654 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:10.650219 I | auth: deleting token BgvPssIFhFoAQMDw.498 for user conductor
2021-06-21 08:21:10.650281 I | auth: deleting token YJpTYyTUshmtvfcg.497 for user conductor
2021-06-21 08:21:11.650175 I | auth: deleting token EZgphnXXHCQgHiOn.499 for user conductor
2021-06-21 08:21:12.650196 I | auth: deleting token dDKSiINVAsMgGhIs.501 for user conductor
2021-06-21 08:21:12.650249 I | auth: deleting token hRhzUBOGLpxpEQaG.500 for user conductor
2021-06-21 08:21:13.804988 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (5.201280197s) to execute
2021-06-21 08:21:15.299691 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:15.650252 I | auth: deleting token IuWndRojyuznhuyB.503 for user conductor
2021-06-21 08:21:15.650309 I | auth: deleting token zDdzLOeqowqGlsvy.502 for user conductor
2021-06-21 08:21:15.650328 I | auth: deleting token fnjssNrRmYQvedDD.504 for user conductor
2021-06-21 08:21:18.699540 I | auth: deleting token vrrekvjWnakphHtQ.508 for user conductor
2021-06-21 08:21:18.699589 I | auth: deleting token AlbLZIcLmRknGHHe.505 for user conductor
2021-06-21 08:21:18.699596 I | auth: deleting token qNbJwpJwUWRdKdpO.507 for user conductor
2021-06-21 08:21:18.699607 I | auth: deleting token vsioNCDVFXsHcBTv.506 for user conductor
2021-06-21 08:21:19.199906 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.888613345s) to execute
2021-06-21 08:21:20.299860 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:20.407395 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.20474519s) to execute
2021-06-21 08:21:20.407559 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.205445499s) to execute
2021-06-21 08:21:20.502013 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.299410181s) to execute
2021-06-21 08:21:20.502052 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.299834648s) to execute
2021-06-21 08:21:20.699579 I | auth: deleting token DzNshjrMcNNWONdu.509 for user conductor
2021-06-21 08:21:21.650177 I | auth: deleting token FAIQxxShllBBiSPQ.511 for user conductor
2021-06-21 08:21:21.650237 I | auth: deleting token BkDqsBbEHpTPoRzt.510 for user conductor
2021-06-21 08:21:21.650246 I | auth: deleting token yfcovPVHYLTQzfWG.512 for user conductor
2021-06-21 08:21:24.701315 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.75419706s) to execute
2021-06-21 08:21:25.300060 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:26.007393 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.303538685s) to execute
2021-06-21 08:21:26.007511 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.303665981s) to execute
2021-06-21 08:21:26.007876 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.206742563s) to execute
2021-06-21 08:21:27.650154 I | auth: deleting token vobixoAamhIfuirG.514 for user conductor
2021-06-21 08:21:27.650209 I | auth: deleting token nyXrfBxNjUvJzDmU.513 for user conductor
2021-06-21 08:21:28.650253 I | auth: deleting token uqCCuSlaeHoAvmfw.517 for user conductor
2021-06-21 08:21:28.650310 I | auth: deleting token EgbPiseDzZGxtBHv.515 for user conductor
2021-06-21 08:21:28.650323 I | auth: deleting token XBhNEClWgbSXDJBP.516 for user conductor
2021-06-21 08:21:30.103188 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.503576498s) to execute
2021-06-21 08:21:30.300301 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:30.650258 I | auth: deleting token dwDDJpEGnMfqJrjd.519 for user conductor
2021-06-21 08:21:30.650355 I | auth: deleting token LmQzXONrbExVjLqI.518 for user conductor
2021-06-21 08:21:31.608071 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.406355089s) to execute
2021-06-21 08:21:31.608433 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (508.778415ms) to execute
2021-06-21 08:21:33.100009 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.400351462s) to execute
2021-06-21 08:21:33.699513 I | auth: deleting token FUkSfNVTXUzcMxvN.521 for user conductor
2021-06-21 08:21:33.699573 I | auth: deleting token tfsfGrpHLflOukkt.520 for user conductor
2021-06-21 08:21:34.600909 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (198.782864ms) to execute
2021-06-21 08:21:34.650168 I | auth: deleting token tIKbVAkZmedtHUuR.522 for user conductor
2021-06-21 08:21:35.300560 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:35.650224 I | auth: deleting token pVaJmhesvsGYWqmi.523 for user conductor
2021-06-21 08:21:35.650442 I | auth: deleting token EOmUlHGJKDHGqZil.524 for user conductor
2021-06-21 08:21:36.664454 I | auth: deleting token AiynRdPovhVDoxhh.525 for user conductor
2021-06-21 08:21:37.003425 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.152114227s) to execute
2021-06-21 08:21:37.650181 I | auth: deleting token odhFluAIOXlHmydd.526 for user conductor
2021-06-21 08:21:38.400881 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (500.330756ms) to execute
2021-06-21 08:21:39.650189 I | auth: deleting token EhOLffsnyfLkCzAY.527 for user conductor
2021-06-21 08:21:40.300841 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:40.650199 I | auth: deleting token XpDfOREkfqjUHIPv.530 for user conductor
2021-06-21 08:21:40.650244 I | auth: deleting token riyCayXIXmOgdjhu.529 for user conductor
2021-06-21 08:21:40.650264 I | auth: deleting token OOxJScRvnLVmmlUi.528 for user conductor
2021-06-21 08:21:43.650207 I | auth: deleting token lPUngeblARDPaTfK.534 for user conductor
2021-06-21 08:21:43.650257 I | auth: deleting token AyMPFnWRNESzpNCn.533 for user conductor
2021-06-21 08:21:43.650270 I | auth: deleting token WSvApwvUKAaQzdCF.531 for user conductor
2021-06-21 08:21:43.650281 I | auth: deleting token CIWOuMdRwwpdOPOW.532 for user conductor
2021-06-21 08:21:45.301039 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:47.804448 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.9575217s) to execute
2021-06-21 08:21:49.201590 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.20074239s) to execute
2021-06-21 08:21:49.201826 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.394710557s) to execute
2021-06-21 08:21:49.204263 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.304485275s) to execute
2021-06-21 08:21:49.204294 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.304531643s) to execute
2021-06-21 08:21:49.650165 I | auth: deleting token FEjghJnrCmdddluI.536 for user conductor
2021-06-21 08:21:50.301286 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:50.650170 I | auth: deleting token lXDHsEGorUgdHjTf.539 for user conductor
2021-06-21 08:21:50.650206 I | auth: deleting token RznUSTREUsYfgxUn.537 for user conductor
2021-06-21 08:21:50.650225 I | auth: deleting token OUIdcoUfomAZrVse.535 for user conductor
2021-06-21 08:21:50.650237 I | auth: deleting token cTCWfkjqlLelLGqs.538 for user conductor
2021-06-21 08:21:51.700204 I | auth: deleting token nZikgVgQoEDAdtZQ.540 for user conductor
2021-06-21 08:21:53.101848 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.45305974s) to execute
2021-06-21 08:21:53.247279 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (143.111576ms) to execute
2021-06-21 08:21:53.249092 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (144.3718ms) to execute
2021-06-21 08:21:54.699474 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (356.960465ms) to execute
2021-06-21 08:21:55.301533 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:21:55.900649 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.153447471s) to execute
2021-06-21 08:21:57.108253 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.161322557s) to execute
2021-06-21 08:21:57.108409 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.205224837s) to execute
2021-06-21 08:21:57.650183 I | auth: deleting token AqKJfFMkAVxPOZZs.542 for user conductor
2021-06-21 08:21:58.650203 I | auth: deleting token siTSrJytdwLaFMlG.545 for user conductor
2021-06-21 08:21:58.650249 I | auth: deleting token TxXKoeEcggljPIje.543 for user conductor
2021-06-21 08:21:58.650259 I | auth: deleting token GIGGaxtddbiHJWHm.544 for user conductor
2021-06-21 08:21:58.650272 I | auth: deleting token BCNLABneZqepVOFh.541 for user conductor
2021-06-21 08:22:00.399506 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:01.206076 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.50516077s) to execute
2021-06-21 08:22:01.348875 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (139.976278ms) to execute
2021-06-21 08:22:01.448188 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (238.910724ms) to execute
2021-06-21 08:22:01.650159 I | auth: deleting token XXKEvyuJUbEJwBEv.546 for user conductor
2021-06-21 08:22:01.650227 I | auth: deleting token WNVZrPtWelatnMbf.547 for user conductor
2021-06-21 08:22:01.650245 I | auth: deleting token HdemvDvxexUSBCkp.548 for user conductor
2021-06-21 08:22:02.650264 I | auth: deleting token ONeUtIlzDMNOXoCs.549 for user conductor
2021-06-21 08:22:03.650300 I | auth: deleting token ePHMVDkzkAcxGZDB.551 for user conductor
2021-06-21 08:22:04.650205 I | auth: deleting token emKzngMLhCdGxYsF.550 for user conductor
2021-06-21 08:22:05.103923 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (904.275121ms) to execute
2021-06-21 08:22:05.399861 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:05.650166 I | auth: deleting token JanovCbsPFvecvhB.552 for user conductor
2021-06-21 08:22:05.650215 I | auth: deleting token fBubOhTVihFXkKnh.554 for user conductor
2021-06-21 08:22:05.650224 I | auth: deleting token WurNRNYemyZycVsT.553 for user conductor
2021-06-21 08:22:07.500141 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (200.45587ms) to execute
2021-06-21 08:22:07.699561 I | auth: deleting token MyQCWAEPnKowxkqq.556 for user conductor
2021-06-21 08:22:07.699621 I | auth: deleting token IRxtZNUmSprYLGSj.555 for user conductor
2021-06-21 08:22:08.699590 I | auth: deleting token TLieNANPMwnJgemp.558 for user conductor
2021-06-21 08:22:08.699655 I | auth: deleting token fvnyEZvfraXjkRIP.557 for user conductor
2021-06-21 08:22:10.400085 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:10.650179 I | auth: deleting token QptXwzgxdztOVTSl.559 for user conductor
2021-06-21 08:22:11.699474 I | auth: deleting token ylPmWoyvTknQNopX.560 for user conductor
2021-06-21 08:22:11.699525 I | auth: deleting token YbizqoyZJqczPVey.561 for user conductor
2021-06-21 08:22:12.704284 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (5.201419294s) to execute
2021-06-21 08:22:13.650171 I | auth: deleting token EmvjtANOHLZYPhHF.562 for user conductor
