By type
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Skipping self-checking
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
2021-08-28 02:11:08.346575 I | etcdmain: etcd Version: 3.2.24
2021-08-28 02:11:08.346715 I | etcdmain: Git SHA: 420a45226
2021-08-28 02:11:08.346720 I | etcdmain: Go Version: go1.8.7
2021-08-28 02:11:08.346724 I | etcdmain: Go OS/Arch: linux/amd64
2021-08-28 02:11:08.346728 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-08-28 02:11:08.346853 I | embed: listening for peers on http://0.0.0.0:2380
2021-08-28 02:11:08.346956 I | embed: listening for client requests on 0.0.0.0:2379
2021-08-28 02:11:08.357374 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.67.235:2380
2021-08-28 02:11:08.357919 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.67.235:2380
2021-08-28 02:11:08.396867 I | etcdserver: name = onap-oof-has-etcd-1
2021-08-28 02:11:08.396896 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-08-28 02:11:08.396903 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-08-28 02:11:08.396907 I | etcdserver: heartbeat = 100ms
2021-08-28 02:11:08.396910 I | etcdserver: election = 1000ms
2021-08-28 02:11:08.396914 I | etcdserver: snapshot count = 100000
2021-08-28 02:11:08.396924 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2379
2021-08-28 02:11:08.396930 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2380
2021-08-28 02:11:08.443798 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-08-28 02:11:08.451376 I | etcdserver: starting member 72b38cc930a2fa6f in cluster e8b03869cbf54258
2021-08-28 02:11:08.451486 I | raft: 72b38cc930a2fa6f became follower at term 0
2021-08-28 02:11:08.451551 I | raft: newRaft 72b38cc930a2fa6f [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-08-28 02:11:08.451560 I | raft: 72b38cc930a2fa6f became follower at term 1
2021-08-28 02:11:08.457747 W | auth: simple token is not cryptographically signed
2021-08-28 02:11:08.460166 I | rafthttp: starting peer 2d249ba41c7e44fa...
2021-08-28 02:11:08.460219 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa
2021-08-28 02:11:08.545371 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-08-28 02:11:08.545515 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-08-28 02:11:08.548925 I | rafthttp: started peer 2d249ba41c7e44fa
2021-08-28 02:11:08.548975 I | rafthttp: added peer 2d249ba41c7e44fa
2021-08-28 02:11:08.548989 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-08-28 02:11:08.549013 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-08-28 02:11:08.549067 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-08-28 02:11:08.549101 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader)
2021-08-28 02:11:08.643938 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-08-28 02:11:08.644001 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-08-28 02:11:08.645024 I | rafthttp: started peer 8aae4c350a2413a5
2021-08-28 02:11:08.645057 I | rafthttp: added peer 8aae4c350a2413a5
2021-08-28 02:11:08.645105 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-08-28 02:11:08.645163 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-08-28 02:11:08.645387 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-08-28 02:11:08.646743 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-08-28 02:11:08.646872 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-08-28 02:11:08.646935 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-08-28 02:11:08.897806 I | rafthttp: peer 8aae4c350a2413a5 became active
2021-08-28 02:11:08.897879 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-08-28 02:11:08.897964 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message reader)
2021-08-28 02:11:09.003295 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message writer)
2021-08-28 02:11:09.003462 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 writer)
2021-08-28 02:11:10.352936 I | raft: 72b38cc930a2fa6f is starting a new election at term 1
2021-08-28 02:11:10.353069 I | raft: 72b38cc930a2fa6f became candidate at term 2
2021-08-28 02:11:10.353099 I | raft: 72b38cc930a2fa6f received MsgVoteResp from 72b38cc930a2fa6f at term 2
2021-08-28 02:11:10.353110 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 8aae4c350a2413a5 at term 2
2021-08-28 02:11:10.353119 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 2d249ba41c7e44fa at term 2
2021-08-28 02:11:10.512931 I | raft: 72b38cc930a2fa6f [term: 2] received a MsgVote message with higher term from 8aae4c350a2413a5 [term: 275]
2021-08-28 02:11:10.512970 I | raft: 72b38cc930a2fa6f became follower at term 275
2021-08-28 02:11:10.512981 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3, vote: 0] cast MsgVote for 8aae4c350a2413a5 [logterm: 1, index: 3] at term 275
2021-08-28 02:11:10.514454 I | raft: raft.node: 72b38cc930a2fa6f elected leader 8aae4c350a2413a5 at term 275
2021-08-28 02:11:10.517718 I | embed: ready to serve client requests
2021-08-28 02:11:10.517852 I | etcdserver: published {Name:onap-oof-has-etcd-1 ClientURLs:[http://onap-oof-has-etcd-1.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-08-28 02:11:10.518076 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-08-28 02:11:10.998633 N | etcdserver/membership: set the initial cluster version to 3.0
2021-08-28 02:11:10.998728 I | etcdserver/api: enabled capabilities for version 3.0
2021-08-28 02:11:13.549346 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:11:18.549542 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:11:23.549766 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:11:28.549911 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:11:32.450050 N | auth: added a new user: root
2021-08-28 02:11:32.450353 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.15403843s) to execute
2021-08-28 02:11:33.550084 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:11:36.346189 N | auth: added a new user: conductor
2021-08-28 02:11:36.346318 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.147104528s) to execute
2021-08-28 02:11:38.550343 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:11:39.501162 N | auth: Role conductor is created
2021-08-28 02:11:39.897643 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-08-28 02:11:40.199469 N | auth: granted role conductor to user conductor
2021-08-28 02:11:40.696219 N | auth: Role root is created
2021-08-28 02:11:40.699918 N | auth: granted role root to user root
2021-08-28 02:11:40.797998 N | auth: Authentication enabled
2021-08-28 02:11:43.550496 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:11:48.550733 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:11:53.550947 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:11:58.551130 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:03.551278 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:08.551532 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:13.551701 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:18.552000 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:23.552277 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:28.552474 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:33.552656 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:38.552832 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:43.553034 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:48.553238 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:53.553433 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:12:58.553613 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:03.553778 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:08.553968 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:13.554150 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:18.643819 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:19.645348 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.10130197s) to execute
2021-08-28 02:13:22.249453 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.051444625s) to execute
2021-08-28 02:13:23.644032 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:25.148668 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.351439206s) to execute
2021-08-28 02:13:27.747165 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.101979754s) to execute
2021-08-28 02:13:28.743923 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:30.552260 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.008316062s) to execute
2021-08-28 02:13:31.946219 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (749.942352ms) to execute
2021-08-28 02:13:33.744152 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:38.744339 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:43.744578 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:48.744856 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:53.745042 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:56.745288 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.401354149s) to execute
2021-08-28 02:13:56.896437 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (149.044313ms) to execute
2021-08-28 02:13:56.898173 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (150.211174ms) to execute
2021-08-28 02:13:58.745378 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:13:59.448210 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.295044118s) to execute
2021-08-28 02:14:00.745292 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.199602651s) to execute
2021-08-28 02:14:00.745418 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.201465825s) to execute
2021-08-28 02:14:03.252299 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (956.149571ms) to execute
2021-08-28 02:14:03.745580 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:05.950075 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.004683323s) to execute
2021-08-28 02:14:06.096524 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (144.232224ms) to execute
2021-08-28 02:14:08.745783 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:08.747150 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.301337916s) to execute
2021-08-28 02:14:08.996283 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (152.075889ms) to execute
2021-08-28 02:14:13.451242 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.055025119s) to execute
2021-08-28 02:14:13.746133 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:16.150622 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.054086786s) to execute
2021-08-28 02:14:18.746339 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:18.751536 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.105813077s) to execute
2021-08-28 02:14:21.543999 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.043211703s) to execute
2021-08-28 02:14:23.746615 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:28.746912 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:33.747095 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:34.545993 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.248295883s) to execute
2021-08-28 02:14:35.848963 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.300820442s) to execute
2021-08-28 02:14:35.849220 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.301178808s) to execute
2021-08-28 02:14:37.244794 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (1.393374777s) to execute
2021-08-28 02:14:37.244874 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.300851624s) to execute
2021-08-28 02:14:38.450143 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.106163784s) to execute
2021-08-28 02:14:38.844050 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:40.047189 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.400907629s) to execute
2021-08-28 02:14:41.445476 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (1.297136404s) to execute
2021-08-28 02:14:41.445611 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (349.242462ms) to execute
2021-08-28 02:14:43.844251 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:48.844511 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:53.844727 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:14:58.844898 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:03.845117 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:08.845322 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:10.045309 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (749.056533ms) to execute
2021-08-28 02:15:13.845494 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:18.845773 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:23.845993 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:24.546654 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (550.402207ms) to execute
2021-08-28 02:15:25.844941 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.100770115s) to execute
2021-08-28 02:15:28.652569 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.008247737s) to execute
2021-08-28 02:15:28.846198 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:29.950941 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.106443302s) to execute
2021-08-28 02:15:30.096177 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (142.801258ms) to execute
2021-08-28 02:15:30.296848 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (152.9144ms) to execute
2021-08-28 02:15:33.344072 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (499.990742ms) to execute
2021-08-28 02:15:33.697760 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.855844ms) to execute
2021-08-28 02:15:33.846372 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:37.646794 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (802.848839ms) to execute
2021-08-28 02:15:38.846588 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:41.051861 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (652.714539ms) to execute
2021-08-28 02:15:43.846789 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:45.146522 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (702.549613ms) to execute
2021-08-28 02:15:48.452934 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (354.946184ms) to execute
2021-08-28 02:15:48.846998 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:52.746595 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (702.7239ms) to execute
2021-08-28 02:15:53.847223 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:15:54.047437 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.20169355s) to execute
2021-08-28 02:15:54.196471 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (146.581043ms) to execute
2021-08-28 02:15:56.648267 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (452.126058ms) to execute
2021-08-28 02:15:57.946788 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102816743s) to execute
2021-08-28 02:15:58.501139 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (501.173229ms) to execute
2021-08-28 02:15:58.847437 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:16:00.946349 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.050176127s) to execute
2021-08-28 02:16:01.096352 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (147.907174ms) to execute
2021-08-28 02:16:03.649672 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.251791358s) to execute
2021-08-28 02:16:03.847725 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:16:05.050282 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (851.164358ms) to execute
2021-08-28 02:16:08.447419 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (650.816883ms) to execute
2021-08-28 02:16:08.847890 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:16:13.848101 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:16:18.848405 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-08-28 02:16:23.848605 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:16:28.848803 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:16:33.544106 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.045968823s) to execute
2021-08-28 02:16:33.849027 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:16:37.446163 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.049902593s) to execute
2021-08-28 02:16:38.647479 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.198469401s) to execute
2021-08-28 02:16:38.849214 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:16:42.246715 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.596441481s) to execute
2021-08-28 02:16:42.246912 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (3.597080524s) to execute
2021-08-28 02:16:43.849441 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:16:44.747588 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.149785311s) to execute
2021-08-28 02:16:45.849811 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (1.100142448s) to execute
2021-08-28 02:16:45.849905 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.004110697s) to execute
2021-08-28 02:16:46.096260 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (227.134632ms) to execute
2021-08-28 02:16:48.849660 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:16:49.849203 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (103.135435ms) to execute
2021-08-28 02:16:53.849905 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:16:54.446986 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (702.822584ms) to execute
2021-08-28 02:16:57.146074 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (149.820311ms) to execute
2021-08-28 02:16:58.850096 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:03.850318 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:08.850539 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:13.850740 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:18.850970 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-08-28 02:17:22.351844 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (955.24342ms) to execute
2021-08-28 02:17:23.851197 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:28.851482 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:29.548344 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (752.216517ms) to execute
2021-08-28 02:17:33.851644 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:38.851873 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:43.852137 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:48.852331 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:51.346096 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (545.818367ms) to execute
2021-08-28 02:17:53.852566 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:53.947524 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.149918952s) to execute
2021-08-28 02:17:55.798468 I | auth: deleting token ZcrDqcqabpjltZoL.17 for user conductor
2021-08-28 02:17:58.852792 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:17:59.052157 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.508134425s) to execute
2021-08-28 02:17:59.798403 I | auth: deleting token suhfLpWYbLGtKiqC.19 for user conductor
2021-08-28 02:18:00.350829 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (954.248067ms) to execute
2021-08-28 02:18:00.798491 I | auth: deleting token JNtkbUOcWTRxBejG.21 for user conductor
2021-08-28 02:18:01.798420 I | auth: deleting token PhzPdOeuOZfEVpEw.23 for user conductor
2021-08-28 02:18:02.651517 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.207597039s) to execute
2021-08-28 02:18:03.798534 I | auth: deleting token CCIlPvoibVTsUoXN.25 for user conductor
2021-08-28 02:18:03.852909 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:04.843765 I | auth: deleting token TfNaYyOJGgkxqnxi.27 for user conductor
2021-08-28 02:18:05.144790 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.100790646s) to execute
2021-08-28 02:18:06.452763 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (356.446186ms) to execute
2021-08-28 02:18:06.843812 I | auth: deleting token mDzoZpzpksHlOIRy.29 for user conductor
2021-08-28 02:18:07.553352 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.054886548s) to execute
2021-08-28 02:18:07.798386 I | auth: deleting token RWfyebdRpetsHFAg.31 for user conductor
2021-08-28 02:18:08.843780 I | auth: deleting token tYeWSRxTcVxhYEKs.33 for user conductor
2021-08-28 02:18:08.943798 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:10.051804 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (854.530576ms) to execute
2021-08-28 02:18:10.297580 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (153.412653ms) to execute
2021-08-28 02:18:12.651555 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.153629792s) to execute
2021-08-28 02:18:12.796475 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (142.741706ms) to execute
2021-08-28 02:18:12.798340 I | auth: deleting token LPqUJZuXTdjvBhVE.35 for user conductor
2021-08-28 02:18:13.798383 I | auth: deleting token JeKNRGAgtFFoqkvy.36 for user conductor
2021-08-28 02:18:13.944020 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:14.843826 I | auth: deleting token IiUlRTHRrnfyVczy.37 for user conductor
2021-08-28 02:18:15.147554 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.249351475s) to execute
2021-08-28 02:18:16.843847 I | auth: deleting token XgCbANQxRAClanuP.38 for user conductor
2021-08-28 02:18:17.649163 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102564013s) to execute
2021-08-28 02:18:17.796534 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (145.213637ms) to execute
2021-08-28 02:18:18.944225 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:19.798426 I | auth: deleting token GezAZepnovpHcsES.39 for user conductor
2021-08-28 02:18:19.798467 I | auth: deleting token ewWjtDCfBTAduXfm.40 for user conductor
2021-08-28 02:18:22.798370 I | auth: deleting token EPcjoDmTEENgXqnP.43 for user conductor
2021-08-28 02:18:22.798411 I | auth: deleting token XeFPwQzYJEIyCSos.44 for user conductor
2021-08-28 02:18:22.798434 I | auth: deleting token mXAFFkgPBFdcRqlB.45 for user conductor
2021-08-28 02:18:23.944483 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:25.798433 I | auth: deleting token nfdNWjKBfZAAGvBt.48 for user conductor
2021-08-28 02:18:25.798481 I | auth: deleting token jDMUDSRhFkUiKzet.49 for user conductor
2021-08-28 02:18:27.798515 I | auth: deleting token CAsNpBdaUBEDglOH.52 for user conductor
2021-08-28 02:18:28.798389 I | auth: deleting token MucAJcwIDwAQBgzL.53 for user conductor
2021-08-28 02:18:28.798431 I | auth: deleting token lPyJXqbdoeGjAkzV.51 for user conductor
2021-08-28 02:18:28.944806 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:30.798440 I | auth: deleting token yeWKWmnDHjcBlVMv.56 for user conductor
2021-08-28 02:18:30.798483 I | auth: deleting token lgUTzmRiFvordvlm.55 for user conductor
2021-08-28 02:18:32.798483 I | auth: deleting token SnZmjnBtOlVgsTNt.59 for user conductor
2021-08-28 02:18:32.798522 I | auth: deleting token gzSRbpeCCysxSOaF.58 for user conductor
2021-08-28 02:18:33.944964 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:34.798447 I | auth: deleting token ZFczuWSRegngzhaM.60 for user conductor
2021-08-28 02:18:35.351511 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.053447496s) to execute
2021-08-28 02:18:35.843862 I | auth: deleting token FeRudXUfUdSdEPOJ.61 for user conductor
2021-08-28 02:18:37.837993 I | auth: deleting token WuMdZIRMOJnqsbtg.62 for user conductor
2021-08-28 02:18:37.850905 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.654400367s) to execute
2021-08-28 02:18:38.945119 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:39.050314 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.196226095s) to execute
2021-08-28 02:18:40.798426 I | auth: deleting token miuEflJvXeLUawGE.63 for user conductor
2021-08-28 02:18:41.546408 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.693691931s) to execute
2021-08-28 02:18:41.546580 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.400450349s) to execute
2021-08-28 02:18:41.547036 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.402992258s) to execute
2021-08-28 02:18:43.945248 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:45.049118 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.005036332s) to execute
2021-08-28 02:18:45.196467 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (144.891134ms) to execute
2021-08-28 02:18:45.198319 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.627742ms) to execute
2021-08-28 02:18:45.798439 I | auth: deleting token aRVwaYUSpSsAJObm.64 for user conductor
2021-08-28 02:18:47.744430 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.045801349s) to execute
2021-08-28 02:18:48.945434 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.101431135s) to execute
2021-08-28 02:18:48.945549 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.198884097s) to execute
2021-08-28 02:18:48.945881 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:49.798381 I | auth: deleting token yhlelfiRNlbKWQee.65 for user conductor
2021-08-28 02:18:51.345249 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.39730065s) to execute
2021-08-28 02:18:51.345394 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.297932582s) to execute
2021-08-28 02:18:51.345496 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.193819766s) to execute
2021-08-28 02:18:52.544783 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.145773717s) to execute
2021-08-28 02:18:53.798409 I | auth: deleting token JidGXGoKxwJTprLI.66 for user conductor
2021-08-28 02:18:53.946088 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:18:55.848194 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.004187142s) to execute
2021-08-28 02:18:55.996325 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.300495ms) to execute
2021-08-28 02:18:57.798432 I | auth: deleting token lLugLClRURgMbGVu.69 for user conductor
2021-08-28 02:18:57.798471 I | auth: deleting token KNVRiFxUHjtjTfFZ.67 for user conductor
2021-08-28 02:18:57.798482 I | auth: deleting token UNflkOgrKoBiDVHf.68 for user conductor
2021-08-28 02:18:58.450037 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.753491061s) to execute
2021-08-28 02:18:58.946274 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:00.889458 I | auth: deleting token qPMvOflGqJrXoiyB.70 for user conductor
2021-08-28 02:19:00.889525 I | auth: deleting token dtkpmjwQLGGbWLtk.71 for user conductor
2021-08-28 02:19:01.145346 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201468512s) to execute
2021-08-28 02:19:01.296582 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.101332ms) to execute
2021-08-28 02:19:01.298308 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.142527ms) to execute
2021-08-28 02:19:01.843771 I | auth: deleting token XGnUBUQQvuzFvqrC.72 for user conductor
2021-08-28 02:19:03.646953 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201071872s) to execute
2021-08-28 02:19:03.798408 I | auth: deleting token OPlbvvpqePqRRpuC.74 for user conductor
2021-08-28 02:19:03.798455 I | auth: deleting token iMwjjyLVHWJbqguI.73 for user conductor
2021-08-28 02:19:03.946463 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:04.846720 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.050574868s) to execute
2021-08-28 02:19:04.846897 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.10290161s) to execute
2021-08-28 02:19:06.798444 I | auth: deleting token cGOceOtMhtIhcJIi.76 for user conductor
2021-08-28 02:19:06.798533 I | auth: deleting token VmMGqltpNXbEkIkY.75 for user conductor
2021-08-28 02:19:06.798566 I | auth: deleting token ctHpEwYxtUPSAMTm.77 for user conductor
2021-08-28 02:19:07.247789 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.303669671s) to execute
2021-08-28 02:19:07.247911 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.202362321s) to execute
2021-08-28 02:19:08.449655 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.19926777s) to execute
2021-08-28 02:19:08.449806 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.199779977s) to execute
2021-08-28 02:19:08.946679 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:09.798440 I | auth: deleting token XpYUsWfDCdTbUDlG.79 for user conductor
2021-08-28 02:19:09.798478 I | auth: deleting token CtWhgZaAlxuDEzAz.78 for user conductor
2021-08-28 02:19:10.798453 I | auth: deleting token zvdqWTxNGuFfZicc.80 for user conductor
2021-08-28 02:19:10.945467 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.492753958s) to execute
2021-08-28 02:19:10.945721 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.493938524s) to execute
2021-08-28 02:19:11.798514 I | auth: deleting token WWjNjtjqYAOTMtaY.81 for user conductor
2021-08-28 02:19:12.145902 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.197753262s) to execute
2021-08-28 02:19:12.146356 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.198899738s) to execute
2021-08-28 02:19:13.444874 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.295802407s) to execute
2021-08-28 02:19:13.445042 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.296479764s) to execute
2021-08-28 02:19:13.843768 I | auth: deleting token abVDOrzfXYrcxEoP.82 for user conductor
2021-08-28 02:19:13.843833 I | auth: deleting token uUXXqwRmLgrtJgiQ.83 for user conductor
2021-08-28 02:19:13.946887 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:14.651056 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203028076s) to execute
2021-08-28 02:19:14.651268 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.204411788s) to execute
2021-08-28 02:19:16.798451 I | auth: deleting token kaylwjZbiwFfqwnq.84 for user conductor
2021-08-28 02:19:16.798499 I | auth: deleting token VyxkECyWfquBARNx.85 for user conductor
2021-08-28 02:19:16.798523 I | auth: deleting token WbOUChpggmlKQGBw.86 for user conductor
2021-08-28 02:19:18.349050 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.695960626s) to execute
2021-08-28 02:19:18.349198 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.550989705s) to execute
2021-08-28 02:19:18.349309 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.302287794s) to execute
2021-08-28 02:19:18.546268 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.120193ms) to execute
2021-08-28 02:19:18.947068 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:19.745229 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.299122174s) to execute
2021-08-28 02:19:19.745260 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.198973112s) to execute
2021-08-28 02:19:19.798421 I | auth: deleting token wtRRwPlptVWWDXMR.88 for user conductor
2021-08-28 02:19:19.798461 I | auth: deleting token otyyaBEChKEnqKVv.87 for user conductor
2021-08-28 02:19:20.946247 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.049797441s) to execute
2021-08-28 02:19:21.843825 I | auth: deleting token XEcnSSbLHAfEJGMW.90 for user conductor
2021-08-28 02:19:21.843870 I | auth: deleting token WmqcnhENwxjUrgIK.91 for user conductor
2021-08-28 02:19:21.843893 I | auth: deleting token ykSCdNJqLOSlTXIj.89 for user conductor
2021-08-28 02:19:22.245737 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.199643029s) to execute
2021-08-28 02:19:22.245920 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.20187877s) to execute
2021-08-28 02:19:23.545802 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (449.278272ms) to execute
2021-08-28 02:19:23.798470 I | auth: deleting token AslyVTFeZCcAsFVo.92 for user conductor
2021-08-28 02:19:23.947276 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:27.798474 I | auth: deleting token zuSoiwfYwdQuDtnP.93 for user conductor
2021-08-28 02:19:28.947514 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:32.798406 I | auth: deleting token bnIGjJZkkJhloSgD.94 for user conductor
2021-08-28 02:19:33.947756 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:36.798431 I | auth: deleting token PsBUsfoppCFCCYfb.95 for user conductor
2021-08-28 02:19:36.798471 I | auth: deleting token FdxoccvxsZdNNnJG.96 for user conductor
2021-08-28 02:19:36.798480 I | auth: deleting token uaaRVEUXchBhAsXW.97 for user conductor
2021-08-28 02:19:38.843857 I | auth: deleting token RlqhBCuwhXzFLUxE.98 for user conductor
2021-08-28 02:19:38.948015 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:38.950620 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.052095606s) to execute
2021-08-28 02:19:40.151687 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.107749685s) to execute
2021-08-28 02:19:40.297339 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (143.450334ms) to execute
2021-08-28 02:19:40.798417 I | auth: deleting token ieWLhiEBmGzZBRdT.99 for user conductor
2021-08-28 02:19:40.798459 I | auth: deleting token kwUjcBmYDhCVTRbg.101 for user conductor
2021-08-28 02:19:41.798394 I | auth: deleting token jfweTSSJCjZHhSGC.103 for user conductor
2021-08-28 02:19:41.798427 I | auth: deleting token vbbwIVVResqHXZMo.102 for user conductor
2021-08-28 02:19:43.749418 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.953266714s) to execute
2021-08-28 02:19:43.948252 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:45.798458 I | auth: deleting token QbFJUVCeBrUtETuy.105 for user conductor
2021-08-28 02:19:48.798399 I | auth: deleting token IPxahPQuvtFydseM.106 for user conductor
2021-08-28 02:19:48.948433 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:52.798453 I | auth: deleting token oLyHIlNexagKeojj.107 for user conductor
2021-08-28 02:19:53.948749 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:56.798434 I | auth: deleting token qYGvEjvVzkvCfcyf.109 for user conductor
2021-08-28 02:19:58.948992 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:19:59.798404 I | auth: deleting token vmuedFFyPaeLrsrr.110 for user conductor
2021-08-28 02:20:02.798369 I | auth: deleting token MbBuneUUOXfHmwCB.111 for user conductor
2021-08-28 02:20:03.949206 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:04.046178 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.147831817s) to execute
2021-08-28 02:20:05.247105 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (950.549275ms) to execute
2021-08-28 02:20:05.798462 I | auth: deleting token IAXuQWvAxlKtmDDI.112 for user conductor
2021-08-28 02:20:07.647614 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.398026795s) to execute
2021-08-28 02:20:07.647710 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.251126522s) to execute
2021-08-28 02:20:07.798468 I | auth: deleting token UfRasmLAnEoUvUZQ.113 for user conductor
2021-08-28 02:20:08.798393 I | auth: deleting token bUNukkZwbSyRqydC.115 for user conductor
2021-08-28 02:20:08.948816 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.20251972s) to execute
2021-08-28 02:20:08.949398 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:10.145911 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.049635623s) to execute
2021-08-28 02:20:10.798425 I | auth: deleting token aXgbTlKxudOJKlIA.118 for user conductor
2021-08-28 02:20:10.798460 I | auth: deleting token MFkifeLVXrUwnOwQ.117 for user conductor
2021-08-28 02:20:11.798407 I | auth: deleting token eejLsqBSYIhglVwT.120 for user conductor
2021-08-28 02:20:12.798433 I | auth: deleting token PhRgqDyuygBvHrEx.122 for user conductor
2021-08-28 02:20:13.949604 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:16.798406 I | auth: deleting token QoqXLASSJwCjzyUE.123 for user conductor
2021-08-28 02:20:18.798444 I | auth: deleting token hkUZSeKzklMJMakl.124 for user conductor
2021-08-28 02:20:18.949835 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:20.798445 I | auth: deleting token jttncQFIZxEqqdhF.126 for user conductor
2021-08-28 02:20:22.798407 I | auth: deleting token uihbTeROECbPzsJZ.127 for user conductor
2021-08-28 02:20:23.798440 I | auth: deleting token bSYnUNhVMXCGDxLe.128 for user conductor
2021-08-28 02:20:23.950038 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:24.798415 I | auth: deleting token bQvLSVJkaqAgnwhb.130 for user conductor
2021-08-28 02:20:25.596026 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (195.533122ms) to execute
2021-08-28 02:20:26.798434 I | auth: deleting token vtsFiFecBFPYhKaO.132 for user conductor
2021-08-28 02:20:26.798575 I | auth: deleting token WkZOLCyPaisIgEgO.131 for user conductor
2021-08-28 02:20:28.052201 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (756.052543ms) to execute
2021-08-28 02:20:28.798449 I | auth: deleting token bOExoDEKuAfAPaOx.136 for user conductor
2021-08-28 02:20:28.798501 I | auth: deleting token ppDvpLrpTcDJJhwJ.134 for user conductor
2021-08-28 02:20:28.798521 I | auth: deleting token JJiBybCjZJAUjDCi.135 for user conductor
2021-08-28 02:20:28.950188 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:29.245297 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.099185214s) to execute
2021-08-28 02:20:30.446058 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.049612466s) to execute
2021-08-28 02:20:30.596951 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (148.709913ms) to execute
2021-08-28 02:20:30.798440 I | auth: deleting token sfrUViiEkIllVUjY.139 for user conductor
2021-08-28 02:20:30.798492 I | auth: deleting token NiPWgDgKMhkCiDHm.140 for user conductor
2021-08-28 02:20:30.798508 I | auth: deleting token oOmXiHIzSvPvvQSN.137 for user conductor
2021-08-28 02:20:33.248799 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103320789s) to execute
2021-08-28 02:20:33.396444 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (145.610662ms) to execute
2021-08-28 02:20:33.798435 I | auth: deleting token HoMGQTApFaDWWbfE.142 for user conductor
2021-08-28 02:20:33.798476 I | auth: deleting token hGJoiamIyhQZeCgE.141 for user conductor
2021-08-28 02:20:33.950388 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:35.798414 I | auth: deleting token oNIasGzYtlQumZZz.143 for user conductor
2021-08-28 02:20:36.798453 I | auth: deleting token dVELxHBUvUPQpNva.144 for user conductor
2021-08-28 02:20:37.798442 I | auth: deleting token zpNRuqSJSXPxGmjz.145 for user conductor
2021-08-28 02:20:38.798427 I | auth: deleting token gSzmDMPiwjyFsSUT.146 for user conductor
2021-08-28 02:20:38.950603 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:41.798454 I | auth: deleting token utEkQxuEzTeNOxAB.147 for user conductor
2021-08-28 02:20:41.798506 I | auth: deleting token gDyeOXRUajjxcTrB.148 for user conductor
2021-08-28 02:20:42.798416 I | auth: deleting token beVmgoiakvzgTBEG.149 for user conductor
2021-08-28 02:20:43.950850 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:44.844022 I | auth: deleting token mochOXMiOmFwwZVS.150 for user conductor
2021-08-28 02:20:45.798454 I | auth: deleting token NVImOqMzbgoHhQrc.152 for user conductor
2021-08-28 02:20:45.798498 I | auth: deleting token HhytBpsiYQygeaDe.151 for user conductor
2021-08-28 02:20:45.846173 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (449.90723ms) to execute
2021-08-28 02:20:47.051336 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201978647s) to execute
2021-08-28 02:20:48.798413 I | auth: deleting token wiXACmMJTjHADavJ.154 for user conductor
2021-08-28 02:20:48.798454 I | auth: deleting token GFMbsTjQSXHJWQeJ.153 for user conductor
2021-08-28 02:20:48.951104 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:50.649297 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.502855557s) to execute
2021-08-28 02:20:50.843850 I | auth: deleting token eAYjlgRMDspNsRSD.155 for user conductor
2021-08-28 02:20:51.798387 I | auth: deleting token bwIdqffqwpSDlHEk.156 for user conductor
2021-08-28 02:20:51.944105 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.292381215s) to execute
2021-08-28 02:20:51.944159 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.200100628s) to execute
2021-08-28 02:20:51.944353 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.198643466s) to execute
2021-08-28 02:20:52.798416 I | auth: deleting token tcVARaHhEuWsOTCf.157 for user conductor
2021-08-28 02:20:53.052958 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.008991954s) to execute
2021-08-28 02:20:53.951308 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:54.798429 I | auth: deleting token wxcyBxGForPkTnQH.158 for user conductor
2021-08-28 02:20:54.798477 I | auth: deleting token zSKtnKClVWRyrJDq.159 for user conductor
2021-08-28 02:20:55.551553 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.307617749s) to execute
2021-08-28 02:20:55.697704 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (143.955528ms) to execute
2021-08-28 02:20:56.798397 I | auth: deleting token WvMUQEKemsnUKxzL.160 for user conductor
2021-08-28 02:20:58.798437 I | auth: deleting token YxyDxpZZAKefOphR.161 for user conductor
2021-08-28 02:20:58.798485 I | auth: deleting token DdEDfaRvmAnBPsLQ.162 for user conductor
2021-08-28 02:20:58.951560 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:20:59.347226 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.399978775s) to execute
2021-08-28 02:21:00.647580 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203647263s) to execute
2021-08-28 02:21:00.647787 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.298400345s) to execute
2021-08-28 02:21:00.647851 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.298431322s) to execute
2021-08-28 02:21:00.798379 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (148.5063ms) to execute
2021-08-28 02:21:01.798381 I | auth: deleting token nhocvILvbwPRxfNb.163 for user conductor
2021-08-28 02:21:01.798428 I | auth: deleting token xkdZSoaqMMBkbgZJ.165 for user conductor
2021-08-28 02:21:01.798450 I | auth: deleting token czUQxqMVCEAJCKQw.164 for user conductor
2021-08-28 02:21:03.148149 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.347933295s) to execute
2021-08-28 02:21:03.148240 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.750413624s) to execute
2021-08-28 02:21:03.798435 I | auth: deleting token RiVpcsFlRMIaSMOS.167 for user conductor
2021-08-28 02:21:03.798476 I | auth: deleting token pPGJdNLEfZnDqWtA.166 for user conductor
2021-08-28 02:21:03.951788 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:04.350657 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.153038141s) to execute
2021-08-28 02:21:04.350911 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.107135214s) to execute
2021-08-28 02:21:05.649989 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (548.593878ms) to execute
2021-08-28 02:21:05.798442 I | auth: deleting token cILFbfEVEeCbQwnx.168 for user conductor
2021-08-28 02:21:05.798482 I | auth: deleting token BeeVPTSejiiCOLCi.169 for user conductor
2021-08-28 02:21:06.850698 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.054091217s) to execute
2021-08-28 02:21:06.996132 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (143.2162ms) to execute
2021-08-28 02:21:08.843818 I | auth: deleting token RioXcYhGhAHmDaFI.170 for user conductor
2021-08-28 02:21:08.843867 I | auth: deleting token nMqJTIhokWYoKzMp.171 for user conductor
2021-08-28 02:21:08.952074 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:09.546748 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102774415s) to execute
2021-08-28 02:21:10.798378 I | auth: deleting token uEhHkUajgwTeCmju.173 for user conductor
2021-08-28 02:21:10.798433 I | auth: deleting token GzxQzqJXEHmRnpyW.172 for user conductor
2021-08-28 02:21:13.952274 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:15.798405 I | auth: deleting token JdLAjNbVzXepmHxO.174 for user conductor
2021-08-28 02:21:18.798472 I | auth: deleting token ITsuAXbotQYtTJRt.175 for user conductor
2021-08-28 02:21:18.952897 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:21.798391 I | auth: deleting token teXYBprLaCuqaRwn.176 for user conductor
2021-08-28 02:21:23.953093 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:25.843811 I | auth: deleting token hFyFOmQGzckxUwsH.177 for user conductor
2021-08-28 02:21:28.953268 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:29.798405 I | auth: deleting token pMAqeJfhtmbsfmfK.178 for user conductor
2021-08-28 02:21:30.798435 I | auth: deleting token oLaKaOjDtPnHGEwF.179 for user conductor
2021-08-28 02:21:31.153167 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (955.239565ms) to execute
2021-08-28 02:21:31.244075 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.045869059s) to execute
2021-08-28 02:21:32.549710 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.051404235s) to execute
2021-08-28 02:21:33.798470 I | auth: deleting token kEhivHAOSEJeHybD.181 for user conductor
2021-08-28 02:21:33.798533 I | auth: deleting token xXTofEFsAzImMumZ.180 for user conductor
2021-08-28 02:21:33.845967 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.14773209s) to execute
2021-08-28 02:21:33.953464 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:35.151127 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (954.526081ms) to execute
2021-08-28 02:21:35.843839 I | auth: deleting token jBvhketKISbBPsdM.182 for user conductor
2021-08-28 02:21:36.798408 I | auth: deleting token jbfAzeXCPWpEttXg.183 for user conductor
2021-08-28 02:21:37.546480 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.392141236s) to execute
2021-08-28 02:21:37.796627 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (247.691503ms) to execute
2021-08-28 02:21:37.798398 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (200.081291ms) to execute
2021-08-28 02:21:37.798522 I | auth: deleting token TLCfPRlvFJjYZqex.184 for user conductor
2021-08-28 02:21:38.948570 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (752.222055ms) to execute
2021-08-28 02:21:38.953641 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:42.798378 I | auth: deleting token HrPuwisdxEUuNKNN.189 for user conductor
2021-08-28 02:21:42.798422 I | auth: deleting token lHsIrkGnSleVDyKb.187 for user conductor
2021-08-28 02:21:42.798434 I | auth: deleting token QvUbSiRGYoqYWrBF.186 for user conductor
2021-08-28 02:21:42.798441 I | auth: deleting token XqielXKfZssUnDBa.190 for user conductor
2021-08-28 02:21:43.953834 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:45.798437 I | auth: deleting token NVZzXyFVDACNxWLY.191 for user conductor
2021-08-28 02:21:46.798440 I | auth: deleting token wOIIJoRLYkbNWFCb.188 for user conductor
2021-08-28 02:21:46.798489 I | auth: deleting token pzVijyZQVWvaGQSA.193 for user conductor
2021-08-28 02:21:46.798499 I | auth: deleting token NKAUVtdXXaQimFIj.194 for user conductor
2021-08-28 02:21:46.798506 I | auth: deleting token VIybBcPgEoHCThjF.192 for user conductor
2021-08-28 02:21:47.798393 I | auth: deleting token oghWibXQrLxkqYHc.196 for user conductor
2021-08-28 02:21:48.798421 I | auth: deleting token THiowiLMxXQHwdjj.197 for user conductor
2021-08-28 02:21:48.954068 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:50.798352 I | auth: deleting token mEgRaALQTTUnBOBg.199 for user conductor
2021-08-28 02:21:50.798391 I | auth: deleting token oDkGqmkFoGwbwZMr.198 for user conductor
2021-08-28 02:21:52.949277 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.005217738s) to execute
2021-08-28 02:21:53.196726 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (245.468087ms) to execute
2021-08-28 02:21:53.843832 I | auth: deleting token txtCBhFWxHjUUjhI.200 for user conductor
2021-08-28 02:21:53.954271 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:21:54.843808 I | auth: deleting token xzZrdIUctWwGzMdp.201 for user conductor
2021-08-28 02:21:54.843861 I | auth: deleting token ZfRPWYtOfMUWhBdP.202 for user conductor
2021-08-28 02:21:55.644403 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.048069782s) to execute
2021-08-28 02:21:56.798396 I | auth: deleting token qkcAUbCSJJIwrdCJ.203 for user conductor
2021-08-28 02:21:57.798379 I | auth: deleting token KQeqCWDKeUYmwYxZ.204 for user conductor
2021-08-28 02:21:57.798488 I | auth: deleting token DhOPstWLnFRwlNTJ.205 for user conductor
2021-08-28 02:21:58.954573 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:00.798447 I | auth: deleting token TzuZqgTTvDjRuYFJ.206 for user conductor
2021-08-28 02:22:03.798418 I | auth: deleting token YtagfNSNOtnDYgyZ.207 for user conductor
2021-08-28 02:22:03.954787 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:07.798412 I | auth: deleting token qcuwRFosjLrugXyX.208 for user conductor
2021-08-28 02:22:08.954972 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:10.843973 I | auth: deleting token qVbCpeiZlkdCCpZr.209 for user conductor
2021-08-28 02:22:13.955131 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:14.745887 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.59689771s) to execute
2021-08-28 02:22:14.798381 I | auth: deleting token SlahxhxsLogNhzXW.210 for user conductor
2021-08-28 02:22:17.798482 I | auth: deleting token RDZZblYFUTbWHWoK.211 for user conductor
2021-08-28 02:22:18.955317 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:21.798426 I | auth: deleting token vPtkhABgihrXzkVb.212 for user conductor
2021-08-28 02:22:22.798452 I | auth: deleting token fXdNUSQGzYihMmia.215 for user conductor
2021-08-28 02:22:23.955596 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:24.798467 I | auth: deleting token SMlchnEwscKrMCBM.216 for user conductor
2021-08-28 02:22:25.798405 I | auth: deleting token fuCpCrXkpfEjjvoy.217 for user conductor
2021-08-28 02:22:25.798440 I | auth: deleting token tkBVjRkrqeNTbVEY.218 for user conductor
2021-08-28 02:22:28.445725 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (949.281419ms) to execute
2021-08-28 02:22:28.798443 I | auth: deleting token riOQWPVKdOLwnWkW.219 for user conductor
2021-08-28 02:22:28.955799 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:29.798415 I | auth: deleting token HgOwpKQorXgsGwur.220 for user conductor
2021-08-28 02:22:29.798459 I | auth: deleting token xrVtgitBIhyNgMWM.221 for user conductor
2021-08-28 02:22:30.797001 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (142.199186ms) to execute
2021-08-28 02:22:31.798378 I | auth: deleting token yVsQKlNdyVWZOzBI.222 for user conductor
2021-08-28 02:22:32.798422 I | auth: deleting token dCyKaMxYKskkFGKC.224 for user conductor
2021-08-28 02:22:32.798455 I | auth: deleting token wpvcOnFLsWZDPeUW.223 for user conductor
2021-08-28 02:22:33.956032 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:35.645817 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.047030007s) to execute
2021-08-28 02:22:36.798406 I | auth: deleting token aQqzPVZdHOLoHoRk.225 for user conductor
2021-08-28 02:22:38.956337 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:39.244367 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (948.151253ms) to execute
2021-08-28 02:22:40.348566 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.050650827s) to execute
2021-08-28 02:22:40.798429 I | auth: deleting token BNWqXixZUpvkWcLu.226 for user conductor
2021-08-28 02:22:43.798385 I | auth: deleting token dtabRfVIHxpcgneb.228 for user conductor
2021-08-28 02:22:43.956542 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:47.798417 I | auth: deleting token XWFhONOTAIySvwXS.229 for user conductor
2021-08-28 02:22:48.798456 I | auth: deleting token BQUcUdgRKcWOTIzo.230 for user conductor
2021-08-28 02:22:48.956725 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:49.798386 I | auth: deleting token mcwbYhOnIHqnqbpQ.232 for user conductor
2021-08-28 02:22:51.750858 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (454.449434ms) to execute
2021-08-28 02:22:51.798428 I | auth: deleting token wBNwCkubmIPEPlSk.234 for user conductor
2021-08-28 02:22:51.798458 I | auth: deleting token VgfpDkTtgxhmFdVZ.236 for user conductor
2021-08-28 02:22:52.951779 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.055577525s) to execute
2021-08-28 02:22:53.096503 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (142.439958ms) to execute
2021-08-28 02:22:53.956944 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused
2021-08-28 02:22:54.843808 I | auth: deleting token vnSjesnTFzbhxQuU.241 for user conductor
2021-08-28 02:22:54.843846 I | auth: deleting token FJnKgyvQFXSrssbM.238 for user conductor
2021-08-28 02:22:54.843854 I | auth: deleting token EldLSPkswqzujitL.239 for user conductor
2021-08-28 02:22:55.448613 W | etcdserver: request "header: