By type
Skipping self-checking
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd'
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
2021-07-10 04:51:21.690250 I | etcdmain: etcd Version: 3.2.24
2021-07-10 04:51:21.690437 I | etcdmain: Git SHA: 420a45226
2021-07-10 04:51:21.690448 I | etcdmain: Go Version: go1.8.7
2021-07-10 04:51:21.690457 I | etcdmain: Go OS/Arch: linux/amd64
2021-07-10 04:51:21.690468 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-07-10 04:51:21.690716 I | embed: listening for peers on http://0.0.0.0:2380
2021-07-10 04:51:21.690835 I | embed: listening for client requests on 0.0.0.0:2379
2021-07-10 04:51:21.704096 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd:2380 to 10.233.77.251:2380
2021-07-10 04:51:21.705088 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd:2380 to 10.233.77.251:2380
2021-07-10 04:51:21.889211 I | etcdserver: name = onap-oof-has-etcd-0
2021-07-10 04:51:21.889258 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-07-10 04:51:21.889272 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-07-10 04:51:21.889282 I | etcdserver: heartbeat = 100ms
2021-07-10 04:51:21.889290 I | etcdserver: election = 1000ms
2021-07-10 04:51:21.889299 I | etcdserver: snapshot count = 100000
2021-07-10 04:51:21.889319 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-0.oof-has-etcd:2379
2021-07-10 04:51:21.889382 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-0.oof-has-etcd:2380
2021-07-10 04:51:21.889489 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-07-10 04:51:21.900193 I | etcdserver: starting member 8aae4c350a2413a5 in cluster e8b03869cbf54258
2021-07-10 04:51:21.988580 I | raft: 8aae4c350a2413a5 became follower at term 0
2021-07-10 04:51:21.988649 I | raft: newRaft 8aae4c350a2413a5 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-07-10 04:51:21.988663 I | raft: 8aae4c350a2413a5 became follower at term 1
2021-07-10 04:51:21.996910 W | auth: simple token is not cryptographically signed
2021-07-10 04:51:22.091319 I | rafthttp: starting peer 2d249ba41c7e44fa...
2021-07-10 04:51:22.091454 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa
2021-07-10 04:51:22.092845 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-07-10 04:51:22.190101 I | rafthttp: started peer 2d249ba41c7e44fa
2021-07-10 04:51:22.190194 I | rafthttp: added peer 2d249ba41c7e44fa
2021-07-10 04:51:22.190226 I | rafthttp: starting peer 72b38cc930a2fa6f...
2021-07-10 04:51:22.190254 I | rafthttp: started HTTP pipelining with peer 72b38cc930a2fa6f
2021-07-10 04:51:22.190308 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-07-10 04:51:22.190564 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader)
2021-07-10 04:51:22.190634 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-07-10 04:51:22.289991 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-07-10 04:51:22.290341 I | rafthttp: started peer 72b38cc930a2fa6f
2021-07-10 04:51:22.290389 I | rafthttp: added peer 72b38cc930a2fa6f
2021-07-10 04:51:22.290431 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-07-10 04:51:22.290651 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-07-10 04:51:22.290763 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-07-10 04:51:22.290903 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream Message reader)
2021-07-10 04:51:22.488817 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-07-10 04:51:22.588798 I | rafthttp: peer 2d249ba41c7e44fa became active
2021-07-10 04:51:22.588878 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message writer)
2021-07-10 04:51:22.688586 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-07-10 04:51:22.688872 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-07-10 04:51:22.789415 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message reader)
2021-07-10 04:51:22.789497 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 writer)
2021-07-10 04:51:22.791374 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-07-10 04:51:23.034510 I | raft: 8aae4c350a2413a5 [term: 1] received a MsgVote message with higher term from 2d249ba41c7e44fa [term: 905]
2021-07-10 04:51:23.034586 I | raft: 8aae4c350a2413a5 became follower at term 905
2021-07-10 04:51:23.034622 I | raft: 8aae4c350a2413a5 [logterm: 1, index: 3, vote: 0] cast MsgVote for 2d249ba41c7e44fa [logterm: 1, index: 3] at term 905
2021-07-10 04:51:23.037204 I | raft: raft.node: 8aae4c350a2413a5 elected leader 2d249ba41c7e44fa at term 905
2021-07-10 04:51:23.042074 I | etcdserver: published {Name:onap-oof-has-etcd-0 ClientURLs:[http://onap-oof-has-etcd-0.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-07-10 04:51:23.042116 I | embed: ready to serve client requests
2021-07-10 04:51:23.089057 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-07-10 04:51:23.211176 N | etcdserver/membership: set the initial cluster version to 3.0
2021-07-10 04:51:23.211323 I | etcdserver/api: enabled capabilities for version 3.0
2021-07-10 04:51:26.991089 N | auth: added a new user: root
2021-07-10 04:51:26.991341 W | etcdserver: request "header: auth_user_add:" with result "size:29" took too long (3.402250176s) to execute
2021-07-10 04:51:27.290825 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:51:29.593073 N | auth: added a new user: conductor
2021-07-10 04:51:29.593191 W | etcdserver: request "header: auth_user_add:" with result "size:29" took too long (2.60174467s) to execute
2021-07-10 04:51:29.736728 N | auth: Role conductor is created
2021-07-10 04:51:29.939375 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-07-10 04:51:30.142115 N | auth: granted role conductor to user conductor
2021-07-10 04:51:30.442575 N | auth: Role root is created
2021-07-10 04:51:30.510732 N | auth: granted role root to user root
2021-07-10 04:51:30.513801 N | auth: Authentication enabled
2021-07-10 04:51:32.291003 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:51:37.291207 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:51:42.291450 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:51:47.291864 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:51:52.292122 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:51:57.292406 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:02.292653 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:07.292892 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:12.293169 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:17.295527 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:22.295911 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:27.296323 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:32.296630 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:34.789223 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.998794881s) to execute