2021-06-21 08:22:13.650224 I | auth: deleting token vvyKeFFBVjJGXGmd.564 for user conductor
2021-06-21 08:22:13.650247 I | auth: deleting token uEhjKipzqGfXVpfU.563 for user conductor
2021-06-21 08:22:15.400534 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:15.650217 I | auth: deleting token eaHQHCZkkKjQZLBT.565 for user conductor
2021-06-21 08:22:16.699498 I | auth: deleting token acXtzwswsHeTUqnm.566 for user conductor
2021-06-21 08:22:17.303157 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.953972863s) to execute
2021-06-21 08:22:19.699459 I | auth: deleting token QPHxHiQcDhlcUPNy.568 for user conductor
2021-06-21 08:22:19.699512 I | auth: deleting token WVkMoraEtAjdxGeo.567 for user conductor
2021-06-21 08:22:19.699528 I | auth: deleting token ggMZmdozFHSKIcWN.569 for user conductor
2021-06-21 08:22:20.105051 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.256157005s) to execute
2021-06-21 08:22:20.400821 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:20.650108 I | auth: deleting token ucyhTLvzfQZEzaDe.570 for user conductor
2021-06-21 08:22:21.601280 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (301.637502ms) to execute
2021-06-21 08:22:22.699518 I | auth: deleting token gmfbLGSIMWmLAUFL.571 for user conductor
2021-06-21 08:22:22.699558 I | auth: deleting token AhbeeSpVxMDJgIJo.572 for user conductor
2021-06-21 08:22:23.744091 I | auth: deleting token zGlrlRPQQGmlkUdZ.574 for user conductor
2021-06-21 08:22:23.744130 I | auth: deleting token VyNEiRmnFqNLNrsU.573 for user conductor
2021-06-21 08:22:25.401169 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:26.650245 I | auth: deleting token jlGamhBwAmxOnxPX.576 for user conductor
2021-06-21 08:22:26.650300 I | auth: deleting token uHOHRbBnkRCsRPwm.578 for user conductor
2021-06-21 08:22:26.650310 I | auth: deleting token CBLFzwmqioFtueMl.575 for user conductor
2021-06-21 08:22:26.650320 I | auth: deleting token PCzWbSaSBdoLZdsJ.577 for user conductor
2021-06-21 08:22:28.606037 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.3015879s) to execute
2021-06-21 08:22:28.747083 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (138.517006ms) to execute
2021-06-21 08:22:29.650197 I | auth: deleting token ydKmuSJsywbCNGAz.580 for user conductor
2021-06-21 08:22:29.650271 I | auth: deleting token GUYygmjLELRATtId.579 for user conductor
2021-06-21 08:22:30.008515 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (659.642111ms) to execute
2021-06-21 08:22:30.401985 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:30.650215 I | auth: deleting token UnTVYJYnhgezLQRc.582 for user conductor
2021-06-21 08:22:30.650271 I | auth: deleting token WuHFrkLkfiNMzSNF.583 for user conductor
2021-06-21 08:22:30.650288 I | auth: deleting token jFHkOPrAbhnFSgFm.581 for user conductor
2021-06-21 08:22:31.306483 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.2068606s) to execute
2021-06-21 08:22:31.547493 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (143.143125ms) to execute
2021-06-21 08:22:32.699553 I | auth: deleting token ipGfFFmFMjNEcYCx.584 for user conductor
2021-06-21 08:22:33.699596 I | auth: deleting token phcguHGFJoJVVFXF.585 for user conductor
2021-06-21 08:22:34.007085 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.159256656s) to execute
2021-06-21 08:22:34.699550 I | auth: deleting token vmJmkzNkoUNhTpnE.586 for user conductor
2021-06-21 08:22:35.402312 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:35.699462 I | auth: deleting token AWhRcwPAbZKMYUGT.588 for user conductor
2021-06-21 08:22:35.699511 I | auth: deleting token zekZwopyVFSColOm.587 for user conductor
2021-06-21 08:22:37.650169 I | auth: deleting token vGVeBUMGDlcytifV.591 for user conductor
2021-06-21 08:22:37.650226 I | auth: deleting token eonXRfnWmzgYZeAx.590 for user conductor
2021-06-21 08:22:37.650247 I | auth: deleting token ZKLKTiTXiDtNKwyB.589 for user conductor
2021-06-21 08:22:38.650171 I | auth: deleting token BQJhmYxfVLkKfUZd.593 for user conductor
2021-06-21 08:22:38.650240 I | auth: deleting token njVSLbEVykVjHCOs.592 for user conductor
2021-06-21 08:22:39.604130 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.856184355s) to execute
2021-06-21 08:22:39.747120 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (140.677513ms) to execute
2021-06-21 08:22:39.748909 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.302561ms) to execute
2021-06-21 08:22:39.749021 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.332773ms) to execute
2021-06-21 08:22:40.402574 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:40.699555 I | auth: deleting token pQcowOFlkeiVETNn.594 for user conductor
2021-06-21 08:22:41.001276 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (499.453136ms) to execute
2021-06-21 08:22:41.650221 I | auth: deleting token GwpJnppXgVTsiRup.595 for user conductor
2021-06-21 08:22:43.699592 I | auth: deleting token XELmIHicoaxSzpns.596 for user conductor
2021-06-21 08:22:44.308320 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (761.31607ms) to execute
2021-06-21 08:22:45.402788 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:45.699525 I | auth: deleting token AjjfqHBpUzxWdlsW.597 for user conductor
2021-06-21 08:22:45.800483 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (600.632389ms) to execute
2021-06-21 08:22:47.105107 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.158018087s) to execute
2021-06-21 08:22:48.500210 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.357427382s) to execute
2021-06-21 08:22:48.500258 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.295155051s) to execute
2021-06-21 08:22:49.650252 I | auth: deleting token TStBAdeAbjHASJXp.601 for user conductor
2021-06-21 08:22:49.650326 I | auth: deleting token trpQsboogUPiVsbB.599 for user conductor
2021-06-21 08:22:49.900132 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.397227285s) to execute
2021-06-21 08:22:49.900237 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.297896534s) to execute
2021-06-21 08:22:50.047395 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (144.681969ms) to execute
2021-06-21 08:22:50.403079 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:50.699524 I | auth: deleting token tgjNXLDfINJmKHQo.598 for user conductor
2021-06-21 08:22:50.699569 I | auth: deleting token tOpTBocaOmHasDlZ.604 for user conductor
2021-06-21 08:22:50.699586 I | auth: deleting token NlnsVGXBYbUCBkoB.602 for user conductor
2021-06-21 08:22:50.699595 I | auth: deleting token ACfxeseojyJkLPhC.600 for user conductor
2021-06-21 08:22:50.699602 I | auth: deleting token OGyuGeuHQcNtmgCz.603 for user conductor
2021-06-21 08:22:51.303276 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.253566251s) to execute
2021-06-21 08:22:53.650155 I | auth: deleting token AnfoRrAZBsikMXnE.605 for user conductor
2021-06-21 08:22:53.650220 I | auth: deleting token pQxUNlVuFmvXXqOK.606 for user conductor
2021-06-21 08:22:53.901322 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.301480257s) to execute
2021-06-21 08:22:54.650181 I | auth: deleting token BMbQTIpiWRZRqlCS.608 for user conductor
2021-06-21 08:22:54.650255 I | auth: deleting token ZFFsRzQDwEyYKezd.609 for user conductor
2021-06-21 08:22:54.650266 I | auth: deleting token finSPAXlmFBajRVk.607 for user conductor
2021-06-21 08:22:55.207078 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.205253793s) to execute
2021-06-21 08:22:55.207451 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.207751242s) to execute
2021-06-21 08:22:55.207551 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.207749781s) to execute
2021-06-21 08:22:55.403322 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:22:57.650217 I | auth: deleting token HXGSwGCleoWXFDQx.611 for user conductor
2021-06-21 08:22:57.650266 I | auth: deleting token yZrYgYpPnOCEQwTV.610 for user conductor
2021-06-21 08:22:58.650156 I | auth: deleting token BmNepYHkoKQtsZUp.613 for user conductor
2021-06-21 08:22:58.650196 I | auth: deleting token FOugwryKFqKTgVpw.612 for user conductor
2021-06-21 08:22:59.903580 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.50387758s) to execute
2021-06-21 08:23:00.403625 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:23:00.650190 I | auth: deleting token pYpjOwNtvtyfPkBs.614 for user conductor
2021-06-21 08:23:01.650234 I | auth: deleting token DNgMfZdgTCzaxVOj.616 for user conductor
2021-06-21 08:23:02.650275 I | auth: deleting token KPYHfnCmoQSyQlsU.615 for user conductor
2021-06-21 08:23:02.701736 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.154758024s) to execute
2021-06-21 08:23:04.650159 I | auth: deleting token ifqMsDTuQaFhAPvc.619 for user conductor
2021-06-21 08:23:04.650195 I | auth: deleting token ngdRiwoXxypTGTbS.617 for user conductor
2021-06-21 08:23:05.403918 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:23:05.650206 I | auth: deleting token GAGxbcDijAOJrzgF.621 for user conductor
2021-06-21 08:23:05.650295 I | auth: deleting token ClysvzuoBnKmJCwM.618 for user conductor
2021-06-21 08:23:05.650318 I | auth: deleting token VZIWgZzbMQmYInbA.620 for user conductor
2021-06-21 08:23:06.650189 I | auth: deleting token tgdOxLIrOSlyfYJX.622 for user conductor
2021-06-21 08:23:08.650195 I | auth: deleting token HvUVzizudExuLBkH.624 for user conductor
2021-06-21 08:23:08.650248 I | auth: deleting token MCIVIIDrQRAenctr.623 for user conductor
2021-06-21 08:23:08.650263 I | auth: deleting token CzmJpKWiHVhmlGAQ.625 for user conductor
2021-06-21 08:23:08.905641 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.005869976s) to execute
2021-06-21 08:23:10.404181 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:23:10.650174 I | auth: deleting token qRLxcUUrUPXpJEyV.626 for user conductor
2021-06-21 08:23:11.047944 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (239.354427ms) to execute
2021-06-21 08:23:11.650212 I | auth: deleting token gDmWIwGxIZTXtRmo.628 for user conductor
2021-06-21 08:23:11.650281 I | auth: deleting token NiUtuUqBIewaQmVu.627 for user conductor
2021-06-21 08:23:13.508766 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.161260325s) to execute
2021-06-21 08:23:13.647496 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (136.165588ms) to execute
2021-06-21 08:23:13.650139 I | auth: deleting token iijQRorxEeCMLaxA.630 for user conductor
2021-06-21 08:23:14.650215 I | auth: deleting token HrEOfWJKEIZvATZx.629 for user conductor
