Skipping self-checking Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-2.oof-has-etcd' Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up 2021-07-10 04:51:21.690250 I | etcdmain: etcd Version: 3.2.24 2021-07-10 04:51:21.690437 I | etcdmain: Git SHA: 420a45226 2021-07-10 04:51:21.690448 I | etcdmain: Go Version: go1.8.7 2021-07-10 04:51:21.690457 I | etcdmain: Go OS/Arch: linux/amd64 2021-07-10 04:51:21.690468 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16 2021-07-10 04:51:21.690716 I | embed: listening for peers on http://0.0.0.0:2380 2021-07-10 04:51:21.690835 I | embed: listening for client requests on 0.0.0.0:2379 2021-07-10 04:51:21.704096 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd:2380 to 10.233.77.251:2380 2021-07-10 04:51:21.705088 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd:2380 to 10.233.77.251:2380 2021-07-10 04:51:21.889211 I | etcdserver: name = onap-oof-has-etcd-0 2021-07-10 04:51:21.889258 I | etcdserver: data dir = /var/run/etcd/default.etcd 2021-07-10 04:51:21.889272 I | etcdserver: member dir = /var/run/etcd/default.etcd/member 2021-07-10 04:51:21.889282 I | etcdserver: heartbeat = 100ms 2021-07-10 04:51:21.889290 I | etcdserver: election = 1000ms 2021-07-10 04:51:21.889299 I | etcdserver: snapshot count = 100000 2021-07-10 04:51:21.889319 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-0.oof-has-etcd:2379 2021-07-10 04:51:21.889382 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-0.oof-has-etcd:2380 2021-07-10 04:51:21.889489 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380 2021-07-10 04:51:21.900193 I | etcdserver: starting member 8aae4c350a2413a5 in cluster e8b03869cbf54258 2021-07-10 04:51:21.988580 I | raft: 8aae4c350a2413a5 became follower at term 0 2021-07-10 04:51:21.988649 I | raft: newRaft 8aae4c350a2413a5 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0] 2021-07-10 04:51:21.988663 I | raft: 8aae4c350a2413a5 became follower at term 1 2021-07-10 04:51:21.996910 W | auth: simple token is not cryptographically signed 2021-07-10 04:51:22.091319 I | rafthttp: starting peer 2d249ba41c7e44fa... 2021-07-10 04:51:22.091454 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa 2021-07-10 04:51:22.092845 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer) 2021-07-10 04:51:22.190101 I | rafthttp: started peer 2d249ba41c7e44fa 2021-07-10 04:51:22.190194 I | rafthttp: added peer 2d249ba41c7e44fa 2021-07-10 04:51:22.190226 I | rafthttp: starting peer 72b38cc930a2fa6f... 2021-07-10 04:51:22.190254 I | rafthttp: started HTTP pipelining with peer 72b38cc930a2fa6f 2021-07-10 04:51:22.190308 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer) 2021-07-10 04:51:22.190564 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader) 2021-07-10 04:51:22.190634 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader) 2021-07-10 04:51:22.289991 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer) 2021-07-10 04:51:22.290341 I | rafthttp: started peer 72b38cc930a2fa6f 2021-07-10 04:51:22.290389 I | rafthttp: added peer 72b38cc930a2fa6f 2021-07-10 04:51:22.290431 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided] 2021-07-10 04:51:22.290651 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer) 2021-07-10 04:51:22.290763 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream MsgApp v2 reader) 2021-07-10 04:51:22.290903 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream Message reader) 2021-07-10 04:51:22.488817 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258 2021-07-10 04:51:22.588798 I | rafthttp: peer 2d249ba41c7e44fa became active 2021-07-10 04:51:22.588878 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message writer) 2021-07-10 04:51:22.688586 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258 2021-07-10 04:51:22.688872 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 reader) 2021-07-10 04:51:22.789415 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message reader) 2021-07-10 04:51:22.789497 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 writer) 2021-07-10 04:51:22.791374 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258 2021-07-10 04:51:23.034510 I | raft: 8aae4c350a2413a5 [term: 1] received a MsgVote message with higher term from 2d249ba41c7e44fa [term: 905] 2021-07-10 04:51:23.034586 I | raft: 8aae4c350a2413a5 became follower at term 905 2021-07-10 04:51:23.034622 I | raft: 8aae4c350a2413a5 [logterm: 1, index: 3, vote: 0] cast MsgVote for 2d249ba41c7e44fa [logterm: 1, index: 3] at term 905 2021-07-10 04:51:23.037204 I | raft: raft.node: 8aae4c350a2413a5 elected leader 2d249ba41c7e44fa at term 905 2021-07-10 04:51:23.042074 I | etcdserver: published {Name:onap-oof-has-etcd-0 ClientURLs:[http://onap-oof-has-etcd-0.oof-has-etcd:2379]} to cluster e8b03869cbf54258 2021-07-10 04:51:23.042116 I | embed: ready to serve client requests 2021-07-10 04:51:23.089057 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged! 2021-07-10 04:51:23.211176 N | etcdserver/membership: set the initial cluster version to 3.0 2021-07-10 04:51:23.211323 I | etcdserver/api: enabled capabilities for version 3.0 2021-07-10 04:51:26.991089 N | auth: added a new user: root 2021-07-10 04:51:26.991341 W | etcdserver: request "header: auth_user_add:" with result "size:29" took too long (3.402250176s) to execute 2021-07-10 04:51:27.290825 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:51:29.593073 N | auth: added a new user: conductor 2021-07-10 04:51:29.593191 W | etcdserver: request "header: auth_user_add:" with result "size:29" took too long (2.60174467s) to execute 2021-07-10 04:51:29.736728 N | auth: Role conductor is created 2021-07-10 04:51:29.939375 N | auth: role conductor's permission of key conductor is updated as READWRITE 2021-07-10 04:51:30.142115 N | auth: granted role conductor to user conductor 2021-07-10 04:51:30.442575 N | auth: Role root is created 2021-07-10 04:51:30.510732 N | auth: granted role root to user root 2021-07-10 04:51:30.513801 N | auth: Authentication enabled 2021-07-10 04:51:32.291003 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:51:37.291207 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:51:42.291450 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:51:47.291864 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:51:52.292122 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:51:57.292406 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:02.292653 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:07.292892 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:12.293169 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:17.295527 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:22.295911 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:27.296323 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:32.296630 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:34.789223 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.998794881s) to execute 2021-07-10 04:52:37.296967 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:37.593954 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.179091767s) to execute 2021-07-10 04:52:42.297197 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:47.388604 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:47.988960 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.199742487s) to execute 2021-07-10 04:52:50.692639 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.581458478s) to execute 2021-07-10 04:52:50.912117 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (205.988731ms) to execute 2021-07-10 04:52:52.389014 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:52:53.892502 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.781826674s) to execute 2021-07-10 04:52:57.389290 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host proto: no coders for int proto: no encoder for ValueSize int [GetProperties] 2021-07-10 04:52:57.789264 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.681881672s) to execute 2021-07-10 04:52:58.010584 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (121.429902ms) to execute 2021-07-10 04:53:00.393423 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.177892815s) to execute 2021-07-10 04:53:02.389526 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:06.192474 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.681402272s) to execute 2021-07-10 04:53:07.389808 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:08.693329 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.402266285s) to execute 2021-07-10 04:53:08.693841 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.405034366s) to execute 2021-07-10 04:53:11.792680 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.900670154s) to execute 2021-07-10 04:53:12.390101 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:14.798075 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.906878276s) to execute 2021-07-10 04:53:17.390287 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:20.395307 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.406536587s) to execute 2021-07-10 04:53:22.390591 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:27.390919 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:31.496429 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (9.30658112s) to execute 2021-07-10 04:53:32.391266 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:34.091905 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.482957222s) to execute 2021-07-10 04:53:34.092343 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.503558865s) to execute 2021-07-10 04:53:37.093031 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.899685734s) to execute 2021-07-10 04:53:37.391594 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:42.488822 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:44.595740 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.406936981s) to execute 2021-07-10 04:53:47.489211 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:47.791063 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.280091797s) to execute 2021-07-10 04:53:50.991989 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.602998098s) to execute 2021-07-10 04:53:52.489516 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:54.092884 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.903914383s) to execute 2021-07-10 04:53:57.489775 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:53:58.088629 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.999774629s) to execute 2021-07-10 04:54:00.590798 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.302125628s) to execute 2021-07-10 04:54:02.490557 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:54:03.390098 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.797328582s) to execute 2021-07-10 04:54:03.390249 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.500282625s) to execute 2021-07-10 04:54:06.288560 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.894928562s) to execute 2021-07-10 04:54:06.288713 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.89551082s) to execute 2021-07-10 04:54:07.490852 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:54:08.691604 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.102821878s) to execute 2021-07-10 04:54:11.691234 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.480496459s) to execute 2021-07-10 04:54:12.491070 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:54:14.792552 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.00361219s) to execute 2021-07-10 04:54:17.491295 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:54:17.791314 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.900043635s) to execute 2021-07-10 04:54:20.592254 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.798436764s) to execute 2021-07-10 04:54:20.592418 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.603690221s) to execute 2021-07-10 04:54:22.491579 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:54:25.889013 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.293665808s) to execute 2021-07-10 04:54:25.889355 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.294632191s) to execute 2021-07-10 04:54:26.010743 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:364" took too long (118.249546ms) to execute 2021-07-10 04:54:26.288907 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (199.90725ms) to execute 2021-07-10 04:54:27.491834 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:54:29.091087 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.602290997s) to execute 2021-07-10 04:54:31.991974 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.276275774s) to execute 2021-07-10 04:54:32.492120 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:54:35.489369 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.173627058s) to execute 2021-07-10 04:54:37.492354 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:54:39.194649 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.305843735s) to execute 2021-07-10 04:54:42.492715 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 04:54:47.493006 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:54:49.392389 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (10.003588379s) to execute 2021-07-10 04:54:51.798025 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.402893777s) to execute 2021-07-10 04:54:51.888732 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.493787253s) to execute 2021-07-10 04:54:52.011131 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.615706357s) to execute 2021-07-10 04:54:52.013108 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (121.985014ms) to execute 2021-07-10 04:54:52.493282 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:54:57.096799 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (4.906781932s) to execute 2021-07-10 04:54:57.493595 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:54:59.991613 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.802871837s) to execute 2021-07-10 04:55:02.493388 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.393567981s) to execute 2021-07-10 04:55:02.493466 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.479931379s) to execute 2021-07-10 04:55:02.514362 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:05.292957 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.799250108s) to execute 2021-07-10 04:55:05.293099 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.299020184s) to execute 2021-07-10 04:55:05.293467 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.704608082s) to execute 2021-07-10 04:55:07.588670 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:07.992326 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.100981208s) to execute 2021-07-10 04:55:11.897990 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.707922754s) to execute 2021-07-10 04:55:12.589051 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:14.996580 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.982437558s) to execute 2021-07-10 04:55:17.589343 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:20.689967 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.501141965s) to execute 2021-07-10 04:55:22.589655 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:23.495082 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.706206324s) to execute 2021-07-10 04:55:23.495467 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.802996279s) to execute 2021-07-10 04:55:23.590742 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.801677698s) to execute 2021-07-10 04:55:27.589935 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:32.590313 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:37.590563 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:37.995591 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (10.50070953s) to execute 2021-07-10 04:55:40.796338 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.606532353s) to execute 2021-07-10 04:55:40.796666 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.708014837s) to execute 2021-07-10 04:55:42.688649 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:43.791162 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.702357451s) to execute 2021-07-10 04:55:43.791359 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.902565735s) to execute 2021-07-10 04:55:43.791572 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.798732418s) to execute 2021-07-10 04:55:46.791192 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.981721755s) to execute 2021-07-10 04:55:47.689051 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:49.588883 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.79402685s) to execute 2021-07-10 04:55:52.097223 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.508052178s) to execute 2021-07-10 04:55:52.097529 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.30242045s) to execute 2021-07-10 04:55:52.097837 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.505326376s) to execute 2021-07-10 04:55:52.689366 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:54.793516 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.60466198s) to execute 2021-07-10 04:55:57.592569 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.399336998s) to execute 2021-07-10 04:55:57.593142 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.179017702s) to execute 2021-07-10 04:55:57.689491 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:55:59.992182 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.281584989s) to execute 2021-07-10 04:55:59.992670 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.301293563s) to execute 2021-07-10 04:56:00.110775 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (115.799955ms) to execute 2021-07-10 04:56:02.689797 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:06.189255 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.698196572s) to execute 2021-07-10 04:56:07.690077 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:08.797022 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.604867145s) to execute 2021-07-10 04:56:08.797500 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.605466717s) to execute 2021-07-10 04:56:11.989094 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (3.100156943s) to execute 2021-07-10 04:56:11.989332 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.900584295s) to execute 2021-07-10 04:56:11.989719 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.000676241s) to execute 2021-07-10 04:56:12.690450 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:14.597694 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.509048791s) to execute 2021-07-10 04:56:17.690849 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:20.093275 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.40216328s) to execute 2021-07-10 04:56:20.134111 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.443290148s) to execute 2021-07-10 04:56:22.691211 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:25.292153 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.000457617s) to execute 2021-07-10 04:56:27.691811 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:30.895996 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.00616107s) to execute 2021-07-10 04:56:32.692114 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:36.092684 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.103714907s) to execute 2021-07-10 04:56:36.093231 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.194663157s) to execute 2021-07-10 04:56:36.093457 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.194627715s) to execute 2021-07-10 04:56:36.288987 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (192.567202ms) to execute 2021-07-10 04:56:37.692409 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:41.794317 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.204024455s) to execute 2021-07-10 04:56:41.988935 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (192.217559ms) to execute 2021-07-10 04:56:42.012021 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (118.531689ms) to execute 2021-07-10 04:56:42.692658 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:44.393788 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.379204619s) to execute 2021-07-10 04:56:47.195668 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.706948738s) to execute 2021-07-10 04:56:47.411420 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (116.590998ms) to execute 2021-07-10 04:56:47.692941 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:52.592931 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.801517479s) to execute 2021-07-10 04:56:52.788753 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:56:57.789056 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:00.096623 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.406219446s) to execute 2021-07-10 04:57:00.096725 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (7.501333571s) to execute 2021-07-10 04:57:02.789354 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:03.289365 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.675966052s) to execute 2021-07-10 04:57:06.190666 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.679890301s) to execute 2021-07-10 04:57:07.789651 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:08.794331 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601200324s) to execute 2021-07-10 04:57:12.789919 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:17.492935 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.600612746s) to execute 2021-07-10 04:57:17.493459 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (8.696068695s) to execute 2021-07-10 04:57:17.790420 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:22.790721 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:23.694899 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.604909171s) to execute 2021-07-10 04:57:27.791051 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:31.890597 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.001186865s) to execute 2021-07-10 04:57:31.890856 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (7.902220265s) to execute 2021-07-10 04:57:32.791395 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:34.292939 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.400001124s) to execute 2021-07-10 04:57:34.293075 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.400172853s) to execute 2021-07-10 04:57:34.293289 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.303921646s) to execute 2021-07-10 04:57:35.588640 I | auth: deleting token xDwNVndhrordPaqV.18 for user conductor 2021-07-10 04:57:35.588726 I | auth: deleting token GGEiXNzQUNXOfiqn.17 for user conductor 2021-07-10 04:57:36.797448 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.408502338s) to execute 2021-07-10 04:57:36.911055 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (107.388819ms) to execute 2021-07-10 04:57:37.791688 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:38.588467 I | auth: deleting token ryQZIGzpOSuSOiNR.24 for user conductor 2021-07-10 04:57:38.588517 I | auth: deleting token VsTYlseWkTENKJnS.22 for user conductor 2021-07-10 04:57:38.588530 I | auth: deleting token CGevUfdGoMxEKSJT.21 for user conductor 2021-07-10 04:57:39.588519 I | auth: deleting token opeLYyAkJEQckLXv.27 for user conductor 2021-07-10 04:57:41.588584 I | auth: deleting token dphtPNiEeMSxRBZx.29 for user conductor 2021-07-10 04:57:41.896362 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.5788042s) to execute 2021-07-10 04:57:42.514339 I | auth: deleting token sBrFuyesLUKLYzXH.30 for user conductor 2021-07-10 04:57:42.791991 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:44.588700 I | auth: deleting token TLoeHaUMswZfnjRU.32 for user conductor 2021-07-10 04:57:47.089109 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.400279449s) to execute 2021-07-10 04:57:47.792370 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:48.588532 I | auth: deleting token rFkExVxYcNlrjIvI.34 for user conductor 2021-07-10 04:57:48.588634 I | auth: deleting token yAARdpjDrfeaGTin.37 for user conductor 2021-07-10 04:57:49.290829 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (874.602726ms) to execute 2021-07-10 04:57:51.514279 I | auth: deleting token FqbJGnizLCVyIUXV.40 for user conductor 2021-07-10 04:57:51.514353 I | auth: deleting token REMglviYBwqWWhuD.39 for user conductor 2021-07-10 04:57:51.514370 I | auth: deleting token ZxJhvVSwJsRpEdfi.43 for user conductor 2021-07-10 04:57:51.514384 I | auth: deleting token WcMbpUYbwCXPvvJl.38 for user conductor 2021-07-10 04:57:52.792672 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:54.514281 I | auth: deleting token duKUCGzeuwVxFkwZ.46 for user conductor 2021-07-10 04:57:54.514330 I | auth: deleting token iypMCUPtDCSarIiE.48 for user conductor 2021-07-10 04:57:54.514347 I | auth: deleting token xiBIlIbQRNjyBkTx.45 for user conductor 2021-07-10 04:57:55.588852 I | auth: deleting token UiJpYQaYtDTIfInI.49 for user conductor 2021-07-10 04:57:56.291578 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.002770221s) to execute 2021-07-10 04:57:57.792951 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:57:58.588660 I | auth: deleting token bUEXOVlEVuJvYpTI.53 for user conductor 2021-07-10 04:57:58.588724 I | auth: deleting token bBwixrdnGTfFVvZj.51 for user conductor 2021-07-10 04:58:00.588501 I | auth: deleting token fWqIXDePvIYwZgIT.54 for user conductor 2021-07-10 04:58:00.588547 I | auth: deleting token VUZnnNvwkxagCIjB.55 for user conductor 2021-07-10 04:58:01.898027 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.587629768s) to execute 2021-07-10 04:58:02.888649 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:04.291780 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.303240157s) to execute 2021-07-10 04:58:04.292124 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.361584767s) to execute 2021-07-10 04:58:04.410776 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.420086288s) to execute 2021-07-10 04:58:04.412786 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (118.692613ms) to execute 2021-07-10 04:58:06.514304 I | auth: deleting token CWVcUXpmmKNmwsNy.58 for user conductor 2021-07-10 04:58:06.514360 I | auth: deleting token ijzZXSlFAOPvXmMU.60 for user conductor 2021-07-10 04:58:06.514372 I | auth: deleting token NFpFwnMTpHzYYJZT.62 for user conductor 2021-07-10 04:58:07.888836 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:09.588654 I | auth: deleting token caYXnsKHMUmZJnwL.57 for user conductor 2021-07-10 04:58:09.588753 I | auth: deleting token iulJCjrGRBxoefYA.63 for user conductor 2021-07-10 04:58:09.588791 I | auth: deleting token PyPfTYsTmbkLXvCK.65 for user conductor 2021-07-10 04:58:09.996921 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.886129749s) to execute 2021-07-10 04:58:10.213060 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (124.324582ms) to execute 2021-07-10 04:58:12.792478 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.001397325s) to execute 2021-07-10 04:58:12.889182 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:15.514240 I | auth: deleting token oPbulsqGhZZyGOrM.67 for user conductor 2021-07-10 04:58:17.791612 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.080226397s) to execute 2021-07-10 04:58:17.889510 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:20.426896 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.437738301s) to execute 2021-07-10 04:58:20.488578 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.69451724s) to execute 2021-07-10 04:58:20.588670 I | auth: deleting token xjHIibyZuHfJkOpO.68 for user conductor 2021-07-10 04:58:20.588737 I | auth: deleting token lCSFjFQnSGUsaKHy.71 for user conductor 2021-07-10 04:58:20.588763 I | auth: deleting token cOGKagejvFZQuXcP.70 for user conductor 2021-07-10 04:58:22.889819 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:23.492937 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.063724601s) to execute 2021-07-10 04:58:23.493299 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.00457733s) to execute 2021-07-10 04:58:26.390443 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.799433723s) to execute 2021-07-10 04:58:26.390642 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.801774823s) to execute 2021-07-10 04:58:27.890079 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:29.093551 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.182935084s) to execute 2021-07-10 04:58:31.514073 I | auth: deleting token MRwSpNiaOrFRDJFS.77 for user conductor 2021-07-10 04:58:31.514107 I | auth: deleting token juwoUgjQNzPCWebm.74 for user conductor 2021-07-10 04:58:31.514117 I | auth: deleting token zNAqCIFsmrrEbBfS.73 for user conductor 2021-07-10 04:58:31.514125 I | auth: deleting token tAFjDlEPcjCzXVBL.75 for user conductor 2021-07-10 04:58:32.514239 I | auth: deleting token snpjNjtzXCxUiwvK.76 for user conductor 2021-07-10 04:58:32.890659 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:34.514327 I | auth: deleting token LHUeBPzccQkQKOWW.78 for user conductor 2021-07-10 04:58:34.514392 I | auth: deleting token GHddriBiRWkceVos.79 for user conductor 2021-07-10 04:58:34.514407 I | auth: deleting token ljUNQBaMrVoMvhwE.81 for user conductor 2021-07-10 04:58:37.891547 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:38.694655 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.777411122s) to execute 2021-07-10 04:58:41.893131 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.676559697s) to execute 2021-07-10 04:58:42.891853 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:44.294470 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.397774792s) to execute 2021-07-10 04:58:45.588743 I | auth: deleting token sMAJvnlteTCHEMmb.84 for user conductor 2021-07-10 04:58:45.588821 I | auth: deleting token aqRDPNaHbvKkECVf.87 for user conductor 2021-07-10 04:58:45.588837 I | auth: deleting token BNsnchJMHzNkPOCo.86 for user conductor 2021-07-10 04:58:45.588847 I | auth: deleting token XVezoOuBTeiQhjzp.85 for user conductor 2021-07-10 04:58:45.588857 I | auth: deleting token FYzoeUgWYbhSbrYT.83 for user conductor 2021-07-10 04:58:45.588883 I | auth: deleting token pxtmsNgnbkRvauvx.82 for user conductor 2021-07-10 04:58:45.588914 I | auth: deleting token GlhltASaLquELTeX.88 for user conductor 2021-07-10 04:58:47.389949 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.998773012s) to execute 2021-07-10 04:58:47.892130 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:48.514155 I | auth: deleting token BQiJXhOevrxBSCzj.90 for user conductor 2021-07-10 04:58:48.514199 I | auth: deleting token EMVNNcnHCISVnkwF.92 for user conductor 2021-07-10 04:58:48.514210 I | auth: deleting token JbRHetIvmKIICfWb.91 for user conductor 2021-07-10 04:58:50.089880 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.699816717s) to execute 2021-07-10 04:58:50.090101 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.701275828s) to execute 2021-07-10 04:58:51.514203 I | auth: deleting token zvOWSWrjyXAhgsRl.96 for user conductor 2021-07-10 04:58:51.514241 I | auth: deleting token MluLbjBGRLWGNsJm.94 for user conductor 2021-07-10 04:58:52.892496 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:53.093824 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.7007723s) to execute 2021-07-10 04:58:53.094297 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.805325344s) to execute 2021-07-10 04:58:53.094419 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.905404949s) to execute 2021-07-10 04:58:54.514315 I | auth: deleting token rNrhXLLlpyRhxCFY.99 for user conductor 2021-07-10 04:58:54.514401 I | auth: deleting token jziraYjsbnaLwflj.98 for user conductor 2021-07-10 04:58:54.514423 I | auth: deleting token wXatnRjUFZBpFlct.100 for user conductor 2021-07-10 04:58:54.514449 I | auth: deleting token lHnuapNkEKHBtrWa.97 for user conductor 2021-07-10 04:58:54.514466 I | auth: deleting token LCAaoCOFkrAheHbL.102 for user conductor 2021-07-10 04:58:57.889700 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.700786296s) to execute 2021-07-10 04:58:57.892779 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:58:58.514239 I | auth: deleting token nAyUtIFUidpUIhqu.104 for user conductor 2021-07-10 04:58:58.514308 I | auth: deleting token VdVregiOmJiKYJbz.105 for user conductor 2021-07-10 04:59:01.588618 I | auth: deleting token DRfYoBgdEzizgYOs.106 for user conductor 2021-07-10 04:59:01.588671 I | auth: deleting token mpiyZLefOieyMRkb.107 for user conductor 2021-07-10 04:59:02.893067 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:03.514194 I | auth: deleting token jUxhLABGQtDiyjsy.111 for user conductor 2021-07-10 04:59:03.514232 I | auth: deleting token lTgipkWIjkfJnKem.110 for user conductor 2021-07-10 04:59:05.989230 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.899042172s) to execute 2021-07-10 04:59:06.514249 I | auth: deleting token bgWFyiweApRvekHN.116 for user conductor 2021-07-10 04:59:06.514302 I | auth: deleting token usoIcvtQbyxrKjKd.115 for user conductor 2021-07-10 04:59:06.514319 I | auth: deleting token fswQTJkQpMoLgeTX.109 for user conductor 2021-07-10 04:59:06.514338 I | auth: deleting token IEeShFdCJFUjKTMD.113 for user conductor 2021-07-10 04:59:06.514383 I | auth: deleting token RvjbSJPOKMYsTaXw.114 for user conductor 2021-07-10 04:59:07.893272 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:08.595482 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.602192493s) to execute 2021-07-10 04:59:09.588695 I | auth: deleting token ouAKOCFtfhxhefql.118 for user conductor 2021-07-10 04:59:09.588764 I | auth: deleting token eypsvbSFtMUxuTKS.119 for user conductor 2021-07-10 04:59:11.091123 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.098627489s) to execute 2021-07-10 04:59:11.091388 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.097951441s) to execute 2021-07-10 04:59:11.091524 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.492791629s) to execute 2021-07-10 04:59:11.091665 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.493218644s) to execute 2021-07-10 04:59:12.588655 I | auth: deleting token PPERYkVSjrqxrZtU.123 for user conductor 2021-07-10 04:59:12.588701 I | auth: deleting token pXHWoqVZAwGpMuKC.120 for user conductor 2021-07-10 04:59:12.588721 I | auth: deleting token DcMCOubsdzLVvamB.122 for user conductor 2021-07-10 04:59:12.588747 I | auth: deleting token IHXNrIrDuFKjxCVB.121 for user conductor 2021-07-10 04:59:12.893467 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:13.693791 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.500063816s) to execute 2021-07-10 04:59:15.514242 I | auth: deleting token KDFEPtnXZtlAmCBq.124 for user conductor 2021-07-10 04:59:16.595910 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.085294223s) to execute 2021-07-10 04:59:16.810763 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (121.94936ms) to execute 2021-07-10 04:59:17.893757 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:18.514235 I | auth: deleting token NbRnndbUasmcXSOZ.127 for user conductor 2021-07-10 04:59:18.514294 I | auth: deleting token pqDeNmuxkSVoKCIt.128 for user conductor 2021-07-10 04:59:18.514314 I | auth: deleting token pDhjbJLwimhfgIwp.126 for user conductor 2021-07-10 04:59:21.514480 I | auth: deleting token vgVOGnAOmYvttgis.130 for user conductor 2021-07-10 04:59:22.894051 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:24.193849 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.704824621s) to execute 2021-07-10 04:59:26.588705 I | auth: deleting token JMTEIUSdHfEDSjDm.135 for user conductor 2021-07-10 04:59:26.588762 I | auth: deleting token dlrNpEcluXfMCWtK.132 for user conductor 2021-07-10 04:59:26.588777 I | auth: deleting token MUjDONpcWGXpEwHu.133 for user conductor 2021-07-10 04:59:26.588794 I | auth: deleting token yMqOLXEcZkzZKBZJ.129 for user conductor 2021-07-10 04:59:26.588807 I | auth: deleting token oofzOhnOvxdePCfl.134 for user conductor 2021-07-10 04:59:26.588823 I | auth: deleting token XvEijuxdmqPZOlGQ.131 for user conductor 2021-07-10 04:59:27.988461 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:29.096586 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.806083242s) to execute 2021-07-10 04:59:29.588595 I | auth: deleting token DMLNaJyVafRXRGtm.140 for user conductor 2021-07-10 04:59:29.588690 I | auth: deleting token jsxHeItJXUIXJoVQ.137 for user conductor 2021-07-10 04:59:29.588713 I | auth: deleting token qUbbruELZuppfjWU.138 for user conductor 2021-07-10 04:59:32.089707 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.900518457s) to execute 2021-07-10 04:59:32.089916 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.895300626s) to execute 2021-07-10 04:59:32.514244 I | auth: deleting token CRohmFHMtEpHzLhE.142 for user conductor 2021-07-10 04:59:32.514305 I | auth: deleting token AwEdlULqYAzcZkNv.139 for user conductor 2021-07-10 04:59:32.514323 I | auth: deleting token koUYJfCDSAFUGIAO.143 for user conductor 2021-07-10 04:59:32.988780 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:35.514364 I | auth: deleting token ZnmiONCOLKBpvXGH.146 for user conductor 2021-07-10 04:59:35.514416 I | auth: deleting token psMUWwXCXMqePLkT.145 for user conductor 2021-07-10 04:59:35.514431 I | auth: deleting token rXhisFkdEtBTQiEn.147 for user conductor 2021-07-10 04:59:36.588559 I | auth: deleting token qRIziCgARSaWqVjk.148 for user conductor 2021-07-10 04:59:37.290290 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.101506134s) to execute 2021-07-10 04:59:37.989206 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:39.514133 I | auth: deleting token ThVyxEMLVsmaJQuL.150 for user conductor 2021-07-10 04:59:39.514214 I | auth: deleting token gmoujQJApPdsphTF.149 for user conductor 2021-07-10 04:59:40.094131 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.705162487s) to execute 2021-07-10 04:59:42.493207 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.104256796s) to execute 2021-07-10 04:59:42.493435 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.10435356s) to execute 2021-07-10 04:59:42.493530 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.303244719s) to execute 2021-07-10 04:59:42.493625 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.302637618s) to execute 2021-07-10 04:59:42.989585 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:47.989942 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:49.588577 I | auth: deleting token GxHcyKLKEsGEbdNJ.155 for user conductor 2021-07-10 04:59:49.588661 I | auth: deleting token ejOafGhkeQjlHBhV.152 for user conductor 2021-07-10 04:59:49.588693 I | auth: deleting token CEVGwzcNRQZwVfEI.157 for user conductor 2021-07-10 04:59:49.588713 I | auth: deleting token tccjLDSgzUXwuUrQ.151 for user conductor 2021-07-10 04:59:52.588533 I | auth: deleting token DFlPKLPglSfxCYJL.153 for user conductor 2021-07-10 04:59:52.588617 I | auth: deleting token CKjPybxqPFXeHEtj.154 for user conductor 2021-07-10 04:59:52.588638 I | auth: deleting token JwQUtWoEOyPzYyNN.160 for user conductor 2021-07-10 04:59:52.588665 I | auth: deleting token ZVVGcAiEXrvAVBzr.159 for user conductor 2021-07-10 04:59:52.990330 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:53.390284 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (9.399181149s) to execute 2021-07-10 04:59:55.901139 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.409402641s) to execute 2021-07-10 04:59:55.901305 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.507898893s) to execute 2021-07-10 04:59:55.901520 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.508667582s) to execute 2021-07-10 04:59:57.514252 I | auth: deleting token sODmFrmLdHBzIQQn.162 for user conductor 2021-07-10 04:59:57.990678 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 04:59:58.891544 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.89805848s) to execute 2021-07-10 05:00:00.588540 I | auth: deleting token YfQaouITdhaCxOzQ.163 for user conductor 2021-07-10 05:00:01.391315 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.980610974s) to execute 2021-07-10 05:00:02.588790 I | auth: deleting token qsbSOwLmvNauLzSW.164 for user conductor 2021-07-10 05:00:02.588842 I | auth: deleting token vHrbbsmOvfpfrKtW.166 for user conductor 2021-07-10 05:00:02.990920 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:04.190059 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601293189s) to execute 2021-07-10 05:00:04.190408 