2021-07-10 04:52:37.296967 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:37.593954 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.179091767s) to execute
2021-07-10 04:52:42.297197 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:47.388604 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:47.988960 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.199742487s) to execute
2021-07-10 04:52:50.692639 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.581458478s) to execute
2021-07-10 04:52:50.912117 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (205.988731ms) to execute
2021-07-10 04:52:52.389014 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:52:53.892502 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.781826674s) to execute
2021-07-10 04:52:57.389290 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-07-10 04:52:57.789264 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.681881672s) to execute
2021-07-10 04:52:58.010584 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (121.429902ms) to execute
2021-07-10 04:53:00.393423 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.177892815s) to execute
2021-07-10 04:53:02.389526 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:06.192474 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.681402272s) to execute
2021-07-10 04:53:07.389808 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:08.693329 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.402266285s) to execute
2021-07-10 04:53:08.693841 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.405034366s) to execute
2021-07-10 04:53:11.792680 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.900670154s) to execute
2021-07-10 04:53:12.390101 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:14.798075 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.906878276s) to execute
2021-07-10 04:53:17.390287 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:20.395307 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.406536587s) to execute
2021-07-10 04:53:22.390591 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:27.390919 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:31.496429 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (9.30658112s) to execute
2021-07-10 04:53:32.391266 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:34.091905 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.482957222s) to execute
2021-07-10 04:53:34.092343 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.503558865s) to execute
2021-07-10 04:53:37.093031 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.899685734s) to execute
2021-07-10 04:53:37.391594 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:42.488822 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:44.595740 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.406936981s) to execute
2021-07-10 04:53:47.489211 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:47.791063 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.280091797s) to execute
2021-07-10 04:53:50.991989 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.602998098s) to execute
2021-07-10 04:53:52.489516 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:54.092884 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.903914383s) to execute
2021-07-10 04:53:57.489775 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:53:58.088629 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.999774629s) to execute
2021-07-10 04:54:00.590798 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.302125628s) to execute
2021-07-10 04:54:02.490557 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:54:03.390098 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.797328582s) to execute
2021-07-10 04:54:03.390249 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.500282625s) to execute
2021-07-10 04:54:06.288560 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.894928562s) to execute
2021-07-10 04:54:06.288713 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.89551082s) to execute
2021-07-10 04:54:07.490852 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:54:08.691604 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.102821878s) to execute
2021-07-10 04:54:11.691234 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.480496459s) to execute
2021-07-10 04:54:12.491070 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:54:14.792552 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.00361219s) to execute
2021-07-10 04:54:17.491295 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:54:17.791314 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.900043635s) to execute
2021-07-10 04:54:20.592254 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.798436764s) to execute
2021-07-10 04:54:20.592418 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.603690221s) to execute
2021-07-10 04:54:22.491579 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:54:25.889013 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.293665808s) to execute
2021-07-10 04:54:25.889355 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.294632191s) to execute
2021-07-10 04:54:26.010743 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:364" took too long (118.249546ms) to execute
2021-07-10 04:54:26.288907 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (199.90725ms) to execute
2021-07-10 04:54:27.491834 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:54:29.091087 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.602290997s) to execute
2021-07-10 04:54:31.991974 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.276275774s) to execute
2021-07-10 04:54:32.492120 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:54:35.489369 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.173627058s) to execute