2021-06-21 08:23:15.103970 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (754.361357ms) to execute
2021-06-21 08:23:15.347133 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (144.078568ms) to execute
2021-06-21 08:23:15.404456 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:23:15.650183 I | auth: deleting token AlTujfUOHgWWfwbn.631 for user conductor
2021-06-21 08:23:15.650243 I | auth: deleting token XgWFhlnINQjxiafX.632 for user conductor
2021-06-21 08:23:17.650229 I | auth: deleting token FBgQqNruRiTPoqfs.633 for user conductor
2021-06-21 08:23:17.650278 I | auth: deleting token fweJtwHsYlZFLPLt.635 for user conductor
2021-06-21 08:23:17.650299 I | auth: deleting token nlbygaUjhydzqLKr.634 for user conductor
2021-06-21 08:23:17.701152 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (448.242699ms) to execute
2021-06-21 08:23:18.650311 I | auth: deleting token sSzGIBkGveEiRKjI.637 for user conductor
2021-06-21 08:23:18.650356 I | auth: deleting token jsrPydZpNfGSURYy.636 for user conductor
2021-06-21 08:23:19.699602 I | auth: deleting token FsZQBkcEMNERiwfc.638 for user conductor
2021-06-21 08:23:20.499654 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:23:21.650209 I | auth: deleting token fiaglPsdxUTfKcxs.639 for user conductor
2021-06-21 08:23:21.802526 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.15372709s) to execute
2021-06-21 08:23:22.650155 I | auth: deleting token qULEPtHWDvmyKhJZ.640 for user conductor
2021-06-21 08:23:23.200278 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.250896781s) to execute
2021-06-21 08:23:23.200525 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (453.409343ms) to execute
2021-06-21 08:23:24.606251 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.258897406s) to execute
2021-06-21 08:23:24.650163 I | auth: deleting token bByHLeiHZpMuJpEc.641 for user conductor
2021-06-21 08:23:25.499910 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:23:25.650431 I | auth: deleting token uzSXvrwDSZOgiGOU.642 for user conductor
2021-06-21 08:23:25.901608 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.292472993s) to execute
2021-06-21 08:23:25.901711 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.154609665s) to execute
2021-06-21 08:23:26.650155 I | auth: deleting token wohMuJaWCOEQRtPT.643 for user conductor
2021-06-21 08:23:28.602573 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.102637997s) to execute
2021-06-21 08:23:29.901103 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.29573959s) to execute
2021-06-21 08:23:29.901475 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.295460949s) to execute
2021-06-21 08:23:30.500225 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:23:31.201721 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.297931055s) to execute
2021-06-21 08:23:32.504494 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.600483805s) to execute
2021-06-21 08:23:32.504601 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.300305835s) to execute
2021-06-21 08:23:32.504798 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.300806541s) to execute
2021-06-21 08:23:32.650165 I | auth: deleting token UQZHhoYHHkqDVaMb.646 for user conductor
2021-06-21 08:23:32.650208 I | auth: deleting token fuOHUrumWMoekXyY.648 for user conductor
2021-06-21 08:23:32.650219 I | auth: deleting token UqHwSFgXvhcKxvUJ.645 for user conductor
2021-06-21 08:23:32.650225 I | auth: deleting token mVUbXwOofmivbwpP.647 for user conductor
2021-06-21 08:23:32.650235 I | auth: deleting token YTSDXKsvmzZSXVwk.644 for user conductor
2021-06-21 08:23:34.699998 I | auth: deleting token TXUyDNRrYIdLJsQu.649 for user conductor
2021-06-21 08:23:35.199743 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.550206521s) to execute
2021-06-21 08:23:35.500539 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:23:36.405959 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.004332464s) to execute
2021-06-21 08:23:37.699546 I | auth: deleting token zUutPbJLmoEkehLc.650 for user conductor
2021-06-21 08:23:37.699611 I | auth: deleting token nGcYSpxZcjisQZwm.651 for user conductor
2021-06-21 08:23:37.699628 I | auth: deleting token YowZJyWCDxyNNYaX.654 for user conductor
2021-06-21 08:23:37.699641 I | auth: deleting token erNDmjPFXSDXAnWB.653 for user conductor
2021-06-21 08:23:37.699652 I | auth: deleting token tKJBjXcfredhQhtg.652 for user conductor
2021-06-21 08:23:37.706344 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.106655061s) to execute
2021-06-21 08:23:37.706584 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.206892858s) to execute
2021-06-21 08:23:37.847379 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.347571592s) to execute
2021-06-21 08:23:39.205956 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (555.80374ms) to execute
2021-06-21 08:23:40.500756 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:23:41.699526 I | auth: deleting token DmUGUpcHEtwRdfrB.659 for user conductor
2021-06-21 08:23:41.699613 I | auth: deleting token QwfSuRaDHcezXjDY.655 for user conductor
2021-06-21 08:23:41.699635 I | auth: deleting token NvpdxmaynSXkqOqu.657 for user conductor
2021-06-21 08:23:41.699653 I | auth: deleting token HFvZuBCGGsHfgueP.658 for user conductor
2021-06-21 08:23:41.699675 I | auth: deleting token hPJIeqhYkwcpIVEo.656 for user conductor
2021-06-21 08:23:41.802864 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.455807568s) to execute
2021-06-21 08:23:42.699558 I | auth: deleting token VPBTnxVhiYhcNsGU.660 for user conductor
2021-06-21 08:23:43.650211 I | auth: deleting token bACQLKLodhBGDUdl.661 for user conductor
2021-06-21 08:23:44.650192 I | auth: deleting token yBFDtVZxUXcBiKOg.663 for user conductor
2021-06-21 08:23:44.650258 I | auth: deleting token JjYUxXvhDDwOuTby.662 for user conductor
2021-06-21 08:23:45.501085 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:23:45.650228 I | auth: deleting token uelAjSkXOIhCHcHd.664 for user conductor
2021-06-21 08:23:47.650246 I | auth: deleting token tjFqpojmWaPtochM.665 for user conductor
2021-06-21 08:23:47.650294 I | auth: deleting token uOKYktSCsHozYyMB.666 for user conductor
2021-06-21 08:23:48.800646 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (399.750575ms) to execute
2021-06-21 08:23:49.699590 I | auth: deleting token cogDoEiexknYVlue.668 for user conductor
2021-06-21 08:23:49.699638 I | auth: deleting token mGKIGfEUhxRMwopX.667 for user conductor
2021-06-21 08:23:50.208527 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (161.317044ms) to execute
2021-06-21 08:23:50.501343 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:23:50.650170 I | auth: deleting token aGJHogWnimrBmhfn.669 for user conductor
2021-06-21 08:23:51.650154 I | auth: deleting token ukOyRhkZjjLJpbGt.670 for user conductor
2021-06-21 08:23:52.650257 I | auth: deleting token gyRDFGmwLpJibgUV.672 for user conductor
2021-06-21 08:23:52.650335 I | auth: deleting token IHlFnVspkvjNSIvF.671 for user conductor
2021-06-21 08:23:52.902285 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.055352584s) to execute
2021-06-21 08:23:55.501647 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:23:55.699554 I | auth: deleting token WkricixPClifhEAX.673 for user conductor
2021-06-21 08:23:55.699635 I | auth: deleting token xuiYEBOvGFFpYwdj.674 for user conductor
2021-06-21 08:23:56.501708 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.054590696s) to execute
2021-06-21 08:23:56.650187 I | auth: deleting token FHjqZYdjTmQQELai.675 for user conductor
2021-06-21 08:23:59.206200 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.655996057s) to execute
2021-06-21 08:23:59.650196 I | auth: deleting token hWaaMVjFYeNmzxSH.678 for user conductor
2021-06-21 08:23:59.650264 I | auth: deleting token DwVUMLEDafVtUrya.680 for user conductor
2021-06-21 08:23:59.650282 I | auth: deleting token zJcHhCERTVQZIwmj.677 for user conductor
2021-06-21 08:23:59.650297 I | auth: deleting token zVrNWeulDGQfPdBL.676 for user conductor
2021-06-21 08:23:59.650319 I | auth: deleting token auOpAbXwovxZsUAY.679 for user conductor
2021-06-21 08:24:00.501895 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:02.650210 I | auth: deleting token lpIKhgteiYgttloh.683 for user conductor
2021-06-21 08:24:02.650257 I | auth: deleting token eJynQcBKlHvGRhPP.682 for user conductor
2021-06-21 08:24:02.650273 I | auth: deleting token AQmMndpwOIoOiOVp.681 for user conductor
2021-06-21 08:24:03.650211 I | auth: deleting token MYbTLJsDfKwzStri.684 for user conductor
2021-06-21 08:24:05.502154 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:05.650157 I | auth: deleting token jduiOWVkboTcgOSe.685 for user conductor
2021-06-21 08:24:05.650222 I | auth: deleting token bQpCMiCEgFjkWVJV.686 for user conductor
2021-06-21 08:24:06.650290 I | auth: deleting token PxnTRwliIqDoZfJN.688 for user conductor
2021-06-21 08:24:08.650187 I | auth: deleting token FxixogxfjjeSPGoD.687 for user conductor
2021-06-21 08:24:08.650253 I | auth: deleting token juvAYgALETpraoYz.690 for user conductor
2021-06-21 08:24:08.650277 I | auth: deleting token lHekohUwAFERoVPE.689 for user conductor
2021-06-21 08:24:10.502384 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:10.650194 I | auth: deleting token YNYgFPepqTuPshKr.692 for user conductor
2021-06-21 08:24:12.000861 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.70113729s) to execute
2021-06-21 08:24:13.505749 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.502414928s) to execute
2021-06-21 08:24:13.506164 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.502874644s) to execute
2021-06-21 08:24:13.506339 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.357092067s) to execute
2021-06-21 08:24:13.650284 I | auth: deleting token hLmYVosUGNnQYmlB.695 for user conductor
2021-06-21 08:24:13.650341 I | auth: deleting token SKyVwLyePDBAadYn.696 for user conductor
2021-06-21 08:24:13.650351 I | auth: deleting token fsRzwfkQnYeeneBW.693 for user conductor
2021-06-21 08:24:13.650363 I | auth: deleting token MiRogFsDOmGVKksj.694 for user conductor
2021-06-21 08:24:13.650371 I | auth: deleting token suMDYvVwnMCHmEmu.691 for user conductor
2021-06-21 08:24:13.650377 I | auth: deleting token SfqYphyyzGAdebhJ.697 for user conductor
2021-06-21 08:24:15.502640 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:15.650171 I | auth: deleting token vQPqGyuYGtqqbfhl.698 for user conductor
2021-06-21 08:24:16.504295 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.802336351s) to execute
2021-06-21 08:24:17.699560 I | auth: deleting token oYGPXSZJwsUeeBqt.699 for user conductor
2021-06-21 08:24:17.699616 I | auth: deleting token kNbesOicklrIfvxp.701 for user conductor
2021-06-21 08:24:17.699628 I | auth: deleting token hBDmKCLXXlADxpoW.700 for user conductor
2021-06-21 08:24:19.301637 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.101924893s) to execute
2021-06-21 08:24:19.447071 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (142.809204ms) to execute
2021-06-21 08:24:19.449246 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (144.721963ms) to execute
2021-06-21 08:24:19.449536 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (144.620271ms) to execute
2021-06-21 08:24:19.650211 I | auth: deleting token ATrvdFbwxDvBRbVp.702 for user conductor
2021-06-21 08:24:19.650288 I | auth: deleting token gNOVUNvUtsthKyvy.705 for user conductor
2021-06-21 08:24:19.650311 I | auth: deleting token cWquOTpUrOrAVlZQ.703 for user conductor
2021-06-21 08:24:19.650319 I | auth: deleting token YYCHDtBHpfkyrVAu.704 for user conductor
2021-06-21 08:24:20.502851 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:21.650259 I | auth: deleting token yHglhjwlYAbdVtMj.706 for user conductor
2021-06-21 08:24:21.650332 I | auth: deleting token LsDuLNZMZafqwVAl.707 for user conductor
2021-06-21 08:24:23.700081 I | auth: deleting token mxUITVgSNkALAlvk.708 for user conductor
2021-06-21 08:24:23.802794 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.555666374s) to execute
2021-06-21 08:24:23.948411 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.310092ms) to execute
2021-06-21 08:24:24.650271 I | auth: deleting token VmKaecShXTFKSOyN.709 for user conductor
2021-06-21 08:24:25.503059 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:26.650205 I | auth: deleting token awOJZsyHictrzRxq.710 for user conductor
2021-06-21 08:24:27.650175 I | auth: deleting token eiSverkUhCKcOdpL.711 for user conductor
2021-06-21 08:24:28.101330 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.534908474s) to execute
2021-06-21 08:24:28.247966 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (143.681503ms) to execute
2021-06-21 08:24:28.248037 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (141.176877ms) to execute
2021-06-21 08:24:28.650149 I | auth: deleting token WbmhFFWSiJmXGyll.712 for user conductor
2021-06-21 08:24:28.650193 I | auth: deleting token VXmJLumlRhhQVzhL.713 for user conductor
2021-06-21 08:24:29.704950 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.055048932s) to execute
2021-06-21 08:24:30.503331 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:30.650185 I | auth: deleting token QUpiJMjzMyyXjbNs.714 for user conductor
2021-06-21 08:24:30.650235 I | auth: deleting token GNVgXAobcfLPxBzW.716 for user conductor
2021-06-21 08:24:30.650251 I | auth: deleting token gXpydResYIzqyGkP.715 for user conductor
2021-06-21 08:24:33.699552 I | auth: deleting token xLlSfsCBpAJfsARt.719 for user conductor
2021-06-21 08:24:33.699642 I | auth: deleting token ssLrkNnmsRNeAjfu.717 for user conductor
2021-06-21 08:24:35.504034 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:36.101527 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (250.223943ms) to execute
2021-06-21 08:24:36.650185 I | auth: deleting token VJQIZmHbawwLxkPr.724 for user conductor
2021-06-21 08:24:36.650229 I | auth: deleting token StKLAcAdwrxVHaKD.720 for user conductor
2021-06-21 08:24:36.650245 I | auth: deleting token MMPzJWRSahFOJIOj.722 for user conductor
2021-06-21 08:24:36.650254 I | auth: deleting token qfWUivZvKKsDIeZL.718 for user conductor
2021-06-21 08:24:36.650259 I | auth: deleting token LnwnjvVGAxrBsBDn.723 for user conductor
2021-06-21 08:24:36.650266 I | auth: deleting token ONqeuaNgWBijDbzn.721 for user conductor
2021-06-21 08:24:38.801008 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.553776777s) to execute
2021-06-21 08:24:39.047227 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (243.654147ms) to execute
2021-06-21 08:24:39.054656 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (152.126169ms) to execute
2021-06-21 08:24:39.650185 I | auth: deleting token sUTWYTywodvBbXqU.725 for user conductor
2021-06-21 08:24:39.650240 I | auth: deleting token YOyGPiqdmXDmAWlP.726 for user conductor
2021-06-21 08:24:39.650262 I | auth: deleting token FBLMfuynCkvIOIis.727 for user conductor
2021-06-21 08:24:40.400284 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (799.637551ms) to execute
2021-06-21 08:24:40.504235 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:41.650227 I | auth: deleting token TdMcmjxAMxIUubSm.729 for user conductor
2021-06-21 08:24:41.801454 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.254336182s) to execute
2021-06-21 08:24:42.650202 I | auth: deleting token JTyDJUuJZvUaFMjX.730 for user conductor
2021-06-21 08:24:42.650265 I | auth: deleting token aqNYdFNBEtNtvHzP.728 for user conductor
2021-06-21 08:24:44.650167 I | auth: deleting token esbeDBSSPOKMZTHb.732 for user conductor
2021-06-21 08:24:44.650217 I | auth: deleting token CBFxBXuHLoWuzzRr.731 for user conductor
2021-06-21 08:24:44.650233 I | auth: deleting token lxJrhOhFJqnXDZfg.733 for user conductor
2021-06-21 08:24:44.650240 I | auth: deleting token RAmvhzMEuwwUkGpS.734 for user conductor
2021-06-21 08:24:44.704017 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.604243458s) to execute
2021-06-21 08:24:44.847407 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (140.581679ms) to execute
2021-06-21 08:24:44.953143 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (103.547882ms) to execute
2021-06-21 08:24:45.504500 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:45.650211 I | auth: deleting token SFAudYEpUGsLhMnb.735 for user conductor
2021-06-21 08:24:49.108493 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.608871952s) to execute
2021-06-21 08:24:49.347810 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (145.691635ms) to execute
2021-06-21 08:24:49.349990 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (147.719896ms) to execute
2021-06-21 08:24:49.699551 I | auth: deleting token VGtoylHuULIfQKVL.737 for user conductor
2021-06-21 08:24:49.699590 I | auth: deleting token JcGkGFWORDOsCuzF.736 for user conductor
2021-06-21 08:24:49.699597 I | auth: deleting token GksvZwIMHaseEWls.739 for user conductor
2021-06-21 08:24:49.699611 I | auth: deleting token lgvQfJITgMMMtIDb.740 for user conductor
2021-06-21 08:24:49.699624 I | auth: deleting token RQGSEXnaqxdoPbZI.738 for user conductor
2021-06-21 08:24:50.599523 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:51.650145 I | auth: deleting token udlGIyZkTuQmMnhS.741 for user conductor
2021-06-21 08:24:52.008414 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.361362877s) to execute
2021-06-21 08:24:52.147121 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (136.432664ms) to execute
2021-06-21 08:24:52.650204 I | auth: deleting token uSjGWjgbABmZGmxr.743 for user conductor
2021-06-21 08:24:52.650249 I | auth: deleting token TVECTIeFAGZIDAYb.744 for user conductor
2021-06-21 08:24:52.650264 I | auth: deleting token VLksEYkcCTZyHDPa.742 for user conductor
2021-06-21 08:24:54.606332 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (506.651365ms) to execute
2021-06-21 08:24:55.599935 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:24:55.650230 I | auth: deleting token qJfEtCkChxSsZCod.746 for user conductor
2021-06-21 08:24:56.102010 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (202.313048ms) to execute
2021-06-21 08:24:56.650226 I | auth: deleting token exqoOnlBkhvToxMA.745 for user conductor
2021-06-21 08:24:56.650440 I | auth: deleting token KomNRFAKFdbaYhgB.748 for user conductor
2021-06-21 08:24:58.601211 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (854.159063ms) to execute
2021-06-21 08:24:59.650220 I | auth: deleting token qYRDPbExNZNzqRXe.749 for user conductor
2021-06-21 08:24:59.650278 I | auth: deleting token ZpIKgAPpoGkhBUBh.751 for user conductor
2021-06-21 08:24:59.650307 I | auth: deleting token ofKJnurOZARZTiLX.750 for user conductor
2021-06-21 08:24:59.650315 I | auth: deleting token sWcMbHWXOVLxvWSZ.747 for user conductor
2021-06-21 08:25:00.600157 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:02.699535 I | auth: deleting token DDksXYZYavLDxrqv.753 for user conductor
2021-06-21 08:25:02.699591 I | auth: deleting token svyaZSctjHimIJhq.752 for user conductor
2021-06-21 08:25:02.699607 I | auth: deleting token YRODVAKmbwjJEtbA.755 for user conductor
2021-06-21 08:25:02.699622 I | auth: deleting token nkQpnIrrImjUeKSb.754 for user conductor
2021-06-21 08:25:03.203728 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (455.628882ms) to execute
2021-06-21 08:25:04.605276 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.258190673s) to execute
2021-06-21 08:25:04.650147 I | auth: deleting token AZVkPbXLXgtgsaUm.756 for user conductor
2021-06-21 08:25:04.650205 I | auth: deleting token VSCGZzGZuAIZypxm.757 for user conductor
2021-06-21 08:25:04.650218 I | auth: deleting token yhCenjfZqxxpOLwB.758 for user conductor
2021-06-21 08:25:05.600422 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:06.004557 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.302586938s) to execute
2021-06-21 08:25:06.004719 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.304897124s) to execute
2021-06-21 08:25:06.699546 I | auth: deleting token fAlMZrTYhJrgZUQA.759 for user conductor
2021-06-21 08:25:07.600776 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (500.838559ms) to execute
2021-06-21 08:25:07.650202 I | auth: deleting token TXpMpkyqamqDzUwA.761 for user conductor
2021-06-21 08:25:07.650259 I | auth: deleting token LnGAlsVxZdMkOJPS.760 for user conductor
2021-06-21 08:25:07.650281 I | auth: deleting token MvecJTMwkMFLmXhT.762 for user conductor
2021-06-21 08:25:09.505579 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (705.814046ms) to execute
2021-06-21 08:25:09.699473 I | auth: deleting token esEYTTwGvMucdkkR.763 for user conductor
2021-06-21 08:25:09.699528 I | auth: deleting token KrCiFwYMQKVJNmEi.764 for user conductor
2021-06-21 08:25:09.699538 I | auth: deleting token RNdbtxBWxsJwFSdF.765 for user conductor
2021-06-21 08:25:10.600676 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:10.906380 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.357407595s) to execute
2021-06-21 08:25:11.047358 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (138.347498ms) to execute
2021-06-21 08:25:11.650248 I | auth: deleting token jBqkNpUMBkmgyYRW.766 for user conductor
2021-06-21 08:25:12.502443 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.353134472s) to execute
2021-06-21 08:25:12.650173 I | auth: deleting token ttMfgfeOsUUMCclY.768 for user conductor
2021-06-21 08:25:13.699476 I | auth: deleting token OOFmwJwFGTzxLeBo.767 for user conductor
2021-06-21 08:25:14.650182 I | auth: deleting token eegpqPMQTuzlLCFw.771 for user conductor
2021-06-21 08:25:14.650239 I | auth: deleting token EuJUVVAnnNlIsMaS.769 for user conductor
2021-06-21 08:25:14.650251 I | auth: deleting token cmkJbbETvppbsGPm.770 for user conductor
2021-06-21 08:25:15.307988 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (955.28114ms) to execute
2021-06-21 08:25:15.600953 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:17.699635 I | auth: deleting token pPPmHiOThjqqFKcC.773 for user conductor
2021-06-21 08:25:18.650193 I | auth: deleting token LRSaHVwwtAoVlfNU.772 for user conductor
2021-06-21 08:25:18.650244 I | auth: deleting token dqVgCsjWYrekPxMz.775 for user conductor
2021-06-21 08:25:18.650255 I | auth: deleting token sJIyshQmsPSbJsPx.774 for user conductor
2021-06-21 08:25:18.650267 I | auth: deleting token EptMIitqsIaBtDov.776 for user conductor
2021-06-21 08:25:18.706855 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (507.216782ms) to execute
2021-06-21 08:25:20.447412 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (196.363969ms) to execute
2021-06-21 08:25:20.601215 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:21.650220 I | auth: deleting token DTkRhRlLpfOvXPiO.779 for user conductor
2021-06-21 08:25:21.650281 I | auth: deleting token DcitMgEpVaZRhext.780 for user conductor
2021-06-21 08:25:21.650299 I | auth: deleting token qxvLhvxHyxoGVheI.778 for user conductor
2021-06-21 08:25:21.650313 I | auth: deleting token aRhWBeVBCBgDGMww.777 for user conductor
2021-06-21 08:25:23.650236 I | auth: deleting token LxslfvqqZuyHBfzG.781 for user conductor
2021-06-21 08:25:24.650168 I | auth: deleting token SUtdWPnDYnWmwRUR.782 for user conductor
2021-06-21 08:25:25.601491 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:26.650310 I | auth: deleting token paTBEcPgaHDicJGJ.783 for user conductor
2021-06-21 08:25:28.650152 I | auth: deleting token miXMQqmcITolZVas.784 for user conductor
2021-06-21 08:25:29.650136 I | auth: deleting token moRvxzZjuZGiTSuu.785 for user conductor
2021-06-21 08:25:30.601714 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:31.650173 I | auth: deleting token MXFdxKpZuTrtSQxB.786 for user conductor
2021-06-21 08:25:32.699587 I | auth: deleting token cbYTAIXaAvYuDXOn.787 for user conductor
2021-06-21 08:25:32.907082 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.960155806s) to execute
2021-06-21 08:25:34.650259 I | auth: deleting token dAepIpTVKLKnGuBL.788 for user conductor
2021-06-21 08:25:34.700898 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (553.482797ms) to execute
2021-06-21 08:25:35.601896 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:35.908535 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.108817789s) to execute
2021-06-21 08:25:36.247460 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (197.046526ms) to execute
2021-06-21 08:25:36.699495 I | auth: deleting token QoSxsexUXMceEYkO.790 for user conductor
2021-06-21 08:25:36.699542 I | auth: deleting token lJnGEHTGrifrPxKA.791 for user conductor
2021-06-21 08:25:36.699573 I | auth: deleting token YuGziRrrjprhnScm.789 for user conductor
2021-06-21 08:25:39.003289 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.099603577s) to execute
2021-06-21 08:25:39.650189 I | auth: deleting token zjbLgLAmEDMdqVWP.794 for user conductor
2021-06-21 08:25:39.650255 I | auth: deleting token whmhhIDsMJGLoqzH.795 for user conductor
2021-06-21 08:25:39.650269 I | auth: deleting token NnOyVBzViDvFkzmQ.792 for user conductor
2021-06-21 08:25:39.650292 I | auth: deleting token ANMNxFEcLJgHMyvM.793 for user conductor
2021-06-21 08:25:40.602353 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:43.650233 I | auth: deleting token lspmfMTLrqPHSlEq.798 for user conductor
2021-06-21 08:25:43.650411 I | auth: deleting token oOMLZrXjRITbVngJ.797 for user conductor
2021-06-21 08:25:43.650490 I | auth: deleting token ZrldNdkXzsgkgluK.796 for user conductor
2021-06-21 08:25:43.650552 I | auth: deleting token vnouCvLcXqqYaXMc.799 for user conductor
2021-06-21 08:25:45.602600 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:46.650230 I | auth: deleting token pjhITTUJbIGeCPhX.800 for user conductor
2021-06-21 08:25:47.699485 I | auth: deleting token sLGdaCDxHKGrkDgQ.803 for user conductor
2021-06-21 08:25:47.699522 I | auth: deleting token ZoiQCEXsdAZhJNLN.804 for user conductor
2021-06-21 08:25:47.699533 I | auth: deleting token eRmVLpuglhmHkIKX.801 for user conductor
2021-06-21 08:25:47.699549 I | auth: deleting token qqXAWMeBCWDxFwUK.802 for user conductor
2021-06-21 08:25:48.650295 I | auth: deleting token uuQkCPJDCxMrGycr.805 for user conductor
2021-06-21 08:25:50.002091 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.202302375s) to execute
2021-06-21 08:25:50.602841 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:50.699496 I | auth: deleting token zyQjpDZCBIHNkfKb.807 for user conductor
2021-06-21 08:25:50.699640 I | auth: deleting token hQwIWWmhlvATgUia.806 for user conductor
2021-06-21 08:25:51.699516 I | auth: deleting token FKVRLAmCgwRxgVSN.808 for user conductor
2021-06-21 08:25:51.699556 I | auth: deleting token imbUbKTTCXUTasyh.810 for user conductor
2021-06-21 08:25:51.699571 I | auth: deleting token ClsVgrHmytuJqJAV.809 for user conductor
2021-06-21 08:25:53.007881 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.260739864s) to execute
2021-06-21 08:25:53.650224 I | auth: deleting token bOZCWTkkQLOaXZbG.811 for user conductor
2021-06-21 08:25:54.503653 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.356121514s) to execute
2021-06-21 08:25:54.503772 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.403759758s) to execute
2021-06-21 08:25:55.603117 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:25:55.650198 I | auth: deleting token PnFpaaIaFUpMqjfc.812 for user conductor
2021-06-21 08:25:55.908123 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.303043122s) to execute
2021-06-21 08:25:56.650248 I | auth: deleting token nBCqYDuCNiXRhGym.813 for user conductor
2021-06-21 08:25:57.401074 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.301348407s) to execute
2021-06-21 08:25:58.650207 I | auth: deleting token qnxfYxbImkWIbeks.814 for user conductor
2021-06-21 08:25:58.799482 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.208162727s) to execute
2021-06-21 08:25:58.799567 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.099850357s) to execute
2021-06-21 08:25:58.947172 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (145.036887ms) to execute
2021-06-21 08:25:59.650250 I | auth: deleting token kGWFtebsSvwlSuZK.815 for user conductor
2021-06-21 08:26:00.603355 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:01.650171 I | auth: deleting token ITJZzQIxOZibqSET.816 for user conductor
2021-06-21 08:26:03.402028 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (955.208453ms) to execute
2021-06-21 08:26:03.650170 I | auth: deleting token vBASkLtMuDaoESjT.817 for user conductor
2021-06-21 08:26:04.650119 I | auth: deleting token MLIODLVAEQUAquHI.818 for user conductor
2021-06-21 08:26:05.603626 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:06.650155 I | auth: deleting token oyjcIywImxsxPJvP.819 for user conductor
2021-06-21 08:26:07.202118 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102245166s) to execute
2021-06-21 08:26:07.650289 I | auth: deleting token MpOnqvrVFCHMHAsZ.820 for user conductor
2021-06-21 08:26:08.507795 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.206944304s) to execute
2021-06-21 08:26:10.700840 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:12.303621 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203921498s) to execute
2021-06-21 08:26:12.452059 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.474051ms) to execute
2021-06-21 08:26:13.805916 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (758.861414ms) to execute
2021-06-21 08:26:14.650186 I | auth: deleting token xSeeYvPWlVWYohKP.823 for user conductor
2021-06-21 08:26:14.650287 I | auth: deleting token kLhWYHVCuQUQaqEo.821 for user conductor
2021-06-21 08:26:14.650303 I | auth: deleting token KKiooLAGJrwlGCei.825 for user conductor
2021-06-21 08:26:14.650314 I | auth: deleting token GMSYcCLeGapcDibt.822 for user conductor
2021-06-21 08:26:14.650361 I | auth: deleting token KhCpNSlWVaTJIOVu.824 for user conductor
2021-06-21 08:26:15.701066 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:19.106457 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.857835985s) to execute
2021-06-21 08:26:20.602404 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.355241059s) to execute
2021-06-21 08:26:20.602819 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.400780895s) to execute
2021-06-21 08:26:20.602961 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.400955623s) to execute
2021-06-21 08:26:20.650225 I | auth: deleting token ffEZLQZMxIinXrhh.829 for user conductor
2021-06-21 08:26:20.650270 I | auth: deleting token EHUbpoMCWomOKQzN.827 for user conductor
2021-06-21 08:26:20.650285 I | auth: deleting token VjhyMAgNloiOrjDE.830 for user conductor
2021-06-21 08:26:20.650295 I | auth: deleting token FaXDiaCSHzKwujvN.826 for user conductor
2021-06-21 08:26:20.650300 I | auth: deleting token zjQnKvSXArsxkGAr.828 for user conductor
2021-06-21 08:26:20.701255 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:22.101020 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.351160261s) to execute
2021-06-21 08:26:25.650201 I | auth: deleting token qsDUlHZbbxzdYGSk.834 for user conductor
2021-06-21 08:26:25.650276 I | auth: deleting token nbDYATbnaSdKVpOl.832 for user conductor
2021-06-21 08:26:25.650306 I | auth: deleting token xNkJwpbBbExcLBex.833 for user conductor
2021-06-21 08:26:25.650318 I | auth: deleting token FBAcLrtrfztPhXhW.831 for user conductor
2021-06-21 08:26:25.701456 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:25.807820 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.159798639s) to execute
2021-06-21 08:26:26.650203 I | auth: deleting token ZPrGdzDmZdElbzNp.836 for user conductor
2021-06-21 08:26:26.650283 I | auth: deleting token CeynnVJZHhKIKoSL.835 for user conductor
2021-06-21 08:26:26.650304 I | auth: deleting token WCpiZuTXNKelaxqd.837 for user conductor
2021-06-21 08:26:27.405221 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (958.073376ms) to execute
2021-06-21 08:26:27.646936 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (144.990096ms) to execute
2021-06-21 08:26:30.650224 I | auth: deleting token wzwzCEcykHhaGZgW.839 for user conductor
2021-06-21 08:26:30.650296 I | auth: deleting token XYVpCInGxLIkzdNM.838 for user conductor
2021-06-21 08:26:30.650321 I | auth: deleting token PsERHDWcacBKsVeR.842 for user conductor
2021-06-21 08:26:30.650331 I | auth: deleting token FSqftXVFmaPMEktq.840 for user conductor
2021-06-21 08:26:30.650339 I | auth: deleting token SMEXTRPFTmUfbypl.841 for user conductor
2021-06-21 08:26:30.701720 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:31.650181 I | auth: deleting token eUmQMjJsridqJjkJ.843 for user conductor
2021-06-21 08:26:33.650191 I | auth: deleting token NIFGdjPynvJSKlzW.845 for user conductor
2021-06-21 08:26:33.650267 I | auth: deleting token LnsJWuQeiZlMBhMh.846 for user conductor
2021-06-21 08:26:33.650278 I | auth: deleting token XOYojbKBdDEiqVgR.844 for user conductor
2021-06-21 08:26:34.405608 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (858.713207ms) to execute
2021-06-21 08:26:34.650189 I | auth: deleting token slamnQjDYqEQftbj.847 for user conductor
2021-06-21 08:26:35.664253 I | auth: deleting token ZTIzYOxuVxMfwBNP.848 for user conductor
2021-06-21 08:26:35.701995 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:35.802591 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.255654714s) to execute
2021-06-21 08:26:37.699460 I | auth: deleting token KbHyAzQltcnACfmA.849 for user conductor
2021-06-21 08:26:37.699507 I | auth: deleting token yxbILplJnnjVFSmC.850 for user conductor
2021-06-21 08:26:38.501476 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.652604968s) to execute
2021-06-21 08:26:38.501879 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.696834166s) to execute
2021-06-21 08:26:38.650174 I | auth: deleting token gubpZfZptUGizCtu.852 for user conductor
2021-06-21 08:26:38.650214 I | auth: deleting token VEkmqRnBeCdyVDjX.851 for user conductor
2021-06-21 08:26:39.699502 I | auth: deleting token dsBQKLFRPHTPuGrv.853 for user conductor
2021-06-21 08:26:39.901937 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.397887886s) to execute
2021-06-21 08:26:39.902076 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.302220091s) to execute
2021-06-21 08:26:39.902175 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.397992162s) to execute
2021-06-21 08:26:40.047286 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (141.003438ms) to execute
2021-06-21 08:26:40.702230 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:41.650266 I | auth: deleting token RiJEIIwPZFcUVvlW.855 for user conductor
2021-06-21 08:26:41.650363 I | auth: deleting token jpfUscbHQxglftwl.854 for user conductor
2021-06-21 08:26:42.650163 I | auth: deleting token GLOzfWxiWQDiVGNq.856 for user conductor
2021-06-21 08:26:42.650237 I | auth: deleting token iZNvumqfBgSGhYTZ.857 for user conductor
2021-06-21 08:26:42.703874 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.256716714s) to execute
2021-06-21 08:26:42.946952 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (144.937564ms) to execute
2021-06-21 08:26:45.399899 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.350817284s) to execute
2021-06-21 08:26:45.702470 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:46.799757 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.344982219s) to execute
2021-06-21 08:26:48.406766 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.55823748s) to execute
2021-06-21 08:26:48.650234 I | auth: deleting token noUBsKGxQkHigvXP.859 for user conductor
2021-06-21 08:26:49.650172 I | auth: deleting token iJBDKjqUmShVNmHz.861 for user conductor
2021-06-21 08:26:49.650215 I | auth: deleting token GNFCvJGxGauJuLjD.862 for user conductor
2021-06-21 08:26:49.650227 I | auth: deleting token rtAGmZKHbQNEnUgy.863 for user conductor
2021-06-21 08:26:49.650235 I | auth: deleting token kbhdkoHeNDJyaWJE.858 for user conductor
2021-06-21 08:26:49.650241 I | auth: deleting token QSYuUzzcweZijcCO.860 for user conductor
2021-06-21 08:26:49.800250 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.997901364s) to execute
2021-06-21 08:26:49.800456 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.200728243s) to execute
2021-06-21 08:26:49.800570 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.391226327s) to execute
2021-06-21 08:26:50.702691 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:52.507066 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.557461629s) to execute
2021-06-21 08:26:52.599579 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.198763491s) to execute
2021-06-21 08:26:52.747494 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (145.710285ms) to execute
2021-06-21 08:26:53.650231 I | auth: deleting token CyeXkVrvXykcMgxw.865 for user conductor
2021-06-21 08:26:53.650290 I | auth: deleting token sokAgcToyxDlKlaG.867 for user conductor
2021-06-21 08:26:53.650305 I | auth: deleting token KPgepymjkEoFtFps.864 for user conductor
2021-06-21 08:26:53.650312 I | auth: deleting token TMlqhZHNkSOJuRsF.868 for user conductor
2021-06-21 08:26:53.650324 I | auth: deleting token CopTapTecEYnWIfg.866 for user conductor
2021-06-21 08:26:54.203037 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (503.352684ms) to execute
2021-06-21 08:26:54.650208 I | auth: deleting token rFXFFPGfPsvYhGzc.869 for user conductor
2021-06-21 08:26:55.503378 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.156103433s) to execute
2021-06-21 08:26:55.648940 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.355366ms) to execute
2021-06-21 08:26:55.702924 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:26:56.650192 I | auth: deleting token aFrYsHPsEQLTtlkm.871 for user conductor
2021-06-21 08:26:57.699526 I | auth: deleting token nVdrXRkbvSuXGseM.873 for user conductor
2021-06-21 08:26:57.699564 I | auth: deleting token QyLMFAFBFJmhyOrA.872 for user conductor
2021-06-21 08:26:57.699576 I | auth: deleting token ofLCLNUbhAdbKSIK.870 for user conductor
2021-06-21 08:26:58.507132 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.107337823s) to execute
2021-06-21 08:27:00.703333 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:01.650224 I | auth: deleting token IdCHhQzOAhFZnpKR.878 for user conductor
2021-06-21 08:27:01.650273 I | auth: deleting token kXaDwiADNlrKRVch.875 for user conductor
2021-06-21 08:27:01.650281 I | auth: deleting token VXJmRcntuhjSJKyO.876 for user conductor
2021-06-21 08:27:01.650291 I | auth: deleting token ppPHGXOwpQvZxqYX.877 for user conductor
2021-06-21 08:27:01.650313 I | auth: deleting token AgBrxsecyzNbqegA.874 for user conductor
2021-06-21 08:27:02.501900 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.254608619s) to execute
2021-06-21 08:27:02.650229 I | auth: deleting token BxRWzeBzNHVTiTSh.879 for user conductor
2021-06-21 08:27:03.908017 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.358971812s) to execute
2021-06-21 08:27:04.650171 I | auth: deleting token vVnmTUTZXDKwmhrF.880 for user conductor
2021-06-21 08:27:05.400850 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.30107394s) to execute
2021-06-21 08:27:05.400976 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.49080296s) to execute
2021-06-21 08:27:05.650168 I | auth: deleting token wqpKZysTvACKUIuK.882 for user conductor
2021-06-21 08:27:05.650251 I | auth: deleting token JkilcEXWMABMZjyh.881 for user conductor
2021-06-21 08:27:05.703532 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:06.699533 I | auth: deleting token pksNxVRRpQIrSOmJ.883 for user conductor
2021-06-21 08:27:06.801755 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.398725454s) to execute
2021-06-21 08:27:06.802007 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.254727583s) to execute
2021-06-21 08:27:07.699604 I | auth: deleting token KXaNFMzMKUfBdUYp.884 for user conductor
2021-06-21 08:27:08.200564 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.300410532s) to execute
2021-06-21 08:27:08.200806 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.395547366s) to execute
2021-06-21 08:27:10.799508 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:11.102910 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.803235744s) to execute
2021-06-21 08:27:11.103210 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.899732017s) to execute
2021-06-21 08:27:12.500704 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.395039794s) to execute
2021-06-21 08:27:12.500917 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.378169805s) to execute
2021-06-21 08:27:13.699463 I | auth: deleting token yGiYhJnBpYoEVPIy.887 for user conductor
2021-06-21 08:27:13.699502 I | auth: deleting token htFBfcYJjvqDkZzp.888 for user conductor
2021-06-21 08:27:13.699520 I | auth: deleting token UGgxivCOrGSNODAV.889 for user conductor
2021-06-21 08:27:13.699531 I | auth: deleting token EOHFmXlXjlJlQhoi.885 for user conductor
2021-06-21 08:27:13.699541 I | auth: deleting token pnluEiTFMveqrVqr.886 for user conductor
2021-06-21 08:27:13.901576 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.77859008s) to execute
2021-06-21 08:27:13.901652 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.354614612s) to execute
2021-06-21 08:27:14.047796 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.639245ms) to execute
2021-06-21 08:27:15.799776 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:17.650178 I | auth: deleting token BqWLSqihHOXwTwwI.890 for user conductor
2021-06-21 08:27:17.650236 I | auth: deleting token cgtAwPuCDcNINUGt.892 for user conductor
2021-06-21 08:27:17.650251 I | auth: deleting token bimtRYaQSCOCGNnm.891 for user conductor
2021-06-21 08:27:17.650266 I | auth: deleting token EsORUklOFQhurSfd.894 for user conductor
2021-06-21 08:27:17.650273 I | auth: deleting token YxwcahjlKsEYeZQO.893 for user conductor
2021-06-21 08:27:20.651043 I | auth: deleting token aGnqLvnTtZRKSbfO.897 for user conductor
2021-06-21 08:27:20.651106 I | auth: deleting token TLMtsVAaJaGnjevB.896 for user conductor
2021-06-21 08:27:20.651122 I | auth: deleting token FmeulCSjYGaMamjq.895 for user conductor
2021-06-21 08:27:20.800062 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:21.650202 I | auth: deleting token BWaQfypfhNafVslm.898 for user conductor
2021-06-21 08:27:22.699575 I | auth: deleting token WqyqCyQiDdGToQVI.899 for user conductor
2021-06-21 08:27:23.699525 I | auth: deleting token mBjXKHuxWuMTNKtC.900 for user conductor
2021-06-21 08:27:23.699570 I | auth: deleting token madhGYTHHjURLkpm.901 for user conductor
2021-06-21 08:27:24.650206 I | auth: deleting token lXnoBlmXSasmVWBs.903 for user conductor
2021-06-21 08:27:24.650250 I | auth: deleting token mYqNyofwzaXOhMOJ.902 for user conductor
2021-06-21 08:27:24.702759 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.255679003s) to execute
2021-06-21 08:27:25.800262 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:26.694771 I | auth: deleting token mLIgbyjFHHbXIAJq.904 for user conductor
2021-06-21 08:27:27.604474 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.804628944s) to execute
2021-06-21 08:27:27.847308 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (144.188024ms) to execute
2021-06-21 08:27:28.650222 I | auth: deleting token yCODShUIOGtmJYNE.906 for user conductor
2021-06-21 08:27:29.650148 I | auth: deleting token pLTITDUgYzdGeVpT.907 for user conductor
2021-06-21 08:27:29.650196 I | auth: deleting token xODBhZaxkLmnQbIk.905 for user conductor
2021-06-21 08:27:30.605224 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.256528219s) to execute
2021-06-21 08:27:30.650177 I | auth: deleting token LEZkRWaVnqSTkSNi.908 for user conductor
2021-06-21 08:27:30.747260 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (139.278298ms) to execute
2021-06-21 08:27:30.800587 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:31.699508 I | auth: deleting token VKkHmwfRiPobNIvg.909 for user conductor
2021-06-21 08:27:31.699564 I | auth: deleting token hXHDzdQKxaCjpQrJ.911 for user conductor
2021-06-21 08:27:31.699574 I | auth: deleting token PTUkMcgvKosRIypt.910 for user conductor
2021-06-21 08:27:32.201255 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (601.544529ms) to execute
2021-06-21 08:27:34.200236 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.000596167s) to execute
2021-06-21 08:27:34.650194 I | auth: deleting token eruFlhCibgboGMBz.915 for user conductor
2021-06-21 08:27:34.650244 I | auth: deleting token OxWqrlJmpuXwXdCH.913 for user conductor
2021-06-21 08:27:34.650261 I | auth: deleting token JzwRpLlavkXhtPGU.914 for user conductor
2021-06-21 08:27:34.650270 I | auth: deleting token ufZwrsxNvqUnGeNR.912 for user conductor
2021-06-21 08:27:35.599869 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.396891095s) to execute
2021-06-21 08:27:35.800976 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:39.606242 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.004339476s) to execute
2021-06-21 08:27:39.606508 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.003587498s) to execute
2021-06-21 08:27:39.650249 I | auth: deleting token LIZnWpwqRMXUShPN.920 for user conductor
2021-06-21 08:27:39.650311 I | auth: deleting token zWxNmcsULbHVSMnF.917 for user conductor
2021-06-21 08:27:39.847727 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (147.785232ms) to execute
2021-06-21 08:27:39.848137 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (143.7623ms) to execute
2021-06-21 08:27:40.650243 I | auth: deleting token hwJTfBRLwEYlIdhZ.918 for user conductor
2021-06-21 08:27:40.650283 I | auth: deleting token aNKCXAWbMksykvPD.919 for user conductor
2021-06-21 08:27:40.650292 I | auth: deleting token twhJQsahadySothv.916 for user conductor
2021-06-21 08:27:40.650314 I | auth: deleting token RmtGfPpxAlcaCspy.921 for user conductor
2021-06-21 08:27:40.801180 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:41.650171 I | auth: deleting token rioEVaVcErDCcFfc.923 for user conductor
2021-06-21 08:27:41.650236 I | auth: deleting token SCJVtfKUCEKTpEVt.922 for user conductor
2021-06-21 08:27:42.650219 I | auth: deleting token pCQGdqtpAYHLmuhA.924 for user conductor
2021-06-21 08:27:43.607048 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.159992695s) to execute
2021-06-21 08:27:43.747445 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (137.670946ms) to execute
2021-06-21 08:27:44.650157 I | auth: deleting token GIAKRSXGtJtqjfxq.925 for user conductor
2021-06-21 08:27:44.650311 I | auth: deleting token vZJVhXonHoEWuhdS.926 for user conductor
2021-06-21 08:27:45.801441 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:46.602062 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.402358435s) to execute
2021-06-21 08:27:46.650180 I | auth: deleting token LrdjSYzunFoydWax.927 for user conductor
2021-06-21 08:27:47.650283 I | auth: deleting token nocJnnlcxUZYlMgT.928 for user conductor
2021-06-21 08:27:47.650364 I | auth: deleting token DkhaztbQlFdaHpdi.929 for user conductor
2021-06-21 08:27:48.203084 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.597931375s) to execute
2021-06-21 08:27:48.699476 I | auth: deleting token QsREnmbUpCWTlZmX.931 for user conductor
2021-06-21 08:27:48.699590 I | auth: deleting token JMVryODOUWBlClub.930 for user conductor
2021-06-21 08:27:49.699827 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.094922965s) to execute
2021-06-21 08:27:50.699535 I | auth: deleting token GgkjGUjYsYPTAfvb.933 for user conductor
2021-06-21 08:27:50.699694 I | auth: deleting token QWWudumhUdCdsnQC.932 for user conductor
2021-06-21 08:27:50.699752 I | auth: deleting token kykJcnKoDpbjqqQy.934 for user conductor
2021-06-21 08:27:50.803344 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:51.002632 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.701813466s) to execute
2021-06-21 08:27:51.003049 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.797408467s) to execute
2021-06-21 08:27:54.650184 I | auth: deleting token mMMWQDBeUYNFmfBn.938 for user conductor
2021-06-21 08:27:54.650268 I | auth: deleting token wzhoupXQuOVWgAhT.936 for user conductor
2021-06-21 08:27:55.305070 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.858256812s) to execute
2021-06-21 08:27:55.699491 I | auth: deleting token XiDzdCrKzkoDAJVX.940 for user conductor
2021-06-21 08:27:55.699551 I | auth: deleting token NERrsgKjJQpflUQK.935 for user conductor
2021-06-21 08:27:55.699567 I | auth: deleting token jeDRzSCOxXgDBBHq.937 for user conductor
2021-06-21 08:27:55.699586 I | auth: deleting token tLYSOmyyNxncamyp.939 for user conductor
2021-06-21 08:27:55.803622 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:27:56.800800 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.399141695s) to execute
2021-06-21 08:27:56.801010 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.401258097s) to execute
2021-06-21 08:27:56.801145 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.401303207s) to execute
2021-06-21 08:27:57.650195 I | auth: deleting token MednMxxtlWyTvLIQ.942 for user conductor
2021-06-21 08:27:57.650249 I | auth: deleting token StFhhhSsMZrQPjqk.941 for user conductor
2021-06-21 08:27:58.203767 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.399684521s) to execute
2021-06-21 08:27:58.203988 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.398819516s) to execute
2021-06-21 08:27:59.700517 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.300812299s) to execute
2021-06-21 08:28:00.650167 I | auth: deleting token xGWopaJJmORHIrds.946 for user conductor
2021-06-21 08:28:00.650205 I | auth: deleting token GrTZUzqySbNISXbm.945 for user conductor
2021-06-21 08:28:00.650226 I | auth: deleting token LHCWxTQtvdMjdLab.944 for user conductor
2021-06-21 08:28:00.650248 I | auth: deleting token iPfqAMOiVkqyWIKM.943 for user conductor
2021-06-21 08:28:00.803857 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:01.005861 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.257378942s) to execute
2021-06-21 08:28:01.005994 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.30131483s) to execute
2021-06-21 08:28:02.502616 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.302027244s) to execute
2021-06-21 08:28:02.502999 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.403313257s) to execute
2021-06-21 08:28:03.650197 I | auth: deleting token fAxpAaLRbBJnURTM.950 for user conductor
2021-06-21 08:28:03.650244 I | auth: deleting token yOOXiOzyuJqQNprp.948 for user conductor
2021-06-21 08:28:03.650262 I | auth: deleting token aoSUdlmwVOZCrCSx.949 for user conductor
2021-06-21 08:28:03.650272 I | auth: deleting token XHEZXhPYKyxOSoOA.947 for user conductor
2021-06-21 08:28:04.650195 I | auth: deleting token oNeStIdamTlvQHYM.951 for user conductor
2021-06-21 08:28:05.402935 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.8977005s) to execute
2021-06-21 08:28:05.899493 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:06.699541 I | auth: deleting token vuFQOfNBGVddaBeE.952 for user conductor
2021-06-21 08:28:06.900029 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.30031023s) to execute
2021-06-21 08:28:06.900215 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.890083385s) to execute
2021-06-21 08:28:07.650244 I | auth: deleting token utGPnrOSRyIaHZNv.953 for user conductor
2021-06-21 08:28:08.302885 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.399786816s) to execute
2021-06-21 08:28:08.303035 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.400388987s) to execute
2021-06-21 08:28:08.447379 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.544687202s) to execute
2021-06-21 08:28:08.448723 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (143.28501ms) to execute
2021-06-21 08:28:09.650277 I | auth: deleting token ZDoEZTxBkOIXCKuc.955 for user conductor
2021-06-21 08:28:09.650332 I | auth: deleting token iSnRgnKVpaVqYNoF.956 for user conductor
2021-06-21 08:28:09.650344 I | auth: deleting token ugzRjuPlFOjIpvKk.954 for user conductor
2021-06-21 08:28:09.804052 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.353048147s) to execute
2021-06-21 08:28:09.804169 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (857.181169ms) to execute
2021-06-21 08:28:10.899741 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:11.104184 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.255635379s) to execute
2021-06-21 08:28:11.247130 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (140.18448ms) to execute
2021-06-21 08:28:11.699471 I | auth: deleting token uXHwSLLdTiSyIXSg.958 for user conductor
2021-06-21 08:28:11.699532 I | auth: deleting token LRoykAtBdzmoygaR.957 for user conductor
2021-06-21 08:28:13.650204 I | auth: deleting token ddsIAJFMtCsgsmif.959 for user conductor
2021-06-21 08:28:13.650284 I | auth: deleting token JSMWUXjHWJrGOKti.960 for user conductor
2021-06-21 08:28:14.100327 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.733809715s) to execute
2021-06-21 08:28:14.650288 I | auth: deleting token oOfuckrnEBNKNKBt.961 for user conductor
2021-06-21 08:28:15.650171 I | auth: deleting token tYKsslKQBpavShCy.963 for user conductor
2021-06-21 08:28:15.650229 I | auth: deleting token aZpoXllISPMjDptk.962 for user conductor
2021-06-21 08:28:15.900023 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:16.650193 I | auth: deleting token hmCTXeBHNCWWipDi.964 for user conductor
2021-06-21 08:28:16.905911 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.257129253s) to execute
2021-06-21 08:28:18.300485 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.299689438s) to execute
2021-06-21 08:28:18.300642 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.392014342s) to execute
2021-06-21 08:28:18.650263 I | auth: deleting token JKHVkDeLMZreYwGU.966 for user conductor
2021-06-21 08:28:18.650376 I | auth: deleting token OnPCQktMktHsAwcL.965 for user conductor
2021-06-21 08:28:19.650386 I | auth: deleting token jlRWvAySKUFRXMOZ.968 for user conductor
2021-06-21 08:28:19.650450 I | auth: deleting token nblKKVVcMFeiAlzT.967 for user conductor
2021-06-21 08:28:19.701415 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.398701716s) to execute
2021-06-21 08:28:19.701582 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.301900475s) to execute
2021-06-21 08:28:20.900222 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:21.399847 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.500045534s) to execute
2021-06-21 08:28:22.650162 I | auth: deleting token zrvsaAQLUjIAMtiV.971 for user conductor
2021-06-21 08:28:22.650227 I | auth: deleting token AahfrgkEZDsELZWg.969 for user conductor
2021-06-21 08:28:22.650251 I | auth: deleting token OZwfBbAmrnyhJNYX.970 for user conductor
2021-06-21 08:28:23.650228 I | auth: deleting token anSraveuVDQEHBrt.972 for user conductor
2021-06-21 08:28:24.104085 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.504357069s) to execute
2021-06-21 08:28:24.248235 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (141.423936ms) to execute
2021-06-21 08:28:24.347340 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (144.569953ms) to execute
2021-06-21 08:28:24.699515 I | auth: deleting token MqbXZwTiGclVJZrK.974 for user conductor
2021-06-21 08:28:25.650132 I | auth: deleting token RbQDNcQmAKDicXyQ.973 for user conductor
2021-06-21 08:28:25.846959 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (138.862832ms) to execute
2021-06-21 08:28:25.900927 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:26.650148 I | auth: deleting token LxfNqJSGrIPUVBiY.977 for user conductor
2021-06-21 08:28:26.650190 I | auth: deleting token ltezAdbrhMxakZXi.975 for user conductor
2021-06-21 08:28:26.650199 I | auth: deleting token jCjLClYfnjybqJQP.976 for user conductor
2021-06-21 08:28:27.099741 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (900.027283ms) to execute
2021-06-21 08:28:28.501104 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (753.993168ms) to execute
2021-06-21 08:28:28.650169 I | auth: deleting token yDWnMoVmqIGdFKmv.979 for user conductor
2021-06-21 08:28:30.650229 I | auth: deleting token kuyiUAmymosHifVn.978 for user conductor
2021-06-21 08:28:30.901161 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:31.650246 I | auth: deleting token yqCGUKhZZKgaUxIn.980 for user conductor
2021-06-21 08:28:32.104166 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (956.904596ms) to execute
2021-06-21 08:28:32.650281 I | auth: deleting token SbiLmqYQSXLPWUhF.982 for user conductor
2021-06-21 08:28:32.650347 I | auth: deleting token qHaCayYxqEsKvEOt.981 for user conductor
2021-06-21 08:28:33.504122 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.355917597s) to execute
2021-06-21 08:28:33.699469 I | auth: deleting token vAdPJfqtQmxyPpdw.983 for user conductor
2021-06-21 08:28:35.001056 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.494179699s) to execute
2021-06-21 08:28:35.001122 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.401357217s) to execute
2021-06-21 08:28:35.147517 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (144.02444ms) to execute
2021-06-21 08:28:35.901401 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:36.407418 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.305661865s) to execute
2021-06-21 08:28:36.650224 I | auth: deleting token WMyWoUUOlmoTyLRl.984 for user conductor
2021-06-21 08:28:36.650262 I | auth: deleting token sBxsKurNhkaMVQQV.986 for user conductor
2021-06-21 08:28:37.905612 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (758.753206ms) to execute
2021-06-21 08:28:38.699504 I | auth: deleting token PZXlNMOwYWrHUuzL.987 for user conductor
2021-06-21 08:28:38.699565 I | auth: deleting token PJtYtWwTaIknTvvL.989 for user conductor
2021-06-21 08:28:38.699572 I | auth: deleting token tVElHWaNhNAGDAIl.985 for user conductor
2021-06-21 08:28:38.699581 I | auth: deleting token INReEhoKmJeCgIIH.988 for user conductor
2021-06-21 08:28:38.699588 I | auth: deleting token IdWRAdWPFVUKdWVJ.990 for user conductor
2021-06-21 08:28:39.506205 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (659.231614ms) to execute
2021-06-21 08:28:39.650203 I | auth: deleting token BaVWGLecUiuKcvqw.991 for user conductor
2021-06-21 08:28:40.901607 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:42.650152 I | auth: deleting token GclAXcWTWDgGDTGa.995 for user conductor
2021-06-21 08:28:42.650187 I | auth: deleting token mKZcPudyGIoaJYLX.992 for user conductor
2021-06-21 08:28:42.650199 I | auth: deleting token EqfvRANDPrzLALxi.994 for user conductor
2021-06-21 08:28:42.650206 I | auth: deleting token ajTbaxRHRYnOLYUF.993 for user conductor
2021-06-21 08:28:42.650218 I | auth: deleting token rYeafTDFKhGtcKbF.996 for user conductor
2021-06-21 08:28:42.904603 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (304.955286ms) to execute
2021-06-21 08:28:43.146977 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.843459ms) to execute
2021-06-21 08:28:43.650326 I | auth: deleting token hqHvpZUNwAmsCPSs.998 for user conductor
2021-06-21 08:28:43.650405 I | auth: deleting token DeukdrqMKjXwFixA.997 for user conductor
2021-06-21 08:28:45.650332 I | auth: deleting token wqJZCGvAjyoivnvU.999 for user conductor
2021-06-21 08:28:45.901790 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:46.347267 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (196.10188ms) to execute
2021-06-21 08:28:46.650216 I | auth: deleting token esOuXyRULtqSsqYh.1000 for user conductor
2021-06-21 08:28:49.650318 I | auth: deleting token eqcYlDlKUjzLlXIt.1002 for user conductor
2021-06-21 08:28:49.650387 I | auth: deleting token zKyTluYTxbjQRbqb.1001 for user conductor
2021-06-21 08:28:50.650216 I | auth: deleting token rVdwrjCISWzLtxDc.1004 for user conductor
2021-06-21 08:28:50.650314 I | auth: deleting token QioFOGQKEhLCcKjS.1003 for user conductor
2021-06-21 08:28:50.901998 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:53.650187 I | auth: deleting token uFqsXXmfORrgiFBZ.1006 for user conductor
2021-06-21 08:28:53.650246 I | auth: deleting token lZPrCHKknOfiWMGg.1007 for user conductor
2021-06-21 08:28:53.650262 I | auth: deleting token dVKwCUDtKLCfpHZM.1005 for user conductor
2021-06-21 08:28:55.303430 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.00375891s) to execute
2021-06-21 08:28:55.650210 I | auth: deleting token NLPTrPCrowNTNegA.1008 for user conductor
2021-06-21 08:28:55.902245 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:28:56.650155 I | auth: deleting token EfPnSEBIwDBisNvG.1009 for user conductor
2021-06-21 08:28:59.650197 I | auth: deleting token cEZmYmiQytQRYHlJ.1013 for user conductor
2021-06-21 08:28:59.650249 I | auth: deleting token tmHczgBBgWezTFwM.1010 for user conductor
2021-06-21 08:28:59.650256 I | auth: deleting token lGKKfZoeYWKeUMZU.1011 for user conductor
2021-06-21 08:28:59.650268 I | auth: deleting token AhTBlSuwGJFxzHGz.1014 for user conductor
2021-06-21 08:28:59.650277 I | auth: deleting token WBtiGaYWxMjCpJtd.1012 for user conductor
2021-06-21 08:29:00.902446 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-06-21 08:29:01.650171 I | auth: deleting token DcrVCyApfRQpxXmo.1015 for user conductor
2021-06-21 08:29:02.650229 I | auth: deleting token rOvLIFClMzMJiOSR.1016 for user conductor
2021-06-21 08:29:04.650193 I | auth: deleting token hMPxxQQYyWimpNlM.1017 for user conductor
2021-06-21 08:29:05.902642 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:29:06.699715 I | auth: deleting token DTbwqYbnRlJglghS.1018 for user conductor
2021-06-21 08:29:07.607493 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.606520861s) to execute
2021-06-21 08:29:07.650171 I | auth: deleting token JTIojumPAfmeycRa.1019 for user conductor
2021-06-21 08:29:08.650170 I | auth: deleting token EtYCSgJKCGVCGNGq.1020 for user conductor
2021-06-21 08:29:08.905063 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.294950435s) to execute
2021-06-21 08:29:08.905368 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.105709667s) to execute
2021-06-21 08:29:08.905493 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.295394951s) to execute
2021-06-21 08:29:10.403638 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.399919828s) to execute
2021-06-21 08:29:10.902934 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.71.10:2380: getsockopt: connection refused
2021-06-21 08:29:11.805342 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.105645855s) to execute
2021-06-21 08:29:12.650204 I | auth: deleting token dFGmrJQOHMqNkdEA.1025 for user conductor
2021-06-21 08:29:12.650259 I | auth: deleting token PKeiWFmJhaHQnxsC.1023 for user conductor
2021-06-21 08:29:12.650273 I | auth: deleting token btGnfbWsZOjtCTkC.1022 for user conductor
2021-06-21 08:29:12.650287 I | auth: deleting token oeMgKEWneofSryAp.1021 for user conductor
2021-06-21 08:29:12.650295 I | auth: deleting token iZbKJtkhGkzDXdSz.1024 for user conductor