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.701592791s) to execute 2021-07-10 05:00:05.588609 I | auth: deleting token hJUNJCJXrORVUbgx.168 for user conductor 2021-07-10 05:00:05.588660 I | auth: deleting token kviifeAwDUgppcEV.170 for user conductor 2021-07-10 05:00:05.588682 I | auth: deleting token UBmvgYuiVxBwtUMW.165 for user conductor 2021-07-10 05:00:05.588695 I | auth: deleting token WvmOBADwOgYBpTAz.171 for user conductor 2021-07-10 05:00:07.034376 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.842100142s) to execute 2021-07-10 05:00:07.088651 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.795456708s) to execute 2021-07-10 05:00:07.991225 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:08.588678 I | auth: deleting token aIHREWShYEchTtLm.172 for user conductor 2021-07-10 05:00:08.588792 I | auth: deleting token FDMMAnLauViOLAtK.174 for user conductor 2021-07-10 05:00:08.588828 I | auth: deleting token WxDSZWuILREXqGPa.173 for user conductor 2021-07-10 05:00:09.514225 I | auth: deleting token UdROwVQGbaiaPvxG.175 for user conductor 2021-07-10 05:00:09.793435 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.20307736s) to execute 2021-07-10 05:00:11.989269 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.19564941s) to execute 2021-07-10 05:00:11.989388 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.19276301s) to execute 2021-07-10 05:00:12.514216 I | auth: deleting token yCJJoouRnQPhbJCC.178 for user conductor 2021-07-10 05:00:12.514270 I | auth: deleting token sIezyfdSuPRsCnUl.177 for user conductor 2021-07-10 05:00:12.514293 I | auth: deleting token BDuLsMWTXMYHMUYN.176 for user conductor 2021-07-10 05:00:12.991608 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:14.797710 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.186948151s) to execute 2021-07-10 05:00:15.514257 I | auth: deleting token iCQSlqUoBSkBuUVk.179 for user conductor 2021-07-10 05:00:15.514330 I | auth: deleting token WblPRGXGZmLoNIPB.180 for user conductor 2021-07-10 05:00:18.088652 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:18.191428 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.201242413s) to execute 2021-07-10 05:00:20.396491 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.204892482s) to execute 2021-07-10 05:00:20.396656 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.107625303s) to execute 2021-07-10 05:00:20.610701 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (121.920756ms) to execute 2021-07-10 05:00:21.514286 I | auth: deleting token VylNkvlOvrEHefSL.185 for user conductor 2021-07-10 05:00:21.514352 I | auth: deleting token bNJSwehfNqfeMTzg.182 for user conductor 2021-07-10 05:00:21.514369 I | auth: deleting token DcqXLzKqVrsaSFNE.184 for user conductor 2021-07-10 05:00:23.089016 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:23.514628 I | auth: deleting token pNWMoeQowaaOjsIu.183 for user conductor 2021-07-10 05:00:23.514889 I | auth: deleting token KiVruQzKgAkyJntK.188 for user conductor 2021-07-10 05:00:23.514916 I | auth: deleting token PqBsCdreVDXlrBiC.186 for user conductor 2021-07-10 05:00:24.514228 I | auth: deleting token WvXRZMjlrxlwcMtD.187 for user conductor 2021-07-10 05:00:24.514285 I | auth: deleting token fuplSyNDnXwWoOpr.181 for user conductor 2021-07-10 05:00:24.514300 I | auth: deleting token HCpzpjzXgORruvlj.189 for user conductor 2021-07-10 05:00:28.089423 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:28.796998 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (986.457074ms) to execute 2021-07-10 05:00:32.494034 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.883262245s) to execute 2021-07-10 05:00:33.089727 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:35.196598 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.683270302s) to execute 2021-07-10 05:00:37.596884 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.086037641s) to execute 2021-07-10 05:00:38.090049 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:38.514245 I | auth: deleting token HMBMtCEUjnreHreK.191 for user conductor 2021-07-10 05:00:38.514303 I | auth: deleting token czJuUXYvjCBVoUdR.190 for user conductor 2021-07-10 05:00:39.893994 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.183401553s) to execute 2021-07-10 05:00:41.588569 I | auth: deleting token BfbeemIfJOZDubxl.192 for user conductor 2021-07-10 05:00:41.588617 I | auth: deleting token WolumbVFaWgyspzZ.193 for user conductor 2021-07-10 05:00:41.588640 I | auth: deleting token hntozCeZrkKkJoVV.194 for user conductor 2021-07-10 05:00:41.588651 I | auth: deleting token XQwMXfGDYIonQRVE.195 for user conductor 2021-07-10 05:00:43.090587 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:44.992108 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.803320655s) to execute 2021-07-10 05:00:44.992847 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.001388662s) to execute 2021-07-10 05:00:45.111600 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (116.066855ms) to execute 2021-07-10 05:00:47.514251 I | auth: deleting token khUsIbePnmZgVTSj.198 for user conductor 2021-07-10 05:00:48.091147 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:50.514281 I | auth: deleting token xgLlpQBBhiegbiRm.197 for user conductor 2021-07-10 05:00:52.588535 I | auth: deleting token rRtFsUcKZIMhXOrT.203 for user conductor 2021-07-10 05:00:52.588638 I | auth: deleting token TiwvkPHyxtdhxLnd.202 for user conductor 2021-07-10 05:00:52.588661 I | auth: deleting token RqUUcTpRlRxzWCDD.204 for user conductor 2021-07-10 05:00:52.588678 I | auth: deleting token pedlDGJoSpUUMYCV.201 for user conductor 2021-07-10 05:00:52.588699 I | auth: deleting token PbARQlSNjEuSUfGH.200 for user conductor 2021-07-10 05:00:53.188643 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:58.189366 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:00:58.588576 I | auth: deleting token zujalusEfQYNcrnd.205 for user conductor 2021-07-10 05:00:58.588658 I | auth: deleting token nDACkrLAAHwGWuUA.207 for user conductor 2021-07-10 05:01:00.514267 I | auth: deleting token eWjOQwCErVEIqYEZ.206 for user conductor 2021-07-10 05:01:00.514352 I | auth: deleting token fbLxodMyMndvulOQ.209 for user conductor 2021-07-10 05:01:00.514388 I | auth: deleting token EFSQkubqMYxwrxCI.210 for user conductor 2021-07-10 05:01:00.514409 I | auth: deleting token hVrOAuwmbyxpVzqW.208 for user conductor 2021-07-10 05:01:00.514424 I | auth: deleting token CxTdxamQElIGNLNu.211 for user conductor 2021-07-10 05:01:02.192545 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.80107572s) to execute 2021-07-10 05:01:03.189661 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:01:04.991707 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.602914938s) to execute 2021-07-10 05:01:06.588652 I | auth: deleting token GUMBdgenJzdvdZGz.215 for user conductor 2021-07-10 05:01:06.588703 I | auth: deleting token IXElVcrWtPyJRVvd.213 for user conductor 2021-07-10 05:01:06.588721 I | auth: deleting token bWsOafwgFgsExbfG.212 for user conductor 2021-07-10 05:01:07.593105 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.502079626s) to execute 2021-07-10 05:01:07.593267 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.504523604s) to execute 2021-07-10 05:01:07.593324 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.304354599s) to execute 2021-07-10 05:01:07.593520 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.204441625s) to execute 2021-07-10 05:01:08.189937 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:01:09.514373 I | auth: deleting token AAIRzfHIpeTMTCvn.217 for user conductor 2021-07-10 05:01:09.514432 I | auth: deleting token drSuZSdvtbFzjhMs.214 for user conductor 2021-07-10 05:01:09.514453 I | auth: deleting token nvWUItiYJAUDjJjf.216 for user conductor 2021-07-10 05:01:12.514282 I | auth: deleting token CWTlwfTzPxYMehRO.219 for user conductor 2021-07-10 05:01:12.514350 I | auth: deleting token MFoGPhvETTwuOHTK.220 for user conductor 2021-07-10 05:01:12.514369 I | auth: deleting token sJCREPDJvaucNcMj.218 for user conductor 2021-07-10 05:01:12.514382 I | auth: deleting token HteCUIvFEilMVSLu.221 for user conductor 2021-07-10 05:01:13.190278 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:01:18.195044 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:01:19.593025 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (10.503118716s) to execute 2021-07-10 05:01:19.811039 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (122.146815ms) to execute 2021-07-10 05:01:19.888933 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (173.916651ms) to execute 2021-07-10 05:01:20.514333 I | auth: deleting token jefvbpeyxDrvSNUg.222 for user conductor 2021-07-10 05:01:20.514394 I | auth: deleting token imcoUAZsViXXYaZA.225 for user conductor 2021-07-10 05:01:20.514409 I | auth: deleting token mAkHXyeDutUaWLPz.227 for user conductor 2021-07-10 05:01:20.514427 I | auth: deleting token BWXsBPEugFeWPoKY.226 for user conductor 2021-07-10 05:01:20.514442 I | auth: deleting token YOZMTEyTNhFxLWgg.223 for user conductor 2021-07-10 05:01:20.514455 I | auth: deleting token NpzhtLKjlismEMvP.228 for user conductor 2021-07-10 05:01:20.514469 I | auth: deleting token rziGaTZOjGGzJNxF.224 for user conductor 2021-07-10 05:01:20.514480 I | auth: deleting token rcnpYktbjfiCwIff.229 for user conductor 2021-07-10 05:01:23.195617 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:01:28.195928 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:01:29.189979 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.179311139s) to execute 2021-07-10 05:01:31.588617 I | auth: deleting token GmfkOHgyAlVdoTRk.230 for user conductor 2021-07-10 05:01:33.288526 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:01:36.493902 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.283102889s) to execute 2021-07-10 05:01:36.588707 I | auth: deleting token KLdhNCMpaeeoFOnc.231 for user conductor 2021-07-10 05:01:36.588761 I | auth: deleting token XTHpnZwkGnhoQejS.232 for user conductor 2021-07-10 05:01:36.588773 I | auth: deleting token dUJSKcxuLmlprHJU.234 for user conductor 2021-07-10 05:01:36.588788 I | auth: deleting token eDxTxPDpzJlNptQm.235 for user conductor 2021-07-10 05:01:36.588799 I | auth: deleting token iqrcShZmZQzDXNKQ.233 for user conductor 2021-07-10 05:01:38.288846 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:01:39.197702 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.408739316s) to execute 2021-07-10 05:01:39.197933 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.609092269s) to execute 2021-07-10 05:01:41.892110 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.600228302s) to execute 2021-07-10 05:01:41.892231 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.303354934s) to execute 2021-07-10 05:01:41.892270 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.603100799s) to execute 2021-07-10 05:01:42.514271 I | auth: deleting token pCvWZnfEhjJfoQKG.237 for user conductor 2021-07-10 05:01:42.514328 I | auth: deleting token ineStndqXpaIJCPG.238 for user conductor 2021-07-10 05:01:42.514344 I | auth: deleting token kmkKyvnMuiXjCFWV.240 for user conductor 2021-07-10 05:01:42.514354 I | auth: deleting token XNLQdzrQWdfJqtzv.242 for user conductor 2021-07-10 05:01:42.514367 I | auth: deleting token zoObVdmoyOgkWhJB.239 for user conductor 2021-07-10 05:01:42.514377 I | auth: deleting token JhmiBPfLAbzsxiTb.243 for user conductor 2021-07-10 05:01:43.289238 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:01:44.588574 I | auth: deleting token qDNYypjGiruPqzlr.244 for user conductor 2021-07-10 05:01:44.888851 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.897518935s) to execute 2021-07-10 05:01:47.588549 I | auth: deleting token OmGliIPLhlWNSOPG.248 for user conductor 2021-07-10 05:01:47.588610 I | auth: deleting token aZkevWQGIkZSkujC.249 for user conductor 2021-07-10 05:01:47.588635 I | auth: deleting token yhaaWBAizfncIgNe.245 for user conductor 2021-07-10 05:01:47.588652 I | auth: deleting token JWjayYaICzzfqzbK.246 for user conductor 2021-07-10 05:01:47.588666 I | auth: deleting token XSXrdEWHLjMzNxJF.247 for user conductor 2021-07-10 05:01:47.693501 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.704716348s) to execute 2021-07-10 05:01:47.693698 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.70487705s) to execute 2021-07-10 05:01:47.694086 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.70260058s) to execute 2021-07-10 05:01:48.291219 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:01:50.591550 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.800739934s) to execute 2021-07-10 05:01:50.591971 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.803096265s) to execute 2021-07-10 05:01:50.711112 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (116.758055ms) to execute 2021-07-10 05:01:53.291505 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:01:53.514252 I | auth: deleting token EVcIjqZrXolJRxzs.250 for user conductor 2021-07-10 05:01:58.388858 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:00.514252 I | auth: deleting token GcwZpcBOPnohRPtJ.253 for user conductor 2021-07-10 05:02:00.514338 I | auth: deleting token IEzSrOTQxRVaoOaS.252 for user conductor 2021-07-10 05:02:00.514351 I | auth: deleting token jQEmoeUziCrWLeiK.254 for user conductor 2021-07-10 05:02:00.514374 I | auth: deleting token qkgWmMpoTyvksIfR.251 for user conductor 2021-07-10 05:02:00.514386 I | auth: deleting token OELNoGayoYpOULxW.255 for user conductor 2021-07-10 05:02:03.389044 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:03.514273 I | auth: deleting token UXxgAwxIBxYuSztf.256 for user conductor 2021-07-10 05:02:03.514330 I | auth: deleting token PRqKGDmiTMulFfJD.257 for user conductor 2021-07-10 05:02:03.514359 I | auth: deleting token RCMEDiLhwPoDrHkK.258 for user conductor 2021-07-10 05:02:04.191838 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.003022348s) to execute 2021-07-10 05:02:06.588667 I | auth: deleting token GXlYUlWTPCayHSpY.259 for user conductor 2021-07-10 05:02:06.588739 I | auth: deleting token kWsiyoYySWrZnKPp.260 for user conductor 2021-07-10 05:02:07.189341 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.799319854s) to execute 2021-07-10 05:02:07.189684 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.900873302s) to execute 2021-07-10 05:02:07.193315 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.904383329s) to execute 2021-07-10 05:02:08.389397 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:09.514225 I | auth: deleting token GnHCFAcRUoQbnNaB.262 for user conductor 2021-07-10 05:02:10.193013 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.997298554s) to execute 2021-07-10 05:02:13.192122 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.381474853s) to execute 2021-07-10 05:02:13.389604 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:15.991410 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.680575318s) to execute 2021-07-10 05:02:15.991705 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.70277167s) to execute 2021-07-10 05:02:16.110812 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (116.765652ms) to execute 2021-07-10 05:02:17.514344 I | auth: deleting token tkwIjgNSLGquMxpM.263 for user conductor 2021-07-10 05:02:17.514417 I | auth: deleting token rmUurPkCsaWpckOq.266 for user conductor 2021-07-10 05:02:17.514431 I | auth: deleting token WEyQCrfJlHfApsMB.261 for user conductor 2021-07-10 05:02:18.389853 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:18.514400 I | auth: deleting token ueaheqMnucsOcOZd.264 for user conductor 2021-07-10 05:02:18.514479 I | auth: deleting token xZBGjyrAyqyyyVsg.265 for user conductor 2021-07-10 05:02:18.514496 I | auth: deleting token mySUaFYJnuTxakBP.268 for user conductor 2021-07-10 05:02:21.692230 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.275485697s) to execute 2021-07-10 05:02:23.390088 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:24.588512 I | auth: deleting token mBkwFxQMjaKyZeVW.270 for user conductor 2021-07-10 05:02:24.588579 I | auth: deleting token KKOHPeDtWivNEFrZ.273 for user conductor 2021-07-10 05:02:24.588594 I | auth: deleting token bZxkbfFQISJJXIoR.269 for user conductor 2021-07-10 05:02:24.588611 I | auth: deleting token aEHGlzwKOQbCmBJk.272 for user conductor 2021-07-10 05:02:27.090183 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.179384839s) to execute 2021-07-10 05:02:27.090810 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.395958934s) to execute 2021-07-10 05:02:28.390309 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:29.989774 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.800897486s) to execute 2021-07-10 05:02:29.990262 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.897411025s) to execute 2021-07-10 05:02:29.992044 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.803196913s) to execute 2021-07-10 05:02:32.514366 I | auth: deleting token djEAOiUhdUUhUtRV.274 for user conductor 2021-07-10 05:02:32.514422 I | auth: deleting token TVOCOmvCfCzWaRfW.276 for user conductor 2021-07-10 05:02:32.514438 I | auth: deleting token cdHjmqfjTcsfiOTO.271 for user conductor 2021-07-10 05:02:32.514450 I | auth: deleting token PlYwCmlSWivruyYT.275 for user conductor 2021-07-10 05:02:32.514475 I | auth: deleting token wjQSbcAEKBLcJKBJ.277 for user conductor 2021-07-10 05:02:32.896676 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.903795572s) to execute 2021-07-10 05:02:32.896879 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.905259953s) to execute 2021-07-10 05:02:33.390611 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:37.514322 I | auth: deleting token oTKZpabrNaEjIHfx.279 for user conductor 2021-07-10 05:02:37.514397 I | auth: deleting token YpKQorLcnwUcOPsh.281 for user conductor 2021-07-10 05:02:37.514414 I | auth: deleting token LNHtfDEeAkEouxZa.278 for user conductor 2021-07-10 05:02:37.514425 I | auth: deleting token eTCQYhCntAaoMYeL.280 for user conductor 2021-07-10 05:02:38.391166 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:42.514131 I | auth: deleting token QPPJMVKbJYuncUKy.286 for user conductor 2021-07-10 05:02:42.514233 I | auth: deleting token YQsgUjXtOgGhEACH.284 for user conductor 2021-07-10 05:02:42.514254 I | auth: deleting token xzqWlfTCbQsTDPGt.282 for user conductor 2021-07-10 05:02:42.514269 I | auth: deleting token OFSiyOQxJtAAuEmd.283 for user conductor 2021-07-10 05:02:42.514284 I | auth: deleting token uJVzCfloXoZIKkNP.285 for user conductor 2021-07-10 05:02:43.391430 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:43.514307 I | auth: deleting token poSkiMfCFPffawQW.287 for user conductor 2021-07-10 05:02:44.514248 I | auth: deleting token StDlUInsawFkEcCN.288 for user conductor 2021-07-10 05:02:45.792456 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.701269645s) to execute 2021-07-10 05:02:47.514212 I | auth: deleting token RkCMnmmhRHgzlvJO.290 for user conductor 2021-07-10 05:02:47.514624 I | auth: deleting token zZeHzZQmTeQBBloJ.291 for user conductor 2021-07-10 05:02:47.514866 I | auth: deleting token bHbXKUJDmLRurGLC.289 for user conductor 2021-07-10 05:02:48.391637 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:48.896108 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.005546115s) to execute 2021-07-10 05:02:49.514150 I | auth: deleting token rhVIPoDdmYdfyxTT.292 for user conductor 2021-07-10 05:02:49.514279 I | auth: deleting token cItlXEzdwPMCRVwP.293 for user conductor 2021-07-10 05:02:50.588560 I | auth: deleting token HqaqtllfjEGQxKdD.294 for user conductor 2021-07-10 05:02:52.588658 I | auth: deleting token aVSiHzIezLYESYwB.295 for user conductor 2021-07-10 05:02:53.391930 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:02:53.514189 I | auth: deleting token HSgRmcRsAXEgKLSr.296 for user conductor 2021-07-10 05:02:56.514209 I | auth: deleting token ekVLtaKAcsMdvygB.298 for user conductor 2021-07-10 05:02:56.514250 I | auth: deleting token uQynDKRfcMPouPxe.297 for user conductor 2021-07-10 05:02:56.797642 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.898200449s) to execute 2021-07-10 05:02:56.889209 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.990572114s) to execute 2021-07-10 05:02:57.010710 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (121.603344ms) to execute 2021-07-10 05:02:57.088892 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (197.721096ms) to execute 2021-07-10 05:02:58.392239 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:02.089701 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.379281041s) to execute 2021-07-10 05:03:02.310640 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (196.413159ms) to execute 2021-07-10 05:03:02.514322 I | auth: deleting token cNSSnTJqdWcOtqAl.300 for user conductor 2021-07-10 05:03:02.514371 I | auth: deleting token JuuclgVGCtVRuhLu.301 for user conductor 2021-07-10 05:03:03.392521 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:04.514230 I | auth: deleting token IjionHucUVvVUuHw.305 for user conductor 2021-07-10 05:03:04.514286 I | auth: deleting token kpuzZozEoLqnIcqk.303 for user conductor 2021-07-10 05:03:04.514307 I | auth: deleting token DnSjLqBlupGSMiNV.304 for user conductor 2021-07-10 05:03:04.514320 I | auth: deleting token zSfQwBTMIJmzDkQd.302 for user conductor 2021-07-10 05:03:04.514334 I | auth: deleting token AktqIOYKJyGSkmFu.299 for user conductor 2021-07-10 05:03:04.514345 I | auth: deleting token uWaTjotumAwekuZD.306 for user conductor 2021-07-10 05:03:08.392808 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:10.514225 I | auth: deleting token NAvvfQLTYKkBsXzd.308 for user conductor 2021-07-10 05:03:10.514306 I | auth: deleting token zrzeUiwTJGKrLLUQ.310 for user conductor 2021-07-10 05:03:10.514319 I | auth: deleting token QzqhBvWrgJIQfRhT.309 for user conductor 2021-07-10 05:03:10.514334 I | auth: deleting token AJuJmPyyiVgAPqdv.307 for user conductor 2021-07-10 05:03:10.514345 I | auth: deleting token knhbqFNqWRvQrCEX.312 for user conductor 2021-07-10 05:03:10.514355 I | auth: deleting token GlFKEhTRuTZGlPrV.311 for user conductor 2021-07-10 05:03:13.393127 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:13.588562 I | auth: deleting token GetgyKUQgIMSFCwY.315 for user conductor 2021-07-10 05:03:13.588623 I | auth: deleting token xOgurtTJgkZFqpTT.313 for user conductor 2021-07-10 05:03:13.588639 I | auth: deleting token uhHTHNDENfnpcJKZ.314 for user conductor 2021-07-10 05:03:14.492557 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.281625149s) to execute 2021-07-10 05:03:17.288681 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.387484516s) to execute 2021-07-10 05:03:18.488661 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:18.514242 I | auth: deleting token DFzPHpibAcdhKZXY.317 for user conductor 2021-07-10 05:03:18.514338 I | auth: deleting token AJpOPyTGTkCFuiUt.316 for user conductor 2021-07-10 05:03:18.514357 I | auth: deleting token ZCwUFRJDxAGabjEL.319 for user conductor 2021-07-10 05:03:18.514375 I | auth: deleting token MTBvbYWcRMFumyCx.318 for user conductor 2021-07-10 05:03:20.193383 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.782789916s) to execute 2021-07-10 05:03:20.588508 I | auth: deleting token prssAnmMkHSNPBSc.321 for user conductor 2021-07-10 05:03:20.588546 I | auth: deleting token ryPvdslnZohDlldR.322 for user conductor 2021-07-10 05:03:23.288750 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.900025124s) to execute 2021-07-10 05:03:23.488974 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:23.514236 I | auth: deleting token SzXGFZIPRzkZifdu.325 for user conductor 2021-07-10 05:03:23.514276 I | auth: deleting token gtCvKYzDkrtpEwFx.324 for user conductor 2021-07-10 05:03:23.514292 I | auth: deleting token mSsfPQlTETchWoxx.320 for user conductor 2021-07-10 05:03:25.989414 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.790082644s) to execute 2021-07-10 05:03:25.989610 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.599732476s) to execute 2021-07-10 05:03:25.989696 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.600706828s) to execute 2021-07-10 05:03:26.514420 I | auth: deleting token TvpgPhadQmORpQgs.323 for user conductor 2021-07-10 05:03:26.514499 I | auth: deleting token wHvxLEUOpngWSHye.328 for user conductor 2021-07-10 05:03:26.514520 I | auth: deleting token kFDPbVDDWcJxWvRi.327 for user conductor 2021-07-10 05:03:26.514540 I | auth: deleting token iJQJsnIkMENzmAkO.326 for user conductor 2021-07-10 05:03:27.514334 I | auth: deleting token bhArivvAIqGiXsvc.329 for user conductor 2021-07-10 05:03:28.489418 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:28.995058 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.904323699s) to execute 2021-07-10 05:03:28.995494 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.906520742s) to execute 2021-07-10 05:03:29.514275 I | auth: deleting token IugDCNxPrFHOfLBq.332 for user conductor 2021-07-10 05:03:29.514452 I | auth: deleting token LjdKqXwqVfpCBWKF.331 for user conductor 2021-07-10 05:03:29.588734 I | auth: deleting token NGBIuXXHaeLUhPXn.330 for user conductor 2021-07-10 05:03:31.514285 I | auth: deleting token hZMMMKNKhgPqMvCX.333 for user conductor 2021-07-10 05:03:32.514247 I | auth: deleting token CDVGeksGLERBGZCv.334 for user conductor 2021-07-10 05:03:33.489736 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:33.588562 I | auth: deleting token IddTvNrvqOpRxWPs.335 for user conductor 2021-07-10 05:03:34.492099 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.302081748s) to execute 2021-07-10 05:03:34.492322 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.403579509s) to execute 2021-07-10 05:03:37.193097 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.604555175s) to execute 2021-07-10 05:03:37.193719 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.684591187s) to execute 2021-07-10 05:03:37.310617 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.80128491s) to execute 2021-07-10 05:03:38.490050 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:39.588559 I | auth: deleting token BUcBQHyBZRptCZMe.338 for user conductor 2021-07-10 05:03:39.588604 I | auth: deleting token yftWSOACbEaDQwmH.339 for user conductor 2021-07-10 05:03:39.588612 I | auth: deleting token RAZPkzwNwpFFyPTn.337 for user conductor 2021-07-10 05:03:39.588621 I | auth: deleting token sRicyglRWyDNIamt.340 for user conductor 2021-07-10 05:03:39.588646 I | auth: deleting token VketqPwqsEdTTZyx.336 for user conductor 2021-07-10 05:03:39.996775 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.708073751s) to execute 2021-07-10 05:03:39.997015 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.684146709s) to execute 2021-07-10 05:03:42.514264 I | auth: deleting token YdPuJugVnbWieays.341 for user conductor 2021-07-10 05:03:42.514324 I | auth: deleting token ZAmXCyAMadhBHhNC.342 for user conductor 2021-07-10 05:03:43.490494 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:44.514239 I | auth: deleting token iBmCsUospAXVBqxZ.344 for user conductor 2021-07-10 05:03:44.514305 I | auth: deleting token VmLMTvZNpbPezCfc.345 for user conductor 2021-07-10 05:03:45.988919 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.70007782s) to execute 2021-07-10 05:03:47.514199 I | auth: deleting token tfZOCbTGVAqiigEv.343 for user conductor 2021-07-10 05:03:48.490753 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:48.795339 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.802845246s) to execute 2021-07-10 05:03:48.795440 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.804201762s) to execute 2021-07-10 05:03:50.514432 I | auth: deleting token oDmtNFFoOumXNlDu.347 for user conductor 2021-07-10 05:03:50.514500 I | auth: deleting token FQvcIPskeeOtEgUf.346 for user conductor 2021-07-10 05:03:51.890111 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.898438872s) to execute 2021-07-10 05:03:51.890369 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.999382653s) to execute 2021-07-10 05:03:51.890653 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.001721598s) to execute 2021-07-10 05:03:53.491025 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:53.514272 I | auth: deleting token ivIMSQLjqpDJscgm.348 for user conductor 2021-07-10 05:03:53.514324 I | auth: deleting token FOaGFxkbJzWnJdhw.350 for user conductor 2021-07-10 05:03:53.514341 I | auth: deleting token zhqCeQHZbXYOmkZG.349 for user conductor 2021-07-10 05:03:53.514352 I | auth: deleting token hLfOXiZFjlVHqPfJ.351 for user conductor 2021-07-10 05:03:54.990079 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.09719375s) to execute 2021-07-10 05:03:54.990250 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.001450014s) to execute 2021-07-10 05:03:55.588501 I | auth: deleting token zvYGSQRVkPRCIZbX.352 for user conductor 2021-07-10 05:03:58.588632 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:03:58.588701 I | auth: deleting token ieexsjSqcurMZujY.353 for user conductor 2021-07-10 05:03:58.588724 I | auth: deleting token kNfxsyzLMGQudboH.354 for user conductor 2021-07-10 05:03:58.588746 I | auth: deleting token SeZmYVpKasVdZvqt.355 for user conductor 2021-07-10 05:04:00.492811 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.404024982s) to execute 2021-07-10 05:04:03.589044 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:04.388668 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.078003617s) to execute 2021-07-10 05:04:06.588719 I | auth: deleting token xhICfQpYhjSxxFZj.356 for user conductor 2021-07-10 05:04:06.588778 I | auth: deleting token xSUEyuKCsmPPNdZu.357 for user conductor 2021-07-10 05:04:06.588840 I | auth: deleting token rHZkvlhmhStUcBxP.359 for user conductor 2021-07-10 05:04:07.492641 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.381807205s) to execute 2021-07-10 05:04:08.589324 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:09.514218 I | auth: deleting token PaiFrjnRwzKPIHvk.358 for user conductor 2021-07-10 05:04:09.514290 I | auth: deleting token PonUVtfIScilcWwt.360 for user conductor 2021-07-10 05:04:11.588620 I | auth: deleting token WssngjzeFjJypXLT.362 for user conductor 2021-07-10 05:04:11.588684 I | auth: deleting token RDUGqLYpVTgdUDlL.361 for user conductor 2021-07-10 05:04:11.588710 I | auth: deleting token jUXjNEyTmKbcggsW.363 for user conductor 2021-07-10 05:04:13.290775 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.601901824s) to execute 2021-07-10 05:04:13.589866 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:16.294335 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.00072732s) to execute 2021-07-10 05:04:16.294548 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (3.001167594s) to execute 2021-07-10 05:04:17.514309 I | auth: deleting token cEVKfCHrdfaKmpUN.368 for user conductor 2021-07-10 05:04:17.514471 I | auth: deleting token KSvyjDjnhiCnGwOO.364 for user conductor 2021-07-10 05:04:17.514575 I | auth: deleting token pGSOIofaezvJNNFy.367 for user conductor 2021-07-10 05:04:17.514707 I | auth: deleting token PZJgkEaJDorqiDBX.365 for user conductor 2021-07-10 05:04:17.514813 I | auth: deleting token jzITKfnAZFRzcUHX.366 for user conductor 2021-07-10 05:04:17.514948 I | auth: deleting token saidbUyJtHvSRpFp.369 for user conductor 2021-07-10 05:04:18.514255 I | auth: deleting token FwBrPIFHlGvsSbJP.370 for user conductor 2021-07-10 05:04:18.590203 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:18.993677 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.699975391s) to execute 2021-07-10 05:04:18.994069 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.603245346s) to execute 2021-07-10 05:04:19.088748 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.699876419s) to execute 2021-07-10 05:04:20.588583 I | auth: deleting token uSOuaJHDKhNUzeSc.371 for user conductor 2021-07-10 05:04:21.589378 I | auth: deleting token XbdkEnvuIdajlnQO.372 for user conductor 2021-07-10 05:04:22.092306 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.000356518s) to execute 2021-07-10 05:04:22.092622 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.982986334s) to execute 2021-07-10 05:04:23.590594 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:24.588583 I | auth: deleting token VznOWLCuVXakgncf.373 for user conductor 2021-07-10 05:04:24.588644 I | auth: deleting token mskQKAzIdBTvlYcg.374 for user conductor 2021-07-10 05:04:27.395264 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.205228618s) to execute 2021-07-10 05:04:28.590886 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:29.514247 I | auth: deleting token rVezWFpVJqpuFwai.378 for user conductor 2021-07-10 05:04:29.514310 I | auth: deleting token NUxYCfFvgWUqGtSm.376 for user conductor 2021-07-10 05:04:29.514333 I | auth: deleting token QzgFlnPXbfUJhutd.380 for user conductor 2021-07-10 05:04:29.514346 I | auth: deleting token TmwgRxDnFFrvEVCq.377 for user conductor 2021-07-10 05:04:29.514358 I | auth: deleting token HYfgzdHwASdgXsri.375 for user conductor 2021-07-10 05:04:29.514368 I | auth: deleting token hHLjsVCyonLAGUds.379 for user conductor 2021-07-10 05:04:30.091394 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.602425987s) to execute 2021-07-10 05:04:30.091529 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.682317699s) to execute 2021-07-10 05:04:32.888833 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.400142368s) to execute 2021-07-10 05:04:32.888932 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.678378952s) to execute 2021-07-10 05:04:32.889090 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.700206785s) to execute 2021-07-10 05:04:33.591118 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:35.792720 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.900961064s) to execute 2021-07-10 05:04:35.792956 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.901922872s) to execute 2021-07-10 05:04:38.591453 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:40.514360 I | auth: deleting token furPsaIKcvuBCsEW.382 for user conductor 2021-07-10 05:04:40.514560 I | auth: deleting token OukpsRpRpSAjrXXb.381 for user conductor 2021-07-10 05:04:41.388528 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.592983626s) to execute 2021-07-10 05:04:41.389338 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (5.593905369s) to execute 2021-07-10 05:04:42.514276 I | auth: deleting token CFIyaFaMhxattEZB.385 for user conductor 2021-07-10 05:04:42.514446 I | auth: deleting token sUAWADFROGLqBnUd.383 for user conductor 2021-07-10 05:04:43.514269 I | auth: deleting token rNQMDmeyEkwlvNxf.384 for user conductor 2021-07-10 05:04:43.688697 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:44.392997 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.904119642s) to execute 2021-07-10 05:04:44.393538 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.904534169s) to execute 2021-07-10 05:04:47.492737 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (6.003643578s) to execute 2021-07-10 05:04:47.492897 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.904103244s) to execute 2021-07-10 05:04:48.689079 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:50.091458 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.402638436s) to execute 2021-07-10 05:04:50.092147 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.503149603s) to execute 2021-07-10 05:04:50.211108 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (116.941356ms) to execute 2021-07-10 05:04:52.990437 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.701538463s) to execute 2021-07-10 05:04:52.990757 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.379772441s) to execute 2021-07-10 05:04:53.514266 I | auth: deleting token FBEQXeekrVeTqkwm.386 for user conductor 2021-07-10 05:04:53.514313 I | auth: deleting token GfgADIyfpZjvaior.388 for user conductor 2021-07-10 05:04:53.514326 I | auth: deleting token MrsCDSOQjOCUMcJD.390 for user conductor 2021-07-10 05:04:53.514344 I | auth: deleting token spzzErmcDctmseBk.391 for user conductor 2021-07-10 05:04:53.514354 I | auth: deleting token BTlyzDQWmKRMiXxd.387 for user conductor 2021-07-10 05:04:53.689411 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:04:55.794232 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.605425975s) to execute 2021-07-10 05:04:56.514211 I | auth: deleting token jjsUZqIweuGfOVRh.392 for user conductor 2021-07-10 05:04:56.514251 I | auth: deleting token XvBysKVZVzrItEZY.389 for user conductor 2021-07-10 05:04:56.514258 I | auth: deleting token TfPBuFGIqykJzTQw.393 for user conductor 2021-07-10 05:04:56.514265 I | auth: deleting token wYNwdIoKOggLXPAy.395 for user conductor 2021-07-10 05:04:56.514272 I | auth: deleting token KRcHcoYDseOAVzrS.397 for user conductor 2021-07-10 05:04:58.393224 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.304436044s) to execute 2021-07-10 05:04:58.393352 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (2.596987786s) to execute 2021-07-10 05:04:58.689711 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:00.890857 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.380279731s) to execute 2021-07-10 05:05:00.988618 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.499716576s) to execute 2021-07-10 05:05:01.514250 I | auth: deleting token dQVHJFEQNJYnNOIL.401 for user conductor 2021-07-10 05:05:01.514330 I | auth: deleting token ZQEUgYBILyrwiJSS.398 for user conductor 2021-07-10 05:05:01.514350 I | auth: deleting token GLGYClfThBBmtven.399 for user conductor 2021-07-10 05:05:03.689997 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:04.514223 I | auth: deleting token uroCaxVocIzVLoPz.405 for user conductor 2021-07-10 05:05:04.514284 I | auth: deleting token rYiashVNwieUXbIj.400 for user conductor 2021-07-10 05:05:04.514306 I | auth: deleting token CkyLbXGYxhphCmjN.402 for user conductor 2021-07-10 05:05:04.514321 I | auth: deleting token zmTTSfohDYmMemNz.404 for user conductor 2021-07-10 05:05:04.514333 I | auth: deleting token jRxfKKJSDcVcyRPF.403 for user conductor 2021-07-10 05:05:06.690095 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.698849666s) to execute 2021-07-10 05:05:06.690441 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.794897463s) to execute 2021-07-10 05:05:08.690299 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:09.695169 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.002576574s) to execute 2021-07-10 05:05:09.695520 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.003050241s) to execute 2021-07-10 05:05:09.695870 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.907044077s) to execute 2021-07-10 05:05:10.514217 I | auth: deleting token vswHRFXuPCNohnXm.408 for user conductor 2021-07-10 05:05:10.514281 I | auth: deleting token pqGcmllidlRleIQv.406 for user conductor 2021-07-10 05:05:12.397438 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.587011436s) to execute 2021-07-10 05:05:12.514266 I | auth: deleting token ahKaTXqXkzkHFyCp.411 for user conductor 2021-07-10 05:05:12.514336 I | auth: deleting token EISeqEohrdUTKhmg.409 for user conductor 2021-07-10 05:05:12.514351 I | auth: deleting token BLEVpuoumVvujHuu.412 for user conductor 2021-07-10 05:05:12.514371 I | auth: deleting token mGWCiiqBXXDnAWVK.410 for user conductor 2021-07-10 05:05:12.514391 I | auth: deleting token sGVdRpUyaKyYQOFy.407 for user conductor 2021-07-10 05:05:13.690492 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:14.991516 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.499214101s) to execute 2021-07-10 05:05:15.514211 I | auth: deleting token SqdpDsfMvrKfqbZE.414 for user conductor 2021-07-10 05:05:15.514295 I | auth: deleting token TPJpPmHvBYNAPeut.413 for user conductor 2021-07-10 05:05:17.991225 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.999536943s) to execute 2021-07-10 05:05:17.991492 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.902617635s) to execute 2021-07-10 05:05:17.991661 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.502870985s) to execute 2021-07-10 05:05:18.514240 I | auth: deleting token jcmoIDQGvfwTGUOF.416 for user conductor 2021-07-10 05:05:18.690829 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:20.514238 I | auth: deleting token sEjbWLoixBRRPBBF.417 for user conductor 2021-07-10 05:05:20.514296 I | auth: deleting token AJOUxhNQfrodOyUZ.415 for user conductor 2021-07-10 05:05:20.514313 I | auth: deleting token TpjcoKJubFMVEYgv.419 for user conductor 2021-07-10 05:05:20.893771 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.799945966s) to execute 2021-07-10 05:05:21.514135 I | auth: deleting token HzeXuzQumrJQQpos.420 for user conductor 2021-07-10 05:05:21.514257 I | auth: deleting token DbOUaZepocPYkrba.421 for user conductor 2021-07-10 05:05:21.514279 I | auth: deleting token TdmWPdTldMijBKPI.418 for user conductor 2021-07-10 05:05:22.588552 I | auth: deleting token rHQRRupoVtVfXgUO.422 for user conductor 2021-07-10 05:05:23.691185 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:23.889333 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.473663458s) to execute 2021-07-10 05:05:24.514290 I | auth: deleting token iRoliNWSFEkeCoYD.423 for user conductor 2021-07-10 05:05:25.588476 I | auth: deleting token bKbiKJwdyebyqiBx.424 for user conductor 2021-07-10 05:05:26.514125 I | auth: deleting token xzPhMmJtNhiJrAlA.425 for user conductor 2021-07-10 05:05:27.793236 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (904.449363ms) to execute 2021-07-10 05:05:28.691522 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:29.514280 I | auth: deleting token RziwQifCGjxbxQox.426 for user conductor 2021-07-10 05:05:29.514353 I | auth: deleting token MmdIjboLKjxhjOLC.427 for user conductor 2021-07-10 05:05:29.514367 I | auth: deleting token vjJmESelaJHfarEY.428 for user conductor 2021-07-10 05:05:31.393949 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.705079463s) to execute 2021-07-10 05:05:31.810584 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (297.522112ms) to execute 2021-07-10 05:05:32.514253 I | auth: deleting token PhPpfUUWiFgSUkAu.430 for user conductor 2021-07-10 05:05:32.514309 I | auth: deleting token xRYstoDCKENmejmU.429 for user conductor 2021-07-10 05:05:33.691923 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:35.514277 I | auth: deleting token TCHPEjPqbvYyTyQL.434 for user conductor 2021-07-10 05:05:35.514367 I | auth: deleting token KazeLBnswALfXMmZ.432 for user conductor 2021-07-10 05:05:35.514394 I | auth: deleting token ziFFXjbtCDNALIrH.431 for user conductor 2021-07-10 05:05:35.514420 I | auth: deleting token NjGDDNpLToFcJxVm.433 for user conductor 2021-07-10 05:05:38.514149 I | auth: deleting token IPNofhMnMJlgUwqu.435 for user conductor 2021-07-10 05:05:38.692206 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:40.514202 I | auth: deleting token dEEzpdpwPJXoIaZX.438 for user conductor 2021-07-10 05:05:40.514316 I | auth: deleting token nqVUwiZgejBdUuZj.437 for user conductor 2021-07-10 05:05:43.692484 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:45.588535 I | auth: deleting token MMwXhKasiTLdaRzH.436 for user conductor 2021-07-10 05:05:45.588608 I | auth: deleting token zQmrMEGAZFJhurYU.442 for user conductor 2021-07-10 05:05:45.588631 I | auth: deleting token FdcxpkkibHaJDSBY.443 for user conductor 2021-07-10 05:05:45.588651 I | auth: deleting token jMPUMSjoTXGpQAeR.439 for user conductor 2021-07-10 05:05:45.688594 I | auth: deleting token yWGOhvGRRCWqMzzW.440 for user conductor 2021-07-10 05:05:45.688612 I | auth: deleting token ZHrMUjRvyPiRxCnA.441 for user conductor 2021-07-10 05:05:46.610132 I | auth: deleting token tabcTNHfPoEzEjrF.444 for user conductor 2021-07-10 05:05:47.514310 I | auth: deleting token SOfRTZlnkCLdZGEU.445 for user conductor 2021-07-10 05:05:48.692814 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:49.091058 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (9.099444043s) to execute 2021-07-10 05:05:49.514251 I | auth: deleting token ixFzDPWicaJNtPUE.446 for user conductor 2021-07-10 05:05:50.514290 I | auth: deleting token MXdFOwgtEgjylJxS.447 for user conductor 2021-07-10 05:05:51.992445 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.781769075s) to execute 2021-07-10 05:05:51.992684 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.898570466s) to execute 2021-07-10 05:05:51.992940 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.899203156s) to execute 2021-07-10 05:05:52.588598 I | auth: deleting token BzflVPPoKWBAQRMU.448 for user conductor 2021-07-10 05:05:53.693122 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:05:57.789615 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.199627874s) to execute 2021-07-10 05:05:58.788660 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:00.692819 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.900397599s) to execute 2021-07-10 05:06:00.692966 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.781872562s) to execute 2021-07-10 05:06:02.514250 I | auth: deleting token ttjuRpLSvVNAflEm.451 for user conductor 2021-07-10 05:06:02.514303 I | auth: deleting token JfmBwXSfYfDsUDeq.450 for user conductor 2021-07-10 05:06:02.514322 I | auth: deleting token JmbhpTwBAvJhSDIV.449 for user conductor 2021-07-10 05:06:02.514345 I | auth: deleting token lqkFCHsoOntuKMBH.453 for user conductor 2021-07-10 05:06:03.788960 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:05.588578 I | auth: deleting token WlFhZnXaGCEdxJft.454 for user conductor 2021-07-10 05:06:05.588721 I | auth: deleting token yULGfMjAlBEttMMN.452 for user conductor 2021-07-10 05:06:05.993318 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.202561447s) to execute 2021-07-10 05:06:05.994235 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.20554299s) to execute 2021-07-10 05:06:08.514213 I | auth: deleting token mQMQMDJrWHFKxlba.457 for user conductor 2021-07-10 05:06:08.514275 I | auth: deleting token SKuesoVxGLGlXrgA.455 for user conductor 2021-07-10 05:06:08.514297 I | auth: deleting token GnjmRgZbyBOkdGXL.456 for user conductor 2021-07-10 05:06:08.789302 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:08.890553 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.799834031s) to execute 2021-07-10 05:06:08.890856 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.80215098s) to execute 2021-07-10 05:06:11.590920 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.501662351s) to execute 2021-07-10 05:06:11.591044 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.697813808s) to execute 2021-07-10 05:06:11.591169 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.680793938s) to execute 2021-07-10 05:06:11.591331 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.000592141s) to execute 2021-07-10 05:06:13.789621 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:14.389042 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.675284198s) to execute 2021-07-10 05:06:14.389193 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.37858106s) to execute 2021-07-10 05:06:17.690508 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.679839268s) to execute 2021-07-10 05:06:18.790115 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:19.611448 I | auth: deleting token affpEfWfgDMUAwbu.463 for user conductor 2021-07-10 05:06:19.611572 I | auth: deleting token zKNasRcYmQFStNTK.464 for user conductor 2021-07-10 05:06:19.611588 I | auth: deleting token QaXsRPYijiLrCwCz.467 for user conductor 2021-07-10 05:06:19.611599 I | auth: deleting token BWoyFypDhIfKStJW.460 for user conductor 2021-07-10 05:06:19.611607 I | auth: deleting token SqPxmHysoINYVmrj.459 for user conductor 2021-07-10 05:06:19.611614 I | auth: deleting token oYuOpPbNWjmTgyUu.461 for user conductor 2021-07-10 05:06:19.611656 I | auth: deleting token RQbzWTbwbVBjNDjm.465 for user conductor 2021-07-10 05:06:20.490706 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601849627s) to execute 2021-07-10 05:06:20.514248 I | auth: deleting token peqlzbbwTDVVleTd.462 for user conductor 2021-07-10 05:06:20.514314 I | auth: deleting token WtEgPnYbwcVRIGkj.466 for user conductor 2021-07-10 05:06:20.514332 I | auth: deleting token wxoluSlHJpUhTXTa.468 for user conductor 2021-07-10 05:06:20.514353 I | auth: deleting token RcsmZezMoBjxOfod.470 for user conductor 2021-07-10 05:06:21.514234 I | auth: deleting token xBrzTjcoswAKqmum.472 for user conductor 2021-07-10 05:06:23.514448 I | auth: deleting token agaGzvjazDGFRfXi.473 for user conductor 2021-07-10 05:06:23.790517 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:24.514354 I | auth: deleting token wdtfgbUnKzBXlibC.474 for user conductor 2021-07-10 05:06:25.514329 I | auth: deleting token tfTenParKzhZFjnk.475 for user conductor 2021-07-10 05:06:28.790809 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:29.588538 I | auth: deleting token CqSvotFckJJiGxja.476 for user conductor 2021-07-10 05:06:29.588605 I | auth: deleting token KCgnRwZISkhCFQaH.477 for user conductor 2021-07-10 05:06:33.091416 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.702543227s) to execute 2021-07-10 05:06:33.791276 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:36.588429 I | auth: deleting token mPUDpEcejHvxoxcd.480 for user conductor 2021-07-10 05:06:36.588485 I | auth: deleting token TGykxOnJnLfcvMpR.478 for user conductor 2021-07-10 05:06:36.588515 I | auth: deleting token feEskLKQIcnKDfVr.479 for user conductor 2021-07-10 05:06:38.697467 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.486628838s) to execute 2021-07-10 05:06:38.697711 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.603612137s) to execute 2021-07-10 05:06:38.791646 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:39.514201 I | auth: deleting token fhMLPcjciDzQFqCh.482 for user conductor 2021-07-10 05:06:39.514250 I | auth: deleting token XNOpKRrhqWZDhJzf.481 for user conductor 2021-07-10 05:06:42.514362 I | auth: deleting token myXcPTgkNHUTcUQt.483 for user conductor 2021-07-10 05:06:43.791898 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:44.792438 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.482078816s) to execute 2021-07-10 05:06:45.514325 I | auth: deleting token zcEVBdbBAPiemxQF.484 for user conductor 2021-07-10 05:06:47.890493 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.095040465s) to execute 2021-07-10 05:06:47.890769 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.095576244s) to execute 2021-07-10 05:06:48.588672 I | auth: deleting token xCWkyitzmKipMueg.485 for user conductor 2021-07-10 05:06:48.792155 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:50.294413 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.400894171s) to execute 2021-07-10 05:06:50.294667 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.40178574s) to execute 2021-07-10 05:06:51.588963 I | auth: deleting token hpSaasYtykAcDhmn.488 for user conductor 2021-07-10 05:06:51.589024 I | auth: deleting token OTBBzCrfVoCeTsHm.490 for user conductor 2021-07-10 05:06:51.589043 I | auth: deleting token gmyHqDfNCCSybcAG.489 for user conductor 2021-07-10 05:06:51.589059 I | auth: deleting token sATlcorTcunQZDJn.487 for user conductor 2021-07-10 05:06:51.589074 I | auth: deleting token WsOsijdbpmRLueUS.486 for user conductor 2021-07-10 05:06:52.514459 I | auth: deleting token TLrGrIXqTjulXkKQ.491 for user conductor 2021-07-10 05:06:53.593313 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.180876398s) to execute 2021-07-10 05:06:53.593583 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.204751364s) to execute 2021-07-10 05:06:53.792398 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:06:54.514379 I | auth: deleting token qjjidEiCVEmvEwIR.492 for user conductor 2021-07-10 05:06:55.514313 I | auth: deleting token IUbvhYLAUUTjkBBM.493 for user conductor 2021-07-10 05:06:56.492669 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.803751638s) to execute 2021-07-10 05:06:56.492958 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.804109618s) to execute 2021-07-10 05:06:58.888595 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:06:59.194153 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.603203093s) to execute 2021-07-10 05:07:01.789206 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.500342819s) to execute 2021-07-10 05:07:01.789355 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.198551643s) to execute 2021-07-10 05:07:01.789575 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.497760967s) to execute 2021-07-10 05:07:03.888980 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:04.514244 I | auth: deleting token gdqbjCOxySHJEyzV.495 for user conductor 2021-07-10 05:07:04.514310 I | auth: deleting token rPPkuPwHYASiClzj.494 for user conductor 2021-07-10 05:07:04.514331 I | auth: deleting token REEjePKsFVBGNPQj.497 for user conductor 2021-07-10 05:07:04.514364 I | auth: deleting token GuisOozesrVHoanr.499 for user conductor 2021-07-10 05:07:04.514389 I | auth: deleting token HWMECbhaJgAKjXfG.500 for user conductor 2021-07-10 05:07:06.690544 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.401711058s) to execute 2021-07-10 05:07:07.588630 I | auth: deleting token nXsRHpirLDQduoNy.498 for user conductor 2021-07-10 05:07:07.588715 I | auth: deleting token hranhqfVEfawMaYP.502 for user conductor 2021-07-10 05:07:07.588737 I | auth: deleting token kblLPXStibmDPCzt.496 for user conductor 2021-07-10 05:07:07.588752 I | auth: deleting token nirfNMWNubHsXnAt.501 for user conductor 2021-07-10 05:07:07.588765 I | auth: deleting token nKcSMBblOtOWWsGn.503 for user conductor 2021-07-10 05:07:08.889175 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:09.297721 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.60389084s) to execute 2021-07-10 05:07:09.298023 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.604598642s) to execute 2021-07-10 05:07:12.197699 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.806399737s) to execute 2021-07-10 05:07:12.288555 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.809307396s) to execute 2021-07-10 05:07:13.514199 I | auth: deleting token RRCMvFsyNdnBritI.504 for user conductor 2021-07-10 05:07:13.514237 I | auth: deleting token vwMONIhWrKYfhOur.506 for user conductor 2021-07-10 05:07:13.514246 I | auth: deleting token kuSXisOtERnEUqMi.507 for user conductor 2021-07-10 05:07:13.889938 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:16.514277 I | auth: deleting token BZejOcaqKZhysPyb.505 for user conductor 2021-07-10 05:07:16.514353 I | auth: deleting token rtTMxkKkfaISNxGh.508 for user conductor 2021-07-10 05:07:16.514369 I | auth: deleting token AvkLgWNegPCSdzfV.510 for user conductor 2021-07-10 05:07:16.514385 I | auth: deleting token DXFpenhtDKweeZzc.509 for user conductor 2021-07-10 05:07:17.793526 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.404813546s) to execute 2021-07-10 05:07:17.793897 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.400018742s) to execute 2021-07-10 05:07:17.794036 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.77955134s) to execute 2021-07-10 05:07:17.910889 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (114.41809ms) to execute 2021-07-10 05:07:18.890112 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:20.389294 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.400419864s) to execute 2021-07-10 05:07:22.514293 I | auth: deleting token pmCrlrSjOMjeDUUM.511 for user conductor 2021-07-10 05:07:22.514359 I | auth: deleting token HQVTHQtCexcLIhuV.512 for user conductor 2021-07-10 05:07:22.514378 I | auth: deleting token GojRKEsorQNIMPTE.514 for user conductor 2021-07-10 05:07:22.888944 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.378423296s) to execute 2021-07-10 05:07:23.890432 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:26.090508 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (3.19745545s) to execute 2021-07-10 05:07:26.090713 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.07947634s) to execute 2021-07-10 05:07:27.514248 I | auth: deleting token GoaIfsgfLkZZXVsU.519 for user conductor 2021-07-10 05:07:27.514309 I | auth: deleting token tOWjRLUHWPQGzKJX.517 for user conductor 2021-07-10 05:07:27.514329 I | auth: deleting token RmBjdmnihUbyMmZC.516 for user conductor 2021-07-10 05:07:27.514348 I | auth: deleting token PxmeXGJlwDhKqrdP.513 for user conductor 2021-07-10 05:07:28.698342 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.409492606s) to execute 2021-07-10 05:07:28.698509 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.605431122s) to execute 2021-07-10 05:07:28.890660 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:30.514279 I | auth: deleting token uyhGntcsddmXiouR.515 for user conductor 2021-07-10 05:07:30.514336 I | auth: deleting token nQGuVCRJzpGzUFcl.518 for user conductor 2021-07-10 05:07:31.390344 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.691855666s) to execute 2021-07-10 05:07:31.390803 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.69019719s) to execute 2021-07-10 05:07:33.514254 I | auth: deleting token oyfktzqZOTqBPtFL.521 for user conductor 2021-07-10 05:07:33.514326 I | auth: deleting token rsJjaktFnNDeeqnM.522 for user conductor 2021-07-10 05:07:33.514344 I | auth: deleting token oryDMjZcoTOoMEnt.524 for user conductor 2021-07-10 05:07:33.514357 I | auth: deleting token UZpPdTFycFcNRawg.523 for user conductor 2021-07-10 05:07:33.514428 I | auth: deleting token FNslLsYgHsfigpwu.520 for user conductor 2021-07-10 05:07:33.890885 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:34.095990 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.702842487s) to execute 2021-07-10 05:07:34.096192 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.699484786s) to execute 2021-07-10 05:07:35.588678 I | auth: deleting token uvDKlvBcrTMAbODQ.525 for user conductor 2021-07-10 05:07:36.588607 I | auth: deleting token GqfFllauvLSFueaq.526 for user conductor 2021-07-10 05:07:36.691709 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.176917867s) to execute 2021-07-10 05:07:38.588645 I | auth: deleting token ksQCmxUjBSrZJzDy.527 for user conductor 2021-07-10 05:07:38.988640 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:39.293775 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.504735217s) to execute 2021-07-10 05:07:39.294504 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.600373426s) to execute 2021-07-10 05:07:39.588581 I | auth: deleting token RKEonJMLCiNBiGQr.528 for user conductor 2021-07-10 05:07:41.514286 I | auth: deleting token fXCREUxymhldihPm.529 for user conductor 2021-07-10 05:07:41.991648 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.695481302s) to execute 2021-07-10 05:07:41.992006 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.578673373s) to execute 2021-07-10 05:07:41.992058 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.602965467s) to execute 2021-07-10 05:07:42.514295 I | auth: deleting token gwyAGhAORchPvPmO.530 for user conductor 2021-07-10 05:07:43.988965 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:44.788801 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.697727053s) to execute 2021-07-10 05:07:44.910842 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (118.720741ms) to execute 2021-07-10 05:07:46.588636 I | auth: deleting token VNdlbJdmhBOegfeu.532 for user conductor 2021-07-10 05:07:46.588758 I | auth: deleting token ggPSNwoGTTMxIWvZ.531 for user conductor 2021-07-10 05:07:48.989293 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:50.594772 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.984181301s) to execute 2021-07-10 05:07:50.889034 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.015782ms) to execute 2021-07-10 05:07:53.288874 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.098824484s) to execute 2021-07-10 05:07:53.989640 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:56.093820 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.7051358s) to execute 2021-07-10 05:07:57.588513 I | auth: deleting token saCcPnYErxpqLvSW.537 for user conductor 2021-07-10 05:07:57.588576 I | auth: deleting token YuqwywFAcboVfHEl.533 for user conductor 2021-07-10 05:07:57.588594 I | auth: deleting token cHIPJKbXQFeXpzGc.534 for user conductor 2021-07-10 05:07:57.588610 I | auth: deleting token xsDPoAxHOzfGJEHA.536 for user conductor 2021-07-10 05:07:57.588636 I | auth: deleting token QjaRtLpODvdirUgD.535 for user conductor 2021-07-10 05:07:58.990065 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:07:59.089504 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.899643977s) to execute 2021-07-10 05:07:59.089833 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.993521037s) to execute 2021-07-10 05:08:02.514196 I | auth: deleting token KlYVuhTOMOZNhmdf.542 for user conductor 2021-07-10 05:08:02.514260 I | auth: deleting token jelAGdyVRVJUZCrL.539 for user conductor 2021-07-10 05:08:02.514278 I | auth: deleting token XyYlvoqcAgCwxYMy.543 for user conductor 2021-07-10 05:08:02.514291 I | auth: deleting token LeYqZZmFpGrFUzyO.541 for user conductor 2021-07-10 05:08:02.514310 I | auth: deleting token AVJVZgbKXSAJKzTw.538 for user conductor 2021-07-10 05:08:03.588539 I | auth: deleting token hyeLcYmBruhmRfKR.544 for user conductor 2021-07-10 05:08:03.990353 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:04.294017 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.705215353s) to execute 2021-07-10 05:08:04.514127 I | auth: deleting token JQVfZbiceDjYeAOq.545 for user conductor 2021-07-10 05:08:06.514226 I | auth: deleting token JTgvCXogTyZrAQps.546 for user conductor 2021-07-10 05:08:06.791005 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.494084392s) to execute 2021-07-10 05:08:07.588533 I | auth: deleting token NiwaJKxTIVMerShR.547 for user conductor 2021-07-10 05:08:08.990689 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:09.210023 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (4.913326411s) to execute 2021-07-10 05:08:09.210429 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.416088381s) to execute 2021-07-10 05:08:09.210560 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.321713495s) to execute 2021-07-10 05:08:09.514279 I | auth: deleting token OBwyRoNooqLrEnqw.548 for user conductor 2021-07-10 05:08:10.588635 I | auth: deleting token GCvScRGAOyHbaoQf.549 for user conductor 2021-07-10 05:08:11.397224 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.108386469s) to execute 2021-07-10 05:08:11.397340 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.004797569s) to execute 2021-07-10 05:08:12.514255 I | auth: deleting token czKxsrFCyQIBPLZf.550 for user conductor 2021-07-10 05:08:14.088642 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:14.293136 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.782456239s) to execute 2021-07-10 05:08:14.293353 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.893830349s) to execute 2021-07-10 05:08:14.510559 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (121.59751ms) to execute 2021-07-10 05:08:14.514136 I | auth: deleting token bnRgiiGyxqTpMdyC.551 for user conductor 2021-07-10 05:08:15.588649 I | auth: deleting token ZcCWIgnCUMVZfggx.552 for user conductor 2021-07-10 05:08:17.588491 I | auth: deleting token fmmwSXmTlpejCaZy.553 for user conductor 2021-07-10 05:08:17.588561 I | auth: deleting token svmDdEEUKevzVNzo.554 for user conductor 2021-07-10 05:08:17.589837 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.098175216s) to execute 2021-07-10 05:08:19.088958 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:20.290737 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.679897306s) to execute 2021-07-10 05:08:20.588613 I | auth: deleting token gKczHJcAnDWNgZtE.556 for user conductor 2021-07-10 05:08:20.588658 I | auth: deleting token jrDcDhoezAUhnuBg.557 for user conductor 2021-07-10 05:08:22.797132 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.502526742s) to execute 2021-07-10 05:08:22.888642 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.594779537s) to execute 2021-07-10 05:08:22.993335 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (104.29898ms) to execute 2021-07-10 05:08:23.514229 I | auth: deleting token jNtqTZKHiQNSBtYh.559 for user conductor 2021-07-10 05:08:23.514281 I | auth: deleting token HCzxkQPdfYaLNKnD.555 for user conductor 2021-07-10 05:08:24.089170 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:26.514140 I | auth: deleting token oAgRVmGycdNrGbAs.558 for user conductor 2021-07-10 05:08:28.293131 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.803322925s) to execute 2021-07-10 05:08:29.089506 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:29.588544 I | auth: deleting token DrgafWyPOkUNdfFq.560 for user conductor 2021-07-10 05:08:32.893219 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.078507154s) to execute 2021-07-10 05:08:34.089791 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:34.588641 I | auth: deleting token iUJOmfIfUgiXHkfR.561 for user conductor 2021-07-10 05:08:35.590703 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.580275769s) to execute 2021-07-10 05:08:35.590932 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.601984843s) to execute 2021-07-10 05:08:37.588524 I | auth: deleting token iipzHAiQlvZriSVi.563 for user conductor 2021-07-10 05:08:37.588605 I | auth: deleting token UoNvCbllukzKBpHk.564 for user conductor 2021-07-10 05:08:37.588623 I | auth: deleting token wGTYpJtiIncnnSxY.562 for user conductor 2021-07-10 05:08:37.588638 I | auth: deleting token idTjIhIZhqhkKrjp.565 for user conductor 2021-07-10 05:08:38.189577 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.595575184s) to execute 2021-07-10 05:08:39.090203 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:40.893307 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.104426947s) to execute 2021-07-10 05:08:40.893697 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.204907304s) to execute 2021-07-10 05:08:41.011725 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (115.959943ms) to execute 2021-07-10 05:08:43.996583 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.907598185s) to execute 2021-07-10 05:08:44.090370 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:47.390360 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.279441499s) to execute 2021-07-10 05:08:49.090570 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:49.514296 I | auth: deleting token yBpoRoTstFdnfrlc.567 for user conductor 2021-07-10 05:08:49.514367 I | auth: deleting token NzOnzjgHxYRnUpVl.566 for user conductor 2021-07-10 05:08:52.514321 I | auth: deleting token rzybDMFcAQhHXHez.569 for user conductor 2021-07-10 05:08:52.514388 I | auth: deleting token tZgoXAxTahoHhgCh.568 for user conductor 2021-07-10 05:08:52.514415 I | auth: deleting token dSpfCLJnhksxyxBE.570 for user conductor 2021-07-10 05:08:54.090908 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:56.989814 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.60000961s) to execute 2021-07-10 05:08:59.091255 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:08:59.690342 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.697059135s) to execute 2021-07-10 05:08:59.690625 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.698502981s) to execute 2021-07-10 05:09:00.514242 I | auth: deleting token bNNTYRMVvVMgbygA.574 for user conductor 2021-07-10 05:09:00.514297 I | auth: deleting token KSjbNDFTrCmJCNso.572 for user conductor 2021-07-10 05:09:00.514315 I | auth: deleting token iTgPlPwjImqGtDpu.575 for user conductor 2021-07-10 05:09:01.588629 I | auth: deleting token PBLtVjAvXFffFEtz.576 for user conductor 2021-07-10 05:09:01.588678 I | auth: deleting token tATqGauJLbKAPrQY.573 for user conductor 2021-07-10 05:09:01.588687 I | auth: deleting token ElhnitxZNvOWWNYR.571 for user conductor 2021-07-10 05:09:02.189982 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.197435768s) to execute 2021-07-10 05:09:02.190285 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.496918s) to execute 2021-07-10 05:09:02.190380 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.493447853s) to execute 2021-07-10 05:09:02.588566 I | auth: deleting token FCkemyAfkEBMQZaH.577 for user conductor 2021-07-10 05:09:04.091578 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:04.514368 I | auth: deleting token taPNKeAYoQONCYkP.578 for user conductor 2021-07-10 05:09:04.514425 I | auth: deleting token DNhsyZMSUmtqDWbz.579 for user conductor 2021-07-10 05:09:04.888752 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.695530175s) to execute 2021-07-10 05:09:07.588647 I | auth: deleting token GiAgUQiNqpmecqZN.580 for user conductor 2021-07-10 05:09:07.588809 I | auth: deleting token eJVrjCAdwgfIOGIP.581 for user conductor 2021-07-10 05:09:09.188612 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:10.096292 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.007355761s) to execute 2021-07-10 05:09:10.096683 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.20523676s) to execute 2021-07-10 05:09:12.788600 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.599670358s) to execute 2021-07-10 05:09:13.514208 I | auth: deleting token GuooiHuETRcgoEBB.586 for user conductor 2021-07-10 05:09:13.514262 I | auth: deleting token VkORXeDeLqDlbjLv.584 for user conductor 2021-07-10 05:09:13.514306 I | auth: deleting token fkfLcNtdfFIUVMwk.583 for user conductor 2021-07-10 05:09:14.189084 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:15.689797 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.400672723s) to execute 2021-07-10 05:09:15.689919 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.177371473s) to execute 2021-07-10 05:09:16.588666 I | auth: deleting token DXlNPrHEpzogcLde.582 for user conductor 2021-07-10 05:09:16.588744 I | auth: deleting token UHUJDllppZZnBjiM.585 for user conductor 2021-07-10 05:09:18.193994 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.405168812s) to execute 2021-07-10 05:09:18.288625 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.499787771s) to execute 2021-07-10 05:09:19.189465 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:19.514267 I | auth: deleting token EgsTGbMZXvGNFNLe.589 for user conductor 2021-07-10 05:09:19.514387 I | auth: deleting token pYBEsUbgZMFnpHbA.588 for user conductor 2021-07-10 05:09:19.514418 I | auth: deleting token DlXUzndnhZInLwiy.587 for user conductor 2021-07-10 05:09:21.289303 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.978216382s) to execute 2021-07-10 05:09:21.289636 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.093475935s) to execute 2021-07-10 05:09:24.189831 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:26.993632 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.483144894s) to execute 2021-07-10 05:09:29.190113 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:30.514254 I | auth: deleting token MvUxmwvvSmYBLzYB.590 for user conductor 2021-07-10 05:09:30.514316 I | auth: deleting token IoAdStYAoCcCJCTP.591 for user conductor 2021-07-10 05:09:32.289519 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.000704322s) to execute 2021-07-10 05:09:32.289835 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.200969462s) to execute 2021-07-10 05:09:33.588729 I | auth: deleting token codTDcfqGEOhNDmU.592 for user conductor 2021-07-10 05:09:34.288546 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:35.209227 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.917635218s) to execute 2021-07-10 05:09:35.288621 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.917229607s) to execute 2021-07-10 05:09:35.288772 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.915687911s) to execute 2021-07-10 05:09:36.588573 I | auth: deleting token ghSVCzlIilZoevtf.593 for user conductor 2021-07-10 05:09:37.893076 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.60076282s) to execute 2021-07-10 05:09:39.288916 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:40.592965 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.602063327s) to execute 2021-07-10 05:09:40.593200 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.604341539s) to execute 2021-07-10 05:09:41.610833 I | auth: deleting token ifSUyOAcioTsPKbU.597 for user conductor 2021-07-10 05:09:41.610917 I | auth: deleting token vfKgWqGAksVnnuPz.594 for user conductor 2021-07-10 05:09:42.588556 I | auth: deleting token XoPtkVpljgrTTTZh.595 for user conductor 2021-07-10 05:09:42.588640 I | auth: deleting token ZTHzsllrWgIJQZop.596 for user conductor 2021-07-10 05:09:43.498011 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.70942744s) to execute 2021-07-10 05:09:43.589034 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.800288899s) to execute 2021-07-10 05:09:44.289263 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:47.588640 I | auth: deleting token AYOXmfwxLfTThmwf.599 for user conductor 2021-07-10 05:09:49.289581 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:49.491817 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.900889475s) to execute 2021-07-10 05:09:49.492331 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.899003573s) to execute 2021-07-10 05:09:50.588727 I | auth: deleting token VDMYpImyNpaDThQk.603 for user conductor 2021-07-10 05:09:50.588798 I | auth: deleting token jIyGmNLKMmYzHwIy.601 for user conductor 2021-07-10 05:09:50.588812 I | auth: deleting token BSerLgIecsKehCvl.602 for user conductor 2021-07-10 05:09:50.588828 I | auth: deleting token SFoFfUFTZKWJbMYv.600 for user conductor 2021-07-10 05:09:50.588840 I | auth: deleting token bTbHKBGxWVzOYELj.598 for user conductor 2021-07-10 05:09:52.096401 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.306563718s) to execute 2021-07-10 05:09:53.588581 I | auth: deleting token PrPMuBWMJlgakxXZ.604 for user conductor 2021-07-10 05:09:54.289883 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:09:54.894044 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.605084995s) to execute 2021-07-10 05:09:54.894248 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.705546224s) to execute 2021-07-10 05:09:54.991653 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.802804486s) to execute 2021-07-10 05:09:56.514269 I | auth: deleting token OraJYDMSFpPptLXu.605 for user conductor 2021-07-10 05:09:56.514335 I | auth: deleting token mYZKOItgONDMprDg.607 for user conductor 2021-07-10 05:09:57.394317 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.497122216s) to execute 2021-07-10 05:09:57.394536 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.400132021s) to execute 2021-07-10 05:09:58.514256 I | auth: deleting token tByaUmPFpkXdsuEp.606 for user conductor 2021-07-10 05:09:58.514327 I | auth: deleting token LSDmMpppNHkkVRxr.609 for user conductor 2021-07-10 05:09:59.290235 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:00.192181 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.476542076s) to execute 2021-07-10 05:10:01.514480 I | auth: deleting token JYMbHGSyKYYOkNPQ.608 for user conductor 2021-07-10 05:10:01.514574 I | auth: deleting token TEBugujdUtyqgOAb.611 for user conductor 2021-07-10 05:10:04.290584 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:04.988913 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.696599856s) to execute 2021-07-10 05:10:04.989322 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.794846486s) to execute 2021-07-10 05:10:05.111324 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (119.00359ms) to execute 2021-07-10 05:10:05.210670 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (121.745213ms) to execute 2021-07-10 05:10:07.514206 I | auth: deleting token QxSenyimDtaDspMm.613 for user conductor 2021-07-10 05:10:07.514255 I | auth: deleting token ETUIIjIeieuUPgjQ.615 for user conductor 2021-07-10 05:10:07.514304 I | auth: deleting token chjWnGKrsHZSxBSw.610 for user conductor 2021-07-10 05:10:07.514336 I | auth: deleting token yoGkeLGmusEZKOGd.614 for user conductor 2021-07-10 05:10:09.290763 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:12.588577 I | auth: deleting token XgtttNyHNpDeKRMA.617 for user conductor 2021-07-10 05:10:14.388594 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:15.514214 I | auth: deleting token EdssoKusVOnvJErc.616 for user conductor 2021-07-10 05:10:17.095372 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (9.504761993s) to execute 2021-07-10 05:10:18.514268 I | auth: deleting token VufrSgmyMChaxtWA.625 for user conductor 2021-07-10 05:10:18.514327 I | auth: deleting token zxfDTVAxFAFDUdZY.618 for user conductor 2021-07-10 05:10:18.514346 I | auth: deleting token AjkpwvszQrJJKCqU.621 for user conductor 2021-07-10 05:10:18.514357 I | auth: deleting token ZVmDXBZJYmLdksQa.620 for user conductor 2021-07-10 05:10:18.514369 I | auth: deleting token AybfHmvWUoJKowyQ.619 for user conductor 2021-07-10 05:10:18.514379 I | auth: deleting token nFgyviYUGaUpuPLL.622 for user conductor 2021-07-10 05:10:18.514397 I | auth: deleting token SlxvMxDRQVXOLykG.623 for user conductor 2021-07-10 05:10:19.479012 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:20.092067 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.901097266s) to execute 2021-07-10 05:10:20.092198 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.903336396s) to execute 2021-07-10 05:10:20.092371 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.903430274s) to execute 2021-07-10 05:10:23.092283 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.997806221s) to execute 2021-07-10 05:10:23.092621 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.997355049s) to execute 2021-07-10 05:10:24.479303 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:24.588599 I | auth: deleting token NlOTmMnRMqYJxdMa.628 for user conductor 2021-07-10 05:10:24.588678 I | auth: deleting token hMwkAySkzoRvgppa.630 for user conductor 2021-07-10 05:10:24.588692 I | auth: deleting token lrNpgSRuHEBmBRpp.627 for user conductor 2021-07-10 05:10:24.588711 I | auth: deleting token SNnkkQJtwUwnlacI.629 for user conductor 2021-07-10 05:10:24.588750 I | auth: deleting token vnFakPgILIzEuyvg.626 for user conductor 2021-07-10 05:10:25.514236 I | auth: deleting token DjEkekmlduOvJsXP.631 for user conductor 2021-07-10 05:10:26.091031 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.90212877s) to execute 2021-07-10 05:10:26.091369 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.995754047s) to execute 2021-07-10 05:10:28.514331 I | auth: deleting token omzMdylIbbHijZKu.632 for user conductor 2021-07-10 05:10:28.514396 I | auth: deleting token OxAqqeVhlumtWlgm.634 for user conductor 2021-07-10 05:10:28.514419 I | auth: deleting token dccVoFdZKpugyObw.633 for user conductor 2021-07-10 05:10:28.794499 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.605818433s) to execute 2021-07-10 05:10:28.794774 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.698627288s) to execute 2021-07-10 05:10:29.488614 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:31.391357 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.50239088s) to execute 2021-07-10 05:10:31.391594 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.593692392s) to execute 2021-07-10 05:10:31.514319 I | auth: deleting token cOHZqReORFwSkBOS.635 for user conductor 2021-07-10 05:10:31.514389 I | auth: deleting token msnldSTqJvRDnclS.636 for user conductor 2021-07-10 05:10:32.514201 I | auth: deleting token QsfolCKmaOwFIbgV.637 for user conductor 2021-07-10 05:10:33.514266 I | auth: deleting token lclnPemCwuGUzSBB.638 for user conductor 2021-07-10 05:10:34.488948 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:34.533682 I | auth: deleting token jjaWFURpIjtVlCLJ.639 for user conductor 2021-07-10 05:10:36.514291 I | auth: deleting token HbJhGoTSWePZbinU.640 for user conductor 2021-07-10 05:10:37.097600 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.608718152s) to execute 2021-07-10 05:10:37.097796 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.583886716s) to execute 2021-07-10 05:10:37.098029 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.309115055s) to execute 2021-07-10 05:10:37.514237 I | auth: deleting token yuaOAlgAfBLmkKUq.641 for user conductor 2021-07-10 05:10:39.489281 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:40.190901 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.901861191s) to execute 2021-07-10 05:10:40.191051 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.899747197s) to execute 2021-07-10 05:10:40.191250 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.599983365s) to execute 2021-07-10 05:10:42.894681 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.589540157s) to execute 2021-07-10 05:10:42.894806 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.384200309s) to execute 2021-07-10 05:10:44.489543 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:48.993896 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.804156664s) to execute 2021-07-10 05:10:49.586756 I | auth: deleting token pTtPEXwBoPHoJxzY.644 for user conductor 2021-07-10 05:10:49.586806 I | auth: deleting token jEzqyaPilpoMquEx.646 for user conductor 2021-07-10 05:10:49.586826 I | auth: deleting token ECETqXkjlBXvMJNu.647 for user conductor 2021-07-10 05:10:49.586835 I | auth: deleting token UbVWLIMONLIjpglS.643 for user conductor 2021-07-10 05:10:49.586848 I | auth: deleting token ivGbZkAqElCcrbgc.642 for user conductor 2021-07-10 05:10:49.586857 I | auth: deleting token IAHPfhVAtQrbmlhb.648 for user conductor 2021-07-10 05:10:49.586893 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:51.994995 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.000617154s) to execute 2021-07-10 05:10:51.995655 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.999406424s) to execute 2021-07-10 05:10:52.514324 I | auth: deleting token jxhLPJhBNfVNbcFC.650 for user conductor 2021-07-10 05:10:52.514395 I | auth: deleting token UyUvoBEsBtZUqIVx.653 for user conductor 2021-07-10 05:10:52.514414 I | auth: deleting token cwdnzUzgZhMFBGAj.651 for user conductor 2021-07-10 05:10:52.514430 I | auth: deleting token DmQpFYiRaPAVeUQv.645 for user conductor 2021-07-10 05:10:54.587272 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:54.693530 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.60282853s) to execute 2021-07-10 05:10:54.693757 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.605055181s) to execute 2021-07-10 05:10:54.788589 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.699877568s) to execute 2021-07-10 05:10:58.514309 I | auth: deleting token nQqnbOKhoGaVEJjb.656 for user conductor 2021-07-10 05:10:58.514362 I | auth: deleting token cHNuRQPgleHWrJUp.657 for user conductor 2021-07-10 05:10:58.514382 I | auth: deleting token FMCdYcoEtwWchNNN.655 for user conductor 2021-07-10 05:10:58.514403 I | auth: deleting token ljkvJVAdnGpsRHRO.654 for user conductor 2021-07-10 05:10:59.587605 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:10:59.589486 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.378945048s) to execute 2021-07-10 05:10:59.812222 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (196.113431ms) to execute 2021-07-10 05:11:01.588594 I | auth: deleting token gutmrwABTWWVRQSo.659 for user conductor 2021-07-10 05:11:02.193801 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.105127111s) to execute 2021-07-10 05:11:04.587874 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:05.394245 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.105513341s) to execute 2021-07-10 05:11:06.588540 I | auth: deleting token JvdIMtiCHhFBqGVA.658 for user conductor 2021-07-10 05:11:08.193686 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.177467648s) to execute 2021-07-10 05:11:09.514150 I | auth: deleting token iwXRuCjufboGvmdw.660 for user conductor 2021-07-10 05:11:09.514362 I | auth: deleting token JleEiJHTWtJolOti.661 for user conductor 2021-07-10 05:11:09.514378 I | auth: deleting token olrhOoKGGAsmKeWP.663 for user conductor 2021-07-10 05:11:09.514392 I | auth: deleting token OvEdrRevbyMrmIOk.662 for user conductor 2021-07-10 05:11:09.588673 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:12.588849 I | auth: deleting token zqDVXyHhYCsMEbyS.665 for user conductor 2021-07-10 05:11:12.588894 I | auth: deleting token pwfNnwrhCHeWtbAx.664 for user conductor 2021-07-10 05:11:13.492491 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.181708754s) to execute 2021-07-10 05:11:14.514144 I | auth: deleting token USkqKHJPfuotkJBP.666 for user conductor 2021-07-10 05:11:14.514221 I | auth: deleting token OnRYkOrPqNWvQNVf.667 for user conductor 2021-07-10 05:11:14.514234 I | auth: deleting token UuHJJTJAUueOBEHf.668 for user conductor 2021-07-10 05:11:14.589129 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:18.514378 I | auth: deleting token LBtZeGuXhskCRUHf.669 for user conductor 2021-07-10 05:11:18.514481 I | auth: deleting token knumRwzyCiExDRIA.670 for user conductor 2021-07-10 05:11:19.589544 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:20.588509 I | auth: deleting token nUBANxfxxkjoXWCB.672 for user conductor 2021-07-10 05:11:20.588559 I | auth: deleting token iyXRJkEtpjnunshX.673 for user conductor 2021-07-10 05:11:21.514271 I | auth: deleting token lImVFcchHIfYOuhK.674 for user conductor 2021-07-10 05:11:21.514315 I | auth: deleting token CJbVhtUcratscCeZ.675 for user conductor 2021-07-10 05:11:21.514324 I | auth: deleting token ESkoIyymJmNNoRmx.671 for user conductor 2021-07-10 05:11:23.588585 I | auth: deleting token ayjxykyOhJqwpLyg.676 for user conductor 2021-07-10 05:11:24.589915 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:24.592416 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.276330395s) to execute 2021-07-10 05:11:25.514276 I | auth: deleting token XdjKMqzInQmFTWXz.677 for user conductor 2021-07-10 05:11:26.588577 I | auth: deleting token VEXBXDAfjGKkcPvy.678 for user conductor 2021-07-10 05:11:27.588763 I | auth: deleting token AHTbcjFgXKZyFeYd.679 for user conductor 2021-07-10 05:11:29.590109 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:31.193885 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.181133891s) to execute 2021-07-10 05:11:33.514309 I | auth: deleting token zWOJXBsYbsOBdzBA.680 for user conductor 2021-07-10 05:11:33.514365 I | auth: deleting token UTdnRhOkSVZQVkaQ.683 for user conductor 2021-07-10 05:11:33.514383 I | auth: deleting token BkaAyjBVLnUghSti.682 for user conductor 2021-07-10 05:11:33.889064 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.692349733s) to execute 2021-07-10 05:11:34.590508 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:36.292565 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.096105792s) to execute 2021-07-10 05:11:36.388559 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.401374685s) to execute 2021-07-10 05:11:38.495355 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.106579617s) to execute 2021-07-10 05:11:38.495626 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.604035822s) to execute 2021-07-10 05:11:38.495978 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.105342883s) to execute 2021-07-10 05:11:39.514301 I | auth: deleting token AAFWGfnxgKtdGare.686 for user conductor 2021-07-10 05:11:39.514364 I | auth: deleting token waAAgRCdghIdGUER.687 for user conductor 2021-07-10 05:11:39.514379 I | auth: deleting token VFJXMVPVdcCCHmAM.688 for user conductor 2021-07-10 05:11:39.514393 I | auth: deleting token FoTnLWEmEjiqLBsE.685 for user conductor 2021-07-10 05:11:39.514403 I | auth: deleting token PSzFwiXODhnfjKQt.689 for user conductor 2021-07-10 05:11:39.514417 I | auth: deleting token AKssdzsuqtMiKpCa.684 for user conductor 2021-07-10 05:11:39.514434 I | auth: deleting token aSGZjlBDVwsPnbDG.681 for user conductor 2021-07-10 05:11:39.590774 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:41.391811 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.80130381s) to execute 2021-07-10 05:11:41.392234 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.889312221s) to execute 2021-07-10 05:11:44.591027 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:44.591553 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.19662833s) to execute 2021-07-10 05:11:44.591990 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.100588391s) to execute 2021-07-10 05:11:44.592266 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.381762552s) to execute 2021-07-10 05:11:45.514137 I | auth: deleting token quKkpKDAXGvzRoNt.693 for user conductor 2021-07-10 05:11:45.588580 I | auth: deleting token dtYBjnDtlepfJaKN.690 for user conductor 2021-07-10 05:11:45.588611 I | auth: deleting token ZMoWfDYpPHTVarxi.691 for user conductor 2021-07-10 05:11:47.097666 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.407216984s) to execute 2021-07-10 05:11:47.412252 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (123.207641ms) to execute 2021-07-10 05:11:48.588801 I | auth: deleting token lZURoQqyysZDlYvF.695 for user conductor 2021-07-10 05:11:48.588889 I | auth: deleting token rZNRDcfhzQKtreYa.692 for user conductor 2021-07-10 05:11:49.591436 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:50.091133 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.180776901s) to execute 2021-07-10 05:11:50.588703 I | auth: deleting token InwiyOjcyRVhKWQs.697 for user conductor 2021-07-10 05:11:50.588756 I | auth: deleting token HfNdxoaXPHSUAKMI.694 for user conductor 2021-07-10 05:11:52.695146 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (982.802486ms) to execute 2021-07-10 05:11:54.514334 I | auth: deleting token lBgruXNgLuVTmZZF.699 for user conductor 2021-07-10 05:11:54.514405 I | auth: deleting token VfxiZfNyksvtrLPK.696 for user conductor 2021-07-10 05:11:54.591803 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:11:55.793737 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.604064493s) to execute 2021-07-10 05:11:56.589137 I | auth: deleting token OBAbyZALwtJUuYLk.698 for user conductor 2021-07-10 05:11:59.514257 I | auth: deleting token DfcbaEXueFJLvHPt.700 for user conductor 2021-07-10 05:11:59.592243 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:02.514245 I | auth: deleting token IZAMmUVzrQsPIRSz.702 for user conductor 2021-07-10 05:12:02.514312 I | auth: deleting token YqrDgTHzVJxlauOq.705 for user conductor 2021-07-10 05:12:02.514336 I | auth: deleting token NbmVXsYxypkDclqx.704 for user conductor 2021-07-10 05:12:02.514355 I | auth: deleting token sLYhADieTiwbirzJ.703 for user conductor 2021-07-10 05:12:02.514370 I | auth: deleting token rldDkMnwdcwQRDYB.706 for user conductor 2021-07-10 05:12:02.514397 I | auth: deleting token nLjzoBlPovEbhBeG.701 for user conductor 2021-07-10 05:12:04.188819 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.699908329s) to execute 2021-07-10 05:12:04.310774 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (119.5451ms) to execute 2021-07-10 05:12:04.312500 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (121.168178ms) to execute 2021-07-10 05:12:04.592581 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:07.190737 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.801979247s) to execute 2021-07-10 05:12:07.588634 I | auth: deleting token vsOdRPSYjpdtqVRR.710 for user conductor 2021-07-10 05:12:07.588703 I | auth: deleting token HscafxdtxPfKHBMf.707 for user conductor 2021-07-10 05:12:07.588729 I | auth: deleting token BWMOzBrtUbtRVySl.709 for user conductor 2021-07-10 05:12:09.688561 I | auth: deleting token gRLhhcwVtkelKFhz.712 for user conductor 2021-07-10 05:12:09.688628 I | auth: deleting token JdwJbgqLoObuxTOL.708 for user conductor 2021-07-10 05:12:09.688648 I | auth: deleting token CRnaBnOKbJLQXPlC.713 for user conductor 2021-07-10 05:12:09.688683 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:10.088954 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.797960538s) to execute 2021-07-10 05:12:12.514201 I | auth: deleting token IhSErzyHJRApZCZR.715 for user conductor 2021-07-10 05:12:12.514246 I | auth: deleting token cgAJtvJqhOdXFwqo.711 for user conductor 2021-07-10 05:12:12.514256 I | auth: deleting token FcyXbZdsVoDBwQgI.714 for user conductor 2021-07-10 05:12:12.514266 I | auth: deleting token IQZRUWGFGBCsyUcB.716 for user conductor 2021-07-10 05:12:12.695615 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.606495289s) to execute 2021-07-10 05:12:14.688950 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:15.590634 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.799870358s) to execute 2021-07-10 05:12:17.891715 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (7.800275801s) to execute 2021-07-10 05:12:17.891904 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.103140244s) to execute 2021-07-10 05:12:17.892224 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.299031284s) to execute 2021-07-10 05:12:17.892407 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.299454793s) to execute 2021-07-10 05:12:18.111729 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (122.946123ms) to execute 2021-07-10 05:12:18.514295 I | auth: deleting token xZbHuTZuMvZoldkb.718 for user conductor 2021-07-10 05:12:18.514354 I | auth: deleting token DmqmhTPZrGSrQdUk.721 for user conductor 2021-07-10 05:12:18.514381 I | auth: deleting token zqhKDlDbijDNxORN.720 for user conductor 2021-07-10 05:12:18.514393 I | auth: deleting token cssTnshxXSwxdilt.717 for user conductor 2021-07-10 05:12:18.514410 I | auth: deleting token dLQszUwICQHRrbiL.719 for user conductor 2021-07-10 05:12:19.689178 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:23.588528 I | auth: deleting token YQEcSacehoVPmrQv.722 for user conductor 2021-07-10 05:12:23.588598 I | auth: deleting token VpMcKndUecnqJGlO.724 for user conductor 2021-07-10 05:12:23.588612 I | auth: deleting token wbOZMXJJnmjBlNtC.725 for user conductor 2021-07-10 05:12:23.588626 I | auth: deleting token PDtLiQhRieewjrks.723 for user conductor 2021-07-10 05:12:24.689385 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:24.891481 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.080919565s) to execute 2021-07-10 05:12:25.010767 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (115.972631ms) to execute 2021-07-10 05:12:26.514216 I | auth: deleting token iAKNebCFsWhLhmMj.728 for user conductor 2021-07-10 05:12:26.514307 I | auth: deleting token otXdaFvFFeFehtzZ.727 for user conductor 2021-07-10 05:12:26.514325 I | auth: deleting token xqCKlqKwIrrxeFYv.726 for user conductor 2021-07-10 05:12:26.514337 I | auth: deleting token ieSmnaNyDnzTViKg.729 for user conductor 2021-07-10 05:12:27.792689 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.381976278s) to execute 2021-07-10 05:12:29.689683 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:30.792807 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.581980974s) to execute 2021-07-10 05:12:31.588620 I | auth: deleting token lbcMNPXedCaFWVaA.734 for user conductor 2021-07-10 05:12:31.588689 I | auth: deleting token NmLEcUblEEzvSZip.735 for user conductor 2021-07-10 05:12:31.588703 I | auth: deleting token cSeFXSsMCTDIpGyJ.733 for user conductor 2021-07-10 05:12:31.588721 I | auth: deleting token FOotkrTPZWGJOpsb.732 for user conductor 2021-07-10 05:12:31.588734 I | auth: deleting token lIJutfpbCeEExnlv.731 for user conductor 2021-07-10 05:12:31.588746 I | auth: deleting token ROROmbfhjjfWqkSy.730 for user conductor 2021-07-10 05:12:33.089831 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.198252229s) to execute 2021-07-10 05:12:34.690240 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:37.514333 I | auth: deleting token sYaoqkHIijmKuDag.736 for user conductor 2021-07-10 05:12:37.514421 I | auth: deleting token mPpUGuKkypghGAAp.738 for user conductor 2021-07-10 05:12:38.294023 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.405216965s) to execute 2021-07-10 05:12:39.514339 I | auth: deleting token lPxLyvevcEfPlqpg.740 for user conductor 2021-07-10 05:12:39.514387 I | auth: deleting token zDfptDuStHDWzAWQ.737 for user conductor 2021-07-10 05:12:39.514402 I | auth: deleting token tGIPpUltyRTHvSBi.739 for user conductor 2021-07-10 05:12:39.888799 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:40.514385 I | auth: deleting token ZCQOjzHdbHaUKvcS.741 for user conductor 2021-07-10 05:12:42.514209 I | auth: deleting token zTGubrbKkMZtqKWs.742 for user conductor 2021-07-10 05:12:42.514254 I | auth: deleting token JMLQHVnrvqHiPueC.743 for user conductor 2021-07-10 05:12:44.889105 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:45.588629 I | auth: deleting token SZsObFvxISRJKfZw.746 for user conductor 2021-07-10 05:12:45.588729 I | auth: deleting token svUyfiOiGVjLxHxI.744 for user conductor 2021-07-10 05:12:45.588756 I | auth: deleting token LiVpcmLGTPofILwx.745 for user conductor 2021-07-10 05:12:47.891973 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.081317107s) to execute 2021-07-10 05:12:49.889558 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:51.514327 I | auth: deleting token DZNrUypRFghujuDE.748 for user conductor 2021-07-10 05:12:51.514431 I | auth: deleting token NGTcLAVraTGeVOWs.747 for user conductor 2021-07-10 05:12:51.514463 I | auth: deleting token AXUnXXNTIGMNOObQ.750 for user conductor 2021-07-10 05:12:51.514493 I | auth: deleting token jsdptwOYDPpYbnUf.751 for user conductor 2021-07-10 05:12:51.514512 I | auth: deleting token FaAoBkqNASaWVIOg.749 for user conductor 2021-07-10 05:12:51.514528 I | auth: deleting token mBfVXWStEvLwPJcU.752 for user conductor 2021-07-10 05:12:53.514242 I | auth: deleting token OGlRJoPwWYzrlQuu.754 for user conductor 2021-07-10 05:12:53.514300 I | auth: deleting token ijnvUpgrLhTzzguW.753 for user conductor 2021-07-10 05:12:54.890144 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:12:56.088632 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.098851293s) to execute 2021-07-10 05:12:56.588614 I | auth: deleting token QDAFCJMYaFipJkic.756 for user conductor 2021-07-10 05:12:56.588682 I | auth: deleting token LBsLIPMXTxMVZxzl.757 for user conductor 2021-07-10 05:12:58.492553 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (703.86286ms) to execute 2021-07-10 05:12:59.588719 I | auth: deleting token nucZSOywIBVzrJjH.760 for user conductor 2021-07-10 05:12:59.588784 I | auth: deleting token oWeTZaYQSNQVgDBe.755 for user conductor 2021-07-10 05:12:59.588804 I | auth: deleting token sbuzLBiIOPlxxkAg.759 for user conductor 2021-07-10 05:12:59.588834 I | auth: deleting token MxhwkWwVJjnKMmYw.758 for user conductor 2021-07-10 05:12:59.890501 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:13:04.514138 I | auth: deleting token fzaZNfqaZCwNlihH.761 for user conductor 2021-07-10 05:13:04.514242 I | auth: deleting token yMPuGSwHtKYdVUas.762 for user conductor 2021-07-10 05:13:04.514270 I | auth: deleting token RtUvZmxmhWMZgBLy.765 for user conductor 2021-07-10 05:13:04.514289 I | auth: deleting token SacqOyHoeYeXMYHN.764 for user conductor 2021-07-10 05:13:04.890787 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:13:07.588515 I | auth: deleting token PeLTZbdhQvRkjZuS.763 for user conductor 2021-07-10 05:13:09.588640 I | auth: deleting token jybOcfSZYRpIbcvR.766 for user conductor 2021-07-10 05:13:09.588966 I | auth: deleting token kxsHVKrMSlwaYMPe.767 for user conductor 2021-07-10 05:13:09.891151 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:13:11.514218 I | auth: deleting token CCTrRWfuUsiKRNxU.768 for user conductor 2021-07-10 05:13:11.689834 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (9.899922935s) to execute 2021-07-10 05:13:14.389075 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.600112913s) to execute 2021-07-10 05:13:14.514271 I | auth: deleting token wuFbDBiGANnXecnc.769 for user conductor 2021-07-10 05:13:14.514339 I | auth: deleting token pzUaXBLkhHrWKsjG.771 for user conductor 2021-07-10 05:13:14.514365 I | auth: deleting token gyvTKixzgmeZVlPn.772 for user conductor 2021-07-10 05:13:14.514382 I | auth: deleting token dqefEYKgVAhjdhLR.770 for user conductor 2021-07-10 05:13:14.891556 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:13:17.255463 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.745034351s) to execute 2021-07-10 05:13:19.694989 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.283599468s) to execute 2021-07-10 05:13:19.695288 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.404328327s) to execute 2021-07-10 05:13:19.891778 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:13:20.588629 I | auth: deleting token TquxRjVisWmCAOMY.776 for user conductor 2021-07-10 05:13:20.588731 I | auth: deleting token WCoeTMmKRDxYrCre.773 for user conductor 2021-07-10 05:13:20.588763 I | auth: deleting token kbRVUAzDKtCKHOdz.777 for user conductor 2021-07-10 05:13:20.588780 I | auth: deleting token OBjWIvcUNFboDFDC.774 for user conductor 2021-07-10 05:13:23.514250 I | auth: deleting token IfjoZucMbfdkDxUD.775 for user conductor 2021-07-10 05:13:23.514306 I | auth: deleting token rwudOxZRpijASKYE.781 for user conductor 2021-07-10 05:13:23.514338 I | auth: deleting token gnTEiXhvWrrthVIP.778 for user conductor 2021-07-10 05:13:23.514355 I | auth: deleting token ykpUpBdXiHleARfw.779 for user conductor 2021-07-10 05:13:23.514371 I | auth: deleting token NUfIDXEnXnTegbFl.780 for user conductor 2021-07-10 05:13:24.892069 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:13:25.094094 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.304176792s) to execute 2021-07-10 05:13:25.094254 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.38364178s) to execute 2021-07-10 05:13:28.514237 I | auth: deleting token QZVUaQKiYGCvTmvh.783 for user conductor 2021-07-10 05:13:28.514311 I | auth: deleting token DqzSUpkMHCXhRLSP.785 for user conductor 2021-07-10 05:13:28.514337 I | auth: deleting token zRoSwQalbGCeHOEz.784 for user conductor 2021-07-10 05:13:28.514357 I | auth: deleting token YbbvXQIJrhgYCvmD.786 for user conductor 2021-07-10 05:13:28.514369 I | auth: deleting token vkqXfIGRqndwkkPr.782 for user conductor 2021-07-10 05:13:29.892428 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:13:31.195364 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.684720613s) to execute 2021-07-10 05:13:33.514228 I | auth: deleting token JxtOHcLTiCgXzhRY.790 for user conductor 2021-07-10 05:13:33.514291 I | auth: deleting token IRhRACKFydmBfGtt.787 for user conductor 2021-07-10 05:13:33.514308 I | auth: deleting token jmQKTAlbpJFBTZns.789 for user conductor 2021-07-10 05:13:33.789399 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.478637768s) to execute 2021-07-10 05:13:33.789681 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.500760221s) to execute 2021-07-10 05:13:34.892676 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:13:36.193067 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.401334822s) to execute 2021-07-10 05:13:36.514235 I | auth: deleting token LZXriafqfoHFQJux.791 for user conductor 2021-07-10 05:13:36.514294 I | auth: deleting token fniCXbgBGcySbcxd.788 for user conductor 2021-07-10 05:13:36.514310 I | auth: deleting token qRuBjFhGSXIORLlW.792 for user conductor 2021-07-10 05:13:38.793251 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (4.998661315s) to execute 2021-07-10 05:13:38.794871 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.678183105s) to execute 2021-07-10 05:13:39.310380 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (321.352739ms) to execute 2021-07-10 05:13:39.892929 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:13:41.588521 I | auth: deleting token GcOIGTjUwMQWKmjL.794 for user conductor 2021-07-10 05:13:41.588584 I | auth: deleting token QjICgdPIwoNVWgfe.797 for user conductor 2021-07-10 05:13:41.588602 I | auth: deleting token UIwvXZOOrNZjFFpP.793 for user conductor 2021-07-10 05:13:41.588611 I | auth: deleting token zSekxljKeePukPCp.798 for user conductor 2021-07-10 05:13:41.588628 I | auth: deleting token eKQKvzfxtptSXCvi.795 for user conductor 2021-07-10 05:13:41.588636 I | auth: deleting token YrOSOFMciriejNhf.796 for user conductor 2021-07-10 05:13:41.994634 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.703017013s) to execute 2021-07-10 05:13:41.995811 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.406916706s) to execute 2021-07-10 05:13:44.893206 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:13:45.093927 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.479433971s) to execute 2021-07-10 05:13:47.514316 I | auth: deleting token vhbDbCiJgWFLSKZZ.801 for user conductor 2021-07-10 05:13:47.514380 I | auth: deleting token FFvYnVkbJkgISUco.804 for user conductor 2021-07-10 05:13:47.514398 I | auth: deleting token PvShQZtuKdcVNaqA.803 for user conductor 2021-07-10 05:13:47.514415 I | auth: deleting token IptSzcjXglxYkzjd.802 for user conductor 2021-07-10 05:13:47.514430 I | auth: deleting token jcfNuzhOxuIoLOGw.800 for user conductor 2021-07-10 05:13:47.514441 I | auth: deleting token QCkWTKnxzUqDPAID.799 for user conductor 2021-07-10 05:13:47.689327 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.478741395s) to execute 2021-07-10 05:13:48.514278 I | auth: deleting token XhYeLmheFpCnCfDh.805 for user conductor 2021-07-10 05:13:49.893471 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:13:50.490675 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.798353798s) to execute 2021-07-10 05:13:53.092978 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.401475441s) to execute 2021-07-10 05:13:53.093112 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.504288458s) to execute 2021-07-10 05:13:54.988835 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:13:55.793077 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.299958289s) to execute 2021-07-10 05:13:55.793177 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.697395197s) to execute 2021-07-10 05:13:55.793376 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.697484416s) to execute 2021-07-10 05:13:57.514226 I | auth: deleting token jwHlsFCOohxqAfku.806 for user conductor 2021-07-10 05:13:57.514283 I | auth: deleting token XZIctPaeSqORBobD.812 for user conductor 2021-07-10 05:13:57.514299 I | auth: deleting token EPMQIYqbnIZWHTTr.807 for user conductor 2021-07-10 05:13:57.514315 I | auth: deleting token qHIEysXNrUkKLpfJ.810 for user conductor 2021-07-10 05:13:57.514343 I | auth: deleting token iphPSWnXwYFcWbOc.809 for user conductor 2021-07-10 05:13:58.889008 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.89992082s) to execute 2021-07-10 05:13:58.889124 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.600184465s) to execute 2021-07-10 05:13:59.989458 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:00.589534 I | auth: deleting token AafxblwQoktjCZvg.814 for user conductor 2021-07-10 05:14:00.589612 I | auth: deleting token qArAamuJRjdIZyUj.811 for user conductor 2021-07-10 05:14:00.589628 I | auth: deleting token wNvcAliNLwmqotWZ.808 for user conductor 2021-07-10 05:14:00.589643 I | auth: deleting token AlgewmhoStNPBmqi.813 for user conductor 2021-07-10 05:14:01.590761 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.596879661s) to execute 2021-07-10 05:14:01.591024 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.202013847s) to execute 2021-07-10 05:14:04.690475 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.501600294s) to execute 2021-07-10 05:14:04.989846 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:05.588807 I | auth: deleting token YXzkobVrqFSmipwv.816 for user conductor 2021-07-10 05:14:07.291645 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.579062907s) to execute 2021-07-10 05:14:09.989759 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.579221767s) to execute 2021-07-10 05:14:09.990065 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.600969131s) to execute 2021-07-10 05:14:09.990195 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:10.111016 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (118.478269ms) to execute 2021-07-10 05:14:10.588556 I | auth: deleting token WVrrpmTLQHfJafsL.822 for user conductor 2021-07-10 05:14:10.588621 I | auth: deleting token vOwBDgAsikQAOaHy.821 for user conductor 2021-07-10 05:14:10.588637 I | auth: deleting token OLIRiuysEhKgCsvY.818 for user conductor 2021-07-10 05:14:10.588650 I | auth: deleting token hasxzwCcINdqcCMY.815 for user conductor 2021-07-10 05:14:10.588667 I | auth: deleting token QKPGGSXOljKOyaco.817 for user conductor 2021-07-10 05:14:10.588688 I | auth: deleting token jiwrQLnobfRvuTZN.820 for user conductor 2021-07-10 05:14:10.588705 I | auth: deleting token mhLIKAqLBgwQytkd.819 for user conductor 2021-07-10 05:14:12.989512 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.800612379s) to execute 2021-07-10 05:14:12.989663 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.176305465s) to execute 2021-07-10 05:14:14.990513 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:15.889680 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.797893664s) to execute 2021-07-10 05:14:15.889855 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.079143633s) to execute 2021-07-10 05:14:16.514294 I | auth: deleting token AzwjIJcnfJwpewRy.823 for user conductor 2021-07-10 05:14:16.514365 I | auth: deleting token ESHACTywJgqFHJYi.825 for user conductor 2021-07-10 05:14:16.514384 I | auth: deleting token AmJRSCjOwnyWCljf.826 for user conductor 2021-07-10 05:14:18.514337 I | auth: deleting token lkOSQORFyqHTQYUN.828 for user conductor 2021-07-10 05:14:18.514407 I | auth: deleting token KjnugMOuNxeKEJuU.824 for user conductor 2021-07-10 05:14:19.990821 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:21.094710 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.284058524s) to execute 2021-07-10 05:14:21.588639 I | auth: deleting token QqtSlPsDrAVLbaSE.832 for user conductor 2021-07-10 05:14:21.588705 I | auth: deleting token KaPbSZRUXaqLjYBy.830 for user conductor 2021-07-10 05:14:21.588728 I | auth: deleting token ZrzyifyilGRRhhnD.831 for user conductor 2021-07-10 05:14:21.588744 I | auth: deleting token ddTwHDblHTFoWQKu.827 for user conductor 2021-07-10 05:14:21.588759 I | auth: deleting token eXfPDnVQZMHRRXss.829 for user conductor 2021-07-10 05:14:24.097369 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.108402773s) to execute 2021-07-10 05:14:24.991148 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:27.292623 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.003894945s) to execute 2021-07-10 05:14:27.588650 I | auth: deleting token ePaGCKkFjpUdUPYg.836 for user conductor 2021-07-10 05:14:27.588726 I | auth: deleting token jOCtFnuWctPtOTAt.833 for user conductor 2021-07-10 05:14:27.588747 I | auth: deleting token DaZHYDZyTDyxtjTY.834 for user conductor 2021-07-10 05:14:29.991394 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:32.514267 I | auth: deleting token zZbsrYaNkbhCfFKF.840 for user conductor 2021-07-10 05:14:32.514341 I | auth: deleting token ryRcEVAiizoRbVED.838 for user conductor 2021-07-10 05:14:32.514357 I | auth: deleting token BCmHfULOIvfidGgM.835 for user conductor 2021-07-10 05:14:32.514373 I | auth: deleting token NIGSPfAeBJFbqOiR.839 for user conductor 2021-07-10 05:14:32.514384 I | auth: deleting token HArlRnZGWjCymOAG.837 for user conductor 2021-07-10 05:14:33.190656 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.897821316s) to execute 2021-07-10 05:14:33.190955 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.70185317s) to execute 2021-07-10 05:14:34.991924 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:36.390538 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.196545673s) to execute 2021-07-10 05:14:36.390841 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (3.197352538s) to execute 2021-07-10 05:14:36.393947 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (3.199814795s) to execute 2021-07-10 05:14:38.588570 I | auth: deleting token CznuzxwrNLMWzuZX.842 for user conductor 2021-07-10 05:14:39.493623 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.099515798s) to execute 2021-07-10 05:14:39.493884 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.004995973s) to execute 2021-07-10 05:14:39.493991 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.483299498s) to execute 2021-07-10 05:14:39.992340 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:41.514248 I | auth: deleting token XXXDaIIQKQksRcuK.845 for user conductor 2021-07-10 05:14:41.514296 I | auth: deleting token VZypsHjseeubbAEC.844 for user conductor 2021-07-10 05:14:41.514307 I | auth: deleting token sxbcFZdqsbdAYdRn.841 for user conductor 2021-07-10 05:14:44.514351 I | auth: deleting token dBPyIKkSULdwkppt.847 for user conductor 2021-07-10 05:14:44.514440 I | auth: deleting token AIjDQKglITeBEXJj.843 for user conductor 2021-07-10 05:14:44.514456 I | auth: deleting token VUVYJdYfeenmxAvI.846 for user conductor 2021-07-10 05:14:44.992698 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:45.889140 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.600366426s) to execute 2021-07-10 05:14:48.896141 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.00454986s) to execute 2021-07-10 05:14:50.019332 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:52.588575 I | auth: deleting token YMqVxKkbdWGcRAlm.850 for user conductor 2021-07-10 05:14:54.791239 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.800281899s) to execute 2021-07-10 05:14:55.088763 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:14:55.588662 I | auth: deleting token dtTlTombeAufzzvu.852 for user conductor 2021-07-10 05:14:55.588721 I | auth: deleting token cgHjhXSAXuevfpRq.853 for user conductor 2021-07-10 05:14:55.588738 I | auth: deleting token FRdtJXLweTOwwTut.851 for user conductor 2021-07-10 05:14:55.588750 I | auth: deleting token eIuIwTKYInmFSLTa.848 for user conductor 2021-07-10 05:14:55.588768 I | auth: deleting token USIEqAtoYAcYzpTE.849 for user conductor 2021-07-10 05:14:57.290009 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.498647792s) to execute 2021-07-10 05:14:57.290292 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.4968185s) to execute 2021-07-10 05:14:57.290572 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (8.299316075s) to execute 2021-07-10 05:15:00.089232 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:00.514095 I | auth: deleting token wRqKDRURNXIkpNvn.854 for user conductor 2021-07-10 05:15:05.089651 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:05.514236 I | auth: deleting token XBekIzrRoiiKJYsy.859 for user conductor 2021-07-10 05:15:05.514308 I | auth: deleting token lvQnIXhimmoXkFVR.856 for user conductor 2021-07-10 05:15:05.514323 I | auth: deleting token hvwPVtHHUuWYDOJc.857 for user conductor 2021-07-10 05:15:05.514335 I | auth: deleting token knlLlRpQWxNgGinU.860 for user conductor 2021-07-10 05:15:05.514349 I | auth: deleting token HIbyouKDlLCdsLtV.858 for user conductor 2021-07-10 05:15:05.514363 I | auth: deleting token CEUZswrcyLxlDUDW.861 for user conductor 2021-07-10 05:15:05.514378 I | auth: deleting token jwJLKbaUQdlPxMnd.855 for user conductor 2021-07-10 05:15:05.514394 I | auth: deleting token vNDdcVbTgItpNJuO.862 for user conductor 2021-07-10 05:15:10.090001 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:15.090274 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:17.514243 I | auth: deleting token qKGiGzytRFbUyFNX.863 for user conductor 2021-07-10 05:15:17.514282 I | auth: deleting token qmgIPIrdKFlWSaSt.864 for user conductor 2021-07-10 05:15:17.514292 I | auth: deleting token ijEDyDHjjaHfwrab.867 for user conductor 2021-07-10 05:15:17.514298 I | auth: deleting token LTouDxbAUlKmxRBj.865 for user conductor 2021-07-10 05:15:18.789010 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.800146211s) to execute 2021-07-10 05:15:19.010715 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (119.473408ms) to execute 2021-07-10 05:15:20.090527 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:20.514255 I | auth: deleting token dHPMEtIPCskTcxXh.866 for user conductor 2021-07-10 05:15:20.514316 I | auth: deleting token qvScMXVdafuLlMeM.868 for user conductor 2021-07-10 05:15:23.514284 I | auth: deleting token umpNOxDqIgpHlKyk.871 for user conductor 2021-07-10 05:15:23.514357 I | auth: deleting token WfDsOxqyZSBDQpUY.872 for user conductor 2021-07-10 05:15:23.514378 I | auth: deleting token HLHkyqRGeeigsvmU.869 for user conductor 2021-07-10 05:15:25.090890 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:25.991105 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.780523036s) to execute 2021-07-10 05:15:26.514189 I | auth: deleting token wafXyLmkBboypoUD.874 for user conductor 2021-07-10 05:15:26.514257 I | auth: deleting token grkIJwHuYrgLSLhZ.870 for user conductor 2021-07-10 05:15:28.393602 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.283314004s) to execute 2021-07-10 05:15:28.393737 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.305045417s) to execute 2021-07-10 05:15:29.588498 I | auth: deleting token vgGVOXnWnvwDwiKW.873 for user conductor 2021-07-10 05:15:29.588553 I | auth: deleting token zyzOaqgABCTzgVvD.876 for user conductor 2021-07-10 05:15:30.091108 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:31.514322 I | auth: deleting token ZXovqhZeMFmaUqIE.879 for user conductor 2021-07-10 05:15:31.514392 I | auth: deleting token EgXtqhEfBPpGSkgi.878 for user conductor 2021-07-10 05:15:31.514412 I | auth: deleting token IVaPEzbgUcarjMOd.875 for user conductor 2021-07-10 05:15:31.689069 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.500234979s) to execute 2021-07-10 05:15:32.514340 I | auth: deleting token qOjRGfzxxwbzWoXB.880 for user conductor 2021-07-10 05:15:32.514391 I | auth: deleting token YnWzPyezNuumaLhq.877 for user conductor 2021-07-10 05:15:34.492528 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.800374758s) to execute 2021-07-10 05:15:35.091398 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:37.089534 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.479142861s) to execute 2021-07-10 05:15:37.089786 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.500788185s) to execute 2021-07-10 05:15:37.588675 I | auth: deleting token HMsAZficVYfgCTpL.883 for user conductor 2021-07-10 05:15:37.588751 I | auth: deleting token psEReXGgWRIaKmTM.884 for user conductor 2021-07-10 05:15:37.588771 I | auth: deleting token WUfJoJhmZhaKfMDr.881 for user conductor 2021-07-10 05:15:37.588783 I | auth: deleting token CqaNpPmQAwFoNqcf.882 for user conductor 2021-07-10 05:15:39.989388 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.89768129s) to execute 2021-07-10 05:15:40.091611 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:40.588616 I | auth: deleting token QtHRgAjrUuDFxgBH.886 for user conductor 2021-07-10 05:15:40.588672 I | auth: deleting token aUpZuLyprfakIKpQ.885 for user conductor 2021-07-10 05:15:40.588693 I | auth: deleting token mwzFsKSMBiWpBEoO.887 for user conductor 2021-07-10 05:15:42.292338 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.09929775s) to execute 2021-07-10 05:15:42.292606 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.703622531s) to execute 2021-07-10 05:15:42.510633 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (118.861582ms) to execute 2021-07-10 05:15:43.588724 I | auth: deleting token HMVoDhPURwIWEdEI.888 for user conductor 2021-07-10 05:15:43.588839 I | auth: deleting token awZQQjSoTWPAYHyR.889 for user conductor 2021-07-10 05:15:45.091878 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:46.290210 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.579426363s) to execute 2021-07-10 05:15:49.094743 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.678945142s) to execute 2021-07-10 05:15:50.092206 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:52.514196 I | auth: deleting token IqOpIhkZtZUDQlAh.894 for user conductor 2021-07-10 05:15:52.514250 I | auth: deleting token GlRQBXLCGudXTiic.892 for user conductor 2021-07-10 05:15:52.514273 I | auth: deleting token kfqZOsnutPUrjzWf.896 for user conductor 2021-07-10 05:15:52.514286 I | auth: deleting token mPYfYWbywZVHLTXY.890 for user conductor 2021-07-10 05:15:52.514302 I | auth: deleting token rRdfZJEATYXaLItC.891 for user conductor 2021-07-10 05:15:53.488644 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (999.537822ms) to execute 2021-07-10 05:15:55.092441 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:15:55.514216 I | auth: deleting token oGFPxrLyjEKTqkdk.898 for user conductor 2021-07-10 05:15:55.514270 I | auth: deleting token cnFqSetpvnnxsZPl.893 for user conductor 2021-07-10 05:15:55.514283 I | auth: deleting token XasPNiCAYtkDjjek.895 for user conductor 2021-07-10 05:15:55.514295 I | auth: deleting token CqGyuurmTTdnBkCE.899 for user conductor 2021-07-10 05:15:55.514304 I | auth: deleting token VTWqyFDbyPyIPjln.897 for user conductor 2021-07-10 05:15:56.514267 I | auth: deleting token xfhokcEzWzhjTfiy.900 for user conductor 2021-07-10 05:15:56.595064 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.684450809s) to execute 2021-07-10 05:16:00.092727 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:00.514350 I | auth: deleting token TrQcXFozrxeNaSyL.901 for user conductor 2021-07-10 05:16:00.514402 I | auth: deleting token zqlKrLiLCopIrnoD.902 for user conductor 2021-07-10 05:16:00.514416 I | auth: deleting token mMoYEZYcpunYMaGI.903 for user conductor 2021-07-10 05:16:02.094303 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.305141092s) to execute 2021-07-10 05:16:02.588701 I | auth: deleting token aLxqOkuihRChcPjJ.905 for user conductor 2021-07-10 05:16:02.588800 I | auth: deleting token WoARjWdebNaJRatX.906 for user conductor 2021-07-10 05:16:02.588815 I | auth: deleting token DMTaaCRCpeHZlwyZ.904 for user conductor 2021-07-10 05:16:05.093008 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:05.195093 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.872506653s) to execute 2021-07-10 05:16:05.195956 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (3.007069379s) to execute 2021-07-10 05:16:05.388798 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.199761523s) to execute 2021-07-10 05:16:05.488649 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (199.685612ms) to execute 2021-07-10 05:16:05.514327 I | auth: deleting token dxWOvmuUOqsTdzYc.908 for user conductor 2021-07-10 05:16:05.514527 I | auth: deleting token gquJLXKvehcSTFfv.907 for user conductor 2021-07-10 05:16:05.514601 I | auth: deleting token dbdDaQCXSATOJsLl.909 for user conductor 2021-07-10 05:16:08.292288 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.303248773s) to execute 2021-07-10 05:16:08.514125 I | auth: deleting token OsGhWxfrEAzzehnL.910 for user conductor 2021-07-10 05:16:08.514179 I | auth: deleting token WXAAahRzuvyCMmzF.911 for user conductor 2021-07-10 05:16:10.188610 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:10.890848 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.578802836s) to execute 2021-07-10 05:16:13.514241 I | auth: deleting token KqpQtLuHPOTaIkKd.916 for user conductor 2021-07-10 05:16:13.514299 I | auth: deleting token WcqxHSjwthQJNHpj.914 for user conductor 2021-07-10 05:16:13.514321 I | auth: deleting token lQhJUAfkNuUdgiDQ.915 for user conductor 2021-07-10 05:16:13.514336 I | auth: deleting token nwQiIRFCACrZDCvd.913 for user conductor 2021-07-10 05:16:13.889953 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.279560028s) to execute 2021-07-10 05:16:14.588634 I | auth: deleting token ypROgTevDqqTlCkQ.917 for user conductor 2021-07-10 05:16:14.588711 I | auth: deleting token DBmQInWPOUVoZBdS.912 for user conductor 2021-07-10 05:16:14.588738 I | auth: deleting token DVmWeDvFQnTJojrF.918 for user conductor 2021-07-10 05:16:15.288715 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:16.588597 I | auth: deleting token jbvieEGQkGTBmxlW.919 for user conductor 2021-07-10 05:16:17.090460 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.675644718s) to execute 2021-07-10 05:16:17.514217 I | auth: deleting token vUuyIJBJZbbTGqDi.920 for user conductor 2021-07-10 05:16:18.588607 I | auth: deleting token XSyAwyrYfqJVzwzn.921 for user conductor 2021-07-10 05:16:20.289032 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:20.588766 I | auth: deleting token tMiYrxtjCjhGsvhR.922 for user conductor 2021-07-10 05:16:23.195174 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.606205885s) to execute 2021-07-10 05:16:25.289278 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:25.588752 I | auth: deleting token YPlLIXXGaQYJKCWD.927 for user conductor 2021-07-10 05:16:25.588812 I | auth: deleting token WnGuISfvijJgYJfO.923 for user conductor 2021-07-10 05:16:25.588833 I | auth: deleting token MNPVZoGOycIeXTsa.925 for user conductor 2021-07-10 05:16:25.588849 I | auth: deleting token QgKpsRILRpvkkUwX.924 for user conductor 2021-07-10 05:16:25.588869 I | auth: deleting token VvfnvCzXGQHDhBzP.926 for user conductor 2021-07-10 05:16:26.514311 I | auth: deleting token CAJURBmEadunvXHw.928 for user conductor 2021-07-10 05:16:28.760102 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.37131702s) to execute 2021-07-10 05:16:28.760959 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.472045479s) to execute 2021-07-10 05:16:30.289563 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:31.588613 I | auth: deleting token MNUBSqbhlKTplHCm.931 for user conductor 2021-07-10 05:16:31.588684 I | auth: deleting token IqcQLggFJzxzNcGw.932 for user conductor 2021-07-10 05:16:31.588710 I | auth: deleting token rXETOGinsutCEaZa.929 for user conductor 2021-07-10 05:16:31.792530 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.002914173s) to execute 2021-07-10 05:16:31.792731 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.903869242s) to execute 2021-07-10 05:16:34.391993 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.401327195s) to execute 2021-07-10 05:16:34.514110 I | auth: deleting token aTbSlpmJWnvByrGt.930 for user conductor 2021-07-10 05:16:35.290457 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:36.514276 I | auth: deleting token YviMFLDkAoydQlfc.933 for user conductor 2021-07-10 05:16:38.514214 I | auth: deleting token YTPQjqrXVxTLzZTQ.934 for user conductor 2021-07-10 05:16:40.100107 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.489483545s) to execute 2021-07-10 05:16:40.290777 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:40.310348 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (118.618196ms) to execute 2021-07-10 05:16:41.588535 I | auth: deleting token AHJbjFWEVNdcwsTk.935 for user conductor 2021-07-10 05:16:41.588597 I | auth: deleting token HVrhsKViNcFOzxOK.937 for user conductor 2021-07-10 05:16:41.588616 I | auth: deleting token aEiTBTfsZYbeUlsq.936 for user conductor 2021-07-10 05:16:42.588640 I | auth: deleting token jNKcokGRwYHJWhRY.938 for user conductor 2021-07-10 05:16:43.789993 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.200680866s) to execute 2021-07-10 05:16:45.291000 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:45.588618 I | auth: deleting token AGJYdoODjvJfrhnn.940 for user conductor 2021-07-10 05:16:45.588682 I | auth: deleting token nvPxlcjvvMGPfNfm.939 for user conductor 2021-07-10 05:16:46.596848 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.806720829s) to execute 2021-07-10 05:16:46.810703 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (121.708868ms) to execute 2021-07-10 05:16:47.514344 I | auth: deleting token udzrhCfuhrnxpbux.942 for user conductor 2021-07-10 05:16:47.514420 I | auth: deleting token sdsgJrcpXiCkEhwr.943 for user conductor 2021-07-10 05:16:47.514435 I | auth: deleting token rQxSWHSfCLqEuKjW.944 for user conductor 2021-07-10 05:16:47.514456 I | auth: deleting token zdYUowFHrWLUQtTB.941 for user conductor 2021-07-10 05:16:50.291344 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:50.514228 I | auth: deleting token MZaHhWxoggpWfgNL.946 for user conductor 2021-07-10 05:16:50.514295 I | auth: deleting token ukgIOPfdbRaHVoVY.947 for user conductor 2021-07-10 05:16:50.514318 I | auth: deleting token zmKzRCLiSmHpgtfA.945 for user conductor 2021-07-10 05:16:53.514265 I | auth: deleting token lKDzVBHZMDNGgTLq.948 for user conductor 2021-07-10 05:16:53.514337 I | auth: deleting token agKeQGQnwusRWvNX.949 for user conductor 2021-07-10 05:16:55.291586 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:16:56.514199 I | auth: deleting token fnKUZyzivayjOdRA.952 for user conductor 2021-07-10 05:16:56.514252 I | auth: deleting token AarVLUjsUHnlwTGF.950 for user conductor 2021-07-10 05:16:56.514261 I | auth: deleting token OTysMgjVzqKlXzRf.953 for user conductor 2021-07-10 05:16:56.514272 I | auth: deleting token RuWZELMVikMqIncd.951 for user conductor 2021-07-10 05:16:58.797259 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.808309508s) to execute 2021-07-10 05:17:00.292400 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:04.392121 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.421821606s) to execute 2021-07-10 05:17:04.392606 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.503710657s) to execute 2021-07-10 05:17:04.588560 I | auth: deleting token ERrhaIQRMnsSNdED.955 for user conductor 2021-07-10 05:17:04.588649 I | auth: deleting token UnDXgKSgFoLlCrjH.956 for user conductor 2021-07-10 05:17:04.588663 I | auth: deleting token mjIYNtYtMVUyPawN.959 for user conductor 2021-07-10 05:17:04.588676 I | auth: deleting token bZeFnOQFyjwryTCK.958 for user conductor 2021-07-10 05:17:04.588688 I | auth: deleting token npRjOPcEwVydbmds.961 for user conductor 2021-07-10 05:17:04.588701 I | auth: deleting token DsGtUBGdefNzIGUk.957 for user conductor 2021-07-10 05:17:04.589013 I | auth: deleting token BuQpEiyUwleJNSwQ.954 for user conductor 2021-07-10 05:17:04.589050 I | auth: deleting token caImRIXtDbKqdBAw.960 for user conductor 2021-07-10 05:17:05.292803 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:07.193478 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.704402407s) to execute 2021-07-10 05:17:07.193758 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.700386424s) to execute 2021-07-10 05:17:07.514444 I | auth: deleting token imezqWSKOfLuSToi.962 for user conductor 2021-07-10 05:17:07.514515 I | auth: deleting token WUkQZeGipSKDadTW.963 for user conductor 2021-07-10 05:17:09.693159 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.20430418s) to execute 2021-07-10 05:17:10.293042 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:10.514261 I | auth: deleting token ZCbOXNUusCKuUDam.965 for user conductor 2021-07-10 05:17:13.514336 I | auth: deleting token NoTLWArbbQzFzeuZ.964 for user conductor 2021-07-10 05:17:13.514415 I | auth: deleting token esaBWzvuvppAHjNS.966 for user conductor 2021-07-10 05:17:14.793154 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.004422671s) to execute 2021-07-10 05:17:14.793661 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.097918142s) to execute 2021-07-10 05:17:15.293399 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:16.514139 I | auth: deleting token VbircIsAggTEHVSd.967 for user conductor 2021-07-10 05:17:18.091430 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.202517852s) to execute 2021-07-10 05:17:18.091703 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.202869744s) to execute 2021-07-10 05:17:18.094148 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (3.20522243s) to execute 2021-07-10 05:17:18.514272 I | auth: deleting token MdVpTGXPvearrjvv.968 for user conductor 2021-07-10 05:17:18.514337 I | auth: deleting token OCNMwgKoKBZazWAN.969 for user conductor 2021-07-10 05:17:18.514370 I | auth: deleting token pEpyzGIPxCqGbICv.970 for user conductor 2021-07-10 05:17:19.514087 I | auth: deleting token guCpawmgMZlaXgda.971 for user conductor 2021-07-10 05:17:20.293560 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:20.792411 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.60373666s) to execute 2021-07-10 05:17:20.792628 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.603839052s) to execute 2021-07-10 05:17:23.294996 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.306062495s) to execute 2021-07-10 05:17:25.293805 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:25.514229 I | auth: deleting token cXWGQTSawkPEmMDh.975 for user conductor 2021-07-10 05:17:25.514277 I | auth: deleting token dyWPgQgMbFKqdLYV.976 for user conductor 2021-07-10 05:17:25.514294 I | auth: deleting token LlFUXaCBBtIQvTId.977 for user conductor 2021-07-10 05:17:25.514315 I | auth: deleting token LEmbFwncETumHkpy.973 for user conductor 2021-07-10 05:17:25.514323 I | auth: deleting token QggHLIfygTbAtdlT.974 for user conductor 2021-07-10 05:17:25.514334 I | auth: deleting token MBrhYatAfgYAZwXb.972 for user conductor 2021-07-10 05:17:28.514240 I | auth: deleting token gYFHpnZUIArSWBHE.980 for user conductor 2021-07-10 05:17:28.514347 I | auth: deleting token BMltRDitKWdVtAUU.979 for user conductor 2021-07-10 05:17:28.514370 I | auth: deleting token QEXQYBvBQnJUFAyF.978 for user conductor 2021-07-10 05:17:30.091518 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.202656903s) to execute 2021-07-10 05:17:30.294117 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:31.588603 I | auth: deleting token miGfsDTbSxKVscRf.981 for user conductor 2021-07-10 05:17:32.898089 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.709291004s) to execute 2021-07-10 05:17:33.210868 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (121.934354ms) to execute 2021-07-10 05:17:33.588564 I | auth: deleting token EGqFZipKCXiAIJek.983 for user conductor 2021-07-10 05:17:33.588700 I | auth: deleting token PVRVXLjpYVCYugYX.984 for user conductor 2021-07-10 05:17:33.588723 I | auth: deleting token IgubemjycQkOiLpz.985 for user conductor 2021-07-10 05:17:33.588744 I | auth: deleting token HsSHMuiBXfAQqfNH.982 for user conductor 2021-07-10 05:17:35.294365 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:38.514319 I | auth: deleting token YofzzbnnMRyQaDil.989 for user conductor 2021-07-10 05:17:38.514381 I | auth: deleting token CCzrTXqJbfLEFJGF.990 for user conductor 2021-07-10 05:17:38.588481 I | auth: deleting token HQbQbDfbWuSXxrGx.988 for user conductor 2021-07-10 05:17:38.588542 I | auth: deleting token IrDufZIfiUpFAHyU.991 for user conductor 2021-07-10 05:17:38.588565 I | auth: deleting token hQuuwACgCfhALSGD.987 for user conductor 2021-07-10 05:17:38.588576 I | auth: deleting token GgtPwpGNhMpfrbNS.986 for user conductor 2021-07-10 05:17:38.592620 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.581981821s) to execute 2021-07-10 05:17:39.514215 I | auth: deleting token kIuqvWGbXoZgWayg.992 for user conductor 2021-07-10 05:17:40.294664 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:41.291700 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.601620194s) to execute 2021-07-10 05:17:44.298301 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.006444284s) to execute 2021-07-10 05:17:44.298408 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.609758682s) to execute 2021-07-10 05:17:44.388921 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.094066445s) to execute 2021-07-10 05:17:44.510735 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (118.986086ms) to execute 2021-07-10 05:17:45.294944 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:48.588553 I | auth: deleting token GGQxTEkNmtRejYPD.999 for user conductor 2021-07-10 05:17:48.588586 I | auth: deleting token VRUIRQtysuKNWeWN.998 for user conductor 2021-07-10 05:17:48.588596 I | auth: deleting token sWzrugAusjeVUyrV.994 for user conductor 2021-07-10 05:17:48.588602 I | auth: deleting token dCpugBIErPZVsZyO.997 for user conductor 2021-07-10 05:17:48.588608 I | auth: deleting token JQcEgvshLgdAIWAd.995 for user conductor 2021-07-10 05:17:48.588617 I | auth: deleting token nZMbjzNwfjGGAygO.996 for user conductor 2021-07-10 05:17:48.588623 I | auth: deleting token wwYcNWOFqdiAVZmA.993 for user conductor 2021-07-10 05:17:48.588631 I | auth: deleting token LsDKjTHostnEWbFz.1000 for user conductor 2021-07-10 05:17:49.514412 I | auth: deleting token uXMJyfmKopngjlcb.1001 for user conductor 2021-07-10 05:17:50.388579 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:50.514184 I | auth: deleting token fAlhUDFYFSDZMZya.1002 for user conductor 2021-07-10 05:17:51.189243 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.400492177s) to execute 2021-07-10 05:17:52.514310 I | auth: deleting token NabUUBNMavlNjoVs.1003 for user conductor 2021-07-10 05:17:53.514327 I | auth: deleting token SoTUcLGrdaZHemCg.1004 for user conductor 2021-07-10 05:17:54.094189 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.881603214s) to execute 2021-07-10 05:17:55.388862 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:17:56.588678 I | auth: deleting token rQQsRlcyNgTbqXHN.1007 for user conductor 2021-07-10 05:17:56.588741 I | auth: deleting token EzubnrcDZpYzHFvE.1006 for user conductor 2021-07-10 05:17:56.588783 I | auth: deleting token wjAzezsnbtcjoHun.1005 for user conductor 2021-07-10 05:17:56.993865 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.80140253s) to execute 2021-07-10 05:17:56.994355 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.383375278s) to execute 2021-07-10 05:17:56.994554 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.705408843s) to execute 2021-07-10 05:17:57.188956 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (191.985627ms) to execute 2021-07-10 05:17:58.514485 I | auth: deleting token UHGTIbxCHyQtXYmI.1008 for user conductor 2021-07-10 05:17:59.588594 I | auth: deleting token gWLKbGGXWWFOREaR.1009 for user conductor 2021-07-10 05:17:59.588657 I | auth: deleting token QEIgbEounLwRlUCI.1010 for user conductor 2021-07-10 05:18:00.095479 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.906682443s) to execute 2021-07-10 05:18:00.389147 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:18:02.794019 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.083827615s) to execute 2021-07-10 05:18:03.010724 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (119.289834ms) to execute 2021-07-10 05:18:05.389413 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:18:07.292774 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.30410278s) to execute 2021-07-10 05:18:10.091612 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.699562271s) to execute 2021-07-10 05:18:10.389682 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:18:12.588497 I | auth: deleting token MqgiuwdryliXCWry.1015 for user conductor 2021-07-10 05:18:12.588559 I | auth: deleting token jFTSAkQbngZpcJei.1012 for user conductor 2021-07-10 05:18:12.588574 I | auth: deleting token SgfIHZEaDdTgdTgC.1011 for user conductor 2021-07-10 05:18:12.588584 I | auth: deleting token VNJvVgSXNScHBrNq.1014 for user conductor 2021-07-10 05:18:12.588605 I | auth: deleting token NIeRvUmwofRcbyUz.1017 for user conductor 2021-07-10 05:18:12.588623 I | auth: deleting token RHWXVdqQKuSbzENr.1013 for user conductor 2021-07-10 05:18:12.891651 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.779560426s) to execute 2021-07-10 05:18:12.891900 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.797859993s) to execute 2021-07-10 05:18:15.389994 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:18:15.991026 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.802315791s) to execute 2021-07-10 05:18:15.991518 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (3.002726622s) to execute 2021-07-10 05:18:17.514279 I | auth: deleting token VCUGpTkIXbOurvgu.1019 for user conductor 2021-07-10 05:18:17.514355 I | auth: deleting token UxisoyXZUwmLNGfv.1022 for user conductor 2021-07-10 05:18:17.514386 I | auth: deleting token GxqKOkBJZDSQpezv.1020 for user conductor 2021-07-10 05:18:17.514411 I | auth: deleting token JQUhGAImlmLpUIaS.1018 for user conductor 2021-07-10 05:18:17.514430 I | auth: deleting token JiKtuUuvPLgjMVDN.1021 for user conductor 2021-07-10 05:18:20.390353 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:18:20.514244 I | auth: deleting token LoqqWEKZBUxNTMZk.1023 for user conductor 2021-07-10 05:18:20.514304 I | auth: deleting token lJuHHrkKLbmhKsad.1024 for user conductor 2021-07-10 05:18:20.514320 I | auth: deleting token YOeewEjzyeJCajaa.1025 for user conductor 2021-07-10 05:18:21.490773 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.496030533s) to execute 2021-07-10 05:18:21.491172 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.496715876s) to execute 2021-07-10 05:18:24.091650 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.581010146s) to execute 2021-07-10 05:18:24.091863 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.501177636s) to execute 2021-07-10 05:18:24.091925 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.499068615s) to execute 2021-07-10 05:18:25.390643 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:18:25.514346 I | auth: deleting token tINBlUTKlEIJBgYf.1026 for user conductor 2021-07-10 05:18:25.514409 I | auth: deleting token rpvImGSQbCIBhhYS.1029 for user conductor 2021-07-10 05:18:25.514422 I | auth: deleting token LNxLCtukRKohMcHr.1027 for user conductor 2021-07-10 05:18:25.514435 I | auth: deleting token figuKCEVtFMEtbvh.1028 for user conductor 2021-07-10 05:18:25.514454 I | auth: deleting token rPXcmQEZlrSgSEgx.1030 for user conductor 2021-07-10 05:18:26.514301 I | auth: deleting token YVEyvymxFILWeuBC.1031 for user conductor 2021-07-10 05:18:26.890996 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.797235145s) to execute 2021-07-10 05:18:29.893247 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.004330842s) to execute 2021-07-10 05:18:30.390860 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:18:31.514301 I | auth: deleting token kYYnkeXGLZJAgaLl.1035 for user conductor 2021-07-10 05:18:31.514380 I | auth: deleting token aLclDeCBBhqLodLr.1033 for user conductor 2021-07-10 05:18:31.514409 I | auth: deleting token YZUrkGuznzZXccsT.1032 for user conductor 2021-07-10 05:18:32.290297 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.501212456s) to execute 2021-07-10 05:18:34.514335 I | auth: deleting token gQVZYFTTtDXdVCxN.1036 for user conductor 2021-07-10 05:18:34.514480 I | auth: deleting token YizHlLvBRmcnziai.1034 for user conductor 2021-07-10 05:18:34.514538 I | auth: deleting token fuolJYWJwabRHkDG.1037 for user conductor 2021-07-10 05:18:34.514617 I | auth: deleting token EWEGlwJpNVLCfPVA.1038 for user conductor 2021-07-10 05:18:35.097546 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.787155357s) to execute 2021-07-10 05:18:35.391214 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:18:38.289892 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.177877662s) to execute 2021-07-10 05:18:39.588550 I | auth: deleting token vQUUYsYtinPpjwkJ.1039 for user conductor 2021-07-10 05:18:39.588605 I | auth: deleting token ZwLcHaLMjNMkaapg.1040 for user conductor 2021-07-10 05:18:39.588631 I | auth: deleting token zDKmwTtikFDXDVUu.1041 for user conductor 2021-07-10 05:18:39.588671 I | auth: deleting token DBfYHRsQQeFXevGA.1042 for user conductor 2021-07-10 05:18:39.588692 I | auth: deleting token cgNfuMlPBXTyTeRg.1043 for user conductor 2021-07-10 05:18:40.391444 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:18:40.894289 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.793799783s) to execute 2021-07-10 05:18:40.894728 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.601926354s) to execute 2021-07-10 05:18:40.894903 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.506061278s) to execute 2021-07-10 05:18:42.514218 I | auth: deleting token SnWuLtyRxjbskQVm.1046 for user conductor 2021-07-10 05:18:42.514287 I | auth: deleting token TiVEvOHzYOzkZqKQ.1044 for user conductor 2021-07-10 05:18:42.514313 I | auth: deleting token NQwEkNvDMAauPETs.1045 for user conductor 2021-07-10 05:18:43.889680 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.898511823s) to execute 2021-07-10 05:18:43.890087 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.900928193s) to execute 2021-07-10 05:18:45.391778 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:18:45.588498 I | auth: deleting token MOqnmZhajRsZlxiN.1048 for user conductor 2021-07-10 05:18:45.588550 I | auth: deleting token UgLWQVzrgkTnRWHd.1047 for user conductor 2021-07-10 05:18:48.514244 I | auth: deleting token pKtStBwAKnwsDfzJ.1051 for user conductor 2021-07-10 05:18:48.514305 I | auth: deleting token OYUHehgFbJABUuno.1050 for user conductor 2021-07-10 05:18:49.693997 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.801980222s) to execute 2021-07-10 05:18:49.695442 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.606653744s) to execute 2021-07-10 05:18:49.790227 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.51892129s) to execute 2021-07-10 05:18:50.392018 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:18:50.514386 I | auth: deleting token UFfNCIRpgbSSmrCm.1049 for user conductor 2021-07-10 05:18:52.291790 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.498947116s) to execute 2021-07-10 05:18:52.291893 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.4029834s) to execute 2021-07-10 05:18:53.514334 I | auth: deleting token tRTSbRMztpRMYdpz.1052 for user conductor 2021-07-10 05:18:55.488822 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:18:56.588913 I | auth: deleting token QmCpNnctULiWZJdk.1054 for user conductor 2021-07-10 05:18:56.588967 I | auth: deleting token ryveOkURrbeuEUOk.1053 for user conductor 2021-07-10 05:18:56.588987 I | auth: deleting token AYoQwhnmUxwDxEJC.1055 for user conductor 2021-07-10 05:18:56.588996 I | auth: deleting token hmwpapeiBdRtyMrO.1056 for user conductor 2021-07-10 05:18:58.295034 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.90503117s) to execute 2021-07-10 05:18:58.510493 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (116.879153ms) to execute 2021-07-10 05:18:59.588615 I | auth: deleting token tarLvpVDrOsrkdZw.1059 for user conductor 2021-07-10 05:18:59.588829 I | auth: deleting token AYjvAyWDqKxhjTSE.1058 for user conductor 2021-07-10 05:18:59.588949 I | auth: deleting token lLjeDsQIAgxojXeU.1057 for user conductor 2021-07-10 05:19:00.489101 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:02.514256 I | auth: deleting token yoSdtybLciFbAqUc.1061 for user conductor 2021-07-10 05:19:02.514351 I | auth: deleting token YwdKEYewLJTzTWUV.1060 for user conductor 2021-07-10 05:19:05.489436 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:05.514243 I | auth: deleting token TQelPGtXTEEdZLup.1063 for user conductor 2021-07-10 05:19:05.514340 I | auth: deleting token GBHqoaVzhaWlelrB.1062 for user conductor 2021-07-10 05:19:06.394866 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (6.677930531s) to execute 2021-07-10 05:19:07.514230 I | auth: deleting token IbveMdEcFQwobnpX.1065 for user conductor 2021-07-10 05:19:07.514297 I | auth: deleting token KEbcOworuzItFeaq.1066 for user conductor 2021-07-10 05:19:10.489762 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:10.514266 I | auth: deleting token kwsZBWvjNlbpwDhP.1069 for user conductor 2021-07-10 05:19:10.514344 I | auth: deleting token MCFNOzjVEzGhyYuI.1068 for user conductor 2021-07-10 05:19:10.514366 I | auth: deleting token fNWiuLGpEliGohmz.1067 for user conductor 2021-07-10 05:19:10.514389 I | auth: deleting token pvMmAKXhvkjqafOZ.1064 for user conductor 2021-07-10 05:19:13.514250 I | auth: deleting token iMahgucaODfGEcMz.1072 for user conductor 2021-07-10 05:19:13.514308 I | auth: deleting token nmxtjTkfpMwoFnur.1070 for user conductor 2021-07-10 05:19:13.514322 I | auth: deleting token gFLlKOvzmIPsUFja.1071 for user conductor 2021-07-10 05:19:15.588434 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:15.991227 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.100211677s) to execute 2021-07-10 05:19:16.588599 I | auth: deleting token fPvcwbTYBsrrymRx.1075 for user conductor 2021-07-10 05:19:16.588720 I | auth: deleting token KBpmDnThMAatSmAe.1073 for user conductor 2021-07-10 05:19:16.588741 I | auth: deleting token ZGFQOhIJQgdRJRue.1074 for user conductor 2021-07-10 05:19:17.588615 I | auth: deleting token CrcjZrJWuAPMHtsF.1076 for user conductor 2021-07-10 05:19:18.292666 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.103820487s) to execute 2021-07-10 05:19:20.588807 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:21.294047 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.001260808s) to execute 2021-07-10 05:19:21.388895 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.999960844s) to execute 2021-07-10 05:19:21.588519 I | auth: deleting token IpWJmcrQrTUtYhIh.1078 for user conductor 2021-07-10 05:19:21.588584 I | auth: deleting token iALNzInZNCGndesL.1077 for user conductor 2021-07-10 05:19:21.588608 I | auth: deleting token sAbHuGssYawPImEt.1079 for user conductor 2021-07-10 05:19:24.514364 I | auth: deleting token ofMdokJqGYQMunSE.1080 for user conductor 2021-07-10 05:19:24.514430 I | auth: deleting token ToRHAXLNSoIREcUI.1081 for user conductor 2021-07-10 05:19:25.589170 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:27.090677 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.69900619s) to execute 2021-07-10 05:19:27.091579 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.700262449s) to execute 2021-07-10 05:19:27.514352 I | auth: deleting token dsjhDbuMnAUNBdJJ.1083 for user conductor 2021-07-10 05:19:29.991922 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.898201597s) to execute 2021-07-10 05:19:29.992164 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.799028447s) to execute 2021-07-10 05:19:29.992367 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.703830155s) to execute 2021-07-10 05:19:29.992461 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.500653415s) to execute 2021-07-10 05:19:30.589543 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:32.791030 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.698322079s) to execute 2021-07-10 05:19:32.791304 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (376.978075ms) to execute 2021-07-10 05:19:33.514202 I | auth: deleting token cVwklmhjnXysrOLC.1084 for user conductor 2021-07-10 05:19:33.514235 I | auth: deleting token pTziJvEPQBdElzUy.1082 for user conductor 2021-07-10 05:19:33.514249 I | auth: deleting token dhAPosUoKhzGldgf.1086 for user conductor 2021-07-10 05:19:35.589925 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:35.789089 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.9003816s) to execute 2021-07-10 05:19:36.588601 I | auth: deleting token NtJcotacZlgJcgvQ.1088 for user conductor 2021-07-10 05:19:36.588675 I | auth: deleting token ylfnuwXaVcsjsqKx.1085 for user conductor 2021-07-10 05:19:36.588689 I | auth: deleting token rMMhbBjXmIYnlebZ.1087 for user conductor 2021-07-10 05:19:36.588707 I | auth: deleting token SBffzYjQFUyrYhVA.1089 for user conductor 2021-07-10 05:19:38.497829 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.587232413s) to execute 2021-07-10 05:19:38.498042 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.609316443s) to execute 2021-07-10 05:19:39.533559 I | auth: deleting token wVhsyRdQCytnTJLF.1090 for user conductor 2021-07-10 05:19:40.588649 I | auth: deleting token yVShtbaTNKwFtlyw.1092 for user conductor 2021-07-10 05:19:40.588838 I | auth: deleting token XFsbtBEcKRmiqOuf.1091 for user conductor 2021-07-10 05:19:40.590198 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:41.289587 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.698952827s) to execute 2021-07-10 05:19:41.289664 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.600992712s) to execute 2021-07-10 05:19:41.514374 I | auth: deleting token OzppzlyrwlAbXQNH.1093 for user conductor 2021-07-10 05:19:43.514252 I | auth: deleting token uzeudZpeYsIjNjls.1094 for user conductor 2021-07-10 05:19:43.792671 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.08205925s) to execute 2021-07-10 05:19:45.590446 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:46.588570 I | auth: deleting token UsSUSNuBCjmXdfBR.1095 for user conductor 2021-07-10 05:19:46.588646 I | auth: deleting token tDPMpKxmJpUskSWl.1096 for user conductor 2021-07-10 05:19:46.593863 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.704198084s) to execute 2021-07-10 05:19:46.594050 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.483411807s) to execute 2021-07-10 05:19:49.689173 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.573246436s) to execute 2021-07-10 05:19:50.590708 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:52.189929 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.349577862s) to execute 2021-07-10 05:19:55.198121 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.8087126s) to execute 2021-07-10 05:19:55.288648 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.699854688s) to execute 2021-07-10 05:19:55.514262 I | auth: deleting token PTyCoihJaLPcEzdo.1097 for user conductor 2021-07-10 05:19:55.591032 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:19:57.514127 I | auth: deleting token qIydlyqHzxXrHPkT.1101 for user conductor 2021-07-10 05:19:57.514215 I | auth: deleting token mOZkevwuTAGcGJef.1099 for user conductor 2021-07-10 05:19:57.514232 I | auth: deleting token BfWAYmIVMtyPrYTq.1100 for user conductor 2021-07-10 05:19:57.514242 I | auth: deleting token BqxElLNinELDTJsd.1098 for user conductor 2021-07-10 05:19:59.514150 I | auth: deleting token SLrznUCmfFWSVogL.1102 for user conductor 2021-07-10 05:19:59.692375 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.203505334s) to execute 2021-07-10 05:19:59.810756 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (116.028016ms) to execute 2021-07-10 05:19:59.812714 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (117.838694ms) to execute 2021-07-10 05:20:00.588669 I | auth: deleting token TnsAzCOBAICgCbuz.1103 for user conductor 2021-07-10 05:20:00.591290 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:02.514208 I | auth: deleting token aBkrSQocbHAKzujs.1104 for user conductor 2021-07-10 05:20:04.289305 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.699401066s) to execute 2021-07-10 05:20:04.514251 I | auth: deleting token TdYSyLJDqxTiElDU.1105 for user conductor 2021-07-10 05:20:05.588627 I | auth: deleting token lJzVfZBaiADoTKUq.1106 for user conductor 2021-07-10 05:20:05.591552 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:06.694721 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.804953024s) to execute 2021-07-10 05:20:07.588670 I | auth: deleting token ZHkQcImdKLYeqkhH.1107 for user conductor 2021-07-10 05:20:08.588607 I | auth: deleting token UWWapqUSCYmHpLne.1108 for user conductor 2021-07-10 05:20:09.496600 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.686306144s) to execute 2021-07-10 05:20:10.514424 I | auth: deleting token gvyVMYDaySgnUmoC.1109 for user conductor 2021-07-10 05:20:10.688622 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:12.490211 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.89993605s) to execute 2021-07-10 05:20:12.490483 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.90180363s) to execute 2021-07-10 05:20:12.514241 I | auth: deleting token FHEGrJDKgXXvUhoP.1110 for user conductor 2021-07-10 05:20:12.610586 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (116.82388ms) to execute 2021-07-10 05:20:13.588575 I | auth: deleting token ndxRvNUOxBMEajPg.1111 for user conductor 2021-07-10 05:20:15.098160 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.108174201s) to execute 2021-07-10 05:20:15.688914 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:18.191441 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.281705597s) to execute 2021-07-10 05:20:19.588573 I | auth: deleting token wIKbKoTMzuyatYUl.1113 for user conductor 2021-07-10 05:20:19.588641 I | auth: deleting token FRPjuXaTlHXXAsSW.1112 for user conductor 2021-07-10 05:20:19.588674 I | auth: deleting token nnwOteoqMZVlAIkd.1114 for user conductor 2021-07-10 05:20:19.588689 I | auth: deleting token noUUykMSdkGIinlT.1116 for user conductor 2021-07-10 05:20:19.588703 I | auth: deleting token VrtmonLjUXrhiOCM.1115 for user conductor 2021-07-10 05:20:20.588594 I | auth: deleting token RvngzdGWFrdwinuZ.1117 for user conductor 2021-07-10 05:20:20.689325 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:21.091296 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.800934162s) to execute 2021-07-10 05:20:25.689620 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:26.589038 I | auth: deleting token iESGtvfbBWAZCgiR.1122 for user conductor 2021-07-10 05:20:26.589078 I | auth: deleting token wDWNURlxESwzLTgM.1118 for user conductor 2021-07-10 05:20:26.589091 I | auth: deleting token GEstIeabzfeZxoQO.1120 for user conductor 2021-07-10 05:20:26.589102 I | auth: deleting token dHZJPBDyJydLcBwo.1121 for user conductor 2021-07-10 05:20:28.514353 I | auth: deleting token FeytQQBZImSocivE.1119 for user conductor 2021-07-10 05:20:28.514415 I | auth: deleting token mnBLKPDkOyVzxugK.1124 for user conductor 2021-07-10 05:20:28.514428 I | auth: deleting token dvnOIKJcJUfRoPDm.1123 for user conductor 2021-07-10 05:20:29.514487 I | auth: deleting token ylQNVaxEIFdBqVAR.1125 for user conductor 2021-07-10 05:20:30.097198 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (9.002525125s) to execute 2021-07-10 05:20:30.097628 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (9.003537026s) to execute 2021-07-10 05:20:30.689985 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:32.514321 I | auth: deleting token OwmiGdQNCjBWqNlY.1126 for user conductor 2021-07-10 05:20:32.514392 I | auth: deleting token RuoWnUrMifrEJLnJ.1127 for user conductor 2021-07-10 05:20:32.897597 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.708873656s) to execute 2021-07-10 05:20:32.988797 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.796428131s) to execute 2021-07-10 05:20:32.988903 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.800072455s) to execute 2021-07-10 05:20:32.989035 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.400072108s) to execute 2021-07-10 05:20:34.514213 I | auth: deleting token cAszcdHTShbOzEpY.1130 for user conductor 2021-07-10 05:20:34.514276 I | auth: deleting token EQdRQddfBXqlmhgL.1129 for user conductor 2021-07-10 05:20:35.690250 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:37.514222 I | auth: deleting token AtIPmrlEahENPgnU.1132 for user conductor 2021-07-10 05:20:37.514297 I | auth: deleting token ITWIWIQflmTuotAK.1128 for user conductor 2021-07-10 05:20:37.514311 I | auth: deleting token QqeXUPLqFJYEzmvC.1131 for user conductor 2021-07-10 05:20:37.514328 I | auth: deleting token GhasHzUMNvGxEmQP.1133 for user conductor 2021-07-10 05:20:38.395855 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.30706194s) to execute 2021-07-10 05:20:40.690639 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:41.090965 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (6.08047018s) to execute 2021-07-10 05:20:42.588702 I | auth: deleting token QAVwPFyjpsUmEEwF.1136 for user conductor 2021-07-10 05:20:42.588777 I | auth: deleting token GwNsjxyywbJfQzop.1135 for user conductor 2021-07-10 05:20:42.588793 I | auth: deleting token VFsIuRjixSxudMkg.1134 for user conductor 2021-07-10 05:20:42.588810 I | auth: deleting token SonhvrAnSYOqcfCL.1137 for user conductor 2021-07-10 05:20:42.588821 I | auth: deleting token HMPeKEOiynyrCMBd.1138 for user conductor 2021-07-10 05:20:43.588648 I | auth: deleting token vJSpdXQzvHhZcNNF.1139 for user conductor 2021-07-10 05:20:43.893411 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.703118811s) to execute 2021-07-10 05:20:43.893622 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.799681509s) to execute 2021-07-10 05:20:45.690948 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:46.588556 I | auth: deleting token yhdZIjSGhqKPrsXt.1141 for user conductor 2021-07-10 05:20:46.588624 I | auth: deleting token zaiVRSNlIBvPjTWL.1140 for user conductor 2021-07-10 05:20:46.588641 I | auth: deleting token pNqYIGiOhwTShjrO.1142 for user conductor 2021-07-10 05:20:46.593161 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.499041055s) to execute 2021-07-10 05:20:46.688464 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.596650512s) to execute 2021-07-10 05:20:46.688958 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.699993697s) to execute 2021-07-10 05:20:49.492899 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.801413563s) to execute 2021-07-10 05:20:49.493007 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.80071563s) to execute 2021-07-10 05:20:49.588550 I | auth: deleting token fMltTccWqyVhcXQY.1145 for user conductor 2021-07-10 05:20:49.588606 I | auth: deleting token RvbgdPGbzMfBficK.1144 for user conductor 2021-07-10 05:20:49.588634 I | auth: deleting token QLQNcxkPzydQgabb.1143 for user conductor 2021-07-10 05:20:50.588710 I | auth: deleting token DpEZbVhWpMFPjWWS.1146 for user conductor 2021-07-10 05:20:50.691260 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:53.514126 I | auth: deleting token UzYOSZUomeVjPYYq.1147 for user conductor 2021-07-10 05:20:54.514416 I | auth: deleting token gRtBTedTrDVoajzE.1148 for user conductor 2021-07-10 05:20:54.593201 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.097453567s) to execute 2021-07-10 05:20:55.691598 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:20:56.793135 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.102064709s) to execute 2021-07-10 05:20:56.793347 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.104202337s) to execute 2021-07-10 05:20:56.912376 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.223167278s) to execute 2021-07-10 05:20:57.012522 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (123.723309ms) to execute 2021-07-10 05:20:57.015398 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (101.279708ms) to execute 2021-07-10 05:20:57.588588 I | auth: deleting token nLyanSfMjUPXmAVz.1149 for user conductor 2021-07-10 05:20:57.588672 I | auth: deleting token sJFrfovqcLWZAjsk.1150 for user conductor 2021-07-10 05:21:00.691915 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:02.488787 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.799750695s) to execute 2021-07-10 05:21:02.529609 I | auth: deleting token RQcCPKEAUjyfmNKC.1155 for user conductor 2021-07-10 05:21:02.529677 I | auth: deleting token HsbsYYtsYKWQMUSA.1153 for user conductor 2021-07-10 05:21:02.529696 I | auth: deleting token zVNwVKUkzIHyoboc.1152 for user conductor 2021-07-10 05:21:04.997173 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.507253386s) to execute 2021-07-10 05:21:04.997658 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.505626881s) to execute 2021-07-10 05:21:05.588579 I | auth: deleting token ZOFKtgePlrSkZNnI.1157 for user conductor 2021-07-10 05:21:05.588636 I | auth: deleting token GSvkDpoizehBpbnH.1156 for user conductor 2021-07-10 05:21:05.588652 I | auth: deleting token RHtYMJkarljLyRwh.1154 for user conductor 2021-07-10 05:21:05.588671 I | auth: deleting token qbzlWdRaLqIOZmrw.1151 for user conductor 2021-07-10 05:21:05.588685 I | auth: deleting token fVayZwtViSQeBWgO.1158 for user conductor 2021-07-10 05:21:05.588696 I | auth: deleting token nrlQZyHbGPBMYono.1159 for user conductor 2021-07-10 05:21:05.692157 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:07.790978 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.69995844s) to execute 2021-07-10 05:21:07.791194 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.702397696s) to execute 2021-07-10 05:21:08.514313 I | auth: deleting token GyDRvXjBiHEtFCvi.1160 for user conductor 2021-07-10 05:21:10.692541 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:11.588449 I | auth: deleting token UfJyqNcsjepbImxd.1164 for user conductor 2021-07-10 05:21:11.588528 I | auth: deleting token zyKkyoNtDWhllAcM.1161 for user conductor 2021-07-10 05:21:11.588560 I | auth: deleting token avWWRdCEcUkWCtjU.1162 for user conductor 2021-07-10 05:21:11.588583 I | auth: deleting token FWBStwsKUXywtlWc.1163 for user conductor 2021-07-10 05:21:11.589821 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.97931902s) to execute 2021-07-10 05:21:14.291249 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.979215416s) to execute 2021-07-10 05:21:14.514275 I | auth: deleting token pijiWHxQWUltmuRa.1165 for user conductor 2021-07-10 05:21:14.514341 I | auth: deleting token tQOxJYqGsepkldeF.1167 for user conductor 2021-07-10 05:21:14.514365 I | auth: deleting token CoIFCzthnzZzeiBk.1166 for user conductor 2021-07-10 05:21:15.692877 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:16.889527 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.40073928s) to execute 2021-07-10 05:21:17.588660 I | auth: deleting token RCCfbplkGKDlhIMi.1170 for user conductor 2021-07-10 05:21:17.588745 I | auth: deleting token LcDaFTXIhRVBoFRR.1168 for user conductor 2021-07-10 05:21:17.588776 I | auth: deleting token jLlzQuHvsCYLqcuf.1169 for user conductor 2021-07-10 05:21:18.588646 I | auth: deleting token OPlfgSbyOYlgGgfR.1171 for user conductor 2021-07-10 05:21:20.788628 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:22.791786 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.581499929s) to execute 2021-07-10 05:21:23.514344 I | auth: deleting token hhLBRQmpNsiPtdtv.1172 for user conductor 2021-07-10 05:21:23.514387 I | auth: deleting token VkgMFRSyPMcDOPLX.1174 for user conductor 2021-07-10 05:21:25.692065 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (903.220467ms) to execute 2021-07-10 05:21:25.788868 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:29.514395 I | auth: deleting token zgbBDoKOemnoHqGe.1175 for user conductor 2021-07-10 05:21:29.514459 I | auth: deleting token DEVflwfeHAYqQEYL.1178 for user conductor 2021-07-10 05:21:29.514477 I | auth: deleting token YQrMIoQEUxNIThlk.1180 for user conductor 2021-07-10 05:21:29.514488 I | auth: deleting token MvcuWtdEXiJNsRYn.1176 for user conductor 2021-07-10 05:21:29.514499 I | auth: deleting token PoKCAJpxlDntbwOi.1179 for user conductor 2021-07-10 05:21:29.514517 I | auth: deleting token sOUUPVmmvwOGwnGL.1177 for user conductor 2021-07-10 05:21:29.514532 I | auth: deleting token WWAczTxbJrmlRBRR.1173 for user conductor 2021-07-10 05:21:30.789199 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:34.588553 I | auth: deleting token qyTNRAWTxPoWFqtF.1182 for user conductor 2021-07-10 05:21:34.588620 I | auth: deleting token gDMdBRxfJuEgSIdK.1183 for user conductor 2021-07-10 05:21:34.588638 I | auth: deleting token KUQkZlDOlEYGLHay.1181 for user conductor 2021-07-10 05:21:34.588651 I | auth: deleting token XCZaorQfkXakyqli.1184 for user conductor 2021-07-10 05:21:35.514137 I | auth: deleting token zEXSRNaATQPTjUuk.1185 for user conductor 2021-07-10 05:21:35.789517 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:38.392989 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (6.404244691s) to execute 2021-07-10 05:21:40.514399 I | auth: deleting token dgiFvvlWnCfbEkoZ.1188 for user conductor 2021-07-10 05:21:40.514452 I | auth: deleting token rmUllCXehVOThsqp.1189 for user conductor 2021-07-10 05:21:40.514467 I | auth: deleting token QcrwlraBMzlgIYJn.1186 for user conductor 2021-07-10 05:21:40.514483 I | auth: deleting token OhqlOYkLrexIzPxI.1190 for user conductor 2021-07-10 05:21:40.514502 I | auth: deleting token FjIjUDJIGDEdCTQG.1187 for user conductor 2021-07-10 05:21:40.790048 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:40.792926 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.399652679s) to execute 2021-07-10 05:21:40.793217 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.304342129s) to execute 2021-07-10 05:21:40.910629 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.421685453s) to execute 2021-07-10 05:21:43.890637 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.976200517s) to execute 2021-07-10 05:21:44.588652 I | auth: deleting token qOAvLJWlLjygkkCj.1191 for user conductor 2021-07-10 05:21:45.790359 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:46.591485 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.275307704s) to execute 2021-07-10 05:21:47.514245 I | auth: deleting token OLKkUMtERmqRzTci.1195 for user conductor 2021-07-10 05:21:47.514315 I | auth: deleting token pftTAPdtMTOEcNUz.1197 for user conductor 2021-07-10 05:21:47.514337 I | auth: deleting token RIMxIBgNTmGpOqFv.1194 for user conductor 2021-07-10 05:21:47.514350 I | auth: deleting token MWIYYYSoOEzOoqAc.1192 for user conductor 2021-07-10 05:21:47.514360 I | auth: deleting token BeGnLAuQngtZbXbu.1193 for user conductor 2021-07-10 05:21:47.514380 I | auth: deleting token pzTUZQkwzwDXMSli.1196 for user conductor 2021-07-10 05:21:49.514405 I | auth: deleting token PYjNfwRjTbLFbKUL.1198 for user conductor 2021-07-10 05:21:50.514339 I | auth: deleting token BDEQMFlDcAPQrIcL.1199 for user conductor 2021-07-10 05:21:50.790675 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:52.588780 I | auth: deleting token anjKpifoKqnqPXeI.1200 for user conductor 2021-07-10 05:21:53.588487 I | auth: deleting token dhlhWSPxhLldsHRP.1201 for user conductor 2021-07-10 05:21:54.394925 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (7.800011448s) to execute 2021-07-10 05:21:54.395366 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.801251522s) to execute 2021-07-10 05:21:55.791010 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:21:56.888715 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.398037204s) to execute 2021-07-10 05:21:56.888872 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.399951588s) to execute 2021-07-10 05:21:56.889125 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.400031168s) to execute 2021-07-10 05:21:59.514288 I | auth: deleting token wsDmvibxgsuItyhF.1204 for user conductor 2021-07-10 05:21:59.514350 I | auth: deleting token aJUKYubVhopWLYkf.1205 for user conductor 2021-07-10 05:21:59.514370 I | auth: deleting token BDijVKAERmgnhHAZ.1202 for user conductor 2021-07-10 05:22:00.791241 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:04.288942 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.898405171s) to execute 2021-07-10 05:22:04.411679 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (119.972607ms) to execute 2021-07-10 05:22:04.514205 I | auth: deleting token eEZsidBnzxZZSxVl.1203 for user conductor 2021-07-10 05:22:04.514246 I | auth: deleting token vDSLkYALCkysLrxR.1207 for user conductor 2021-07-10 05:22:04.514262 I | auth: deleting token tzLXNaTzMAQreGJZ.1210 for user conductor 2021-07-10 05:22:04.514269 I | auth: deleting token DwkemrsOrKcBHUMA.1209 for user conductor 2021-07-10 05:22:04.514282 I | auth: deleting token QYsujzVKFreeXXjs.1206 for user conductor 2021-07-10 05:22:05.514208 I | auth: deleting token gSwTgsnBalTSMrYN.1211 for user conductor 2021-07-10 05:22:05.514274 I | auth: deleting token BBQNWUPkYwnGxxyE.1208 for user conductor 2021-07-10 05:22:05.791534 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:07.193791 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.204932047s) to execute 2021-07-10 05:22:09.494353 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.182240067s) to execute 2021-07-10 05:22:10.588845 I | auth: deleting token FLTESQCDnQTnsMrn.1214 for user conductor 2021-07-10 05:22:10.588921 I | auth: deleting token vDfVVFYSuJHrBaEY.1212 for user conductor 2021-07-10 05:22:10.791914 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:12.490799 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.899727441s) to execute 2021-07-10 05:22:15.390881 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.899924587s) to execute 2021-07-10 05:22:15.391061 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.893569109s) to execute 2021-07-10 05:22:15.391343 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.897890728s) to execute 2021-07-10 05:22:15.589591 I | auth: deleting token GshbphOeXZLXrcnO.1213 for user conductor 2021-07-10 05:22:15.589645 I | auth: deleting token BghTORyMWZVGhXiO.1216 for user conductor 2021-07-10 05:22:15.589651 I | auth: deleting token bwINdZvARdYeZkqN.1217 for user conductor 2021-07-10 05:22:15.888504 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:18.514202 I | auth: deleting token YoFeQbrJnzPNSsha.1215 for user conductor 2021-07-10 05:22:18.514264 I | auth: deleting token UzRsyGASqwXZpTBz.1218 for user conductor 2021-07-10 05:22:18.514283 I | auth: deleting token udnXqknNxLSEHuxV.1220 for user conductor 2021-07-10 05:22:18.514304 I | auth: deleting token ISycHgWycgzaGvmV.1219 for user conductor 2021-07-10 05:22:20.888839 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:23.514343 I | auth: deleting token ohreOwYQOMnkZwLu.1222 for user conductor 2021-07-10 05:22:23.514419 I | auth: deleting token ACWgsbQqlsGsVKPU.1224 for user conductor 2021-07-10 05:22:23.514437 I | auth: deleting token qBCQhzzvxBmQNJZN.1221 for user conductor 2021-07-10 05:22:23.514448 I | auth: deleting token suSmrLFbeqsivBtF.1223 for user conductor 2021-07-10 05:22:24.693285 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (7.804489499s) to execute 2021-07-10 05:22:25.514149 I | auth: deleting token oXlKdWJHAzjbGvRy.1225 for user conductor 2021-07-10 05:22:25.889159 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:26.514287 I | auth: deleting token GatYUcPFmuqXRsAu.1226 for user conductor 2021-07-10 05:22:27.591496 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.802871139s) to execute 2021-07-10 05:22:27.591933 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.895326829s) to execute 2021-07-10 05:22:27.692023 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.903046868s) to execute 2021-07-10 05:22:27.788817 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (194.34903ms) to execute 2021-07-10 05:22:30.290691 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.380057783s) to execute 2021-07-10 05:22:30.524376 I | auth: deleting token gbzLHnFKcjGaLzHi.1227 for user conductor 2021-07-10 05:22:30.524429 I | auth: deleting token jqkiONTYTmnopcIq.1228 for user conductor 2021-07-10 05:22:30.889545 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:33.193058 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.782610056s) to execute 2021-07-10 05:22:33.588557 I | auth: deleting token pPInGWmeHPbDxlat.1231 for user conductor 2021-07-10 05:22:33.588627 I | auth: deleting token HDokPzRCdbqXAlUg.1232 for user conductor 2021-07-10 05:22:33.588654 I | auth: deleting token QfktlPJzIXGWDWtj.1229 for user conductor 2021-07-10 05:22:33.588687 I | auth: deleting token zAINXFKXOkgoaOhu.1230 for user conductor 2021-07-10 05:22:35.890063 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:36.091357 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.80263505s) to execute 2021-07-10 05:22:36.091650 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.895943475s) to execute 2021-07-10 05:22:39.588464 I | auth: deleting token vwRqsVsMTJnxDxNT.1233 for user conductor 2021-07-10 05:22:39.588538 I | auth: deleting token urmbDpqVZZleRWCC.1236 for user conductor 2021-07-10 05:22:39.588547 I | auth: deleting token qBaRlHayiPQpxqpP.1234 for user conductor 2021-07-10 05:22:40.890769 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:41.389564 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.295524233s) to execute 2021-07-10 05:22:41.389727 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.197563695s) to execute 2021-07-10 05:22:41.389827 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.974336631s) to execute 2021-07-10 05:22:41.510767 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (118.825181ms) to execute 2021-07-10 05:22:41.588619 I | auth: deleting token VSTegoqTqjOUfgSi.1235 for user conductor 2021-07-10 05:22:44.190556 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.899347721s) to execute 2021-07-10 05:22:44.514288 I | auth: deleting token HIuZnblgMhpGnGjR.1238 for user conductor 2021-07-10 05:22:44.514341 I | auth: deleting token zHuFhlKRoJkFkTlD.1237 for user conductor 2021-07-10 05:22:44.514357 I | auth: deleting token EfMFFdMaeZPyPmMG.1239 for user conductor 2021-07-10 05:22:44.514366 I | auth: deleting token HAjUBZbkXTOSUlzb.1240 for user conductor 2021-07-10 05:22:44.514386 I | auth: deleting token EDXsIOHdWlyESImc.1241 for user conductor 2021-07-10 05:22:45.514210 I | auth: deleting token BESHAHVzdrVQwKoH.1242 for user conductor 2021-07-10 05:22:45.891018 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:49.692971 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.304077916s) to execute 2021-07-10 05:22:49.811706 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (115.597263ms) to execute 2021-07-10 05:22:50.891291 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:51.514292 I | auth: deleting token EgKqpMulMkOsDTTU.1245 for user conductor 2021-07-10 05:22:51.514365 I | auth: deleting token XaAeEhonhgyvyhYx.1244 for user conductor 2021-07-10 05:22:51.514382 I | auth: deleting token JmXnsnYBmjWJPbkl.1246 for user conductor 2021-07-10 05:22:51.514394 I | auth: deleting token viSFPWJLpwETHPiM.1243 for user conductor 2021-07-10 05:22:54.514253 I | auth: deleting token kABcNNMySuWMRAZC.1248 for user conductor 2021-07-10 05:22:54.514342 I | auth: deleting token HKgXSLpctLhUAWVe.1249 for user conductor 2021-07-10 05:22:55.891803 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:22:57.514392 I | auth: deleting token TltkMowpkyXcQttG.1252 for user conductor 2021-07-10 05:22:57.514459 I | auth: deleting token nRLVpmBfLLPHfTDO.1251 for user conductor 2021-07-10 05:22:57.514480 I | auth: deleting token qoLxUozOpPmlvwtQ.1253 for user conductor 2021-07-10 05:22:57.514504 I | auth: deleting token wumrHjNvFEnnUFeY.1247 for user conductor 2021-07-10 05:22:57.514517 I | auth: deleting token uGliMQcwnxpGwuIg.1250 for user conductor 2021-07-10 05:23:00.892169 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:01.696403 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (985.422055ms) to execute 2021-07-10 05:23:03.514406 I | auth: deleting token pxjpjdkyNRaJdOQn.1258 for user conductor 2021-07-10 05:23:03.514495 I | auth: deleting token ZSxxhxjtttYcTXTl.1255 for user conductor 2021-07-10 05:23:03.514520 I | auth: deleting token CdKGSSIFcPotmsdv.1256 for user conductor 2021-07-10 05:23:03.514545 I | auth: deleting token AySThMbOnvdFhklI.1254 for user conductor 2021-07-10 05:23:03.514614 I | auth: deleting token jyLOjrmVBlWtGlBl.1257 for user conductor 2021-07-10 05:23:04.294961 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.284472915s) to execute 2021-07-10 05:23:04.514212 I | auth: deleting token MyfCXCbPsBqGEFnS.1259 for user conductor 2021-07-10 05:23:05.892466 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:07.197985 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.707937701s) to execute 2021-07-10 05:23:07.410400 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (114.613231ms) to execute 2021-07-10 05:23:07.514402 I | auth: deleting token geUlomOQVxdmKwKa.1260 for user conductor 2021-07-10 05:23:07.514459 I | auth: deleting token XJSDZViLewueYaFS.1261 for user conductor 2021-07-10 05:23:10.514227 I | auth: deleting token CtAzgAhPLNOWycBa.1262 for user conductor 2021-07-10 05:23:10.514269 I | auth: deleting token FRqKWblyqlDlYWIw.1263 for user conductor 2021-07-10 05:23:10.988673 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:12.893062 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.804085862s) to execute 2021-07-10 05:23:13.514216 I | auth: deleting token PfYCaoVTmuUsvNwh.1265 for user conductor 2021-07-10 05:23:15.988978 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:16.514293 I | auth: deleting token osSYRLrROkxgRBPD.1267 for user conductor 2021-07-10 05:23:16.514368 I | auth: deleting token klWPryUCtzdzBffR.1264 for user conductor 2021-07-10 05:23:18.391545 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.402567131s) to execute 2021-07-10 05:23:18.391985 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.49556752s) to execute 2021-07-10 05:23:18.589252 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (194.734104ms) to execute 2021-07-10 05:23:18.889103 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (400.235504ms) to execute 2021-07-10 05:23:18.891029 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (101.977164ms) to execute 2021-07-10 05:23:20.989281 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:21.514135 I | auth: deleting token UKAaDoGohdloJgCn.1271 for user conductor 2021-07-10 05:23:21.514185 I | auth: deleting token yBVFKpUdOQkGmpJf.1266 for user conductor 2021-07-10 05:23:21.514198 I | auth: deleting token bCBVcGsOqnVPPywA.1269 for user conductor 2021-07-10 05:23:22.588742 I | auth: deleting token QUloPGWjUQUlNsnE.1270 for user conductor 2021-07-10 05:23:22.588801 I | auth: deleting token KoFEChJsfRJkAMUM.1272 for user conductor 2021-07-10 05:23:22.588837 I | auth: deleting token qchbZJQGRIumkEgz.1268 for user conductor 2021-07-10 05:23:24.491093 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.280506407s) to execute 2021-07-10 05:23:24.611707 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (118.004491ms) to execute 2021-07-10 05:23:25.989492 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:27.514244 I | auth: deleting token GZYXriARqwIsBCQZ.1275 for user conductor 2021-07-10 05:23:27.514507 I | auth: deleting token xpYzKEISTczpLksB.1276 for user conductor 2021-07-10 05:23:27.514619 I | auth: deleting token hyiyQURulmtVMihm.1273 for user conductor 2021-07-10 05:23:27.514784 I | auth: deleting token DgvXYHwYtVAVRgxK.1274 for user conductor 2021-07-10 05:23:30.390338 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.499493594s) to execute 2021-07-10 05:23:30.514225 I | auth: deleting token BHGqXoyJRjYlkLgf.1278 for user conductor 2021-07-10 05:23:30.514463 I | auth: deleting token rtNIzkGvngvqhqaC.1277 for user conductor 2021-07-10 05:23:30.989867 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:32.533438 I | auth: deleting token PUSpIvqNuJWdOQtL.1279 for user conductor 2021-07-10 05:23:35.517406 I | auth: deleting token bfwPHssRbXJUHkvC.1281 for user conductor 2021-07-10 05:23:35.517466 I | auth: deleting token wPXnTpbRvOxsxOPC.1280 for user conductor 2021-07-10 05:23:35.517493 I | auth: deleting token hDVTVcTYbOGVutcH.1282 for user conductor 2021-07-10 05:23:35.990226 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:36.092798 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.603904686s) to execute 2021-07-10 05:23:36.093134 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.604253831s) to execute 2021-07-10 05:23:38.588522 I | auth: deleting token zNBJmWuVYDTMgbCC.1284 for user conductor 2021-07-10 05:23:38.588579 I | auth: deleting token YwcXMfRlTHsNVtMB.1285 for user conductor 2021-07-10 05:23:38.789605 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.176432204s) to execute 2021-07-10 05:23:40.990573 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:41.588657 I | auth: deleting token zmZXfNJnPansYkyi.1283 for user conductor 2021-07-10 05:23:41.692865 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.582106265s) to execute 2021-07-10 05:23:44.514270 I | auth: deleting token zPBcXMIXhVzYNFwo.1289 for user conductor 2021-07-10 05:23:44.514351 I | auth: deleting token wLyIotwygNJwpeoe.1286 for user conductor 2021-07-10 05:23:44.514381 I | auth: deleting token WSAqRkBgUTDtDsNY.1288 for user conductor 2021-07-10 05:23:44.514406 I | auth: deleting token emyehCamIXrqmzmt.1287 for user conductor 2021-07-10 05:23:46.088612 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:47.993030 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.482775036s) to execute 2021-07-10 05:23:50.514233 I | auth: deleting token hHHsTPlCGdTtRoTv.1291 for user conductor 2021-07-10 05:23:50.514288 I | auth: deleting token jzTODTRbgzbfEcwT.1290 for user conductor 2021-07-10 05:23:50.514339 I | auth: deleting token LQCZWXVFXKLbanYM.1293 for user conductor 2021-07-10 05:23:50.514381 I | auth: deleting token FsqHEgLVEWUUZCFu.1292 for user conductor 2021-07-10 05:23:51.088895 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:53.489098 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.378169934s) to execute 2021-07-10 05:23:53.489427 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.494108612s) to execute 2021-07-10 05:23:53.610822 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (118.755159ms) to execute 2021-07-10 05:23:53.710412 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (216.464466ms) to execute 2021-07-10 05:23:56.089298 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:23:58.514245 I | auth: deleting token oTqKDCBAIeQZCjMa.1297 for user conductor 2021-07-10 05:23:58.514290 I | auth: deleting token QJmTziUMFqfbtBfI.1294 for user conductor 2021-07-10 05:23:58.514305 I | auth: deleting token UTlcjQtMJRrYJAaO.1295 for user conductor 2021-07-10 05:23:58.514316 I | auth: deleting token rdDSPCyQjonAPfzV.1296 for user conductor 2021-07-10 05:23:58.514324 I | auth: deleting token SswgSZWaXWXiPvmk.1299 for user conductor 2021-07-10 05:23:58.514354 I | auth: deleting token XtigYsrphhsIpLmv.1298 for user conductor 2021-07-10 05:24:01.089606 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:06.089858 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:06.588696 I | auth: deleting token QlamIVrclLORaYCa.1302 for user conductor 2021-07-10 05:24:06.589049 I | auth: deleting token jaUUUvlWACybidSQ.1306 for user conductor 2021-07-10 05:24:06.589252 I | auth: deleting token VtBiXZapXhrjfdcg.1307 for user conductor 2021-07-10 05:24:06.589462 I | auth: deleting token UstcpphHUZYjpPeG.1303 for user conductor 2021-07-10 05:24:06.589667 I | auth: deleting token XvNSniDdArJYnyOg.1301 for user conductor 2021-07-10 05:24:06.589868 I | auth: deleting token akLFFfHZJHNuEgDk.1305 for user conductor 2021-07-10 05:24:06.590078 I | auth: deleting token rkFGrmlFDwVCsftn.1300 for user conductor 2021-07-10 05:24:06.590253 I | auth: deleting token KjTyLbHVzeyBLNfr.1304 for user conductor 2021-07-10 05:24:08.514433 I | auth: deleting token croZwUTTRCOgMTRY.1308 for user conductor 2021-07-10 05:24:09.588608 I | auth: deleting token RPmuVQZkVzCqqeFA.1309 for user conductor 2021-07-10 05:24:09.990133 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (7.57702541s) to execute 2021-07-10 05:24:10.110577 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (117.083965ms) to execute 2021-07-10 05:24:10.514277 I | auth: deleting token vxYlYVaGtsMiIREl.1310 for user conductor 2021-07-10 05:24:11.090056 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:12.514146 I | auth: deleting token pFLctNkoDERvZgwp.1311 for user conductor 2021-07-10 05:24:13.514327 I | auth: deleting token yhLVBQwjchqWfiKp.1312 for user conductor 2021-07-10 05:24:15.290575 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.380193137s) to execute 2021-07-10 05:24:16.090310 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:16.514338 I | auth: deleting token xSUeOvwHEEssEOBs.1313 for user conductor 2021-07-10 05:24:17.696936 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.086142146s) to execute 2021-07-10 05:24:21.188619 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:21.514256 I | auth: deleting token iTLxlbudymxtDKNC.1315 for user conductor 2021-07-10 05:24:21.514320 I | auth: deleting token zaYWbavwhuHugxiF.1316 for user conductor 2021-07-10 05:24:21.514332 I | auth: deleting token TCuMICtLhLnznbNM.1314 for user conductor 2021-07-10 05:24:21.514346 I | auth: deleting token nMvJiYxXbjUdZsDS.1318 for user conductor 2021-07-10 05:24:25.189898 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.198795435s) to execute 2021-07-10 05:24:25.310686 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (118.118677ms) to execute 2021-07-10 05:24:26.189024 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:27.589015 I | auth: deleting token fJiLtfIhYFXKUOiv.1317 for user conductor 2021-07-10 05:24:27.589108 I | auth: deleting token poYSQeugCjUfUJPF.1320 for user conductor 2021-07-10 05:24:27.589126 I | auth: deleting token OHBsOuSxuHYtvbKh.1319 for user conductor 2021-07-10 05:24:27.589144 I | auth: deleting token zOkVaGzViJysFHhc.1321 for user conductor 2021-07-10 05:24:28.289737 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.700846769s) to execute 2021-07-10 05:24:30.514420 I | auth: deleting token INLCboiLjaKWygcy.1323 for user conductor 2021-07-10 05:24:30.514480 I | auth: deleting token WcwZconvnZhjPkHr.1324 for user conductor 2021-07-10 05:24:30.514505 I | auth: deleting token rYJoVgoAnGSFznBM.1322 for user conductor 2021-07-10 05:24:30.795255 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.404147552s) to execute 2021-07-10 05:24:31.189413 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:33.588626 I | auth: deleting token ncuCcTihRkkdFdoK.1325 for user conductor 2021-07-10 05:24:33.892548 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.680769638s) to execute 2021-07-10 05:24:36.189717 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:36.514317 I | auth: deleting token rqejMcISadJAzUHw.1328 for user conductor 2021-07-10 05:24:36.514435 I | auth: deleting token qevlOCrUensqKsvC.1327 for user conductor 2021-07-10 05:24:38.514347 I | auth: deleting token xZvMuASgFiTjmUwz.1330 for user conductor 2021-07-10 05:24:38.514432 I | auth: deleting token GXsneXgdPmCbNpwv.1331 for user conductor 2021-07-10 05:24:38.514459 I | auth: deleting token grQiJGmgsVGvvBkg.1326 for user conductor 2021-07-10 05:24:39.588538 I | auth: deleting token WQGTTgmbldOniWFn.1329 for user conductor 2021-07-10 05:24:39.588622 I | auth: deleting token JQASxIqTbjErGyUh.1332 for user conductor 2021-07-10 05:24:40.093345 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.582956372s) to execute 2021-07-10 05:24:41.190250 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:44.514193 I | auth: deleting token ApvINSnhMDtZckcr.1335 for user conductor 2021-07-10 05:24:44.514240 I | auth: deleting token qlSKRpJycuQavTah.1334 for user conductor 2021-07-10 05:24:44.514248 I | auth: deleting token LiBUijiJkttDYhNv.1333 for user conductor 2021-07-10 05:24:44.514257 I | auth: deleting token BTQNLSIDaCSwBCaA.1336 for user conductor 2021-07-10 05:24:46.091417 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.98587564s) to execute 2021-07-10 05:24:46.091842 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.988271101s) to execute 2021-07-10 05:24:46.190448 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:46.288999 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.033678ms) to execute 2021-07-10 05:24:46.290842 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.807138ms) to execute 2021-07-10 05:24:47.514206 I | auth: deleting token wekEuWPpwXKwdVeN.1338 for user conductor 2021-07-10 05:24:47.514246 I | auth: deleting token OXRikjQTHnODyUqO.1337 for user conductor 2021-07-10 05:24:47.514253 I | auth: deleting token AwuQEHLRIVincGBI.1340 for user conductor 2021-07-10 05:24:47.514263 I | auth: deleting token dRMCjzlRjIeYIiMh.1339 for user conductor 2021-07-10 05:24:50.514120 I | auth: deleting token OgffgPpvyIIbseQf.1342 for user conductor 2021-07-10 05:24:50.514205 I | auth: deleting token vVzMNXOzfirHOUHx.1341 for user conductor 2021-07-10 05:24:51.190749 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:52.588621 I | auth: deleting token OHTrxcGOVCmnXhBK.1343 for user conductor 2021-07-10 05:24:52.588686 I | auth: deleting token ICoYTCprsZaqlOfA.1346 for user conductor 2021-07-10 05:24:52.588700 I | auth: deleting token emoXkOjTxqrXXtQE.1345 for user conductor 2021-07-10 05:24:52.588718 I | auth: deleting token CwClFeSwQYIxLrFk.1344 for user conductor 2021-07-10 05:24:53.990548 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (6.49924809s) to execute 2021-07-10 05:24:55.514213 I | auth: deleting token APUfZsvdPkiRPFFh.1347 for user conductor 2021-07-10 05:24:55.514278 I | auth: deleting token bAuXJjIFbCuDLXET.1348 for user conductor 2021-07-10 05:24:56.190876 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:24:56.693144 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.699404713s) to execute 2021-07-10 05:24:56.693345 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.700415958s) to execute 2021-07-10 05:24:59.391183 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.398225636s) to execute 2021-07-10 05:24:59.391305 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.695270246s) to execute 2021-07-10 05:24:59.391509 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.69517188s) to execute 2021-07-10 05:25:00.514322 I | auth: deleting token rCvnaDLhRwmybtPS.1351 for user conductor 2021-07-10 05:25:00.514400 I | auth: deleting token mGhsSWtocoDgNeav.1352 for user conductor 2021-07-10 05:25:00.514414 I | auth: deleting token uaSBKuiJhqzlibwh.1349 for user conductor 2021-07-10 05:25:00.514432 I | auth: deleting token shqnQwjWkeQnOCrM.1354 for user conductor 2021-07-10 05:25:00.514446 I | auth: deleting token TzmDaUERXNZlRyrO.1350 for user conductor 2021-07-10 05:25:00.514457 I | auth: deleting token CFLlyVHFNtFzPyuN.1353 for user conductor 2021-07-10 05:25:01.191150 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:25:02.192330 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.797796343s) to execute 2021-07-10 05:25:02.192856 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.798460335s) to execute 2021-07-10 05:25:04.588606 I | auth: deleting token ZDrGvxRuwCHqjaTr.1359 for user conductor 2021-07-10 05:25:04.588692 I | auth: deleting token MvhQRToYBCAmnzhZ.1356 for user conductor 2021-07-10 05:25:04.588724 I | auth: deleting token ZgSELRVYsNSSgdPi.1357 for user conductor 2021-07-10 05:25:04.588744 I | auth: deleting token DFNXWRnYhTKCDAiw.1355 for user conductor 2021-07-10 05:25:04.588783 I | auth: deleting token vbPWdGrJLwhnfqpY.1358 for user conductor 2021-07-10 05:25:04.791373 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.596826952s) to execute 2021-07-10 05:25:04.791498 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.502699142s) to execute 2021-07-10 05:25:06.191454 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:25:07.514301 I | auth: deleting token TnMFJMPsvtuXhdoq.1361 for user conductor 2021-07-10 05:25:07.514386 I | auth: deleting token UcJlCCoWEJDlKeft.1360 for user conductor 2021-07-10 05:25:07.591170 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.700107537s) to execute 2021-07-10 05:25:09.588743 I | auth: deleting token mwQlDYbMUxrtCFdv.1364 for user conductor 2021-07-10 05:25:09.588817 I | auth: deleting token dZQKexPPdEPWkXaj.1363 for user conductor 2021-07-10 05:25:09.996542 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.285655546s) to execute 2021-07-10 05:25:09.996857 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.403499137s) to execute 2021-07-10 05:25:10.189010 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.134212ms) to execute 2021-07-10 05:25:11.191700 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:25:12.588713 I | auth: deleting token RpIvuKbmAIDypXTo.1367 for user conductor 2021-07-10 05:25:12.588789 I | auth: deleting token BjONmvSSQqDFnikb.1362 for user conductor 2021-07-10 05:25:12.588814 I | auth: deleting token CYwjUWtxBmGVFxkL.1366 for user conductor 2021-07-10 05:25:12.591299 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.402378655s) to execute 2021-07-10 05:25:12.591728 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.002610454s) to execute 2021-07-10 05:25:13.514262 I | auth: deleting token mUdytvkzDzVBAokd.1368 for user conductor 2021-07-10 05:25:13.514334 I | auth: deleting token AUAPRmNQpSGzHPyj.1365 for user conductor 2021-07-10 05:25:15.514239 I | auth: deleting token PUcTJjarspEfIuuw.1369 for user conductor 2021-07-10 05:25:15.514344 I | auth: deleting token uvMSPGwIZKztSYfg.1371 for user conductor 2021-07-10 05:25:15.514362 I | auth: deleting token XlTWBrejBgmviVsQ.1370 for user conductor 2021-07-10 05:25:15.593737 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.903651507s) to execute 2021-07-10 05:25:16.192189 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:25:18.588662 I | auth: deleting token wKiFTBzJoidAcyKt.1372 for user conductor 2021-07-10 05:25:21.192482 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:25:21.514232 I | auth: deleting token sGgbxxCCqgKLmXDs.1374 for user conductor 2021-07-10 05:25:23.790683 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (8.101817749s) to execute 2021-07-10 05:25:23.790942 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (8.194274094s) to execute 2021-07-10 05:25:26.192825 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:25:27.489191 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.249393131s) to execute 2021-07-10 05:25:30.089386 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.498022578s) to execute 2021-07-10 05:25:30.310271 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (121.50958ms) to execute 2021-07-10 05:25:30.588743 I | auth: deleting token cQGORbLklPcCldFV.1377 for user conductor 2021-07-10 05:25:30.588824 I | auth: deleting token YPcssPPFuBhWBdDw.1373 for user conductor 2021-07-10 05:25:30.588848 I | auth: deleting token qbPgJrmbmEsIGapL.1378 for user conductor 2021-07-10 05:25:30.588865 I | auth: deleting token TndKLFgXWHUjzXEC.1376 for user conductor 2021-07-10 05:25:30.588886 I | auth: deleting token ULcmXhwdYTuKNWfH.1375 for user conductor 2021-07-10 05:25:31.193107 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:25:33.191256 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.277065883s) to execute 2021-07-10 05:25:33.588626 I | auth: deleting token xBROKjPyexUrpFyq.1380 for user conductor 2021-07-10 05:25:33.588722 I | auth: deleting token TRSvTtpzBsQdCWqQ.1379 for user conductor 2021-07-10 05:25:36.090007 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.87710554s) to execute 2021-07-10 05:25:36.193376 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:25:41.193932 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:25:41.514321 I | auth: deleting token sCyuawxAwihxSuGA.1383 for user conductor 2021-07-10 05:25:41.514396 I | auth: deleting token LxfIuPabdkrwBKTX.1381 for user conductor 2021-07-10 05:25:42.091371 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.18110951s) to execute 2021-07-10 05:25:44.588612 I | auth: deleting token TQAfJIvWeoiZXSXB.1382 for user conductor 2021-07-10 05:25:44.588850 I | auth: deleting token xGZOZaaTlrWnGYxs.1384 for user conductor 2021-07-10 05:25:44.792636 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.582037887s) to execute 2021-07-10 05:25:46.194266 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:25:47.514242 I | auth: deleting token HrdgMzYgKRshVZnP.1387 for user conductor 2021-07-10 05:25:47.514282 I | auth: deleting token eLgjhYgyTJHykJwL.1386 for user conductor 2021-07-10 05:25:47.514290 I | auth: deleting token SOuUgbfJuRKsjjKy.1385 for user conductor 2021-07-10 05:25:47.792180 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.603424976s) to execute 2021-07-10 05:25:47.792492 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.903587155s) to execute 2021-07-10 05:25:47.792635 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.801212834s) to execute 2021-07-10 05:25:51.288685 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:25:52.790870 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.601978797s) to execute 2021-07-10 05:25:55.588768 I | auth: deleting token BPVCDpUBhFKJHvPw.1391 for user conductor 2021-07-10 05:25:55.588832 I | auth: deleting token xbJKrhwCsgxWQpPc.1389 for user conductor 2021-07-10 05:25:55.591019 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.60204975s) to execute 2021-07-10 05:25:55.591258 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.702353733s) to execute 2021-07-10 05:25:56.289077 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:25:57.514241 I | auth: deleting token VFtRgwwsnTMozNqC.1388 for user conductor 2021-07-10 05:25:57.514334 I | auth: deleting token dvsmTKjNldasNXCy.1390 for user conductor 2021-07-10 05:25:57.514362 I | auth: deleting token fUlxdHEjJULQFxXJ.1394 for user conductor 2021-07-10 05:25:57.514399 I | auth: deleting token hlohfPNnRRSPjgNa.1393 for user conductor 2021-07-10 05:25:57.514418 I | auth: deleting token IGcKsIxOqujQVNKq.1395 for user conductor 2021-07-10 05:25:57.514448 I | auth: deleting token spQEuDQkoojIqLFc.1392 for user conductor 2021-07-10 05:25:58.295946 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.605423819s) to execute 2021-07-10 05:25:58.296091 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.607310907s) to execute 2021-07-10 05:26:01.188931 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.17861919s) to execute 2021-07-10 05:26:01.289359 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:02.514137 I | auth: deleting token BTdhOnqPaGUYZeWH.1396 for user conductor 2021-07-10 05:26:02.588569 I | auth: deleting token WHbwIkCmDcHlkXSy.1398 for user conductor 2021-07-10 05:26:02.588599 I | auth: deleting token tlIonhQLdEvTWDWS.1399 for user conductor 2021-07-10 05:26:05.514240 I | auth: deleting token VfOXeqmDscbVMLAR.1397 for user conductor 2021-07-10 05:26:05.514297 I | auth: deleting token VlMxbTOSYrrpTfre.1401 for user conductor 2021-07-10 05:26:06.289378 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.574301156s) to execute 2021-07-10 05:26:06.289633 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:08.520975 I | auth: deleting token MWleKGuVJVfQXFjD.1400 for user conductor 2021-07-10 05:26:08.521022 I | auth: deleting token hpJcnhEYZGVXXzJw.1405 for user conductor 2021-07-10 05:26:08.521035 I | auth: deleting token eQkwnmgZihJcQClv.1402 for user conductor 2021-07-10 05:26:08.521056 I | auth: deleting token ACKwvvUGutYLVjsS.1403 for user conductor 2021-07-10 05:26:08.521068 I | auth: deleting token vEujgTjPaWpIbCzm.1404 for user conductor 2021-07-10 05:26:08.791963 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.301677241s) to execute 2021-07-10 05:26:11.289907 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:11.590419 I | auth: deleting token UmiWUAmCyqAbNYPD.1407 for user conductor 2021-07-10 05:26:11.590495 I | auth: deleting token gDjZYxIYqPEUyFxg.1406 for user conductor 2021-07-10 05:26:12.588627 I | auth: deleting token ytBbQyVNudSBinfB.1408 for user conductor 2021-07-10 05:26:14.588521 I | auth: deleting token pIETZHSeOsGcAufL.1410 for user conductor 2021-07-10 05:26:14.588588 I | auth: deleting token iinrtahuDubweDIs.1409 for user conductor 2021-07-10 05:26:14.593407 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.702356755s) to execute 2021-07-10 05:26:14.593620 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.798903004s) to execute 2021-07-10 05:26:14.788996 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (192.517444ms) to execute 2021-07-10 05:26:14.811307 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (122.189442ms) to execute 2021-07-10 05:26:16.290206 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:17.514377 I | auth: deleting token ivATNWaPssENooUU.1413 for user conductor 2021-07-10 05:26:17.514425 I | auth: deleting token CceUvbhPQxgCbauu.1414 for user conductor 2021-07-10 05:26:17.514436 I | auth: deleting token owdFVOSdUzexqJbK.1412 for user conductor 2021-07-10 05:26:17.514443 I | auth: deleting token nUtFShCqtdQzdFvn.1411 for user conductor 2021-07-10 05:26:17.989444 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.700615295s) to execute 2021-07-10 05:26:21.290533 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:23.396113 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.384181312s) to execute 2021-07-10 05:26:23.514243 I | auth: deleting token dcBgRLBoWdHEbIKM.1417 for user conductor 2021-07-10 05:26:23.514305 I | auth: deleting token trCcyodToolQhBhe.1418 for user conductor 2021-07-10 05:26:23.514333 I | auth: deleting token GlOKBjBylEToWmMz.1419 for user conductor 2021-07-10 05:26:23.514352 I | auth: deleting token pSkrJJalxnNjnbkc.1415 for user conductor 2021-07-10 05:26:23.514363 I | auth: deleting token JUhSdrUvrQMdBkBM.1416 for user conductor 2021-07-10 05:26:23.514381 I | auth: deleting token eGyHnniUgukyqXEo.1420 for user conductor 2021-07-10 05:26:25.991060 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.499278364s) to execute 2021-07-10 05:26:25.991309 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.50250886s) to execute 2021-07-10 05:26:26.111010 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.622172619s) to execute 2021-07-10 05:26:26.112884 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (118.9087ms) to execute 2021-07-10 05:26:26.288910 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (100.00725ms) to execute 2021-07-10 05:26:26.290721 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:26.514277 I | auth: deleting token HXZpKllaLsIKwIVO.1421 for user conductor 2021-07-10 05:26:26.514369 I | auth: deleting token ZkQMsSKFnqagqGsh.1423 for user conductor 2021-07-10 05:26:26.514410 I | auth: deleting token LbHpBrigpKybehcd.1422 for user conductor 2021-07-10 05:26:27.514198 I | auth: deleting token FkCYqQouGzuOTXeZ.1424 for user conductor 2021-07-10 05:26:29.514303 I | auth: deleting token nkJDEMZaAaDqiZjg.1425 for user conductor 2021-07-10 05:26:30.514143 I | auth: deleting token BVsSeMyrXIIllHzJ.1426 for user conductor 2021-07-10 05:26:31.291007 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:36.291316 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:38.514366 I | auth: deleting token nSdaHxwvyKmgCAKr.1429 for user conductor 2021-07-10 05:26:38.514433 I | auth: deleting token wEfXPtmXoeTXuYTc.1427 for user conductor 2021-07-10 05:26:38.514454 I | auth: deleting token thuCDzTqoDcmIkxM.1430 for user conductor 2021-07-10 05:26:41.291625 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:41.588674 I | auth: deleting token OlaaomldFnSrvyfD.1432 for user conductor 2021-07-10 05:26:41.588744 I | auth: deleting token YZjsJUgNLLZhaYXM.1431 for user conductor 2021-07-10 05:26:41.588768 I | auth: deleting token eSZkfohJyBmVHjYd.1428 for user conductor 2021-07-10 05:26:41.588796 I | auth: deleting token VmZtAsLWGFvdWcqj.1433 for user conductor 2021-07-10 05:26:41.588817 I | auth: deleting token XGTwHibzTnwmwpyU.1434 for user conductor 2021-07-10 05:26:41.588841 I | auth: deleting token USGFjOTLvdLUIbPf.1435 for user conductor 2021-07-10 05:26:44.990369 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (9.874546994s) to execute 2021-07-10 05:26:45.288998 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.133423ms) to execute 2021-07-10 05:26:46.292050 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:47.588586 I | auth: deleting token mBgaQProXymxyCVS.1439 for user conductor 2021-07-10 05:26:47.588665 I | auth: deleting token CddEoxhVIbEuyhOa.1437 for user conductor 2021-07-10 05:26:47.588692 I | auth: deleting token TeXJkbRtPjXYSabA.1436 for user conductor 2021-07-10 05:26:50.993125 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.079417808s) to execute 2021-07-10 05:26:51.292322 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:54.588468 I | auth: deleting token fiLKhTYXczeQCLzq.1438 for user conductor 2021-07-10 05:26:54.588514 I | auth: deleting token oEgetlYOTbLSdspj.1440 for user conductor 2021-07-10 05:26:56.292539 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:26:57.588493 I | auth: deleting token AnqSZfnocvgINmFK.1444 for user conductor 2021-07-10 05:26:57.588559 I | auth: deleting token aWAAChLNvwlpbYCy.1443 for user conductor 2021-07-10 05:26:57.588583 I | auth: deleting token lYLeqnPFYPlFTPxq.1441 for user conductor 2021-07-10 05:26:57.588597 I | auth: deleting token fbcVzGEdryAZzokk.1442 for user conductor 2021-07-10 05:26:57.588609 I | auth: deleting token tdEBeGFoMsBoyHlE.1445 for user conductor 2021-07-10 05:27:01.292808 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:01.297327 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (7.686856208s) to execute 2021-07-10 05:27:04.096866 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.607814024s) to execute 2021-07-10 05:27:04.097088 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.7081413s) to execute 2021-07-10 05:27:04.588663 I | auth: deleting token LZadDTmdbvYLypgK.1452 for user conductor 2021-07-10 05:27:04.588739 I | auth: deleting token pGzmEhLkeQKyMGwo.1454 for user conductor 2021-07-10 05:27:04.588761 I | auth: deleting token iCqwoasnBoYHJuWw.1453 for user conductor 2021-07-10 05:27:04.588781 I | auth: deleting token WtyvTnJUsZDtCWzt.1450 for user conductor 2021-07-10 05:27:04.588794 I | auth: deleting token MplFeYSJaJdlkigt.1448 for user conductor 2021-07-10 05:27:04.588809 I | auth: deleting token yPurARXGSaTxvdWl.1447 for user conductor 2021-07-10 05:27:04.588821 I | auth: deleting token psrxaBrjrbpmMuna.1451 for user conductor 2021-07-10 05:27:04.589309 I | auth: deleting token GfMyOQAjVbtXpDFq.1449 for user conductor 2021-07-10 05:27:06.293183 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:07.090612 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.701605925s) to execute 2021-07-10 05:27:07.091195 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.900138346s) to execute 2021-07-10 05:27:07.588556 I | auth: deleting token sASjBxwVofUVllXG.1456 for user conductor 2021-07-10 05:27:09.514255 I | auth: deleting token XOfxzBGUJNiidwVT.1458 for user conductor 2021-07-10 05:27:10.290881 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.102034059s) to execute 2021-07-10 05:27:10.291117 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.102304772s) to execute 2021-07-10 05:27:11.293642 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:12.588685 I | auth: deleting token qcKzZhEzVCVSvyVY.1457 for user conductor 2021-07-10 05:27:13.392429 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (9.201200968s) to execute 2021-07-10 05:27:13.392649 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.098617718s) to execute 2021-07-10 05:27:13.392867 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.09864368s) to execute 2021-07-10 05:27:13.510612 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (115.489318ms) to execute 2021-07-10 05:27:15.589863 I | auth: deleting token OXRenEwJBSQptBIj.1464 for user conductor 2021-07-10 05:27:15.589912 I | auth: deleting token UyLWvlnHgbpeCvmF.1462 for user conductor 2021-07-10 05:27:15.589939 I | auth: deleting token zRUWImTIyigzdgIH.1465 for user conductor 2021-07-10 05:27:15.589960 I | auth: deleting token aamfqLcYyCRXWlEv.1463 for user conductor 2021-07-10 05:27:15.589988 I | auth: deleting token uvcScVkemLUjwbBW.1459 for user conductor 2021-07-10 05:27:15.590027 I | auth: deleting token vcumCADQDzoIOiUS.1460 for user conductor 2021-07-10 05:27:15.590062 I | auth: deleting token CpOdPhwqrjIomTZI.1461 for user conductor 2021-07-10 05:27:16.294140 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:17.790932 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.001945255s) to execute 2021-07-10 05:27:20.690649 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.001802937s) to execute 2021-07-10 05:27:21.294443 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:23.790000 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.979292309s) to execute 2021-07-10 05:27:23.911415 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (117.698186ms) to execute 2021-07-10 05:27:24.110939 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (197.769323ms) to execute 2021-07-10 05:27:25.514262 I | auth: deleting token UxzSkaVafaYvyDJz.1472 for user conductor 2021-07-10 05:27:25.514323 I | auth: deleting token ltAsEFdjKRiZDmxE.1467 for user conductor 2021-07-10 05:27:25.514334 I | auth: deleting token TlCrXnxJdoiZsnnh.1470 for user conductor 2021-07-10 05:27:25.514346 I | auth: deleting token kGFpfNhuSBvFYTGq.1469 for user conductor 2021-07-10 05:27:25.514358 I | auth: deleting token tWdeikYFLSmgZKLY.1466 for user conductor 2021-07-10 05:27:26.294765 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:28.514397 I | auth: deleting token XKhXXEfrITvMkZuQ.1471 for user conductor 2021-07-10 05:27:28.514469 I | auth: deleting token QrvDpTTCYNWKLDIY.1475 for user conductor 2021-07-10 05:27:28.514496 I | auth: deleting token GpERhtmlZCxXTgtJ.1473 for user conductor 2021-07-10 05:27:28.514532 I | auth: deleting token AoxpxQidjWrspyeE.1476 for user conductor 2021-07-10 05:27:28.514554 I | auth: deleting token GZGRWrOjhJxnNCyJ.1468 for user conductor 2021-07-10 05:27:28.514571 I | auth: deleting token XinPTsicgfVMoMYG.1474 for user conductor 2021-07-10 05:27:30.514314 I | auth: deleting token EVUclmBQHMBgwLNv.1477 for user conductor 2021-07-10 05:27:31.295287 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:33.588612 I | auth: deleting token QCndWiwcuDivyPXu.1479 for user conductor 2021-07-10 05:27:33.588843 I | auth: deleting token WbCbeAZYssujVPsA.1480 for user conductor 2021-07-10 05:27:36.295565 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:36.514232 I | auth: deleting token FdliLwcHFhcVZiTD.1482 for user conductor 2021-07-10 05:27:36.514302 I | auth: deleting token cOholTGMzvbvPxkY.1481 for user conductor 2021-07-10 05:27:36.514350 I | auth: deleting token UUdMrxzTXmwzGHRM.1478 for user conductor 2021-07-10 05:27:36.514385 I | auth: deleting token FIacOhOFpkvdUHzB.1484 for user conductor 2021-07-10 05:27:36.514404 I | auth: deleting token eGDHfdiVavKJJGjP.1483 for user conductor 2021-07-10 05:27:36.993950 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.182823446s) to execute 2021-07-10 05:27:40.194077 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.083654799s) to execute 2021-07-10 05:27:41.388551 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:41.588743 I | auth: deleting token nFzkZGEiofVYFjVa.1487 for user conductor 2021-07-10 05:27:41.588801 I | auth: deleting token CtllZiKjayMPnbrB.1486 for user conductor 2021-07-10 05:27:41.588823 I | auth: deleting token ATphLvumxkGXOLnc.1485 for user conductor 2021-07-10 05:27:42.588555 I | auth: deleting token PyxrvKfbfvXgVZEc.1488 for user conductor 2021-07-10 05:27:43.196089 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.001860478s) to execute 2021-07-10 05:27:43.196761 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (6.107755383s) to execute 2021-07-10 05:27:44.514260 I | auth: deleting token mIenconHDvIJdyrn.1490 for user conductor 2021-07-10 05:27:44.514377 I | auth: deleting token YGiLqMTyFrCjyEXy.1489 for user conductor 2021-07-10 05:27:46.192402 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.902425135s) to execute 2021-07-10 05:27:46.192661 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.994206616s) to execute 2021-07-10 05:27:46.192838 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.903921679s) to execute 2021-07-10 05:27:46.388825 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:50.589190 I | auth: deleting token ifpcXajporcFKZrc.1492 for user conductor 2021-07-10 05:27:50.589266 I | auth: deleting token WiaxhpMTPuCCZriM.1494 for user conductor 2021-07-10 05:27:50.589280 I | auth: deleting token UihIIPsUAWVfStnM.1491 for user conductor 2021-07-10 05:27:50.589298 I | auth: deleting token jWlDBRJpcikQhToc.1497 for user conductor 2021-07-10 05:27:50.589312 I | auth: deleting token YjHoNcjLChyqtOiK.1493 for user conductor 2021-07-10 05:27:50.589322 I | auth: deleting token GbzCANABNOxJrUQM.1495 for user conductor 2021-07-10 05:27:50.589331 I | auth: deleting token UjpBFeWdzhjrYqQM.1496 for user conductor 2021-07-10 05:27:51.389151 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:51.588807 I | auth: deleting token qElTeVZBUIjHSuIT.1498 for user conductor 2021-07-10 05:27:52.392557 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (6.103714253s) to execute 2021-07-10 05:27:52.392951 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (6.099848868s) to execute 2021-07-10 05:27:52.393184 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.60020877s) to execute 2021-07-10 05:27:52.588776 I | auth: deleting token zyPMjvCDWkLfBlHD.1499 for user conductor 2021-07-10 05:27:53.588527 I | auth: deleting token EpaHQedQNFUesjsq.1500 for user conductor 2021-07-10 05:27:55.093864 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.405018435s) to execute 2021-07-10 05:27:55.109006 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.420164966s) to execute 2021-07-10 05:27:55.514203 I | auth: deleting token UEQrIkcKYHXvLRqG.1501 for user conductor 2021-07-10 05:27:56.389429 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:27:56.533401 I | auth: deleting token CeBHXmghoXlZgZhH.1502 for user conductor 2021-07-10 05:27:57.493199 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.302774787s) to execute 2021-07-10 05:27:58.514312 I | auth: deleting token QjGYLIfnIibmgdvd.1503 for user conductor 2021-07-10 05:27:59.588803 I | auth: deleting token rldHetUEwCIxDuvm.1504 for user conductor 2021-07-10 05:28:00.290587 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.101611895s) to execute 2021-07-10 05:28:01.389763 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:02.514231 I | auth: deleting token rXpUXrkmaScaiult.1506 for user conductor 2021-07-10 05:28:02.514286 I | auth: deleting token aPbwisWsrdumEyYl.1505 for user conductor 2021-07-10 05:28:03.091303 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.500244602s) to execute 2021-07-10 05:28:03.091556 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.502562648s) to execute 2021-07-10 05:28:04.588556 I | auth: deleting token BVDCXaqnoVRvLDsy.1507 for user conductor 2021-07-10 05:28:04.588648 I | auth: deleting token gHPgCQpCJmJDeUVp.1508 for user conductor 2021-07-10 05:28:05.694444 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.600186746s) to execute 2021-07-10 05:28:05.694969 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.600632818s) to execute 2021-07-10 05:28:06.390075 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:07.514132 I | auth: deleting token dubjIPCNNELelUOn.1510 for user conductor 2021-07-10 05:28:07.588549 I | auth: deleting token gdmfSuFLszjPbisc.1511 for user conductor 2021-07-10 05:28:07.588604 I | auth: deleting token OiglUqioBWPKCoho.1512 for user conductor 2021-07-10 05:28:07.588628 I | auth: deleting token GPZUzuarzQcXyBJs.1509 for user conductor 2021-07-10 05:28:08.790595 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.695293297s) to execute 2021-07-10 05:28:08.790814 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.001842105s) to execute 2021-07-10 05:28:08.790972 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.997439426s) to execute 2021-07-10 05:28:08.791147 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.377630681s) to execute 2021-07-10 05:28:11.390327 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:11.596540 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.607674496s) to execute 2021-07-10 05:28:11.596792 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.407998002s) to execute 2021-07-10 05:28:13.588611 I | auth: deleting token sPdvBRiAebOwveOD.1513 for user conductor 2021-07-10 05:28:13.588850 I | auth: deleting token BILkzDIhpjdBRrli.1516 for user conductor 2021-07-10 05:28:13.588939 I | auth: deleting token FGsvAtEUDvqhwRRT.1514 for user conductor 2021-07-10 05:28:16.412321 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:16.997972 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.008853359s) to execute 2021-07-10 05:28:18.588725 I | auth: deleting token qEiIafMRXQHXaODe.1515 for user conductor 2021-07-10 05:28:18.588774 I | auth: deleting token WXIeHdTwMOFDUibv.1521 for user conductor 2021-07-10 05:28:18.588790 I | auth: deleting token kTGNbqUuVDyKvugU.1519 for user conductor 2021-07-10 05:28:18.588808 I | auth: deleting token iSBDLjEWINxzmGmo.1518 for user conductor 2021-07-10 05:28:19.588485 I | auth: deleting token ijrqhLMxsUqPYDKr.1523 for user conductor 2021-07-10 05:28:19.588667 I | auth: deleting token kYAzOMZbsGXlxJKI.1520 for user conductor 2021-07-10 05:28:19.588741 I | auth: deleting token HIwIozVvCJrcZCRa.1522 for user conductor 2021-07-10 05:28:19.588783 I | auth: deleting token YKMgGhBbeXZINtRW.1517 for user conductor 2021-07-10 05:28:19.894105 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.801772485s) to execute 2021-07-10 05:28:19.894499 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.803523767s) to execute 2021-07-10 05:28:20.010571 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.919359762s) to execute 2021-07-10 05:28:20.110488 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (212.868402ms) to execute 2021-07-10 05:28:21.488575 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:23.197633 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.108730675s) to execute 2021-07-10 05:28:24.514271 I | auth: deleting token WMGBaKYJkhmwRPzV.1524 for user conductor 2021-07-10 05:28:24.514316 I | auth: deleting token DbudOwYOPfwipdtw.1528 for user conductor 2021-07-10 05:28:24.514332 I | auth: deleting token SMHXajbwsgSSwUmZ.1527 for user conductor 2021-07-10 05:28:24.514346 I | auth: deleting token AQMWCPUVqjflLjmh.1525 for user conductor 2021-07-10 05:28:25.514373 I | auth: deleting token flPpMAurIwxFcbvX.1529 for user conductor 2021-07-10 05:28:25.514443 I | auth: deleting token yWWMUZLVnrGuXVUf.1526 for user conductor 2021-07-10 05:28:25.993992 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.403126341s) to execute 2021-07-10 05:28:26.489038 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:28.990292 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.801527891s) to execute 2021-07-10 05:28:28.990460 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.993431864s) to execute 2021-07-10 05:28:30.588536 I | auth: deleting token FcVSkHkyKIOjohkR.1530 for user conductor 2021-07-10 05:28:30.688550 I | auth: deleting token RuYWfxNoYFIPZigA.1532 for user conductor 2021-07-10 05:28:30.688698 I | auth: deleting token qpHcqOdyHZrbLtuZ.1533 for user conductor 2021-07-10 05:28:31.489328 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:31.693269 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.602321792s) to execute 2021-07-10 05:28:31.693430 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.700520945s) to execute 2021-07-10 05:28:34.494477 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.605506474s) to execute 2021-07-10 05:28:34.494846 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.706096023s) to execute 2021-07-10 05:28:36.489545 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:36.514129 I | auth: deleting token YvYVWuJFLFOBUgZN.1534 for user conductor 2021-07-10 05:28:36.514203 I | auth: deleting token SRAEPgknEqbqduiH.1531 for user conductor 2021-07-10 05:28:36.514215 I | auth: deleting token RtgIJBrCWmOwbaZl.1538 for user conductor 2021-07-10 05:28:36.514221 I | auth: deleting token YaCudFpMPgTiSJqV.1537 for user conductor 2021-07-10 05:28:36.514230 I | auth: deleting token adTWRwpucotJyJKh.1536 for user conductor 2021-07-10 05:28:36.514237 I | auth: deleting token IMhJnXYYwcGbesJa.1539 for user conductor 2021-07-10 05:28:36.514242 I | auth: deleting token KBrpwlLefQLqbAmi.1535 for user conductor 2021-07-10 05:28:39.514342 I | auth: deleting token glCjNoxAqfIJJudt.1540 for user conductor 2021-07-10 05:28:39.514439 I | auth: deleting token kvNYpCgiHSAeuuXL.1541 for user conductor 2021-07-10 05:28:39.992559 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.403540593s) to execute 2021-07-10 05:28:41.489932 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:42.588706 I | auth: deleting token DQkNnrBIeSdmMfmc.1545 for user conductor 2021-07-10 05:28:42.588764 I | auth: deleting token nlypjmJoeMoKXhMc.1543 for user conductor 2021-07-10 05:28:42.588783 I | auth: deleting token HDLCEmGSPoZvCRwH.1542 for user conductor 2021-07-10 05:28:42.588804 I | auth: deleting token lCGMQVpBdNigTAbu.1544 for user conductor 2021-07-10 05:28:42.791700 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (8.199616956s) to execute 2021-07-10 05:28:42.791885 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.500483804s) to execute 2021-07-10 05:28:43.010690 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (121.723398ms) to execute 2021-07-10 05:28:43.110521 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.781996ms) to execute 2021-07-10 05:28:46.490508 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:48.588696 I | auth: deleting token zllvbAVEAjFzXaOs.1549 for user conductor 2021-07-10 05:28:48.588770 I | auth: deleting token AHKBCzPcMMQeyTXp.1546 for user conductor 2021-07-10 05:28:48.588789 I | auth: deleting token tIoOWAgRIISKldMg.1547 for user conductor 2021-07-10 05:28:48.588802 I | auth: deleting token eLuyVtwknNTYNAPe.1550 for user conductor 2021-07-10 05:28:51.490795 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:51.890702 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (8.401856193s) to execute 2021-07-10 05:28:53.588540 I | auth: deleting token ccfSImAesYDiDDLO.1554 for user conductor 2021-07-10 05:28:53.588606 I | auth: deleting token oRlnmScFvWNkpLXt.1552 for user conductor 2021-07-10 05:28:53.588617 I | auth: deleting token NSMaUoCftjHlURop.1553 for user conductor 2021-07-10 05:28:53.588634 I | auth: deleting token QdfJamMwuuQUuHqq.1548 for user conductor 2021-07-10 05:28:54.514208 I | auth: deleting token DptenpGReSFaqgFb.1556 for user conductor 2021-07-10 05:28:54.514285 I | auth: deleting token iIuaQcZjzChWtbvZ.1551 for user conductor 2021-07-10 05:28:54.514318 I | auth: deleting token vQrOfOQjZicPzPqO.1555 for user conductor 2021-07-10 05:28:54.793265 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.902305832s) to execute 2021-07-10 05:28:54.793564 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.900229629s) to execute 2021-07-10 05:28:55.588604 I | auth: deleting token GlKkiwPktBQXtRMT.1557 for user conductor 2021-07-10 05:28:56.491165 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:28:57.588604 I | auth: deleting token iHjAASiDtLoKvXat.1558 for user conductor 2021-07-10 05:28:57.894107 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.905229892s) to execute 2021-07-10 05:28:57.894676 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (3.005670426s) to execute 2021-07-10 05:28:57.895084 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.002722084s) to execute 2021-07-10 05:28:58.588735 I | auth: deleting token stCbXXJNwcUlkCri.1559 for user conductor 2021-07-10 05:29:00.524126 I | auth: deleting token ZVuQzHRcLBenjwta.1560 for user conductor 2021-07-10 05:29:00.793801 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.802921393s) to execute 2021-07-10 05:29:01.491478 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:03.790680 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.801728515s) to execute 2021-07-10 05:29:06.491115 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.70027697s) to execute 2021-07-10 05:29:06.491415 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.69469464s) to execute 2021-07-10 05:29:06.491648 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.697904678s) to execute 2021-07-10 05:29:06.491776 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:06.610583 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (116.85353ms) to execute 2021-07-10 05:29:09.190905 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.596613977s) to execute 2021-07-10 05:29:10.514205 I | auth: deleting token HnPoxVvoLNJVKIHW.1563 for user conductor 2021-07-10 05:29:10.514255 I | auth: deleting token qsNdNZZbhwDdUzjx.1566 for user conductor 2021-07-10 05:29:10.514268 I | auth: deleting token HTYWVsIuZYiBVQaE.1568 for user conductor 2021-07-10 05:29:10.514294 I | auth: deleting token nwjwyLTQpGwkvmVl.1562 for user conductor 2021-07-10 05:29:10.514311 I | auth: deleting token iPJlYfYSMkufhhXI.1564 for user conductor 2021-07-10 05:29:10.514325 I | auth: deleting token MRgqbECeZyVntvTv.1567 for user conductor 2021-07-10 05:29:10.514338 I | auth: deleting token HkoGkjsQOvOgMDVE.1561 for user conductor 2021-07-10 05:29:10.514353 I | auth: deleting token PwQelliWFmGtYGwY.1565 for user conductor 2021-07-10 05:29:11.491993 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:12.591290 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.573921168s) to execute 2021-07-10 05:29:15.190924 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.402007573s) to execute 2021-07-10 05:29:15.191050 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.596781477s) to execute 2021-07-10 05:29:15.410741 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (121.747541ms) to execute 2021-07-10 05:29:15.514374 I | auth: deleting token zlKgvUHWfKlMglSf.1573 for user conductor 2021-07-10 05:29:15.514512 I | auth: deleting token pEFVStdGvJeveczz.1572 for user conductor 2021-07-10 05:29:15.514561 I | auth: deleting token PcetAcGJtKPaeiwp.1569 for user conductor 2021-07-10 05:29:15.514576 I | auth: deleting token lWDXdMkhjURNPSSK.1575 for user conductor 2021-07-10 05:29:15.514596 I | auth: deleting token PkkNyoAyJZZxkYfU.1574 for user conductor 2021-07-10 05:29:15.514615 I | auth: deleting token TeBwiQgWztTqqAbJ.1570 for user conductor 2021-07-10 05:29:16.492300 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:18.514270 I | auth: deleting token zTzmqFIwgbRzFqdW.1576 for user conductor 2021-07-10 05:29:18.514326 I | auth: deleting token uOzjYHMvJdpYnSDB.1577 for user conductor 2021-07-10 05:29:18.514338 I | auth: deleting token CldTPPwKSUDYgJJi.1578 for user conductor 2021-07-10 05:29:19.514156 I | auth: deleting token EMYVxwmOZVTOTsIb.1579 for user conductor 2021-07-10 05:29:21.492606 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:25.588861 I | auth: deleting token idydwmPAAfCpbXsy.1585 for user conductor 2021-07-10 05:29:25.588933 I | auth: deleting token CpBSLLcNAWpmrzCh.1580 for user conductor 2021-07-10 05:29:25.588949 I | auth: deleting token bWldkWKWDglgUimp.1582 for user conductor 2021-07-10 05:29:25.588965 I | auth: deleting token SEFJIHVqZmzHlUWW.1583 for user conductor 2021-07-10 05:29:25.588980 I | auth: deleting token IIkswLXJFCwubiTc.1581 for user conductor 2021-07-10 05:29:25.589002 I | auth: deleting token nbcPikPjziMxoCgL.1584 for user conductor 2021-07-10 05:29:26.493108 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:28.514359 I | auth: deleting token DuzweZwheuPrkMDr.1588 for user conductor 2021-07-10 05:29:28.514426 I | auth: deleting token SlZliabzfupjUCds.1587 for user conductor 2021-07-10 05:29:28.514442 I | auth: deleting token GCWuiNacsOsJgTqw.1586 for user conductor 2021-07-10 05:29:31.493382 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:31.588572 I | auth: deleting token BupbIqcqQJsEPJku.1589 for user conductor 2021-07-10 05:29:31.588663 I | auth: deleting token jMhiNOFwAPuqYuXs.1590 for user conductor 2021-07-10 05:29:31.588710 I | auth: deleting token eVJbdhEBlCixCBKU.1591 for user conductor 2021-07-10 05:29:34.514220 I | auth: deleting token DuoLDfegbEyCskTL.1592 for user conductor 2021-07-10 05:29:34.514279 I | auth: deleting token RzZoXmsNpXvnDjfJ.1593 for user conductor 2021-07-10 05:29:34.514297 I | auth: deleting token UUObKJgEMeNllogC.1594 for user conductor 2021-07-10 05:29:36.389053 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (11.298995535s) to execute 2021-07-10 05:29:36.588682 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:39.091469 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.681375782s) to execute 2021-07-10 05:29:40.514226 I | auth: deleting token veApmCyEhCmCRPNU.1599 for user conductor 2021-07-10 05:29:40.514286 I | auth: deleting token hWyadnLzJXiGECBX.1595 for user conductor 2021-07-10 05:29:40.514310 I | auth: deleting token kNScoXGuMSNclPta.1598 for user conductor 2021-07-10 05:29:40.514325 I | auth: deleting token fnLvVELmhTSbkcDe.1596 for user conductor 2021-07-10 05:29:41.589106 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:42.092655 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.701105278s) to execute 2021-07-10 05:29:42.092824 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.700638097s) to execute 2021-07-10 05:29:42.092896 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.998956056s) to execute 2021-07-10 05:29:42.093044 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.99913714s) to execute 2021-07-10 05:29:46.514237 I | auth: deleting token PpCUtrajxXpSmePM.1604 for user conductor 2021-07-10 05:29:46.514290 I | auth: deleting token cEmAGkKkhoPdPZUw.1605 for user conductor 2021-07-10 05:29:46.514307 I | auth: deleting token zcOaCWPueISsuTnw.1601 for user conductor 2021-07-10 05:29:46.514341 I | auth: deleting token oqzSqrCuyANVaDlB.1600 for user conductor 2021-07-10 05:29:46.514352 I | auth: deleting token bHxySfPHPtCaOkiB.1597 for user conductor 2021-07-10 05:29:46.514363 I | auth: deleting token yLDAOuRNYhUQkPaH.1602 for user conductor 2021-07-10 05:29:46.514371 I | auth: deleting token EaxZdejRAvdERKIc.1603 for user conductor 2021-07-10 05:29:46.589447 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:51.589839 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:51.691055 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (7.902461537s) to execute 2021-07-10 05:29:54.514339 I | auth: deleting token RghaOqvwvrUGWNij.1608 for user conductor 2021-07-10 05:29:54.514411 I | auth: deleting token FVkXDTZtyFDeRHqS.1609 for user conductor 2021-07-10 05:29:54.514432 I | auth: deleting token SvzWqZxiILuYOAbw.1611 for user conductor 2021-07-10 05:29:54.514444 I | auth: deleting token HNwjnclrEorhjxiK.1606 for user conductor 2021-07-10 05:29:56.590114 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:29:57.489429 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.698696109s) to execute 2021-07-10 05:29:57.489942 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.701052797s) to execute 2021-07-10 05:29:57.490062 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.701172868s) to execute 2021-07-10 05:29:57.588549 I | auth: deleting token LyrftnmmMYwlvlrG.1607 for user conductor 2021-07-10 05:29:57.588612 I | auth: deleting token QanahaeLtuGLWfOF.1610 for user conductor 2021-07-10 05:29:59.514232 I | auth: deleting token XxZfZXxyiiUvpnBB.1612 for user conductor 2021-07-10 05:30:00.090305 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.500843634s) to execute 2021-07-10 05:30:01.590481 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:02.588571 I | auth: deleting token rzakxnnljYyKEWjg.1613 for user conductor 2021-07-10 05:30:02.588644 I | auth: deleting token cBdstTJJCNSAZpjP.1614 for user conductor 2021-07-10 05:30:02.588661 I | auth: deleting token xzigdZUrbAEKutZG.1617 for user conductor 2021-07-10 05:30:02.588700 I | auth: deleting token GQXxJbvsdUEWwPnH.1615 for user conductor 2021-07-10 05:30:02.588720 I | auth: deleting token zQUtomoJnCiLWNDH.1616 for user conductor 2021-07-10 05:30:06.665714 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:08.393307 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (8.299795176s) to execute 2021-07-10 05:30:08.588495 I | auth: deleting token VkDrUpTXUmGATQCT.1619 for user conductor 2021-07-10 05:30:08.588545 I | auth: deleting token UXUgHeQpSKOyAzeO.1618 for user conductor 2021-07-10 05:30:08.588559 I | auth: deleting token lXXjvloqvTOBjZAV.1620 for user conductor 2021-07-10 05:30:10.514250 I | auth: deleting token XARXVOnUPWjlZUMk.1621 for user conductor 2021-07-10 05:30:10.514308 I | auth: deleting token SDfLzhjrVGNokwVk.1622 for user conductor 2021-07-10 05:30:10.514353 I | auth: deleting token sZOnHRFsqhlnHaBU.1623 for user conductor 2021-07-10 05:30:10.514375 I | auth: deleting token tWouZTIJrToosRHJ.1624 for user conductor 2021-07-10 05:30:11.391460 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.996058453s) to execute 2021-07-10 05:30:11.391939 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.881539869s) to execute 2021-07-10 05:30:11.392217 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.903414793s) to execute 2021-07-10 05:30:11.590802 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (101.864704ms) to execute 2021-07-10 05:30:11.666006 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:13.588684 I | auth: deleting token JEdBzurrjfDVqfbX.1625 for user conductor 2021-07-10 05:30:16.588750 I | auth: deleting token UGBGeJDVjbIKHyFC.1628 for user conductor 2021-07-10 05:30:16.588866 I | auth: deleting token QEzIiscnaURnGvou.1627 for user conductor 2021-07-10 05:30:16.688591 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:21.689094 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:22.492649 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (9.501533074s) to execute 2021-07-10 05:30:24.588627 I | auth: deleting token roySzdppFkedVQmT.1633 for user conductor 2021-07-10 05:30:24.588739 I | auth: deleting token lvDGKskuPwhjbdTI.1632 for user conductor 2021-07-10 05:30:24.588764 I | auth: deleting token xwaISTsaGWteizau.1630 for user conductor 2021-07-10 05:30:24.588786 I | auth: deleting token nfmdrDmlaHNONltA.1631 for user conductor 2021-07-10 05:30:24.588805 I | auth: deleting token GwuaDuROOaZUmXaM.1626 for user conductor 2021-07-10 05:30:24.588822 I | auth: deleting token BMaijltkqsiSTpPp.1629 for user conductor 2021-07-10 05:30:25.391854 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.702996375s) to execute 2021-07-10 05:30:25.392116 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.80328272s) to execute 2021-07-10 05:30:25.510433 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.921566064s) to execute 2021-07-10 05:30:25.512963 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (116.701721ms) to execute 2021-07-10 05:30:26.689496 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:27.588618 I | auth: deleting token sUSjabiNSieAakjh.1636 for user conductor 2021-07-10 05:30:27.588671 I | auth: deleting token tJcWYUQkvMNIRLEU.1635 for user conductor 2021-07-10 05:30:28.689260 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.476791309s) to execute 2021-07-10 05:30:30.588589 I | auth: deleting token DOXiMXwfIoBvyUeu.1637 for user conductor 2021-07-10 05:30:30.588668 I | auth: deleting token QrktkycHpXdJcacg.1641 for user conductor 2021-07-10 05:30:30.588698 I | auth: deleting token XpbFdNbkLYyRBgqV.1639 for user conductor 2021-07-10 05:30:30.588723 I | auth: deleting token GGoMUgLrkwxTaayO.1638 for user conductor 2021-07-10 05:30:31.689743 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:31.888859 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.187566248s) to execute 2021-07-10 05:30:33.514207 I | auth: deleting token BZaKSbaURSzTqjnf.1643 for user conductor 2021-07-10 05:30:33.514267 I | auth: deleting token cWyTiNREjlZWoiTq.1642 for user conductor 2021-07-10 05:30:36.588577 I | auth: deleting token bDWFKviVDXPRUTBz.1646 for user conductor 2021-07-10 05:30:36.588674 I | auth: deleting token fDeAMiyHRGmkKufC.1644 for user conductor 2021-07-10 05:30:36.588695 I | auth: deleting token PGgDJIBmTSvLqUIj.1645 for user conductor 2021-07-10 05:30:36.588732 I | auth: deleting token bXAoHxWizyFxoOFf.1647 for user conductor 2021-07-10 05:30:36.690121 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:41.690387 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:42.514204 I | auth: deleting token ffxtiZyhUePqxqJp.1651 for user conductor 2021-07-10 05:30:42.514295 I | auth: deleting token WZyGQxIPDQXyFZcj.1649 for user conductor 2021-07-10 05:30:42.514312 I | auth: deleting token qbbECIqsigynqmJl.1648 for user conductor 2021-07-10 05:30:42.693521 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (7.863825175s) to execute 2021-07-10 05:30:45.514338 I | auth: deleting token VyYffMWbEaoULeyX.1654 for user conductor 2021-07-10 05:30:45.514399 I | auth: deleting token UNaWQdgBnHcZFFfH.1653 for user conductor 2021-07-10 05:30:45.514425 I | auth: deleting token PcqQXyPplAEREsst.1650 for user conductor 2021-07-10 05:30:45.514441 I | auth: deleting token SfEayuEOUqrWwRQH.1652 for user conductor 2021-07-10 05:30:45.797648 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.00809086s) to execute 2021-07-10 05:30:45.888593 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.099144904s) to execute 2021-07-10 05:30:45.910642 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.12105903s) to execute 2021-07-10 05:30:46.690629 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:48.588569 I | auth: deleting token UFmfxEcTTPcpisiP.1655 for user conductor 2021-07-10 05:30:48.588633 I | auth: deleting token uOszkNQQhmaRmWop.1657 for user conductor 2021-07-10 05:30:48.588644 I | auth: deleting token vhuqZQWgGuNPEXna.1656 for user conductor 2021-07-10 05:30:48.689991 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.578972826s) to execute 2021-07-10 05:30:51.690902 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host 2021-07-10 05:30:53.588580 I | auth: deleting token RDCmImQDiQEfSYKb.1658 for user conductor 2021-07-10 05:30:53.588633 I | auth: deleting token GsrWvfkGArkBHGxk.1661 for user conductor 2021-07-10 05:30:53.588651 I | auth: deleting token RIyFIzRkjTNPsDXD.1659 for user conductor 2021-07-10 05:30:55.388720 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.878030397s) to execute 2021-07-10 05:30:56.588569 I | auth: deleting token iYAOhcyrTwtYkBKc.1660 for user conductor 2021-07-10 05:30:56.588640 I | auth: deleting token CAQFylxKycKdfZJy.1664 for user conductor 2021-07-10 05:30:56.588666 I | auth: deleting token uoRhzpPGndwwidUR.1663 for user conductor 2021-07-10 05:30:56.691231 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:30:58.297100 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.808308609s) to execute 2021-07-10 05:30:58.297420 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.906061605s) to execute 2021-07-10 05:30:58.514254 I | auth: deleting token ehtkyXRdmaDyqWxR.1665 for user conductor 2021-07-10 05:30:58.514328 I | auth: deleting token ATHDvSJPzTbomWfN.1668 for user conductor 2021-07-10 05:30:58.514346 I | auth: deleting token mIfhiHEyxNHSAUSJ.1666 for user conductor 2021-07-10 05:30:58.514362 I | auth: deleting token XOLglHbRpUlRngFS.1662 for user conductor 2021-07-10 05:30:58.514378 I | auth: deleting token TIyVMsoDLAFpKXPn.1667 for user conductor 2021-07-10 05:31:00.990609 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.18011601s) to execute 2021-07-10 05:31:01.588745 I | auth: deleting token tnEPvDaHEbCdqnbt.1670 for user conductor 2021-07-10 05:31:01.588802 I | auth: deleting token PpKkVjYNsqizZKJw.1669 for user conductor 2021-07-10 05:31:01.691672 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:02.588492 I | auth: deleting token JQPtuyxYJwmfcxBC.1671 for user conductor 2021-07-10 05:31:03.588697 I | auth: deleting token FpaeLBkebhnWkZIL.1672 for user conductor 2021-07-10 05:31:03.589708 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.079206589s) to execute 2021-07-10 05:31:06.490358 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.170172623s) to execute 2021-07-10 05:31:06.514422 I | auth: deleting token yErdqgnCfEvdbiDH.1673 for user conductor 2021-07-10 05:31:06.691925 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:09.588553 I | auth: deleting token EepqfpGQJoWLWIyo.1675 for user conductor 2021-07-10 05:31:09.588622 I | auth: deleting token qcVAVBkJrmzVyOmk.1674 for user conductor 2021-07-10 05:31:10.794298 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (704.478708ms) to execute 2021-07-10 05:31:11.692227 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:13.495198 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.605403824s) to execute 2021-07-10 05:31:15.524203 I | auth: deleting token FTmgPNrqFPrLNtiW.1678 for user conductor 2021-07-10 05:31:15.524266 I | auth: deleting token TQiEqIIwUITtcZqa.1680 for user conductor 2021-07-10 05:31:15.524286 I | auth: deleting token KKaiQfMxmolksPOn.1681 for user conductor 2021-07-10 05:31:15.524299 I | auth: deleting token uOgolmwHvBVcCnzF.1677 for user conductor 2021-07-10 05:31:15.524318 I | auth: deleting token lTxnSBTxcdoDhYjS.1676 for user conductor 2021-07-10 05:31:15.524328 I | auth: deleting token EBQRIMGAgATckSNC.1679 for user conductor 2021-07-10 05:31:17.088847 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:18.514292 I | auth: deleting token XsJUVbMTfADesanv.1682 for user conductor 2021-07-10 05:31:22.089816 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:23.588664 I | auth: deleting token QJaHwvZFPhnSZmQA.1687 for user conductor 2021-07-10 05:31:23.588727 I | auth: deleting token HYpUKmBXuMfemadx.1684 for user conductor 2021-07-10 05:31:23.588745 I | auth: deleting token lnVtOOfQeGODqOHY.1685 for user conductor 2021-07-10 05:31:24.991696 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (9.97470423s) to execute 2021-07-10 05:31:26.514146 I | auth: deleting token TIWGEWsQwkxhykwn.1689 for user conductor 2021-07-10 05:31:26.514258 I | auth: deleting token DlkGfVkCqdTdFidW.1688 for user conductor 2021-07-10 05:31:26.514288 I | auth: deleting token FzgrbcWEszigrEdG.1691 for user conductor 2021-07-10 05:31:26.514328 I | auth: deleting token GUFrZThoNEtPSZzj.1690 for user conductor 2021-07-10 05:31:26.514359 I | auth: deleting token LaZZwJEgEiLuCFmS.1683 for user conductor 2021-07-10 05:31:26.514375 I | auth: deleting token XxkMDmZYdQsPTsTp.1686 for user conductor 2021-07-10 05:31:27.090228 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:27.514438 I | auth: deleting token NChdwlfvmKXjpwae.1692 for user conductor 2021-07-10 05:31:27.888895 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.800175992s) to execute 2021-07-10 05:31:27.889416 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.894927937s) to execute 2021-07-10 05:31:27.892328 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.896905373s) to execute 2021-07-10 05:31:29.588644 I | auth: deleting token ZFvGHsFhPtahULdB.1693 for user conductor 2021-07-10 05:31:30.490216 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.598024874s) to execute 2021-07-10 05:31:30.490373 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.498057418s) to execute 2021-07-10 05:31:30.588989 I | auth: deleting token LoNBpPPoegnoHOja.1694 for user conductor 2021-07-10 05:31:32.090476 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:32.588643 I | auth: deleting token AQZzqhxLGUtEcJAR.1695 for user conductor 2021-07-10 05:31:32.993692 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.503196643s) to execute 2021-07-10 05:31:33.514464 I | auth: deleting token MHTQQPnIDCEyAJka.1696 for user conductor 2021-07-10 05:31:37.091404 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:40.090069 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.477519426s) to execute 2021-07-10 05:31:42.091563 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:42.991039 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.676229303s) to execute 2021-07-10 05:31:45.588706 I | auth: deleting token tmRQwWllSKQlNYGj.1699 for user conductor 2021-07-10 05:31:45.588789 I | auth: deleting token joDnBdMRHozKmYuZ.1700 for user conductor 2021-07-10 05:31:45.588806 I | auth: deleting token wEHcGrtioMyjQjMP.1704 for user conductor 2021-07-10 05:31:45.588819 I | auth: deleting token hjIOyttMKnWdvAqx.1698 for user conductor 2021-07-10 05:31:45.588830 I | auth: deleting token JcfCVyIlckzkpXRh.1703 for user conductor 2021-07-10 05:31:45.588844 I | auth: deleting token XZyFtWoRnZIoObSQ.1702 for user conductor 2021-07-10 05:31:45.588854 I | auth: deleting token VfGfmozNLgQwvBdw.1701 for user conductor 2021-07-10 05:31:45.588864 I | auth: deleting token afPsRrFnoWcLWSne.1697 for user conductor 2021-07-10 05:31:45.588872 I | auth: deleting token cAArpgiYCcDmhbuG.1705 for user conductor 2021-07-10 05:31:45.893034 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.782682132s) to execute 2021-07-10 05:31:47.091788 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:48.791070 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.798568303s) to execute 2021-07-10 05:31:48.791312 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.7998336s) to execute 2021-07-10 05:31:48.910612 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (116.524642ms) to execute 2021-07-10 05:31:51.514253 I | auth: deleting token fJxiiuCUGRWiyWnZ.1713 for user conductor 2021-07-10 05:31:51.514319 I | auth: deleting token cihfRVCuUgvqrGvY.1708 for user conductor 2021-07-10 05:31:51.514368 I | auth: deleting token iWZILpUWeMImGfND.1709 for user conductor 2021-07-10 05:31:51.514396 I | auth: deleting token ObciAQedtTanaqQh.1711 for user conductor 2021-07-10 05:31:51.514417 I | auth: deleting token OudBEHLCHvcmWqzF.1706 for user conductor 2021-07-10 05:31:51.514467 I | auth: deleting token ZJZBabcfgLCxpsAg.1710 for user conductor 2021-07-10 05:31:52.092050 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:31:52.514385 I | auth: deleting token VjHeVSGOgpmAzsfp.1714 for user conductor 2021-07-10 05:31:57.092458 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:01.514384 I | auth: deleting token AZHPUOhDUuNfwbvk.1718 for user conductor 2021-07-10 05:32:01.514451 I | auth: deleting token kMpKTafrLzahOoOs.1720 for user conductor 2021-07-10 05:32:01.514472 I | auth: deleting token DNUnEXBvauhnWrBN.1715 for user conductor 2021-07-10 05:32:01.514487 I | auth: deleting token srwWDHYvVKdlsVLB.1717 for user conductor 2021-07-10 05:32:02.092744 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:04.588530 I | auth: deleting token nVhhiiEQpPEgtQiL.1719 for user conductor 2021-07-10 05:32:04.588609 I | auth: deleting token HBspvWoRvDOzBjKO.1716 for user conductor 2021-07-10 05:32:07.092934 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:07.588642 I | auth: deleting token vgWprDvgTPwyyevk.1721 for user conductor 2021-07-10 05:32:09.897793 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.587455358s) to execute 2021-07-10 05:32:10.588538 I | auth: deleting token SoEfguyyFOspCHHO.1722 for user conductor 2021-07-10 05:32:12.189087 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:12.692563 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.582104924s) to execute 2021-07-10 05:32:12.693368 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.704152921s) to execute 2021-07-10 05:32:12.790456 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.699081903s) to execute 2021-07-10 05:32:13.588638 I | auth: deleting token qgXRbXQKzSyyRrfL.1723 for user conductor 2021-07-10 05:32:13.588710 I | auth: deleting token wDGbcrzMfLmkbQBf.1725 for user conductor 2021-07-10 05:32:13.588724 I | auth: deleting token ZuSBNgcMgSlXDJYL.1724 for user conductor 2021-07-10 05:32:14.514286 I | auth: deleting token VSIVJtsFgNtTVdzM.1726 for user conductor 2021-07-10 05:32:14.514481 I | auth: deleting token QhcxMrzdqxjSzsAp.1727 for user conductor 2021-07-10 05:32:15.695987 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.902497487s) to execute 2021-07-10 05:32:17.189381 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:18.389514 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.277644411s) to execute 2021-07-10 05:32:18.514269 I | auth: deleting token DesfKaRrtVcTYloZ.1728 for user conductor 2021-07-10 05:32:18.514334 I | auth: deleting token SBebrlEpXXCBaRpN.1730 for user conductor 2021-07-10 05:32:18.514387 I | auth: deleting token VVKtHFXvIRCGzkTR.1729 for user conductor 2021-07-10 05:32:21.588667 I | auth: deleting token qZWciFTXDrBbtcyX.1732 for user conductor 2021-07-10 05:32:21.588720 I | auth: deleting token XYYhXdFjIVBOOlSW.1731 for user conductor 2021-07-10 05:32:22.189661 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:24.514299 I | auth: deleting token LxcyStqViTrnWnBi.1734 for user conductor 2021-07-10 05:32:24.514363 I | auth: deleting token aFadzQTfwYPtLyoY.1735 for user conductor 2021-07-10 05:32:24.514381 I | auth: deleting token tcIprjDcVcHXZYvH.1733 for user conductor 2021-07-10 05:32:24.514413 I | auth: deleting token RtSwZmzAGOnZAyVA.1736 for user conductor 2021-07-10 05:32:25.514378 I | auth: deleting token bhZkLMofjCTGGLsJ.1737 for user conductor 2021-07-10 05:32:26.292187 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (7.803448688s) to execute 2021-07-10 05:32:26.292547 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (7.90077801s) to execute 2021-07-10 05:32:26.514136 I | auth: deleting token ZpNLgkjERjCONujZ.1738 for user conductor 2021-07-10 05:32:27.189915 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:28.514156 I | auth: deleting token ctTxbjyvjasfLExK.1739 for user conductor 2021-07-10 05:32:30.514275 I | auth: deleting token kkkhiKyYjOFjjEkL.1740 for user conductor 2021-07-10 05:32:31.514253 I | auth: deleting token yuCwycdJcslsuUcf.1741 for user conductor 2021-07-10 05:32:32.190129 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:34.289890 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (6.479455163s) to execute 2021-07-10 05:32:37.096006 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.704861308s) to execute 2021-07-10 05:32:37.096159 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.707406121s) to execute 2021-07-10 05:32:37.096186 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.707420211s) to execute 2021-07-10 05:32:37.190447 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:37.588627 I | auth: deleting token iMQtFjzQVmpIhzkp.1744 for user conductor 2021-07-10 05:32:37.588692 I | auth: deleting token NkdyVJzYPsMAzOMW.1745 for user conductor 2021-07-10 05:32:37.588718 I | auth: deleting token HYUfNcLozVPctUev.1742 for user conductor 2021-07-10 05:32:39.491140 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.299834925s) to execute 2021-07-10 05:32:39.491340 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.202292318s) to execute 2021-07-10 05:32:39.491460 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (902.553423ms) to execute 2021-07-10 05:32:40.514269 I | auth: deleting token dcoPvPYFAFaAkKbD.1743 for user conductor 2021-07-10 05:32:42.190832 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:42.495740 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.785231521s) to execute 2021-07-10 05:32:42.495875 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.98167332s) to execute 2021-07-10 05:32:43.514111 I | auth: deleting token KmlIGxZMbvTayYLE.1746 for user conductor 2021-07-10 05:32:43.514157 I | auth: deleting token bNuwSUttHzhQkJTp.1747 for user conductor 2021-07-10 05:32:43.514192 I | auth: deleting token elLbGlRJpItKqADu.1748 for user conductor 2021-07-10 05:32:45.489652 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.898331364s) to execute 2021-07-10 05:32:46.514132 I | auth: deleting token ySRhVUJBWfKzCVxn.1749 for user conductor 2021-07-10 05:32:46.514363 I | auth: deleting token eZMQDqUgVjvpRUcc.1750 for user conductor 2021-07-10 05:32:46.514450 I | auth: deleting token WgoteqirvmTARXfG.1751 for user conductor 2021-07-10 05:32:47.191127 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:50.589725 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.000815201s) to execute 2021-07-10 05:32:50.590279 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.001412708s) to execute 2021-07-10 05:32:52.191541 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:52.514325 I | auth: deleting token hRBIrMFlpSmYtqlQ.1752 for user conductor 2021-07-10 05:32:52.514424 I | auth: deleting token BQetHhsKDgEGECDf.1754 for user conductor 2021-07-10 05:32:53.293763 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.605212943s) to execute 2021-07-10 05:32:53.294021 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.701776723s) to execute 2021-07-10 05:32:53.294113 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.701633035s) to execute 2021-07-10 05:32:53.411467 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.745367ms) to execute 2021-07-10 05:32:55.514291 I | auth: deleting token zxZtzMkzOFapDEWI.1753 for user conductor 2021-07-10 05:32:56.095439 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.606572152s) to execute 2021-07-10 05:32:56.095875 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.607001413s) to execute 2021-07-10 05:32:57.191938 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:32:57.588655 I | auth: deleting token qkXfVPVmLbrgbwNV.1755 for user conductor 2021-07-10 05:32:59.090331 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.801662685s) to execute 2021-07-10 05:33:02.192159 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:03.588664 I | auth: deleting token fLoXurBVlhOhJtdd.1756 for user conductor 2021-07-10 05:33:04.296152 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.202561081s) to execute 2021-07-10 05:33:04.296439 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.203438985s) to execute 2021-07-10 05:33:06.514220 I | auth: deleting token MnuGEKYirUlPfMbl.1759 for user conductor 2021-07-10 05:33:06.514263 I | auth: deleting token TOIfmwkgNZJsGzMV.1757 for user conductor 2021-07-10 05:33:06.514273 I | auth: deleting token jkgNWzxcIbqkAeWl.1758 for user conductor 2021-07-10 05:33:06.514281 I | auth: deleting token YRPlmsSyfagkGQSx.1760 for user conductor 2021-07-10 05:33:07.192365 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:07.290737 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.992255271s) to execute 2021-07-10 05:33:07.291001 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.992818117s) to execute 2021-07-10 05:33:07.291287 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.898742672s) to execute 2021-07-10 05:33:07.291579 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (502.593971ms) to execute 2021-07-10 05:33:09.588634 I | auth: deleting token VetCAjXoKOUFzHcC.1761 for user conductor 2021-07-10 05:33:09.588697 I | auth: deleting token KmfsTEjuaMUbQeiJ.1762 for user conductor 2021-07-10 05:33:09.989341 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.576259292s) to execute 2021-07-10 05:33:09.989540 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.778914815s) to execute 2021-07-10 05:33:12.192598 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:12.295369 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.203789177s) to execute 2021-07-10 05:33:12.295577 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.182950358s) to execute 2021-07-10 05:33:12.514221 I | auth: deleting token umEpYpasTmVrALqW.1764 for user conductor 2021-07-10 05:33:12.514295 I | auth: deleting token uwcHAJgLBJeJWgzF.1763 for user conductor 2021-07-10 05:33:17.193129 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:17.514222 I | auth: deleting token oYljulOhZYBIroIS.1766 for user conductor 2021-07-10 05:33:17.514277 I | auth: deleting token dYtNxKEBYjVcTuyf.1769 for user conductor 2021-07-10 05:33:17.514311 I | auth: deleting token vTxGuXoNhiOlniBw.1767 for user conductor 2021-07-10 05:33:18.190469 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.800477792s) to execute 2021-07-10 05:33:18.388957 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (194.981125ms) to execute 2021-07-10 05:33:20.588490 I | auth: deleting token osPElgLAEvxGsMoo.1772 for user conductor 2021-07-10 05:33:20.588570 I | auth: deleting token splevBZXqnufwCmw.1770 for user conductor 2021-07-10 05:33:20.588585 I | auth: deleting token vsMhQcwbjJywtirx.1765 for user conductor 2021-07-10 05:33:20.588598 I | auth: deleting token dvpEnoJxxkmKONWW.1771 for user conductor 2021-07-10 05:33:20.588613 I | auth: deleting token YTsVmUzJFvDUHZvy.1768 for user conductor 2021-07-10 05:33:20.690902 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.478600733s) to execute 2021-07-10 05:33:22.288662 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:26.098433 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (6.709458236s) to execute 2021-07-10 05:33:26.588535 I | auth: deleting token dinBsUGLgyIkeecj.1774 for user conductor 2021-07-10 05:33:26.588777 I | auth: deleting token htfFkyKOqtdZTiCM.1776 for user conductor 2021-07-10 05:33:26.588861 I | auth: deleting token UPjaneYxFMBTvyls.1773 for user conductor 2021-07-10 05:33:26.588937 I | auth: deleting token WCiKZjlESLACIzbT.1775 for user conductor 2021-07-10 05:33:26.589023 I | auth: deleting token NnquVsQmKjmuIdHV.1777 for user conductor 2021-07-10 05:33:27.288959 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:28.792530 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.481954295s) to execute 2021-07-10 05:33:28.888704 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.604020198s) to execute 2021-07-10 05:33:28.888850 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.699615083s) to execute 2021-07-10 05:33:29.514228 I | auth: deleting token KDRvIemXnLfIEoQE.1780 for user conductor 2021-07-10 05:33:29.514273 I | auth: deleting token SKXLiOroCcMLhZFc.1779 for user conductor 2021-07-10 05:33:29.514296 I | auth: deleting token GZxLcikPwQsaEKym.1778 for user conductor 2021-07-10 05:33:31.191012 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.299926017s) to execute 2021-07-10 05:33:31.191193 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.299368567s) to execute 2021-07-10 05:33:32.289262 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:32.514230 I | auth: deleting token stDgRzXGXteQJmjN.1782 for user conductor 2021-07-10 05:33:33.693036 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.501672921s) to execute 2021-07-10 05:33:34.588545 I | auth: deleting token DNKAeUDIczdxzays.1784 for user conductor 2021-07-10 05:33:34.588610 I | auth: deleting token VZZGhJTjDWlryvGh.1781 for user conductor 2021-07-10 05:33:35.524108 I | auth: deleting token bgcQwWyofWuGqvZN.1783 for user conductor 2021-07-10 05:33:35.524181 I | auth: deleting token FJDujleNNujjNPer.1785 for user conductor 2021-07-10 05:33:36.290699 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.580676936s) to execute 2021-07-10 05:33:36.290969 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.594556763s) to execute 2021-07-10 05:33:37.289625 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:39.194528 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.800923349s) to execute 2021-07-10 05:33:39.194657 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.002214412s) to execute 2021-07-10 05:33:42.289927 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:43.514267 I | auth: deleting token RFyQygxocpxuVJjw.1786 for user conductor 2021-07-10 05:33:43.588569 I | auth: deleting token TzDPlpjeLvNLBAlZ.1789 for user conductor 2021-07-10 05:33:43.588805 I | auth: deleting token MHfqgfkOqbJYfRtj.1787 for user conductor 2021-07-10 05:33:43.588903 I | auth: deleting token GdCqGyvogafTTexB.1788 for user conductor 2021-07-10 05:33:45.198508 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.906561917s) to execute 2021-07-10 05:33:47.290334 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:47.996181 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.794991024s) to execute 2021-07-10 05:33:47.996282 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.704270894s) to execute 2021-07-10 05:33:47.996473 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.707562352s) to execute 2021-07-10 05:33:52.290564 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:33:52.514273 I | auth: deleting token GbPZQSnyoCqnwVDA.1790 for user conductor 2021-07-10 05:33:52.514358 I | auth: deleting token tOmmiWnMTGXFXTzN.1792 for user conductor 2021-07-10 05:33:52.514391 I | auth: deleting token lbopYncZAVcOoQJv.1793 for user conductor 2021-07-10 05:33:53.589837 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.498900108s) to execute 2021-07-10 05:33:55.588708 I | auth: deleting token fTDRpTiWWPgMwNUR.1797 for user conductor 2021-07-10 05:33:55.588762 I | auth: deleting token rFOeAuVRxWYUFZhd.1794 for user conductor 2021-07-10 05:33:55.588783 I | auth: deleting token jdWDQOjKEUtKsvil.1796 for user conductor 2021-07-10 05:33:55.588794 I | auth: deleting token rFVRNtTFbOiPyeAN.1798 for user conductor 2021-07-10 05:33:55.588812 I | auth: deleting token PHkDMOprDptpnQAk.1791 for user conductor 2021-07-10 05:33:55.588837 I | auth: deleting token HwExWALpnalSXzON.1795 for user conductor 2021-07-10 05:33:56.390750 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.798095891s) to execute 2021-07-10 05:33:56.390984 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.702162339s) to execute 2021-07-10 05:33:57.388646 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:01.588732 I | auth: deleting token VIjgOluydNzbykFU.1800 for user conductor 2021-07-10 05:34:01.696758 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.707999517s) to execute 2021-07-10 05:34:01.911320 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (121.906608ms) to execute 2021-07-10 05:34:02.389003 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:04.588578 I | auth: deleting token yQsDXkjkaUnEQekq.1799 for user conductor 2021-07-10 05:34:04.593806 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.482730235s) to execute 2021-07-10 05:34:06.588779 I | auth: deleting token rITyNxpuDXXUkqCc.1805 for user conductor 2021-07-10 05:34:06.588843 I | auth: deleting token RcSBKKRHAETusXry.1804 for user conductor 2021-07-10 05:34:06.588865 I | auth: deleting token PAETwaCBQATwMkum.1802 for user conductor 2021-07-10 05:34:06.588884 I | auth: deleting token iGOIzpzXYZlaPjUM.1801 for user conductor 2021-07-10 05:34:07.389349 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:07.514262 I | auth: deleting token ecEfYUYisenjfntT.1806 for user conductor 2021-07-10 05:34:07.514363 I | auth: deleting token SzfzqvAVeFykHPID.1803 for user conductor 2021-07-10 05:34:07.689173 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.978675041s) to execute 2021-07-10 05:34:12.389653 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:12.889620 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.099177624s) to execute 2021-07-10 05:34:12.890042 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.197720461s) to execute 2021-07-10 05:34:13.514377 I | auth: deleting token kZJoWRwLkVrmgRMF.1809 for user conductor 2021-07-10 05:34:13.514457 I | auth: deleting token xWbPYwoOajLKJSaN.1808 for user conductor 2021-07-10 05:34:13.514485 I | auth: deleting token kDCOQVNCzrGzAKqn.1810 for user conductor 2021-07-10 05:34:13.514502 I | auth: deleting token rnHZezaCOMFLjKoS.1807 for user conductor 2021-07-10 05:34:13.788820 I | auth: deleting token jSNknAAPVFjLMAHU.1811 for user conductor 2021-07-10 05:34:15.588632 I | auth: deleting token RgCmNnZciHhdAZUp.1813 for user conductor 2021-07-10 05:34:15.588686 I | auth: deleting token JsuUBvsHrscfSPcj.1814 for user conductor 2021-07-10 05:34:15.588718 I | auth: deleting token RKbJZMGmZhasiodQ.1812 for user conductor 2021-07-10 05:34:15.991138 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.097490262s) to execute 2021-07-10 05:34:15.991940 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.099082911s) to execute 2021-07-10 05:34:15.992157 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.100154713s) to execute 2021-07-10 05:34:16.514226 I | auth: deleting token xvZMOyfWvIiMcdDA.1815 for user conductor 2021-07-10 05:34:17.390003 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:17.514262 I | auth: deleting token iISrDPnpSbyNPmJB.1816 for user conductor 2021-07-10 05:34:18.793182 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.701938336s) to execute 2021-07-10 05:34:18.793495 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.704452952s) to execute 2021-07-10 05:34:19.514298 I | auth: deleting token oeXhyXEUROjDNLDw.1817 for user conductor 2021-07-10 05:34:20.589105 I | auth: deleting token CmSBzgezOJkdFZVn.1818 for user conductor 2021-07-10 05:34:22.390273 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:22.588562 I | auth: deleting token hXDPvtsXAfIAMCWs.1819 for user conductor 2021-07-10 05:34:24.597075 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.708240582s) to execute 2021-07-10 05:34:24.597562 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.800416046s) to execute 2021-07-10 05:34:24.790482 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (190.885145ms) to execute 2021-07-10 05:34:24.792328 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (192.423176ms) to execute 2021-07-10 05:34:27.390517 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:27.990304 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (3.198759992s) to execute 2021-07-10 05:34:32.390789 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:36.089590 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (8.095849436s) to execute 2021-07-10 05:34:36.514135 I | auth: deleting token QnvMENKjfvXuDUgM.1820 for user conductor 2021-07-10 05:34:36.514408 I | auth: deleting token ctYkWmRucoMUmIAP.1821 for user conductor 2021-07-10 05:34:37.391100 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:39.197873 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (3.009051916s) to execute 2021-07-10 05:34:39.198062 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.009225488s) to execute 2021-07-10 05:34:39.198153 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.009259288s) to execute 2021-07-10 05:34:39.588508 I | auth: deleting token FcwpCFnBESdLVWzx.1822 for user conductor 2021-07-10 05:34:39.588560 I | auth: deleting token llRXzhGJkCuUxLTx.1823 for user conductor 2021-07-10 05:34:41.894308 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.605611839s) to execute 2021-07-10 05:34:41.988694 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.788298833s) to execute 2021-07-10 05:34:42.391429 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:42.588588 I | auth: deleting token GFcuydniLjFgGEdc.1824 for user conductor 2021-07-10 05:34:42.588727 I | auth: deleting token GKlCnvwGFfXYzrrF.1825 for user conductor 2021-07-10 05:34:42.588752 I | auth: deleting token OsMIhOPiOWViQvMU.1826 for user conductor 2021-07-10 05:34:44.697536 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (987.417321ms) to execute 2021-07-10 05:34:47.391579 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:49.591668 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.502686567s) to execute 2021-07-10 05:34:52.293376 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.602512802s) to execute 2021-07-10 05:34:52.391833 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:52.510798 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (116.228273ms) to execute 2021-07-10 05:34:52.514253 I | auth: deleting token tEqIktnJIyDNoFZO.1832 for user conductor 2021-07-10 05:34:52.514300 I | auth: deleting token WXWCrNlFDqvFtpZw.1830 for user conductor 2021-07-10 05:34:52.514320 I | auth: deleting token XbhayHTShfAPPJEx.1828 for user conductor 2021-07-10 05:34:52.514338 I | auth: deleting token fLIRmddTbvglNaVa.1827 for user conductor 2021-07-10 05:34:57.392181 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:34:57.588656 I | auth: deleting token hLvysppofWNsQdhK.1829 for user conductor 2021-07-10 05:34:57.588722 I | auth: deleting token BlAxROJizJmfVNTb.1831 for user conductor 2021-07-10 05:34:58.588535 I | auth: deleting token OOUFRtDSCuHMYSTj.1834 for user conductor 2021-07-10 05:34:58.588578 I | auth: deleting token uMCZCYmLbHzdRBGt.1833 for user conductor 2021-07-10 05:34:58.588593 I | auth: deleting token CSCqKCjSuOkopTlg.1835 for user conductor 2021-07-10 05:35:00.193360 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (6.277578237s) to execute 2021-07-10 05:35:02.392435 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:02.592997 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.302888844s) to execute 2021-07-10 05:35:02.593187 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.382467265s) to execute 2021-07-10 05:35:02.593487 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.382771866s) to execute 2021-07-10 05:35:05.290397 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.600053927s) to execute 2021-07-10 05:35:07.488663 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:08.588745 I | auth: deleting token BnybGZQvvtJbdhZV.1836 for user conductor 2021-07-10 05:35:08.588809 I | auth: deleting token axDPlioeCKsrrAea.1838 for user conductor 2021-07-10 05:35:10.492442 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (7.703713173s) to execute 2021-07-10 05:35:10.492612 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.197943505s) to execute 2021-07-10 05:35:10.492885 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.198887963s) to execute 2021-07-10 05:35:11.588490 I | auth: deleting token TIjOPzIzxVWpbsMg.1837 for user conductor 2021-07-10 05:35:11.588537 I | auth: deleting token RJHJEwkitCVdggmX.1842 for user conductor 2021-07-10 05:35:11.588563 I | auth: deleting token tFzYVIbOoZBfqraN.1840 for user conductor 2021-07-10 05:35:11.588571 I | auth: deleting token iLakdzXooQqbjUbz.1844 for user conductor 2021-07-10 05:35:12.488987 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:12.514236 I | auth: deleting token BdqnnZJTJUBhTEsj.1839 for user conductor 2021-07-10 05:35:16.094184 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.105280815s) to execute 2021-07-10 05:35:17.489417 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:18.393006 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.981985229s) to execute 2021-07-10 05:35:18.393195 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (2.296538979s) to execute 2021-07-10 05:35:21.090804 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.679612106s) to execute 2021-07-10 05:35:21.091002 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.681866762s) to execute 2021-07-10 05:35:22.489948 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:22.514236 I | auth: deleting token KrMyXlwaGJwRfoIy.1847 for user conductor 2021-07-10 05:35:22.514304 I | auth: deleting token wPXRedzxnrGkYyaP.1846 for user conductor 2021-07-10 05:35:22.514343 I | auth: deleting token WfzRHwZbuCLSzFKt.1845 for user conductor 2021-07-10 05:35:25.514281 I | auth: deleting token adLUSDWRGwpJSVbv.1850 for user conductor 2021-07-10 05:35:25.514348 I | auth: deleting token BtjchOqLCwnlXihZ.1851 for user conductor 2021-07-10 05:35:25.514377 I | auth: deleting token luDxXFHqSIxovsmH.1849 for user conductor 2021-07-10 05:35:25.514390 I | auth: deleting token VriTMTxSuRaSrhxA.1853 for user conductor 2021-07-10 05:35:25.514403 I | auth: deleting token rlqxqaarTdwsTDSV.1848 for user conductor 2021-07-10 05:35:26.514295 I | auth: deleting token vcufcvbdkaHVxnxK.1854 for user conductor 2021-07-10 05:35:26.891731 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.797979792s) to execute 2021-07-10 05:35:26.892064 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.797892977s) to execute 2021-07-10 05:35:27.490317 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:29.514350 I | auth: deleting token wrruIfaZIDHlZyuU.1857 for user conductor 2021-07-10 05:35:29.514424 I | auth: deleting token HulwiqdqVgAbEaCt.1856 for user conductor 2021-07-10 05:35:29.514461 I | auth: deleting token qPzHOqhYRngPHbOS.1855 for user conductor 2021-07-10 05:35:29.891198 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.99618263s) to execute 2021-07-10 05:35:29.891586 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.997068789s) to execute 2021-07-10 05:35:29.988908 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.094348481s) to execute 2021-07-10 05:35:30.011562 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (118.01167ms) to execute 2021-07-10 05:35:32.490700 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:32.514240 I | auth: deleting token LuRyLoewyeTCuKoU.1860 for user conductor 2021-07-10 05:35:32.514306 I | auth: deleting token krWqcPDohcEKbDcq.1858 for user conductor 2021-07-10 05:35:32.514336 I | auth: deleting token aLAjeGZHBBzQVjCP.1859 for user conductor 2021-07-10 05:35:37.491219 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:42.491541 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:43.514311 I | auth: deleting token TgKWSKJYJioMakov.1862 for user conductor 2021-07-10 05:35:43.514572 I | auth: deleting token SOuoIeBadNBiEWrq.1865 for user conductor 2021-07-10 05:35:43.514760 I | auth: deleting token KMjPiAfBqdbTlOPm.1867 for user conductor 2021-07-10 05:35:43.514883 I | auth: deleting token MgZAkoxgnpzaIWRa.1863 for user conductor 2021-07-10 05:35:43.515009 I | auth: deleting token KFVzubJjVbASAZTJ.1861 for user conductor 2021-07-10 05:35:46.588546 I | auth: deleting token WrrUJXsqJaMgHEMF.1866 for user conductor 2021-07-10 05:35:46.588618 I | auth: deleting token wAHCbuqwPkjFoLrC.1870 for user conductor 2021-07-10 05:35:46.588635 I | auth: deleting token NpZWZoGiMZMHyiqw.1869 for user conductor 2021-07-10 05:35:46.588648 I | auth: deleting token LMyQuNQDSnmhCBRC.1868 for user conductor 2021-07-10 05:35:46.588659 I | auth: deleting token SmrBAWNIXrRgHHAe.1864 for user conductor 2021-07-10 05:35:46.588681 I | auth: deleting token cjlgsQLeRCSbezTx.1871 for user conductor 2021-07-10 05:35:47.491843 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:47.492777 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.176411972s) to execute 2021-07-10 05:35:49.514224 I | auth: deleting token zCyuzxBznjOOEAlm.1875 for user conductor 2021-07-10 05:35:49.514307 I | auth: deleting token TcfcuzfWzdJblaXd.1873 for user conductor 2021-07-10 05:35:49.514329 I | auth: deleting token UpCuOMVpDzvtyYAZ.1874 for user conductor 2021-07-10 05:35:50.192736 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.682406451s) to execute 2021-07-10 05:35:52.492266 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:55.092123 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (4.87958901s) to execute 2021-07-10 05:35:55.514201 I | auth: deleting token kdxctyEXBWXODThg.1876 for user conductor 2021-07-10 05:35:55.514259 I | auth: deleting token NmLtpEmoEkbcZYxT.1879 for user conductor 2021-07-10 05:35:55.514271 I | auth: deleting token VeoSwGRryRtEWxzt.1877 for user conductor 2021-07-10 05:35:56.514343 I | auth: deleting token LNIiPWrEXOdWLKnC.1878 for user conductor 2021-07-10 05:35:57.493661 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:35:58.514263 I | auth: deleting token pwjYiPXIritPwTfJ.1881 for user conductor 2021-07-10 05:35:58.514324 I | auth: deleting token dLIojpjJGvhghcjD.1882 for user conductor 2021-07-10 05:35:58.514353 I | auth: deleting token ExWCQmYTQrLgdGCy.1883 for user conductor 2021-07-10 05:35:58.514381 I | auth: deleting token FqSTGbbPoZrVicbz.1880 for user conductor 2021-07-10 05:35:58.993160 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.602184773s) to execute 2021-07-10 05:36:01.514262 I | auth: deleting token QjkycBuyikNvHIDr.1884 for user conductor 2021-07-10 05:36:01.514349 I | auth: deleting token CeolIQOWopCVoxuk.1886 for user conductor 2021-07-10 05:36:01.514363 I | auth: deleting token LJUlSXwYkfxSEhHZ.1885 for user conductor 2021-07-10 05:36:01.693638 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.583254962s) to execute 2021-07-10 05:36:02.493929 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:36:04.289907 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.179579923s) to execute 2021-07-10 05:36:04.514345 I | auth: deleting token eotRdmNavEkTUpOm.1887 for user conductor 2021-07-10 05:36:04.514416 I | auth: deleting token PRiirklRNmaqZTWL.1888 for user conductor 2021-07-10 05:36:04.514437 I | auth: deleting token babTHEBNPXXeoagU.1889 for user conductor 2021-07-10 05:36:06.514363 I | auth: deleting token yHhwMOmwSVGGXjcX.1890 for user conductor 2021-07-10 05:36:06.514452 I | auth: deleting token xMPkteYqSfJfQUFd.1891 for user conductor 2021-07-10 05:36:07.494245 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:36:07.608637 I | auth: deleting token zMABEtuHuWGzkGCY.1893 for user conductor 2021-07-10 05:36:07.608708 I | auth: deleting token CRFSsShDbrerokWS.1892 for user conductor 2021-07-10 05:36:08.094683 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.605704361s) to execute 2021-07-10 05:36:09.514206 I | auth: deleting token TTKiEgNsvvngKhEG.1894 for user conductor 2021-07-10 05:36:11.091899 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.68155444s) to execute 2021-07-10 05:36:11.588604 I | auth: deleting token jBEhvIjwbziefOmW.1895 for user conductor 2021-07-10 05:36:12.588646 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:36:13.588637 I | auth: deleting token kPgufpWjbwmCYSGA.1897 for user conductor 2021-07-10 05:36:13.588712 I | auth: deleting token YwSsKlyRLOXKPTND.1898 for user conductor 2021-07-10 05:36:13.997344 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.806300838s) to execute 2021-07-10 05:36:14.588711 I | auth: deleting token lQHAcKUjKvodKsSw.1899 for user conductor 2021-07-10 05:36:14.588798 I | auth: deleting token ORxzdbcyeJdovnTo.1896 for user conductor 2021-07-10 05:36:17.588985 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:36:22.094571 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (8.005900924s) to execute 2021-07-10 05:36:22.095230 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (8.006469733s) to execute 2021-07-10 05:36:22.312890 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (100.155286ms) to execute 2021-07-10 05:36:22.589433 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:36:25.097817 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.487667801s) to execute 2021-07-10 05:36:25.588576 I | auth: deleting token rSDLnlwssvMcHoCA.1903 for user conductor 2021-07-10 05:36:25.588633 I | auth: deleting token mfBVaFwRcDxXHiGi.1908 for user conductor 2021-07-10 05:36:25.588663 I | auth: deleting token PpHotdVELopVFStF.1902 for user conductor 2021-07-10 05:36:25.588681 I | auth: deleting token AGoeBZFhDjOgCiIS.1905 for user conductor 2021-07-10 05:36:25.588697 I | auth: deleting token eGUsYidozRzLRAjv.1906 for user conductor 2021-07-10 05:36:25.588715 I | auth: deleting token dUPYiJxVXFnlvUVE.1901 for user conductor 2021-07-10 05:36:25.588738 I | auth: deleting token uaikQxRcZbQkadTf.1900 for user conductor 2021-07-10 05:36:27.589708 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:36:28.290678 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (1.480327572s) to execute 2021-07-10 05:36:28.588783 I | auth: deleting token uFugmHXSvWlAOhPt.1904 for user conductor 2021-07-10 05:36:28.588857 I | auth: deleting token iYfMGXKXbdALhyXs.1909 for user conductor 2021-07-10 05:36:28.588894 I | auth: deleting token tQVtZvdOiEZeHLjk.1910 for user conductor 2021-07-10 05:36:28.588929 I | auth: deleting token VbResCgfpGKEmOQZ.1912 for user conductor 2021-07-10 05:36:28.588955 I | auth: deleting token CgQaUGbODvAmWOkj.1911 for user conductor 2021-07-10 05:36:28.588971 I | auth: deleting token lBUpgegSSPuqQdgG.1907 for user conductor 2021-07-10 05:36:30.896328 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (2.565312535s) to execute 2021-07-10 05:36:32.589974 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:36:33.514245 I | auth: deleting token oNLnIZSLnanxfuky.1918 for user conductor 2021-07-10 05:36:33.514281 I | auth: deleting token xlbbZRshhLuYyxvO.1917 for user conductor 2021-07-10 05:36:33.514288 I | auth: deleting token TbSPARNEFTmWbZCh.1916 for user conductor 2021-07-10 05:36:33.514294 I | auth: deleting token dwKaYAmjRYsjsMFh.1914 for user conductor 2021-07-10 05:36:33.514300 I | auth: deleting token gpDeNeiloGBPaRnn.1915 for user conductor 2021-07-10 05:36:34.588628 I | auth: deleting token LpWHPBHbjPasdgsa.1919 for user conductor 2021-07-10 05:36:36.514309 I | auth: deleting token vxNoEFcjoiwNNWzB.1921 for user conductor 2021-07-10 05:36:36.591802 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (5.599528726s) to execute 2021-07-10 05:36:36.592469 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:636" took too long (5.603523644s) to execute 2021-07-10 05:36:37.514345 I | auth: deleting token pLMOJsmniELsCFqI.1922 for user conductor 2021-07-10 05:36:37.590432 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:36:40.514353 I | auth: deleting token sdlAMmvmuqVCOXNl.1925 for user conductor 2021-07-10 05:36:40.514409 I | auth: deleting token yyvgQxHuWEhBDjzX.1923 for user conductor 2021-07-10 05:36:40.514438 I | auth: deleting token LABBoJExlZNUpXkb.1924 for user conductor 2021-07-10 05:36:42.590747 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:36:43.588624 I | auth: deleting token TJlIihUwHqFCFgMZ.1927 for user conductor 2021-07-10 05:36:43.588689 I | auth: deleting token gsQHhYRrIYRzLjqb.1926 for user conductor 2021-07-10 05:36:44.893363 W | etcdserver: request "header: authenticate:" with result "size:52" took too long (6.480918362s) to execute 2021-07-10 05:36:46.514293 I | auth: deleting token SAFUAgfWlpbcQgQG.1929 for user conductor 2021-07-10 05:36:46.514348 I | auth: deleting token ABEeUmyYdSSQxkey.1930 for user conductor 2021-07-10 05:36:47.591139 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.69.75:2380: getsockopt: connection refused 2021-07-10 05:36:47.795013 W | etcdserver: request "he