2021-07-10 04:54:37.492354 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:54:39.194649 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.305843735s) to execute
2021-07-10 04:54:42.492715 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-10 04:54:47.493006 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:54:49.392389 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (10.003588379s) to execute
2021-07-10 04:54:51.798025 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.402893777s) to execute
2021-07-10 04:54:51.888732 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.493787253s) to execute
2021-07-10 04:54:52.011131 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.615706357s) to execute
2021-07-10 04:54:52.013108 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (121.985014ms) to execute
2021-07-10 04:54:52.493282 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:54:57.096799 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (4.906781932s) to execute
2021-07-10 04:54:57.493595 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:54:59.991613 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.802871837s) to execute
2021-07-10 04:55:02.493388 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.393567981s) to execute
2021-07-10 04:55:02.493466 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.479931379s) to execute
2021-07-10 04:55:02.514362 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:05.292957 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.799250108s) to execute
2021-07-10 04:55:05.293099 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.299020184s) to execute
2021-07-10 04:55:05.293467 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.704608082s) to execute
2021-07-10 04:55:07.588670 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:07.992326 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.100981208s) to execute
2021-07-10 04:55:11.897990 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.707922754s) to execute
2021-07-10 04:55:12.589051 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:14.996580 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.982437558s) to execute
2021-07-10 04:55:17.589343 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:20.689967 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.501141965s) to execute
2021-07-10 04:55:22.589655 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:23.495082 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.706206324s) to execute
2021-07-10 04:55:23.495467 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.802996279s) to execute
2021-07-10 04:55:23.590742 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.801677698s) to execute
2021-07-10 04:55:27.589935 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:32.590313 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:37.590563 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:37.995591 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (10.50070953s) to execute
2021-07-10 04:55:40.796338 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.606532353s) to execute
2021-07-10 04:55:40.796666 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.708014837s) to execute
2021-07-10 04:55:42.688649 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:43.791162 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.702357451s) to execute
2021-07-10 04:55:43.791359 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.902565735s) to execute
2021-07-10 04:55:43.791572 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.798732418s) to execute
2021-07-10 04:55:46.791192 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.981721755s) to execute
2021-07-10 04:55:47.689051 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:49.588883 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.79402685s) to execute
2021-07-10 04:55:52.097223 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.508052178s) to execute
2021-07-10 04:55:52.097529 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.30242045s) to execute
2021-07-10 04:55:52.097837 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.505326376s) to execute
2021-07-10 04:55:52.689366 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:54.793516 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.60466198s) to execute
2021-07-10 04:55:57.592569 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.399336998s) to execute
2021-07-10 04:55:57.593142 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.179017702s) to execute
2021-07-10 04:55:57.689491 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:55:59.992182 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.281584989s) to execute
2021-07-10 04:55:59.992670 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.301293563s) to execute
2021-07-10 04:56:00.110775 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (115.799955ms) to execute
2021-07-10 04:56:02.689797 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:06.189255 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.698196572s) to execute
2021-07-10 04:56:07.690077 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:08.797022 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.604867145s) to execute
2021-07-10 04:56:08.797500 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.605466717s) to execute
2021-07-10 04:56:11.989094 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (3.100156943s) to execute
2021-07-10 04:56:11.989332 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.900584295s) to execute
2021-07-10 04:56:11.989719 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.000676241s) to execute
2021-07-10 04:56:12.690450 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:14.597694 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.509048791s) to execute
2021-07-10 04:56:17.690849 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:20.093275 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.40216328s) to execute
2021-07-10 04:56:20.134111 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.443290148s) to execute
2021-07-10 04:56:22.691211 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:25.292153 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.000457617s) to execute
2021-07-10 04:56:27.691811 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:30.895996 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.00616107s) to execute
2021-07-10 04:56:32.692114 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:36.092684 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.103714907s) to execute
2021-07-10 04:56:36.093231 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.194663157s) to execute
2021-07-10 04:56:36.093457 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.194627715s) to execute
2021-07-10 04:56:36.288987 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (192.567202ms) to execute
2021-07-10 04:56:37.692409 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:41.794317 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.204024455s) to execute
2021-07-10 04:56:41.988935 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (192.217559ms) to execute
2021-07-10 04:56:42.012021 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (118.531689ms) to execute
2021-07-10 04:56:42.692658 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:44.393788 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.379204619s) to execute
2021-07-10 04:56:47.195668 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.706948738s) to execute
2021-07-10 04:56:47.411420 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (116.590998ms) to execute
2021-07-10 04:56:47.692941 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:52.592931 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.801517479s) to execute
2021-07-10 04:56:52.788753 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:56:57.789056 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:00.096623 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.406219446s) to execute
2021-07-10 04:57:00.096725 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (7.501333571s) to execute
2021-07-10 04:57:02.789354 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:03.289365 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.675966052s) to execute
2021-07-10 04:57:06.190666 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.679890301s) to execute
2021-07-10 04:57:07.789651 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:08.794331 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601200324s) to execute
2021-07-10 04:57:12.789919 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:17.492935 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.600612746s) to execute
2021-07-10 04:57:17.493459 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (8.696068695s) to execute
2021-07-10 04:57:17.790420 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:22.790721 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:23.694899 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.604909171s) to execute
2021-07-10 04:57:27.791051 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:31.890597 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.001186865s) to execute
2021-07-10 04:57:31.890856 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (7.902220265s) to execute
2021-07-10 04:57:32.791395 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:34.292939 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.400001124s) to execute
2021-07-10 04:57:34.293075 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.400172853s) to execute
2021-07-10 04:57:34.293289 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.303921646s) to execute
2021-07-10 04:57:35.588640 I | auth: deleting token xDwNVndhrordPaqV.18 for user conductor
2021-07-10 04:57:35.588726 I | auth: deleting token GGEiXNzQUNXOfiqn.17 for user conductor
2021-07-10 04:57:36.797448 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.408502338s) to execute
2021-07-10 04:57:36.911055 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (107.388819ms) to execute
2021-07-10 04:57:37.791688 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:38.588467 I | auth: deleting token ryQZIGzpOSuSOiNR.24 for user conductor
2021-07-10 04:57:38.588517 I | auth: deleting token VsTYlseWkTENKJnS.22 for user conductor
2021-07-10 04:57:38.588530 I | auth: deleting token CGevUfdGoMxEKSJT.21 for user conductor
2021-07-10 04:57:39.588519 I | auth: deleting token opeLYyAkJEQckLXv.27 for user conductor
2021-07-10 04:57:41.588584 I | auth: deleting token dphtPNiEeMSxRBZx.29 for user conductor
2021-07-10 04:57:41.896362 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.5788042s) to execute
2021-07-10 04:57:42.514339 I | auth: deleting token sBrFuyesLUKLYzXH.30 for user conductor
2021-07-10 04:57:42.791991 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:44.588700 I | auth: deleting token TLoeHaUMswZfnjRU.32 for user conductor
2021-07-10 04:57:47.089109 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.400279449s) to execute
2021-07-10 04:57:47.792370 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:48.588532 I | auth: deleting token rFkExVxYcNlrjIvI.34 for user conductor
2021-07-10 04:57:48.588634 I | auth: deleting token yAARdpjDrfeaGTin.37 for user conductor
2021-07-10 04:57:49.290829 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (874.602726ms) to execute
2021-07-10 04:57:51.514279 I | auth: deleting token FqbJGnizLCVyIUXV.40 for user conductor
2021-07-10 04:57:51.514353 I | auth: deleting token REMglviYBwqWWhuD.39 for user conductor
2021-07-10 04:57:51.514370 I | auth: deleting token ZxJhvVSwJsRpEdfi.43 for user conductor
2021-07-10 04:57:51.514384 I | auth: deleting token WcMbpUYbwCXPvvJl.38 for user conductor
2021-07-10 04:57:52.792672 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:54.514281 I | auth: deleting token duKUCGzeuwVxFkwZ.46 for user conductor
2021-07-10 04:57:54.514330 I | auth: deleting token iypMCUPtDCSarIiE.48 for user conductor
2021-07-10 04:57:54.514347 I | auth: deleting token xiBIlIbQRNjyBkTx.45 for user conductor
2021-07-10 04:57:55.588852 I | auth: deleting token UiJpYQaYtDTIfInI.49 for user conductor
2021-07-10 04:57:56.291578 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.002770221s) to execute
2021-07-10 04:57:57.792951 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:57:58.588660 I | auth: deleting token bUEXOVlEVuJvYpTI.53 for user conductor
2021-07-10 04:57:58.588724 I | auth: deleting token bBwixrdnGTfFVvZj.51 for user conductor
2021-07-10 04:58:00.588501 I | auth: deleting token fWqIXDePvIYwZgIT.54 for user conductor
2021-07-10 04:58:00.588547 I | auth: deleting token VUZnnNvwkxagCIjB.55 for user conductor
2021-07-10 04:58:01.898027 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.587629768s) to execute
2021-07-10 04:58:02.888649 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:04.291780 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.303240157s) to execute
2021-07-10 04:58:04.292124 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.361584767s) to execute
2021-07-10 04:58:04.410776 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.420086288s) to execute
2021-07-10 04:58:04.412786 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (118.692613ms) to execute
2021-07-10 04:58:06.514304 I | auth: deleting token CWVcUXpmmKNmwsNy.58 for user conductor
2021-07-10 04:58:06.514360 I | auth: deleting token ijzZXSlFAOPvXmMU.60 for user conductor
2021-07-10 04:58:06.514372 I | auth: deleting token NFpFwnMTpHzYYJZT.62 for user conductor
2021-07-10 04:58:07.888836 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:09.588654 I | auth: deleting token caYXnsKHMUmZJnwL.57 for user conductor
2021-07-10 04:58:09.588753 I | auth: deleting token iulJCjrGRBxoefYA.63 for user conductor
2021-07-10 04:58:09.588791 I | auth: deleting token PyPfTYsTmbkLXvCK.65 for user conductor
2021-07-10 04:58:09.996921 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.886129749s) to execute
2021-07-10 04:58:10.213060 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (124.324582ms) to execute
2021-07-10 04:58:12.792478 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.001397325s) to execute
2021-07-10 04:58:12.889182 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:15.514240 I | auth: deleting token oPbulsqGhZZyGOrM.67 for user conductor
2021-07-10 04:58:17.791612 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.080226397s) to execute
2021-07-10 04:58:17.889510 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:20.426896 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.437738301s) to execute
2021-07-10 04:58:20.488578 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.69451724s) to execute
2021-07-10 04:58:20.588670 I | auth: deleting token xjHIibyZuHfJkOpO.68 for user conductor
2021-07-10 04:58:20.588737 I | auth: deleting token lCSFjFQnSGUsaKHy.71 for user conductor
2021-07-10 04:58:20.588763 I | auth: deleting token cOGKagejvFZQuXcP.70 for user conductor
2021-07-10 04:58:22.889819 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:23.492937 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.063724601s) to execute
2021-07-10 04:58:23.493299 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.00457733s) to execute
2021-07-10 04:58:26.390443 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.799433723s) to execute
2021-07-10 04:58:26.390642 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.801774823s) to execute
2021-07-10 04:58:27.890079 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:29.093551 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.182935084s) to execute
2021-07-10 04:58:31.514073 I | auth: deleting token MRwSpNiaOrFRDJFS.77 for user conductor
2021-07-10 04:58:31.514107 I | auth: deleting token juwoUgjQNzPCWebm.74 for user conductor
2021-07-10 04:58:31.514117 I | auth: deleting token zNAqCIFsmrrEbBfS.73 for user conductor
2021-07-10 04:58:31.514125 I | auth: deleting token tAFjDlEPcjCzXVBL.75 for user conductor
2021-07-10 04:58:32.514239 I | auth: deleting token snpjNjtzXCxUiwvK.76 for user conductor
2021-07-10 04:58:32.890659 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:34.514327 I | auth: deleting token LHUeBPzccQkQKOWW.78 for user conductor
2021-07-10 04:58:34.514392 I | auth: deleting token GHddriBiRWkceVos.79 for user conductor
2021-07-10 04:58:34.514407 I | auth: deleting token ljUNQBaMrVoMvhwE.81 for user conductor
2021-07-10 04:58:37.891547 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:38.694655 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.777411122s) to execute
2021-07-10 04:58:41.893131 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.676559697s) to execute
2021-07-10 04:58:42.891853 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:44.294470 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.397774792s) to execute
2021-07-10 04:58:45.588743 I | auth: deleting token sMAJvnlteTCHEMmb.84 for user conductor
2021-07-10 04:58:45.588821 I | auth: deleting token aqRDPNaHbvKkECVf.87 for user conductor
2021-07-10 04:58:45.588837 I | auth: deleting token BNsnchJMHzNkPOCo.86 for user conductor
2021-07-10 04:58:45.588847 I | auth: deleting token XVezoOuBTeiQhjzp.85 for user conductor
2021-07-10 04:58:45.588857 I | auth: deleting token FYzoeUgWYbhSbrYT.83 for user conductor
2021-07-10 04:58:45.588883 I | auth: deleting token pxtmsNgnbkRvauvx.82 for user conductor
2021-07-10 04:58:45.588914 I | auth: deleting token GlhltASaLquELTeX.88 for user conductor
2021-07-10 04:58:47.389949 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.998773012s) to execute
2021-07-10 04:58:47.892130 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:48.514155 I | auth: deleting token BQiJXhOevrxBSCzj.90 for user conductor
2021-07-10 04:58:48.514199 I | auth: deleting token EMVNNcnHCISVnkwF.92 for user conductor
2021-07-10 04:58:48.514210 I | auth: deleting token JbRHetIvmKIICfWb.91 for user conductor
2021-07-10 04:58:50.089880 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.699816717s) to execute
2021-07-10 04:58:50.090101 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.701275828s) to execute
2021-07-10 04:58:51.514203 I | auth: deleting token zvOWSWrjyXAhgsRl.96 for user conductor
2021-07-10 04:58:51.514241 I | auth: deleting token MluLbjBGRLWGNsJm.94 for user conductor
2021-07-10 04:58:52.892496 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:53.093824 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.7007723s) to execute
2021-07-10 04:58:53.094297 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.805325344s) to execute
2021-07-10 04:58:53.094419 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.905404949s) to execute
2021-07-10 04:58:54.514315 I | auth: deleting token rNrhXLLlpyRhxCFY.99 for user conductor
2021-07-10 04:58:54.514401 I | auth: deleting token jziraYjsbnaLwflj.98 for user conductor
2021-07-10 04:58:54.514423 I | auth: deleting token wXatnRjUFZBpFlct.100 for user conductor
2021-07-10 04:58:54.514449 I | auth: deleting token lHnuapNkEKHBtrWa.97 for user conductor
2021-07-10 04:58:54.514466 I | auth: deleting token LCAaoCOFkrAheHbL.102 for user conductor
2021-07-10 04:58:57.889700 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.700786296s) to execute
2021-07-10 04:58:57.892779 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:58:58.514239 I | auth: deleting token nAyUtIFUidpUIhqu.104 for user conductor
2021-07-10 04:58:58.514308 I | auth: deleting token VdVregiOmJiKYJbz.105 for user conductor
2021-07-10 04:59:01.588618 I | auth: deleting token DRfYoBgdEzizgYOs.106 for user conductor
2021-07-10 04:59:01.588671 I | auth: deleting token mpiyZLefOieyMRkb.107 for user conductor
2021-07-10 04:59:02.893067 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:03.514194 I | auth: deleting token jUxhLABGQtDiyjsy.111 for user conductor
2021-07-10 04:59:03.514232 I | auth: deleting token lTgipkWIjkfJnKem.110 for user conductor
2021-07-10 04:59:05.989230 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.899042172s) to execute
2021-07-10 04:59:06.514249 I | auth: deleting token bgWFyiweApRvekHN.116 for user conductor
2021-07-10 04:59:06.514302 I | auth: deleting token usoIcvtQbyxrKjKd.115 for user conductor
2021-07-10 04:59:06.514319 I | auth: deleting token fswQTJkQpMoLgeTX.109 for user conductor
2021-07-10 04:59:06.514338 I | auth: deleting token IEeShFdCJFUjKTMD.113 for user conductor
2021-07-10 04:59:06.514383 I | auth: deleting token RvjbSJPOKMYsTaXw.114 for user conductor
2021-07-10 04:59:07.893272 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:08.595482 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.602192493s) to execute
2021-07-10 04:59:09.588695 I | auth: deleting token ouAKOCFtfhxhefql.118 for user conductor
2021-07-10 04:59:09.588764 I | auth: deleting token eypsvbSFtMUxuTKS.119 for user conductor
2021-07-10 04:59:11.091123 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.098627489s) to execute
2021-07-10 04:59:11.091388 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.097951441s) to execute
2021-07-10 04:59:11.091524 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.492791629s) to execute
2021-07-10 04:59:11.091665 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.493218644s) to execute
2021-07-10 04:59:12.588655 I | auth: deleting token PPERYkVSjrqxrZtU.123 for user conductor
2021-07-10 04:59:12.588701 I | auth: deleting token pXHWoqVZAwGpMuKC.120 for user conductor
2021-07-10 04:59:12.588721 I | auth: deleting token DcMCOubsdzLVvamB.122 for user conductor
2021-07-10 04:59:12.588747 I | auth: deleting token IHXNrIrDuFKjxCVB.121 for user conductor
2021-07-10 04:59:12.893467 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:13.693791 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.500063816s) to execute
2021-07-10 04:59:15.514242 I | auth: deleting token KDFEPtnXZtlAmCBq.124 for user conductor
2021-07-10 04:59:16.595910 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.085294223s) to execute
2021-07-10 04:59:16.810763 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (121.94936ms) to execute
2021-07-10 04:59:17.893757 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:18.514235 I | auth: deleting token NbRnndbUasmcXSOZ.127 for user conductor
2021-07-10 04:59:18.514294 I | auth: deleting token pqDeNmuxkSVoKCIt.128 for user conductor
2021-07-10 04:59:18.514314 I | auth: deleting token pDhjbJLwimhfgIwp.126 for user conductor
2021-07-10 04:59:21.514480 I | auth: deleting token vgVOGnAOmYvttgis.130 for user conductor
2021-07-10 04:59:22.894051 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:24.193849 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.704824621s) to execute
2021-07-10 04:59:26.588705 I | auth: deleting token JMTEIUSdHfEDSjDm.135 for user conductor
2021-07-10 04:59:26.588762 I | auth: deleting token dlrNpEcluXfMCWtK.132 for user conductor
2021-07-10 04:59:26.588777 I | auth: deleting token MUjDONpcWGXpEwHu.133 for user conductor
2021-07-10 04:59:26.588794 I | auth: deleting token yMqOLXEcZkzZKBZJ.129 for user conductor
2021-07-10 04:59:26.588807 I | auth: deleting token oofzOhnOvxdePCfl.134 for user conductor
2021-07-10 04:59:26.588823 I | auth: deleting token XvEijuxdmqPZOlGQ.131 for user conductor
2021-07-10 04:59:27.988461 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:29.096586 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.806083242s) to execute
2021-07-10 04:59:29.588595 I | auth: deleting token DMLNaJyVafRXRGtm.140 for user conductor
2021-07-10 04:59:29.588690 I | auth: deleting token jsxHeItJXUIXJoVQ.137 for user conductor
2021-07-10 04:59:29.588713 I | auth: deleting token qUbbruELZuppfjWU.138 for user conductor
2021-07-10 04:59:32.089707 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.900518457s) to execute
2021-07-10 04:59:32.089916 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.895300626s) to execute
2021-07-10 04:59:32.514244 I | auth: deleting token CRohmFHMtEpHzLhE.142 for user conductor
2021-07-10 04:59:32.514305 I | auth: deleting token AwEdlULqYAzcZkNv.139 for user conductor
2021-07-10 04:59:32.514323 I | auth: deleting token koUYJfCDSAFUGIAO.143 for user conductor
2021-07-10 04:59:32.988780 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:35.514364 I | auth: deleting token ZnmiONCOLKBpvXGH.146 for user conductor
2021-07-10 04:59:35.514416 I | auth: deleting token psMUWwXCXMqePLkT.145 for user conductor
2021-07-10 04:59:35.514431 I | auth: deleting token rXhisFkdEtBTQiEn.147 for user conductor
2021-07-10 04:59:36.588559 I | auth: deleting token qRIziCgARSaWqVjk.148 for user conductor
2021-07-10 04:59:37.290290 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.101506134s) to execute
2021-07-10 04:59:37.989206 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:39.514133 I | auth: deleting token ThVyxEMLVsmaJQuL.150 for user conductor
2021-07-10 04:59:39.514214 I | auth: deleting token gmoujQJApPdsphTF.149 for user conductor
2021-07-10 04:59:40.094131 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.705162487s) to execute
2021-07-10 04:59:42.493207 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.104256796s) to execute
2021-07-10 04:59:42.493435 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.10435356s) to execute
2021-07-10 04:59:42.493530 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.303244719s) to execute
2021-07-10 04:59:42.493625 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.302637618s) to execute
2021-07-10 04:59:42.989585 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:47.989942 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:49.588577 I | auth: deleting token GxHcyKLKEsGEbdNJ.155 for user conductor
2021-07-10 04:59:49.588661 I | auth: deleting token ejOafGhkeQjlHBhV.152 for user conductor
2021-07-10 04:59:49.588693 I | auth: deleting token CEVGwzcNRQZwVfEI.157 for user conductor
2021-07-10 04:59:49.588713 I | auth: deleting token tccjLDSgzUXwuUrQ.151 for user conductor
2021-07-10 04:59:52.588533 I | auth: deleting token DFlPKLPglSfxCYJL.153 for user conductor
2021-07-10 04:59:52.588617 I | auth: deleting token CKjPybxqPFXeHEtj.154 for user conductor
2021-07-10 04:59:52.588638 I | auth: deleting token JwQUtWoEOyPzYyNN.160 for user conductor
2021-07-10 04:59:52.588665 I | auth: deleting token ZVVGcAiEXrvAVBzr.159 for user conductor
2021-07-10 04:59:52.990330 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:53.390284 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (9.399181149s) to execute
2021-07-10 04:59:55.901139 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.409402641s) to execute
2021-07-10 04:59:55.901305 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.507898893s) to execute
2021-07-10 04:59:55.901520 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.508667582s) to execute
2021-07-10 04:59:57.514252 I | auth: deleting token sODmFrmLdHBzIQQn.162 for user conductor
2021-07-10 04:59:57.990678 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 04:59:58.891544 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.89805848s) to execute
2021-07-10 05:00:00.588540 I | auth: deleting token YfQaouITdhaCxOzQ.163 for user conductor
2021-07-10 05:00:01.391315 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.980610974s) to execute
2021-07-10 05:00:02.588790 I | auth: deleting token qsbSOwLmvNauLzSW.164 for user conductor
2021-07-10 05:00:02.588842 I | auth: deleting token vHrbbsmOvfpfrKtW.166 for user conductor
2021-07-10 05:00:02.990920 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:04.190059 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601293189s) to execute
2021-07-10 05:00:04.190408 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.701592791s) to execute
2021-07-10 05:00:05.588609 I | auth: deleting token hJUNJCJXrORVUbgx.168 for user conductor
2021-07-10 05:00:05.588660 I | auth: deleting token kviifeAwDUgppcEV.170 for user conductor
2021-07-10 05:00:05.588682 I | auth: deleting token UBmvgYuiVxBwtUMW.165 for user conductor
2021-07-10 05:00:05.588695 I | auth: deleting token WvmOBADwOgYBpTAz.171 for user conductor
2021-07-10 05:00:07.034376 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.842100142s) to execute
2021-07-10 05:00:07.088651 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.795456708s) to execute
2021-07-10 05:00:07.991225 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:08.588678 I | auth: deleting token aIHREWShYEchTtLm.172 for user conductor
2021-07-10 05:00:08.588792 I | auth: deleting token FDMMAnLauViOLAtK.174 for user conductor
2021-07-10 05:00:08.588828 I | auth: deleting token WxDSZWuILREXqGPa.173 for user conductor
2021-07-10 05:00:09.514225 I | auth: deleting token UdROwVQGbaiaPvxG.175 for user conductor
2021-07-10 05:00:09.793435 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.20307736s) to execute
2021-07-10 05:00:11.989269 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.19564941s) to execute
2021-07-10 05:00:11.989388 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.19276301s) to execute
2021-07-10 05:00:12.514216 I | auth: deleting token yCJJoouRnQPhbJCC.178 for user conductor
2021-07-10 05:00:12.514270 I | auth: deleting token sIezyfdSuPRsCnUl.177 for user conductor
2021-07-10 05:00:12.514293 I | auth: deleting token BDuLsMWTXMYHMUYN.176 for user conductor
2021-07-10 05:00:12.991608 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:14.797710 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.186948151s) to execute
2021-07-10 05:00:15.514257 I | auth: deleting token iCQSlqUoBSkBuUVk.179 for user conductor
2021-07-10 05:00:15.514330 I | auth: deleting token WblPRGXGZmLoNIPB.180 for user conductor
2021-07-10 05:00:18.088652 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:18.191428 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.201242413s) to execute
2021-07-10 05:00:20.396491 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.204892482s) to execute
2021-07-10 05:00:20.396656 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.107625303s) to execute
2021-07-10 05:00:20.610701 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (121.920756ms) to execute
2021-07-10 05:00:21.514286 I | auth: deleting token VylNkvlOvrEHefSL.185 for user conductor
2021-07-10 05:00:21.514352 I | auth: deleting token bNJSwehfNqfeMTzg.182 for user conductor
2021-07-10 05:00:21.514369 I | auth: deleting token DcqXLzKqVrsaSFNE.184 for user conductor
2021-07-10 05:00:23.089016 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:23.514628 I | auth: deleting token pNWMoeQowaaOjsIu.183 for user conductor
2021-07-10 05:00:23.514889 I | auth: deleting token KiVruQzKgAkyJntK.188 for user conductor
2021-07-10 05:00:23.514916 I | auth: deleting token PqBsCdreVDXlrBiC.186 for user conductor
2021-07-10 05:00:24.514228 I | auth: deleting token WvXRZMjlrxlwcMtD.187 for user conductor
2021-07-10 05:00:24.514285 I | auth: deleting token fuplSyNDnXwWoOpr.181 for user conductor
2021-07-10 05:00:24.514300 I | auth: deleting token HCpzpjzXgORruvlj.189 for user conductor
2021-07-10 05:00:28.089423 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:28.796998 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (986.457074ms) to execute
2021-07-10 05:00:32.494034 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.883262245s) to execute
2021-07-10 05:00:33.089727 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:35.196598 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.683270302s) to execute
2021-07-10 05:00:37.596884 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.086037641s) to execute
2021-07-10 05:00:38.090049 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:38.514245 I | auth: deleting token HMBMtCEUjnreHreK.191 for user conductor
2021-07-10 05:00:38.514303 I | auth: deleting token czJuUXYvjCBVoUdR.190 for user conductor
2021-07-10 05:00:39.893994 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.183401553s) to execute
2021-07-10 05:00:41.588569 I | auth: deleting token BfbeemIfJOZDubxl.192 for user conductor
2021-07-10 05:00:41.588617 I | auth: deleting token WolumbVFaWgyspzZ.193 for user conductor
2021-07-10 05:00:41.588640 I | auth: deleting token hntozCeZrkKkJoVV.194 for user conductor
2021-07-10 05:00:41.588651 I | auth: deleting token XQwMXfGDYIonQRVE.195 for user conductor
2021-07-10 05:00:43.090587 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:44.992108 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.803320655s) to execute
2021-07-10 05:00:44.992847 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.001388662s) to execute
2021-07-10 05:00:45.111600 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (116.066855ms) to execute
2021-07-10 05:00:47.514251 I | auth: deleting token khUsIbePnmZgVTSj.198 for user conductor
2021-07-10 05:00:48.091147 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:50.514281 I | auth: deleting token xgLlpQBBhiegbiRm.197 for user conductor
2021-07-10 05:00:52.588535 I | auth: deleting token rRtFsUcKZIMhXOrT.203 for user conductor
2021-07-10 05:00:52.588638 I | auth: deleting token TiwvkPHyxtdhxLnd.202 for user conductor
2021-07-10 05:00:52.588661 I | auth: deleting token RqUUcTpRlRxzWCDD.204 for user conductor
2021-07-10 05:00:52.588678 I | auth: deleting token pedlDGJoSpUUMYCV.201 for user conductor
2021-07-10 05:00:52.588699 I | auth: deleting token PbARQlSNjEuSUfGH.200 for user conductor
2021-07-10 05:00:53.188643 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:58.189366 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:00:58.588576 I | auth: deleting token zujalusEfQYNcrnd.205 for user conductor
2021-07-10 05:00:58.588658 I | auth: deleting token nDACkrLAAHwGWuUA.207 for user conductor
2021-07-10 05:01:00.514267 I | auth: deleting token eWjOQwCErVEIqYEZ.206 for user conductor
2021-07-10 05:01:00.514352 I | auth: deleting token fbLxodMyMndvulOQ.209 for user conductor
2021-07-10 05:01:00.514388 I | auth: deleting token EFSQkubqMYxwrxCI.210 for user conductor
2021-07-10 05:01:00.514409 I | auth: deleting token hVrOAuwmbyxpVzqW.208 for user conductor
2021-07-10 05:01:00.514424 I | auth: deleting token CxTdxamQElIGNLNu.211 for user conductor
2021-07-10 05:01:02.192545 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.80107572s) to execute
2021-07-10 05:01:03.189661 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:01:04.991707 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.602914938s) to execute
2021-07-10 05:01:06.588652 I | auth: deleting token GUMBdgenJzdvdZGz.215 for user conductor
2021-07-10 05:01:06.588703 I | auth: deleting token IXElVcrWtPyJRVvd.213 for user conductor
2021-07-10 05:01:06.588721 I | auth: deleting token bWsOafwgFgsExbfG.212 for user conductor
2021-07-10 05:01:07.593105 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.502079626s) to execute
2021-07-10 05:01:07.593267 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.504523604s) to execute
2021-07-10 05:01:07.593324 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.304354599s) to execute
2021-07-10 05:01:07.593520 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.204441625s) to execute
2021-07-10 05:01:08.189937 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:01:09.514373 I | auth: deleting token AAIRzfHIpeTMTCvn.217 for user conductor
2021-07-10 05:01:09.514432 I | auth: deleting token drSuZSdvtbFzjhMs.214 for user conductor
2021-07-10 05:01:09.514453 I | auth: deleting token nvWUItiYJAUDjJjf.216 for user conductor
2021-07-10 05:01:12.514282 I | auth: deleting token CWTlwfTzPxYMehRO.219 for user conductor
2021-07-10 05:01:12.514350 I | auth: deleting token MFoGPhvETTwuOHTK.220 for user conductor
2021-07-10 05:01:12.514369 I | auth: deleting token sJCREPDJvaucNcMj.218 for user conductor
2021-07-10 05:01:12.514382 I | auth: deleting token HteCUIvFEilMVSLu.221 for user conductor
2021-07-10 05:01:13.190278 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:01:18.195044 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:01:19.593025 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (10.503118716s) to execute
2021-07-10 05:01:19.811039 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (122.146815ms) to execute
2021-07-10 05:01:19.888933 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (173.916651ms) to execute
2021-07-10 05:01:20.514333 I | auth: deleting token jefvbpeyxDrvSNUg.222 for user conductor
2021-07-10 05:01:20.514394 I | auth: deleting token imcoUAZsViXXYaZA.225 for user conductor
2021-07-10 05:01:20.514409 I | auth: deleting token mAkHXyeDutUaWLPz.227 for user conductor
2021-07-10 05:01:20.514427 I | auth: deleting token BWXsBPEugFeWPoKY.226 for user conductor
2021-07-10 05:01:20.514442 I | auth: deleting token YOZMTEyTNhFxLWgg.223 for user conductor
2021-07-10 05:01:20.514455 I | auth: deleting token NpzhtLKjlismEMvP.228 for user conductor
2021-07-10 05:01:20.514469 I | auth: deleting token rziGaTZOjGGzJNxF.224 for user conductor
2021-07-10 05:01:20.514480 I | auth: deleting token rcnpYktbjfiCwIff.229 for user conductor
2021-07-10 05:01:23.195617 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:01:28.195928 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:01:29.189979 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.179311139s) to execute
2021-07-10 05:01:31.588617 I | auth: deleting token GmfkOHgyAlVdoTRk.230 for user conductor
2021-07-10 05:01:33.288526 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused
2021-07-10 05:01:36.493902 W | etcdserver: request "header: authenticate: