Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd' Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up Skipping self-checking Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up 2021-08-28 02:11:08.346575 I | etcdmain: etcd Version: 3.2.24 2021-08-28 02:11:08.346715 I | etcdmain: Git SHA: 420a45226 2021-08-28 02:11:08.346720 I | etcdmain: Go Version: go1.8.7 2021-08-28 02:11:08.346724 I | etcdmain: Go OS/Arch: linux/amd64 2021-08-28 02:11:08.346728 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16 2021-08-28 02:11:08.346853 I | embed: listening for peers on http://0.0.0.0:2380 2021-08-28 02:11:08.346956 I | embed: listening for client requests on 0.0.0.0:2379 2021-08-28 02:11:08.357374 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.67.235:2380 2021-08-28 02:11:08.357919 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.67.235:2380 2021-08-28 02:11:08.396867 I | etcdserver: name = onap-oof-has-etcd-1 2021-08-28 02:11:08.396896 I | etcdserver: data dir = /var/run/etcd/default.etcd 2021-08-28 02:11:08.396903 I | etcdserver: member dir = /var/run/etcd/default.etcd/member 2021-08-28 02:11:08.396907 I | etcdserver: heartbeat = 100ms 2021-08-28 02:11:08.396910 I | etcdserver: election = 1000ms 2021-08-28 02:11:08.396914 I | etcdserver: snapshot count = 100000 2021-08-28 02:11:08.396924 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2379 2021-08-28 02:11:08.396930 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2380 2021-08-28 02:11:08.443798 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380 2021-08-28 02:11:08.451376 I | etcdserver: starting member 72b38cc930a2fa6f in cluster e8b03869cbf54258 2021-08-28 02:11:08.451486 I | raft: 72b38cc930a2fa6f became follower at term 0 2021-08-28 02:11:08.451551 I | raft: newRaft 72b38cc930a2fa6f [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0] 2021-08-28 02:11:08.451560 I | raft: 72b38cc930a2fa6f became follower at term 1 2021-08-28 02:11:08.457747 W | auth: simple token is not cryptographically signed 2021-08-28 02:11:08.460166 I | rafthttp: starting peer 2d249ba41c7e44fa... 2021-08-28 02:11:08.460219 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa 2021-08-28 02:11:08.545371 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer) 2021-08-28 02:11:08.545515 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer) 2021-08-28 02:11:08.548925 I | rafthttp: started peer 2d249ba41c7e44fa 2021-08-28 02:11:08.548975 I | rafthttp: added peer 2d249ba41c7e44fa 2021-08-28 02:11:08.548989 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader) 2021-08-28 02:11:08.549013 I | rafthttp: starting peer 8aae4c350a2413a5... 2021-08-28 02:11:08.549067 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5 2021-08-28 02:11:08.549101 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader) 2021-08-28 02:11:08.643938 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer) 2021-08-28 02:11:08.644001 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer) 2021-08-28 02:11:08.645024 I | rafthttp: started peer 8aae4c350a2413a5 2021-08-28 02:11:08.645057 I | rafthttp: added peer 8aae4c350a2413a5 2021-08-28 02:11:08.645105 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader) 2021-08-28 02:11:08.645163 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided] 2021-08-28 02:11:08.645387 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader) 2021-08-28 02:11:08.646743 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258 2021-08-28 02:11:08.646872 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258 2021-08-28 02:11:08.646935 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258 2021-08-28 02:11:08.897806 I | rafthttp: peer 8aae4c350a2413a5 became active 2021-08-28 02:11:08.897879 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 reader) 2021-08-28 02:11:08.897964 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message reader) 2021-08-28 02:11:09.003295 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message writer) 2021-08-28 02:11:09.003462 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 writer) 2021-08-28 02:11:10.352936 I | raft: 72b38cc930a2fa6f is starting a new election at term 1 2021-08-28 02:11:10.353069 I | raft: 72b38cc930a2fa6f became candidate at term 2 2021-08-28 02:11:10.353099 I | raft: 72b38cc930a2fa6f received MsgVoteResp from 72b38cc930a2fa6f at term 2 2021-08-28 02:11:10.353110 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 8aae4c350a2413a5 at term 2 2021-08-28 02:11:10.353119 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 2d249ba41c7e44fa at term 2 2021-08-28 02:11:10.512931 I | raft: 72b38cc930a2fa6f [term: 2] received a MsgVote message with higher term from 8aae4c350a2413a5 [term: 275] 2021-08-28 02:11:10.512970 I | raft: 72b38cc930a2fa6f became follower at term 275 2021-08-28 02:11:10.512981 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3, vote: 0] cast MsgVote for 8aae4c350a2413a5 [logterm: 1, index: 3] at term 275 2021-08-28 02:11:10.514454 I | raft: raft.node: 72b38cc930a2fa6f elected leader 8aae4c350a2413a5 at term 275 2021-08-28 02:11:10.517718 I | embed: ready to serve client requests 2021-08-28 02:11:10.517852 I | etcdserver: published {Name:onap-oof-has-etcd-1 ClientURLs:[http://onap-oof-has-etcd-1.oof-has-etcd:2379]} to cluster e8b03869cbf54258 2021-08-28 02:11:10.518076 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged! 2021-08-28 02:11:10.998633 N | etcdserver/membership: set the initial cluster version to 3.0 2021-08-28 02:11:10.998728 I | etcdserver/api: enabled capabilities for version 3.0 2021-08-28 02:11:13.549346 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:11:18.549542 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:11:23.549766 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:11:28.549911 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:11:32.450050 N | auth: added a new user: root 2021-08-28 02:11:32.450353 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.15403843s) to execute 2021-08-28 02:11:33.550084 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:11:36.346189 N | auth: added a new user: conductor 2021-08-28 02:11:36.346318 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.147104528s) to execute 2021-08-28 02:11:38.550343 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:11:39.501162 N | auth: Role conductor is created 2021-08-28 02:11:39.897643 N | auth: role conductor's permission of key conductor is updated as READWRITE 2021-08-28 02:11:40.199469 N | auth: granted role conductor to user conductor 2021-08-28 02:11:40.696219 N | auth: Role root is created 2021-08-28 02:11:40.699918 N | auth: granted role root to user root 2021-08-28 02:11:40.797998 N | auth: Authentication enabled 2021-08-28 02:11:43.550496 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:11:48.550733 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:11:53.550947 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:11:58.551130 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:03.551278 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:08.551532 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:13.551701 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:18.552000 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:23.552277 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:28.552474 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:33.552656 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:38.552832 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:43.553034 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:48.553238 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:53.553433 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:12:58.553613 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:03.553778 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:08.553968 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:13.554150 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:18.643819 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:19.645348 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.10130197s) to execute 2021-08-28 02:13:22.249453 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.051444625s) to execute 2021-08-28 02:13:23.644032 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:25.148668 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.351439206s) to execute 2021-08-28 02:13:27.747165 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.101979754s) to execute 2021-08-28 02:13:28.743923 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:30.552260 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.008316062s) to execute 2021-08-28 02:13:31.946219 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (749.942352ms) to execute 2021-08-28 02:13:33.744152 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:38.744339 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:43.744578 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:48.744856 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:53.745042 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:56.745288 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.401354149s) to execute 2021-08-28 02:13:56.896437 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (149.044313ms) to execute 2021-08-28 02:13:56.898173 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (150.211174ms) to execute 2021-08-28 02:13:58.745378 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:13:59.448210 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.295044118s) to execute 2021-08-28 02:14:00.745292 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.199602651s) to execute 2021-08-28 02:14:00.745418 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.201465825s) to execute 2021-08-28 02:14:03.252299 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (956.149571ms) to execute 2021-08-28 02:14:03.745580 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:05.950075 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.004683323s) to execute 2021-08-28 02:14:06.096524 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (144.232224ms) to execute 2021-08-28 02:14:08.745783 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:08.747150 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.301337916s) to execute 2021-08-28 02:14:08.996283 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (152.075889ms) to execute 2021-08-28 02:14:13.451242 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.055025119s) to execute 2021-08-28 02:14:13.746133 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:16.150622 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.054086786s) to execute 2021-08-28 02:14:18.746339 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:18.751536 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.105813077s) to execute 2021-08-28 02:14:21.543999 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.043211703s) to execute 2021-08-28 02:14:23.746615 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:28.746912 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:33.747095 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:34.545993 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.248295883s) to execute 2021-08-28 02:14:35.848963 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.300820442s) to execute 2021-08-28 02:14:35.849220 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.301178808s) to execute 2021-08-28 02:14:37.244794 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (1.393374777s) to execute 2021-08-28 02:14:37.244874 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.300851624s) to execute 2021-08-28 02:14:38.450143 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.106163784s) to execute 2021-08-28 02:14:38.844050 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:40.047189 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.400907629s) to execute 2021-08-28 02:14:41.445476 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (1.297136404s) to execute 2021-08-28 02:14:41.445611 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (349.242462ms) to execute 2021-08-28 02:14:43.844251 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:48.844511 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:53.844727 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:14:58.844898 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:03.845117 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:08.845322 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:10.045309 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (749.056533ms) to execute 2021-08-28 02:15:13.845494 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:18.845773 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:23.845993 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:24.546654 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (550.402207ms) to execute 2021-08-28 02:15:25.844941 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.100770115s) to execute 2021-08-28 02:15:28.652569 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.008247737s) to execute 2021-08-28 02:15:28.846198 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:29.950941 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.106443302s) to execute 2021-08-28 02:15:30.096177 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (142.801258ms) to execute 2021-08-28 02:15:30.296848 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (152.9144ms) to execute 2021-08-28 02:15:33.344072 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (499.990742ms) to execute 2021-08-28 02:15:33.697760 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.855844ms) to execute 2021-08-28 02:15:33.846372 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:37.646794 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (802.848839ms) to execute 2021-08-28 02:15:38.846588 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:41.051861 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (652.714539ms) to execute 2021-08-28 02:15:43.846789 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:45.146522 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (702.549613ms) to execute 2021-08-28 02:15:48.452934 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (354.946184ms) to execute 2021-08-28 02:15:48.846998 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:52.746595 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (702.7239ms) to execute 2021-08-28 02:15:53.847223 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:15:54.047437 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.20169355s) to execute 2021-08-28 02:15:54.196471 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (146.581043ms) to execute 2021-08-28 02:15:56.648267 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (452.126058ms) to execute 2021-08-28 02:15:57.946788 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102816743s) to execute 2021-08-28 02:15:58.501139 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (501.173229ms) to execute 2021-08-28 02:15:58.847437 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:16:00.946349 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.050176127s) to execute 2021-08-28 02:16:01.096352 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (147.907174ms) to execute 2021-08-28 02:16:03.649672 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.251791358s) to execute 2021-08-28 02:16:03.847725 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:16:05.050282 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (851.164358ms) to execute 2021-08-28 02:16:08.447419 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (650.816883ms) to execute 2021-08-28 02:16:08.847890 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:16:13.848101 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:16:18.848405 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:16:23.848605 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:16:28.848803 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:16:33.544106 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.045968823s) to execute 2021-08-28 02:16:33.849027 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:16:37.446163 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.049902593s) to execute 2021-08-28 02:16:38.647479 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.198469401s) to execute 2021-08-28 02:16:38.849214 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:16:42.246715 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.596441481s) to execute 2021-08-28 02:16:42.246912 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (3.597080524s) to execute 2021-08-28 02:16:43.849441 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:16:44.747588 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.149785311s) to execute 2021-08-28 02:16:45.849811 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (1.100142448s) to execute 2021-08-28 02:16:45.849905 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.004110697s) to execute 2021-08-28 02:16:46.096260 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (227.134632ms) to execute 2021-08-28 02:16:48.849660 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:16:49.849203 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (103.135435ms) to execute 2021-08-28 02:16:53.849905 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:16:54.446986 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (702.822584ms) to execute 2021-08-28 02:16:57.146074 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (149.820311ms) to execute 2021-08-28 02:16:58.850096 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:03.850318 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:08.850539 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:13.850740 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:18.850970 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused proto: no coders for int proto: no encoder for ValueSize int [GetProperties] 2021-08-28 02:17:22.351844 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (955.24342ms) to execute 2021-08-28 02:17:23.851197 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:28.851482 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:29.548344 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (752.216517ms) to execute 2021-08-28 02:17:33.851644 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:38.851873 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:43.852137 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:48.852331 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:51.346096 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (545.818367ms) to execute 2021-08-28 02:17:53.852566 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:53.947524 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.149918952s) to execute 2021-08-28 02:17:55.798468 I | auth: deleting token ZcrDqcqabpjltZoL.17 for user conductor 2021-08-28 02:17:58.852792 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:17:59.052157 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.508134425s) to execute 2021-08-28 02:17:59.798403 I | auth: deleting token suhfLpWYbLGtKiqC.19 for user conductor 2021-08-28 02:18:00.350829 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (954.248067ms) to execute 2021-08-28 02:18:00.798491 I | auth: deleting token JNtkbUOcWTRxBejG.21 for user conductor 2021-08-28 02:18:01.798420 I | auth: deleting token PhzPdOeuOZfEVpEw.23 for user conductor 2021-08-28 02:18:02.651517 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.207597039s) to execute 2021-08-28 02:18:03.798534 I | auth: deleting token CCIlPvoibVTsUoXN.25 for user conductor 2021-08-28 02:18:03.852909 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:04.843765 I | auth: deleting token TfNaYyOJGgkxqnxi.27 for user conductor 2021-08-28 02:18:05.144790 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.100790646s) to execute 2021-08-28 02:18:06.452763 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (356.446186ms) to execute 2021-08-28 02:18:06.843812 I | auth: deleting token mDzoZpzpksHlOIRy.29 for user conductor 2021-08-28 02:18:07.553352 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.054886548s) to execute 2021-08-28 02:18:07.798386 I | auth: deleting token RWfyebdRpetsHFAg.31 for user conductor 2021-08-28 02:18:08.843780 I | auth: deleting token tYeWSRxTcVxhYEKs.33 for user conductor 2021-08-28 02:18:08.943798 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:10.051804 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (854.530576ms) to execute 2021-08-28 02:18:10.297580 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (153.412653ms) to execute 2021-08-28 02:18:12.651555 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.153629792s) to execute 2021-08-28 02:18:12.796475 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (142.741706ms) to execute 2021-08-28 02:18:12.798340 I | auth: deleting token LPqUJZuXTdjvBhVE.35 for user conductor 2021-08-28 02:18:13.798383 I | auth: deleting token JeKNRGAgtFFoqkvy.36 for user conductor 2021-08-28 02:18:13.944020 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:14.843826 I | auth: deleting token IiUlRTHRrnfyVczy.37 for user conductor 2021-08-28 02:18:15.147554 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.249351475s) to execute 2021-08-28 02:18:16.843847 I | auth: deleting token XgCbANQxRAClanuP.38 for user conductor 2021-08-28 02:18:17.649163 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102564013s) to execute 2021-08-28 02:18:17.796534 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (145.213637ms) to execute 2021-08-28 02:18:18.944225 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:19.798426 I | auth: deleting token GezAZepnovpHcsES.39 for user conductor 2021-08-28 02:18:19.798467 I | auth: deleting token ewWjtDCfBTAduXfm.40 for user conductor 2021-08-28 02:18:22.798370 I | auth: deleting token EPcjoDmTEENgXqnP.43 for user conductor 2021-08-28 02:18:22.798411 I | auth: deleting token XeFPwQzYJEIyCSos.44 for user conductor 2021-08-28 02:18:22.798434 I | auth: deleting token mXAFFkgPBFdcRqlB.45 for user conductor 2021-08-28 02:18:23.944483 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:25.798433 I | auth: deleting token nfdNWjKBfZAAGvBt.48 for user conductor 2021-08-28 02:18:25.798481 I | auth: deleting token jDMUDSRhFkUiKzet.49 for user conductor 2021-08-28 02:18:27.798515 I | auth: deleting token CAsNpBdaUBEDglOH.52 for user conductor 2021-08-28 02:18:28.798389 I | auth: deleting token MucAJcwIDwAQBgzL.53 for user conductor 2021-08-28 02:18:28.798431 I | auth: deleting token lPyJXqbdoeGjAkzV.51 for user conductor 2021-08-28 02:18:28.944806 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:30.798440 I | auth: deleting token yeWKWmnDHjcBlVMv.56 for user conductor 2021-08-28 02:18:30.798483 I | auth: deleting token lgUTzmRiFvordvlm.55 for user conductor 2021-08-28 02:18:32.798483 I | auth: deleting token SnZmjnBtOlVgsTNt.59 for user conductor 2021-08-28 02:18:32.798522 I | auth: deleting token gzSRbpeCCysxSOaF.58 for user conductor 2021-08-28 02:18:33.944964 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:34.798447 I | auth: deleting token ZFczuWSRegngzhaM.60 for user conductor 2021-08-28 02:18:35.351511 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.053447496s) to execute 2021-08-28 02:18:35.843862 I | auth: deleting token FeRudXUfUdSdEPOJ.61 for user conductor 2021-08-28 02:18:37.837993 I | auth: deleting token WuMdZIRMOJnqsbtg.62 for user conductor 2021-08-28 02:18:37.850905 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.654400367s) to execute 2021-08-28 02:18:38.945119 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:39.050314 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.196226095s) to execute 2021-08-28 02:18:40.798426 I | auth: deleting token miuEflJvXeLUawGE.63 for user conductor 2021-08-28 02:18:41.546408 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.693691931s) to execute 2021-08-28 02:18:41.546580 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.400450349s) to execute 2021-08-28 02:18:41.547036 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.402992258s) to execute 2021-08-28 02:18:43.945248 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:45.049118 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.005036332s) to execute 2021-08-28 02:18:45.196467 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (144.891134ms) to execute 2021-08-28 02:18:45.198319 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.627742ms) to execute 2021-08-28 02:18:45.798439 I | auth: deleting token aRVwaYUSpSsAJObm.64 for user conductor 2021-08-28 02:18:47.744430 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.045801349s) to execute 2021-08-28 02:18:48.945434 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.101431135s) to execute 2021-08-28 02:18:48.945549 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.198884097s) to execute 2021-08-28 02:18:48.945881 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:49.798381 I | auth: deleting token yhlelfiRNlbKWQee.65 for user conductor 2021-08-28 02:18:51.345249 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.39730065s) to execute 2021-08-28 02:18:51.345394 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.297932582s) to execute 2021-08-28 02:18:51.345496 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.193819766s) to execute 2021-08-28 02:18:52.544783 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.145773717s) to execute 2021-08-28 02:18:53.798409 I | auth: deleting token JidGXGoKxwJTprLI.66 for user conductor 2021-08-28 02:18:53.946088 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:18:55.848194 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.004187142s) to execute 2021-08-28 02:18:55.996325 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.300495ms) to execute 2021-08-28 02:18:57.798432 I | auth: deleting token lLugLClRURgMbGVu.69 for user conductor 2021-08-28 02:18:57.798471 I | auth: deleting token KNVRiFxUHjtjTfFZ.67 for user conductor 2021-08-28 02:18:57.798482 I | auth: deleting token UNflkOgrKoBiDVHf.68 for user conductor 2021-08-28 02:18:58.450037 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.753491061s) to execute 2021-08-28 02:18:58.946274 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:00.889458 I | auth: deleting token qPMvOflGqJrXoiyB.70 for user conductor 2021-08-28 02:19:00.889525 I | auth: deleting token dtkpmjwQLGGbWLtk.71 for user conductor 2021-08-28 02:19:01.145346 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201468512s) to execute 2021-08-28 02:19:01.296582 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.101332ms) to execute 2021-08-28 02:19:01.298308 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.142527ms) to execute 2021-08-28 02:19:01.843771 I | auth: deleting token XGnUBUQQvuzFvqrC.72 for user conductor 2021-08-28 02:19:03.646953 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201071872s) to execute 2021-08-28 02:19:03.798408 I | auth: deleting token OPlbvvpqePqRRpuC.74 for user conductor 2021-08-28 02:19:03.798455 I | auth: deleting token iMwjjyLVHWJbqguI.73 for user conductor 2021-08-28 02:19:03.946463 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:04.846720 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.050574868s) to execute 2021-08-28 02:19:04.846897 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.10290161s) to execute 2021-08-28 02:19:06.798444 I | auth: deleting token cGOceOtMhtIhcJIi.76 for user conductor 2021-08-28 02:19:06.798533 I | auth: deleting token VmMGqltpNXbEkIkY.75 for user conductor 2021-08-28 02:19:06.798566 I | auth: deleting token ctHpEwYxtUPSAMTm.77 for user conductor 2021-08-28 02:19:07.247789 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.303669671s) to execute 2021-08-28 02:19:07.247911 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.202362321s) to execute 2021-08-28 02:19:08.449655 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.19926777s) to execute 2021-08-28 02:19:08.449806 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.199779977s) to execute 2021-08-28 02:19:08.946679 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:09.798440 I | auth: deleting token XpYUsWfDCdTbUDlG.79 for user conductor 2021-08-28 02:19:09.798478 I | auth: deleting token CtWhgZaAlxuDEzAz.78 for user conductor 2021-08-28 02:19:10.798453 I | auth: deleting token zvdqWTxNGuFfZicc.80 for user conductor 2021-08-28 02:19:10.945467 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.492753958s) to execute 2021-08-28 02:19:10.945721 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.493938524s) to execute 2021-08-28 02:19:11.798514 I | auth: deleting token WWjNjtjqYAOTMtaY.81 for user conductor 2021-08-28 02:19:12.145902 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.197753262s) to execute 2021-08-28 02:19:12.146356 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.198899738s) to execute 2021-08-28 02:19:13.444874 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.295802407s) to execute 2021-08-28 02:19:13.445042 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.296479764s) to execute 2021-08-28 02:19:13.843768 I | auth: deleting token abVDOrzfXYrcxEoP.82 for user conductor 2021-08-28 02:19:13.843833 I | auth: deleting token uUXXqwRmLgrtJgiQ.83 for user conductor 2021-08-28 02:19:13.946887 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:14.651056 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203028076s) to execute 2021-08-28 02:19:14.651268 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.204411788s) to execute 2021-08-28 02:19:16.798451 I | auth: deleting token kaylwjZbiwFfqwnq.84 for user conductor 2021-08-28 02:19:16.798499 I | auth: deleting token VyxkECyWfquBARNx.85 for user conductor 2021-08-28 02:19:16.798523 I | auth: deleting token WbOUChpggmlKQGBw.86 for user conductor 2021-08-28 02:19:18.349050 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.695960626s) to execute 2021-08-28 02:19:18.349198 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.550989705s) to execute 2021-08-28 02:19:18.349309 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.302287794s) to execute 2021-08-28 02:19:18.546268 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.120193ms) to execute 2021-08-28 02:19:18.947068 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:19.745229 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.299122174s) to execute 2021-08-28 02:19:19.745260 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.198973112s) to execute 2021-08-28 02:19:19.798421 I | auth: deleting token wtRRwPlptVWWDXMR.88 for user conductor 2021-08-28 02:19:19.798461 I | auth: deleting token otyyaBEChKEnqKVv.87 for user conductor 2021-08-28 02:19:20.946247 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.049797441s) to execute 2021-08-28 02:19:21.843825 I | auth: deleting token XEcnSSbLHAfEJGMW.90 for user conductor 2021-08-28 02:19:21.843870 I | auth: deleting token WmqcnhENwxjUrgIK.91 for user conductor 2021-08-28 02:19:21.843893 I | auth: deleting token ykSCdNJqLOSlTXIj.89 for user conductor 2021-08-28 02:19:22.245737 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.199643029s) to execute 2021-08-28 02:19:22.245920 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.20187877s) to execute 2021-08-28 02:19:23.545802 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (449.278272ms) to execute 2021-08-28 02:19:23.798470 I | auth: deleting token AslyVTFeZCcAsFVo.92 for user conductor 2021-08-28 02:19:23.947276 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:27.798474 I | auth: deleting token zuSoiwfYwdQuDtnP.93 for user conductor 2021-08-28 02:19:28.947514 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:32.798406 I | auth: deleting token bnIGjJZkkJhloSgD.94 for user conductor 2021-08-28 02:19:33.947756 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:36.798431 I | auth: deleting token PsBUsfoppCFCCYfb.95 for user conductor 2021-08-28 02:19:36.798471 I | auth: deleting token FdxoccvxsZdNNnJG.96 for user conductor 2021-08-28 02:19:36.798480 I | auth: deleting token uaaRVEUXchBhAsXW.97 for user conductor 2021-08-28 02:19:38.843857 I | auth: deleting token RlqhBCuwhXzFLUxE.98 for user conductor 2021-08-28 02:19:38.948015 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:38.950620 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.052095606s) to execute 2021-08-28 02:19:40.151687 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.107749685s) to execute 2021-08-28 02:19:40.297339 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (143.450334ms) to execute 2021-08-28 02:19:40.798417 I | auth: deleting token ieWLhiEBmGzZBRdT.99 for user conductor 2021-08-28 02:19:40.798459 I | auth: deleting token kwUjcBmYDhCVTRbg.101 for user conductor 2021-08-28 02:19:41.798394 I | auth: deleting token jfweTSSJCjZHhSGC.103 for user conductor 2021-08-28 02:19:41.798427 I | auth: deleting token vbbwIVVResqHXZMo.102 for user conductor 2021-08-28 02:19:43.749418 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.953266714s) to execute 2021-08-28 02:19:43.948252 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:45.798458 I | auth: deleting token QbFJUVCeBrUtETuy.105 for user conductor 2021-08-28 02:19:48.798399 I | auth: deleting token IPxahPQuvtFydseM.106 for user conductor 2021-08-28 02:19:48.948433 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:52.798453 I | auth: deleting token oLyHIlNexagKeojj.107 for user conductor 2021-08-28 02:19:53.948749 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:56.798434 I | auth: deleting token qYGvEjvVzkvCfcyf.109 for user conductor 2021-08-28 02:19:58.948992 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:19:59.798404 I | auth: deleting token vmuedFFyPaeLrsrr.110 for user conductor 2021-08-28 02:20:02.798369 I | auth: deleting token MbBuneUUOXfHmwCB.111 for user conductor 2021-08-28 02:20:03.949206 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:04.046178 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.147831817s) to execute 2021-08-28 02:20:05.247105 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (950.549275ms) to execute 2021-08-28 02:20:05.798462 I | auth: deleting token IAXuQWvAxlKtmDDI.112 for user conductor 2021-08-28 02:20:07.647614 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.398026795s) to execute 2021-08-28 02:20:07.647710 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.251126522s) to execute 2021-08-28 02:20:07.798468 I | auth: deleting token UfRasmLAnEoUvUZQ.113 for user conductor 2021-08-28 02:20:08.798393 I | auth: deleting token bUNukkZwbSyRqydC.115 for user conductor 2021-08-28 02:20:08.948816 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.20251972s) to execute 2021-08-28 02:20:08.949398 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:10.145911 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.049635623s) to execute 2021-08-28 02:20:10.798425 I | auth: deleting token aXgbTlKxudOJKlIA.118 for user conductor 2021-08-28 02:20:10.798460 I | auth: deleting token MFkifeLVXrUwnOwQ.117 for user conductor 2021-08-28 02:20:11.798407 I | auth: deleting token eejLsqBSYIhglVwT.120 for user conductor 2021-08-28 02:20:12.798433 I | auth: deleting token PhRgqDyuygBvHrEx.122 for user conductor 2021-08-28 02:20:13.949604 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:16.798406 I | auth: deleting token QoqXLASSJwCjzyUE.123 for user conductor 2021-08-28 02:20:18.798444 I | auth: deleting token hkUZSeKzklMJMakl.124 for user conductor 2021-08-28 02:20:18.949835 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:20.798445 I | auth: deleting token jttncQFIZxEqqdhF.126 for user conductor 2021-08-28 02:20:22.798407 I | auth: deleting token uihbTeROECbPzsJZ.127 for user conductor 2021-08-28 02:20:23.798440 I | auth: deleting token bSYnUNhVMXCGDxLe.128 for user conductor 2021-08-28 02:20:23.950038 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:24.798415 I | auth: deleting token bQvLSVJkaqAgnwhb.130 for user conductor 2021-08-28 02:20:25.596026 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (195.533122ms) to execute 2021-08-28 02:20:26.798434 I | auth: deleting token vtsFiFecBFPYhKaO.132 for user conductor 2021-08-28 02:20:26.798575 I | auth: deleting token WkZOLCyPaisIgEgO.131 for user conductor 2021-08-28 02:20:28.052201 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (756.052543ms) to execute 2021-08-28 02:20:28.798449 I | auth: deleting token bOExoDEKuAfAPaOx.136 for user conductor 2021-08-28 02:20:28.798501 I | auth: deleting token ppDvpLrpTcDJJhwJ.134 for user conductor 2021-08-28 02:20:28.798521 I | auth: deleting token JJiBybCjZJAUjDCi.135 for user conductor 2021-08-28 02:20:28.950188 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:29.245297 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.099185214s) to execute 2021-08-28 02:20:30.446058 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.049612466s) to execute 2021-08-28 02:20:30.596951 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (148.709913ms) to execute 2021-08-28 02:20:30.798440 I | auth: deleting token sfrUViiEkIllVUjY.139 for user conductor 2021-08-28 02:20:30.798492 I | auth: deleting token NiPWgDgKMhkCiDHm.140 for user conductor 2021-08-28 02:20:30.798508 I | auth: deleting token oOmXiHIzSvPvvQSN.137 for user conductor 2021-08-28 02:20:33.248799 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103320789s) to execute 2021-08-28 02:20:33.396444 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (145.610662ms) to execute 2021-08-28 02:20:33.798435 I | auth: deleting token HoMGQTApFaDWWbfE.142 for user conductor 2021-08-28 02:20:33.798476 I | auth: deleting token hGJoiamIyhQZeCgE.141 for user conductor 2021-08-28 02:20:33.950388 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:35.798414 I | auth: deleting token oNIasGzYtlQumZZz.143 for user conductor 2021-08-28 02:20:36.798453 I | auth: deleting token dVELxHBUvUPQpNva.144 for user conductor 2021-08-28 02:20:37.798442 I | auth: deleting token zpNRuqSJSXPxGmjz.145 for user conductor 2021-08-28 02:20:38.798427 I | auth: deleting token gSzmDMPiwjyFsSUT.146 for user conductor 2021-08-28 02:20:38.950603 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:41.798454 I | auth: deleting token utEkQxuEzTeNOxAB.147 for user conductor 2021-08-28 02:20:41.798506 I | auth: deleting token gDyeOXRUajjxcTrB.148 for user conductor 2021-08-28 02:20:42.798416 I | auth: deleting token beVmgoiakvzgTBEG.149 for user conductor 2021-08-28 02:20:43.950850 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:44.844022 I | auth: deleting token mochOXMiOmFwwZVS.150 for user conductor 2021-08-28 02:20:45.798454 I | auth: deleting token NVImOqMzbgoHhQrc.152 for user conductor 2021-08-28 02:20:45.798498 I | auth: deleting token HhytBpsiYQygeaDe.151 for user conductor 2021-08-28 02:20:45.846173 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (449.90723ms) to execute 2021-08-28 02:20:47.051336 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201978647s) to execute 2021-08-28 02:20:48.798413 I | auth: deleting token wiXACmMJTjHADavJ.154 for user conductor 2021-08-28 02:20:48.798454 I | auth: deleting token GFMbsTjQSXHJWQeJ.153 for user conductor 2021-08-28 02:20:48.951104 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:50.649297 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.502855557s) to execute 2021-08-28 02:20:50.843850 I | auth: deleting token eAYjlgRMDspNsRSD.155 for user conductor 2021-08-28 02:20:51.798387 I | auth: deleting token bwIdqffqwpSDlHEk.156 for user conductor 2021-08-28 02:20:51.944105 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.292381215s) to execute 2021-08-28 02:20:51.944159 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.200100628s) to execute 2021-08-28 02:20:51.944353 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.198643466s) to execute 2021-08-28 02:20:52.798416 I | auth: deleting token tcVARaHhEuWsOTCf.157 for user conductor 2021-08-28 02:20:53.052958 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.008991954s) to execute 2021-08-28 02:20:53.951308 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:54.798429 I | auth: deleting token wxcyBxGForPkTnQH.158 for user conductor 2021-08-28 02:20:54.798477 I | auth: deleting token zSKtnKClVWRyrJDq.159 for user conductor 2021-08-28 02:20:55.551553 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.307617749s) to execute 2021-08-28 02:20:55.697704 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (143.955528ms) to execute 2021-08-28 02:20:56.798397 I | auth: deleting token WvMUQEKemsnUKxzL.160 for user conductor 2021-08-28 02:20:58.798437 I | auth: deleting token YxyDxpZZAKefOphR.161 for user conductor 2021-08-28 02:20:58.798485 I | auth: deleting token DdEDfaRvmAnBPsLQ.162 for user conductor 2021-08-28 02:20:58.951560 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:20:59.347226 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.399978775s) to execute 2021-08-28 02:21:00.647580 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203647263s) to execute 2021-08-28 02:21:00.647787 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.298400345s) to execute 2021-08-28 02:21:00.647851 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.298431322s) to execute 2021-08-28 02:21:00.798379 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (148.5063ms) to execute 2021-08-28 02:21:01.798381 I | auth: deleting token nhocvILvbwPRxfNb.163 for user conductor 2021-08-28 02:21:01.798428 I | auth: deleting token xkdZSoaqMMBkbgZJ.165 for user conductor 2021-08-28 02:21:01.798450 I | auth: deleting token czUQxqMVCEAJCKQw.164 for user conductor 2021-08-28 02:21:03.148149 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.347933295s) to execute 2021-08-28 02:21:03.148240 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.750413624s) to execute 2021-08-28 02:21:03.798435 I | auth: deleting token RiVpcsFlRMIaSMOS.167 for user conductor 2021-08-28 02:21:03.798476 I | auth: deleting token pPGJdNLEfZnDqWtA.166 for user conductor 2021-08-28 02:21:03.951788 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:04.350657 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.153038141s) to execute 2021-08-28 02:21:04.350911 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.107135214s) to execute 2021-08-28 02:21:05.649989 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (548.593878ms) to execute 2021-08-28 02:21:05.798442 I | auth: deleting token cILFbfEVEeCbQwnx.168 for user conductor 2021-08-28 02:21:05.798482 I | auth: deleting token BeeVPTSejiiCOLCi.169 for user conductor 2021-08-28 02:21:06.850698 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.054091217s) to execute 2021-08-28 02:21:06.996132 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (143.2162ms) to execute 2021-08-28 02:21:08.843818 I | auth: deleting token RioXcYhGhAHmDaFI.170 for user conductor 2021-08-28 02:21:08.843867 I | auth: deleting token nMqJTIhokWYoKzMp.171 for user conductor 2021-08-28 02:21:08.952074 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:09.546748 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102774415s) to execute 2021-08-28 02:21:10.798378 I | auth: deleting token uEhHkUajgwTeCmju.173 for user conductor 2021-08-28 02:21:10.798433 I | auth: deleting token GzxQzqJXEHmRnpyW.172 for user conductor 2021-08-28 02:21:13.952274 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:15.798405 I | auth: deleting token JdLAjNbVzXepmHxO.174 for user conductor 2021-08-28 02:21:18.798472 I | auth: deleting token ITsuAXbotQYtTJRt.175 for user conductor 2021-08-28 02:21:18.952897 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:21.798391 I | auth: deleting token teXYBprLaCuqaRwn.176 for user conductor 2021-08-28 02:21:23.953093 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:25.843811 I | auth: deleting token hFyFOmQGzckxUwsH.177 for user conductor 2021-08-28 02:21:28.953268 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:29.798405 I | auth: deleting token pMAqeJfhtmbsfmfK.178 for user conductor 2021-08-28 02:21:30.798435 I | auth: deleting token oLaKaOjDtPnHGEwF.179 for user conductor 2021-08-28 02:21:31.153167 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (955.239565ms) to execute 2021-08-28 02:21:31.244075 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.045869059s) to execute 2021-08-28 02:21:32.549710 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.051404235s) to execute 2021-08-28 02:21:33.798470 I | auth: deleting token kEhivHAOSEJeHybD.181 for user conductor 2021-08-28 02:21:33.798533 I | auth: deleting token xXTofEFsAzImMumZ.180 for user conductor 2021-08-28 02:21:33.845967 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.14773209s) to execute 2021-08-28 02:21:33.953464 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:35.151127 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (954.526081ms) to execute 2021-08-28 02:21:35.843839 I | auth: deleting token jBvhketKISbBPsdM.182 for user conductor 2021-08-28 02:21:36.798408 I | auth: deleting token jbfAzeXCPWpEttXg.183 for user conductor 2021-08-28 02:21:37.546480 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.392141236s) to execute 2021-08-28 02:21:37.796627 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (247.691503ms) to execute 2021-08-28 02:21:37.798398 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (200.081291ms) to execute 2021-08-28 02:21:37.798522 I | auth: deleting token TLCfPRlvFJjYZqex.184 for user conductor 2021-08-28 02:21:38.948570 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (752.222055ms) to execute 2021-08-28 02:21:38.953641 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:42.798378 I | auth: deleting token HrPuwisdxEUuNKNN.189 for user conductor 2021-08-28 02:21:42.798422 I | auth: deleting token lHsIrkGnSleVDyKb.187 for user conductor 2021-08-28 02:21:42.798434 I | auth: deleting token QvUbSiRGYoqYWrBF.186 for user conductor 2021-08-28 02:21:42.798441 I | auth: deleting token XqielXKfZssUnDBa.190 for user conductor 2021-08-28 02:21:43.953834 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:45.798437 I | auth: deleting token NVZzXyFVDACNxWLY.191 for user conductor 2021-08-28 02:21:46.798440 I | auth: deleting token wOIIJoRLYkbNWFCb.188 for user conductor 2021-08-28 02:21:46.798489 I | auth: deleting token pzVijyZQVWvaGQSA.193 for user conductor 2021-08-28 02:21:46.798499 I | auth: deleting token NKAUVtdXXaQimFIj.194 for user conductor 2021-08-28 02:21:46.798506 I | auth: deleting token VIybBcPgEoHCThjF.192 for user conductor 2021-08-28 02:21:47.798393 I | auth: deleting token oghWibXQrLxkqYHc.196 for user conductor 2021-08-28 02:21:48.798421 I | auth: deleting token THiowiLMxXQHwdjj.197 for user conductor 2021-08-28 02:21:48.954068 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:50.798352 I | auth: deleting token mEgRaALQTTUnBOBg.199 for user conductor 2021-08-28 02:21:50.798391 I | auth: deleting token oDkGqmkFoGwbwZMr.198 for user conductor 2021-08-28 02:21:52.949277 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.005217738s) to execute 2021-08-28 02:21:53.196726 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (245.468087ms) to execute 2021-08-28 02:21:53.843832 I | auth: deleting token txtCBhFWxHjUUjhI.200 for user conductor 2021-08-28 02:21:53.954271 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:21:54.843808 I | auth: deleting token xzZrdIUctWwGzMdp.201 for user conductor 2021-08-28 02:21:54.843861 I | auth: deleting token ZfRPWYtOfMUWhBdP.202 for user conductor 2021-08-28 02:21:55.644403 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.048069782s) to execute 2021-08-28 02:21:56.798396 I | auth: deleting token qkcAUbCSJJIwrdCJ.203 for user conductor 2021-08-28 02:21:57.798379 I | auth: deleting token KQeqCWDKeUYmwYxZ.204 for user conductor 2021-08-28 02:21:57.798488 I | auth: deleting token DhOPstWLnFRwlNTJ.205 for user conductor 2021-08-28 02:21:58.954573 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:00.798447 I | auth: deleting token TzuZqgTTvDjRuYFJ.206 for user conductor 2021-08-28 02:22:03.798418 I | auth: deleting token YtagfNSNOtnDYgyZ.207 for user conductor 2021-08-28 02:22:03.954787 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:07.798412 I | auth: deleting token qcuwRFosjLrugXyX.208 for user conductor 2021-08-28 02:22:08.954972 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:10.843973 I | auth: deleting token qVbCpeiZlkdCCpZr.209 for user conductor 2021-08-28 02:22:13.955131 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:14.745887 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.59689771s) to execute 2021-08-28 02:22:14.798381 I | auth: deleting token SlahxhxsLogNhzXW.210 for user conductor 2021-08-28 02:22:17.798482 I | auth: deleting token RDZZblYFUTbWHWoK.211 for user conductor 2021-08-28 02:22:18.955317 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:21.798426 I | auth: deleting token vPtkhABgihrXzkVb.212 for user conductor 2021-08-28 02:22:22.798452 I | auth: deleting token fXdNUSQGzYihMmia.215 for user conductor 2021-08-28 02:22:23.955596 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:24.798467 I | auth: deleting token SMlchnEwscKrMCBM.216 for user conductor 2021-08-28 02:22:25.798405 I | auth: deleting token fuCpCrXkpfEjjvoy.217 for user conductor 2021-08-28 02:22:25.798440 I | auth: deleting token tkBVjRkrqeNTbVEY.218 for user conductor 2021-08-28 02:22:28.445725 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (949.281419ms) to execute 2021-08-28 02:22:28.798443 I | auth: deleting token riOQWPVKdOLwnWkW.219 for user conductor 2021-08-28 02:22:28.955799 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:29.798415 I | auth: deleting token HgOwpKQorXgsGwur.220 for user conductor 2021-08-28 02:22:29.798459 I | auth: deleting token xrVtgitBIhyNgMWM.221 for user conductor 2021-08-28 02:22:30.797001 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (142.199186ms) to execute 2021-08-28 02:22:31.798378 I | auth: deleting token yVsQKlNdyVWZOzBI.222 for user conductor 2021-08-28 02:22:32.798422 I | auth: deleting token dCyKaMxYKskkFGKC.224 for user conductor 2021-08-28 02:22:32.798455 I | auth: deleting token wpvcOnFLsWZDPeUW.223 for user conductor 2021-08-28 02:22:33.956032 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:35.645817 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.047030007s) to execute 2021-08-28 02:22:36.798406 I | auth: deleting token aQqzPVZdHOLoHoRk.225 for user conductor 2021-08-28 02:22:38.956337 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:39.244367 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (948.151253ms) to execute 2021-08-28 02:22:40.348566 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.050650827s) to execute 2021-08-28 02:22:40.798429 I | auth: deleting token BNWqXixZUpvkWcLu.226 for user conductor 2021-08-28 02:22:43.798385 I | auth: deleting token dtabRfVIHxpcgneb.228 for user conductor 2021-08-28 02:22:43.956542 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:47.798417 I | auth: deleting token XWFhONOTAIySvwXS.229 for user conductor 2021-08-28 02:22:48.798456 I | auth: deleting token BQUcUdgRKcWOTIzo.230 for user conductor 2021-08-28 02:22:48.956725 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:49.798386 I | auth: deleting token mcwbYhOnIHqnqbpQ.232 for user conductor 2021-08-28 02:22:51.750858 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (454.449434ms) to execute 2021-08-28 02:22:51.798428 I | auth: deleting token wBNwCkubmIPEPlSk.234 for user conductor 2021-08-28 02:22:51.798458 I | auth: deleting token VgfpDkTtgxhmFdVZ.236 for user conductor 2021-08-28 02:22:52.951779 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.055577525s) to execute 2021-08-28 02:22:53.096503 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (142.439958ms) to execute 2021-08-28 02:22:53.956944 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:54.843808 I | auth: deleting token vnSjesnTFzbhxQuU.241 for user conductor 2021-08-28 02:22:54.843846 I | auth: deleting token FJnKgyvQFXSrssbM.238 for user conductor 2021-08-28 02:22:54.843854 I | auth: deleting token EldLSPkswqzujitL.239 for user conductor 2021-08-28 02:22:55.448613 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (952.131972ms) to execute 2021-08-28 02:22:55.557088 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (106.377312ms) to execute 2021-08-28 02:22:58.045650 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.14948466s) to execute 2021-08-28 02:22:58.196754 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (148.845073ms) to execute 2021-08-28 02:22:58.957205 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:22:59.843855 I | auth: deleting token RhzYBaPGpmrurrgc.245 for user conductor 2021-08-28 02:22:59.843899 I | auth: deleting token wpUJsTogtTXFocpO.243 for user conductor 2021-08-28 02:22:59.843912 I | auth: deleting token PDNkRXfxcakKxsaH.244 for user conductor 2021-08-28 02:22:59.843927 I | auth: deleting token fXHoEVqqcFKxyNwY.242 for user conductor 2021-08-28 02:23:00.798444 I | auth: deleting token FXGhLWVMEHccjYrh.246 for user conductor 2021-08-28 02:23:01.649892 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.252030459s) to execute 2021-08-28 02:23:01.896286 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (150.387217ms) to execute 2021-08-28 02:23:02.798441 I | auth: deleting token IInumFJZPsYdlPHx.247 for user conductor 2021-08-28 02:23:02.798481 I | auth: deleting token fUmwsnqKDtewmyEu.250 for user conductor 2021-08-28 02:23:03.798474 I | auth: deleting token uXLzFwgJjeJydUCi.249 for user conductor 2021-08-28 02:23:03.798522 I | auth: deleting token QTYxbdCbQrAPxCms.248 for user conductor 2021-08-28 02:23:03.957368 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:05.843799 I | auth: deleting token VJXpYWwxxVOYHNZE.252 for user conductor 2021-08-28 02:23:05.843841 I | auth: deleting token wBNrCbhGPAoClylt.251 for user conductor 2021-08-28 02:23:06.546323 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (102.312206ms) to execute 2021-08-28 02:23:06.798404 I | auth: deleting token HrQLaVUAuDYuhBNB.253 for user conductor 2021-08-28 02:23:07.798428 I | auth: deleting token HDTpVypQwGtzlMan.255 for user conductor 2021-08-28 02:23:07.798464 I | auth: deleting token JDIDxsCqKAYsyaNM.254 for user conductor 2021-08-28 02:23:08.957551 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:09.244124 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.245805608s) to execute 2021-08-28 02:23:09.496315 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (196.384273ms) to execute 2021-08-28 02:23:10.798436 I | auth: deleting token CFBtcjLyPclbegGR.258 for user conductor 2021-08-28 02:23:10.798474 I | auth: deleting token SFUjtWZrIIWbBQAK.256 for user conductor 2021-08-28 02:23:10.798484 I | auth: deleting token bzRMckwItyqyeCqk.257 for user conductor 2021-08-28 02:23:11.947342 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.503334725s) to execute 2021-08-28 02:23:12.099051 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.883429ms) to execute 2021-08-28 02:23:12.798485 I | auth: deleting token XtmHzOQkWCtdgeau.259 for user conductor 2021-08-28 02:23:13.798408 I | auth: deleting token yCzjUEVqwSxvkRlL.260 for user conductor 2021-08-28 02:23:14.043834 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:14.746935 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.249391856s) to execute 2021-08-28 02:23:14.896319 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (147.60309ms) to execute 2021-08-28 02:23:15.798460 I | auth: deleting token REpHyHUXHBLArhOE.262 for user conductor 2021-08-28 02:23:15.798499 I | auth: deleting token ghzLxdhggufzvQuF.263 for user conductor 2021-08-28 02:23:15.798514 I | auth: deleting token wiSbKcRlXOacreoI.261 for user conductor 2021-08-28 02:23:17.843835 I | auth: deleting token yljrZJayyvKCNxmc.265 for user conductor 2021-08-28 02:23:17.843901 I | auth: deleting token IhcXqnaBtXWktufa.264 for user conductor 2021-08-28 02:23:18.843801 I | auth: deleting token onOtSaUwVectwFwI.266 for user conductor 2021-08-28 02:23:19.044061 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:19.348530 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.004618384s) to execute 2021-08-28 02:23:21.798442 I | auth: deleting token KDuBmnDaOBXasKyB.267 for user conductor 2021-08-28 02:23:23.051912 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (107.772581ms) to execute 2021-08-28 02:23:24.044258 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:24.798406 I | auth: deleting token rjTTDjfmFpNyknQX.268 for user conductor 2021-08-28 02:23:28.798476 I | auth: deleting token fspQXMMtOramghJp.269 for user conductor 2021-08-28 02:23:29.044460 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:30.798417 I | auth: deleting token fAwsSxIdCXczXXAq.270 for user conductor 2021-08-28 02:23:31.798433 I | auth: deleting token MZaSYkYNLItVEYFw.272 for user conductor 2021-08-28 02:23:32.798423 I | auth: deleting token haovXNlhNsovLWxr.274 for user conductor 2021-08-28 02:23:34.044666 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:35.798426 I | auth: deleting token CzEsuIKzhViluTIK.275 for user conductor 2021-08-28 02:23:35.798471 I | auth: deleting token eWlZDudnSdfntScb.276 for user conductor 2021-08-28 02:23:38.798405 I | auth: deleting token lCwVhwHRtwkRKHgO.277 for user conductor 2021-08-28 02:23:39.044905 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:39.798458 I | auth: deleting token VdPvFDZTQPPGxDqD.279 for user conductor 2021-08-28 02:23:41.798406 I | auth: deleting token mUhZirtzwMCfFfzq.282 for user conductor 2021-08-28 02:23:41.798444 I | auth: deleting token OPoJDuAvXbjgSbaZ.280 for user conductor 2021-08-28 02:23:41.798451 I | auth: deleting token bLXnnURrIiVlWGRa.281 for user conductor 2021-08-28 02:23:41.798462 I | auth: deleting token HmqKAXelmAYfzEoy.283 for user conductor 2021-08-28 02:23:44.045124 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:45.798433 I | auth: deleting token CSfqerMysWqchMEh.285 for user conductor 2021-08-28 02:23:45.798489 I | auth: deleting token jGKsDViuKVAOmhpb.284 for user conductor 2021-08-28 02:23:45.798500 I | auth: deleting token FWgfVJauVPvLEGSJ.286 for user conductor 2021-08-28 02:23:47.798381 I | auth: deleting token PZlamSMqthODnBLx.287 for user conductor 2021-08-28 02:23:48.798446 I | auth: deleting token HZbstwQqhGRMHDhQ.288 for user conductor 2021-08-28 02:23:49.045334 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:49.798403 I | auth: deleting token XnbEhzVrlzLEPwHJ.290 for user conductor 2021-08-28 02:23:49.798441 I | auth: deleting token XgsjgYxBmMaNlsBM.289 for user conductor 2021-08-28 02:23:49.798450 I | auth: deleting token jdYbiSNXyjYTuRoc.291 for user conductor 2021-08-28 02:23:51.798431 I | auth: deleting token CnwQlZdVKTCJWOsU.293 for user conductor 2021-08-28 02:23:51.798466 I | auth: deleting token ZfCcztsaajBQEfMA.292 for user conductor 2021-08-28 02:23:52.798390 I | auth: deleting token rWNCjcrRUMEdFlaL.295 for user conductor 2021-08-28 02:23:52.798430 I | auth: deleting token wezsHUZBkRZtbhOQ.294 for user conductor 2021-08-28 02:23:54.045541 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:23:56.798387 I | auth: deleting token sZDCgdnrNQbjFktl.297 for user conductor 2021-08-28 02:23:56.798423 I | auth: deleting token VNBcKqYVOYMHKntS.296 for user conductor 2021-08-28 02:23:58.798390 I | auth: deleting token MovrdxPgARNIJASs.298 for user conductor 2021-08-28 02:23:58.798427 I | auth: deleting token HdybVpZwqeRLseIw.300 for user conductor 2021-08-28 02:23:58.798439 I | auth: deleting token FJiVAegRGtvnyVvQ.299 for user conductor 2021-08-28 02:23:59.045762 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:01.798428 I | auth: deleting token rJDfhOjZDLpJcjTN.302 for user conductor 2021-08-28 02:24:01.798466 I | auth: deleting token weiNKWkVIMXYAfqx.303 for user conductor 2021-08-28 02:24:01.798476 I | auth: deleting token kovpCqsEgZMdIjgK.301 for user conductor 2021-08-28 02:24:04.045944 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:05.798448 I | auth: deleting token AMmkoXXnFZLRLGPd.305 for user conductor 2021-08-28 02:24:05.798484 I | auth: deleting token SZJywneaZiyplabm.307 for user conductor 2021-08-28 02:24:05.798494 I | auth: deleting token ywXhlXoPqcAHeeUV.306 for user conductor 2021-08-28 02:24:05.798513 I | auth: deleting token DduUWJnNkgSvStHY.304 for user conductor 2021-08-28 02:24:08.798402 I | auth: deleting token aFkWdxnjdrFiPrLp.309 for user conductor 2021-08-28 02:24:09.046063 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:09.144540 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.046633181s) to execute 2021-08-28 02:24:11.798425 I | auth: deleting token FHmoCVCzAXZzQJtd.310 for user conductor 2021-08-28 02:24:11.798474 I | auth: deleting token OmqgsuUysmMZsMFi.312 for user conductor 2021-08-28 02:24:12.798415 I | auth: deleting token QlzVUyhJEVVYzoAj.311 for user conductor 2021-08-28 02:24:13.798421 I | auth: deleting token fWuUwJdeGTSOMqtT.313 for user conductor 2021-08-28 02:24:14.046295 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:14.798445 I | auth: deleting token AnajQzzSobWMntre.315 for user conductor 2021-08-28 02:24:14.798491 I | auth: deleting token hLjsjhEjhxaCpRTC.316 for user conductor 2021-08-28 02:24:15.798410 I | auth: deleting token MdDjgBFwijFnCwZt.317 for user conductor 2021-08-28 02:24:18.798418 I | auth: deleting token qANquNSDuzpybgEX.319 for user conductor 2021-08-28 02:24:18.798459 I | auth: deleting token TPugfFNdOHaMLuPC.318 for user conductor 2021-08-28 02:24:18.798467 I | auth: deleting token zHAyYtChFMhcCvGH.320 for user conductor 2021-08-28 02:24:19.046542 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:22.798399 I | auth: deleting token MCeiZGZdfpEJHDit.323 for user conductor 2021-08-28 02:24:22.798505 I | auth: deleting token ITrSVqwOFNrvvyhC.321 for user conductor 2021-08-28 02:24:22.798543 I | auth: deleting token LZuLEcsTzNTszocq.322 for user conductor 2021-08-28 02:24:23.843828 I | auth: deleting token sVpnwAwnfBnjFpAw.324 for user conductor 2021-08-28 02:24:23.843865 I | auth: deleting token CZoCbBPXKsEXHqVT.325 for user conductor 2021-08-28 02:24:23.850024 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (153.726964ms) to execute 2021-08-28 02:24:24.046727 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:27.798422 I | auth: deleting token GAtAhCxNcODEHvZx.326 for user conductor 2021-08-28 02:24:28.949664 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.053301504s) to execute 2021-08-28 02:24:29.046981 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:30.445462 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.348968942s) to execute 2021-08-28 02:24:30.798582 I | auth: deleting token koeHlfywTtONppFH.327 for user conductor 2021-08-28 02:24:31.745118 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.248754162s) to execute 2021-08-28 02:24:31.745325 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.297427679s) to execute 2021-08-28 02:24:34.047165 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:34.798505 I | auth: deleting token ZQzdMRfaygSqLRpx.328 for user conductor 2021-08-28 02:24:39.047378 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:39.798412 I | auth: deleting token LGagphfGaLgxeYPw.329 for user conductor 2021-08-28 02:24:40.798472 I | auth: deleting token fjNqlmsEcRpLLKCX.331 for user conductor 2021-08-28 02:24:40.798527 I | auth: deleting token zqLvcSUOmLoSCyrJ.330 for user conductor 2021-08-28 02:24:43.798434 I | auth: deleting token JEgGtjJQYTwpHScJ.332 for user conductor 2021-08-28 02:24:44.047582 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:44.798460 I | auth: deleting token aDjDIsDsGkkAqOwu.334 for user conductor 2021-08-28 02:24:44.798497 I | auth: deleting token usZVuzeuAXuihbHD.333 for user conductor 2021-08-28 02:24:45.798439 I | auth: deleting token EVkznBMTGxcBLLJg.335 for user conductor 2021-08-28 02:24:49.047870 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:49.798441 I | auth: deleting token VlTlJHjzYpmnvHDw.337 for user conductor 2021-08-28 02:24:52.798417 I | auth: deleting token RgckSmRefQMstnpO.338 for user conductor 2021-08-28 02:24:54.048088 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:56.798408 I | auth: deleting token XLmrqVcgZgccrCrA.339 for user conductor 2021-08-28 02:24:58.348919 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.049525407s) to execute 2021-08-28 02:24:59.048236 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:24:59.644588 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.200634078s) to execute 2021-08-28 02:24:59.798411 I | auth: deleting token fHCqhhnPqujAZPiZ.340 for user conductor 2021-08-28 02:25:00.945233 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (441.531791ms) to execute 2021-08-28 02:25:02.150777 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.05440839s) to execute 2021-08-28 02:25:02.843809 I | auth: deleting token GOsWLHjZsmmZNLdH.341 for user conductor 2021-08-28 02:25:04.048454 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:05.644485 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (900.544276ms) to execute 2021-08-28 02:25:05.843807 I | auth: deleting token wTfLpyRMZXlaAjdg.344 for user conductor 2021-08-28 02:25:06.844827 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.04834876s) to execute 2021-08-28 02:25:06.996128 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.211988ms) to execute 2021-08-28 02:25:07.843776 I | auth: deleting token adOlTDteMHwHppri.346 for user conductor 2021-08-28 02:25:07.843808 I | auth: deleting token EhOytVbnhDyvWMQx.347 for user conductor 2021-08-28 02:25:07.843819 I | auth: deleting token DZitsKsRvTnmltOM.345 for user conductor 2021-08-28 02:25:07.843826 I | auth: deleting token yrOPXNwrVmGBItiK.349 for user conductor 2021-08-28 02:25:09.048631 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:09.545428 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.401391878s) to execute 2021-08-28 02:25:10.798420 I | auth: deleting token uMndFwZWftEMOPcH.352 for user conductor 2021-08-28 02:25:10.798478 I | auth: deleting token ENilKACWMuUjoNgE.351 for user conductor 2021-08-28 02:25:12.834883 I | auth: deleting token XLUUyxLSakDLVeiu.353 for user conductor 2021-08-28 02:25:13.251204 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.154812234s) to execute 2021-08-28 02:25:13.497406 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (149.466183ms) to execute 2021-08-28 02:25:14.048840 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:16.798444 I | auth: deleting token UQHezslghGHcJAKb.354 for user conductor 2021-08-28 02:25:17.145251 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.349196055s) to execute 2021-08-28 02:25:18.349149 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.105184374s) to execute 2021-08-28 02:25:19.049037 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:19.550057 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.402829493s) to execute 2021-08-28 02:25:19.550257 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.40198802s) to execute 2021-08-28 02:25:19.550407 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.199369007s) to execute 2021-08-28 02:25:19.550665 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.006641582s) to execute 2021-08-28 02:25:19.696627 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (144.077522ms) to execute 2021-08-28 02:25:20.843838 I | auth: deleting token sBQPkjkvTOACLtGL.355 for user conductor 2021-08-28 02:25:22.146435 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.049951954s) to execute 2021-08-28 02:25:22.344370 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (144.412557ms) to execute 2021-08-28 02:25:23.798423 I | auth: deleting token vwzwGEKCRKvWqRaZ.356 for user conductor 2021-08-28 02:25:24.049254 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:25.798384 I | auth: deleting token MnkfSUfDRJsVKZhR.357 for user conductor 2021-08-28 02:25:26.798421 I | auth: deleting token EaeMafHmOXgFUhcG.358 for user conductor 2021-08-28 02:25:28.798384 I | auth: deleting token ANTNTHzPcEDYhVWR.359 for user conductor 2021-08-28 02:25:29.049467 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:29.798445 I | auth: deleting token kPAHsVEIRTcGDuqX.360 for user conductor 2021-08-28 02:25:30.798473 I | auth: deleting token tZuYShMzHbuONuKq.363 for user conductor 2021-08-28 02:25:30.798506 I | auth: deleting token gLkmopDlsIZehkSd.361 for user conductor 2021-08-28 02:25:31.798421 I | auth: deleting token UmDlFpcDMaSLQvgL.364 for user conductor 2021-08-28 02:25:33.798413 I | auth: deleting token ZaQRQqzYxqSPpKuo.365 for user conductor 2021-08-28 02:25:33.798454 I | auth: deleting token PZnaERJVguzHYLSz.366 for user conductor 2021-08-28 02:25:34.049684 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:34.798425 I | auth: deleting token gPIGHryshADsprGd.367 for user conductor 2021-08-28 02:25:36.496423 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (144.862847ms) to execute 2021-08-28 02:25:37.843790 I | auth: deleting token FANOjlJkzCGammod.368 for user conductor 2021-08-28 02:25:38.098712 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (100.349484ms) to execute 2021-08-28 02:25:39.049884 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:41.647305 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (203.306813ms) to execute 2021-08-28 02:25:41.798426 I | auth: deleting token sFSUdUtMdbvqdCvE.370 for user conductor 2021-08-28 02:25:44.050071 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:45.745850 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (449.177663ms) to execute 2021-08-28 02:25:46.798411 I | auth: deleting token eLHSzAcDjqdEiAqz.371 for user conductor 2021-08-28 02:25:47.149637 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.399976132s) to execute 2021-08-28 02:25:47.798459 I | auth: deleting token cQnfWUrfhMYVzHsb.372 for user conductor 2021-08-28 02:25:49.050430 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:49.649615 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.405512934s) to execute 2021-08-28 02:25:49.649927 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.498269352s) to execute 2021-08-28 02:25:49.796444 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (144.912461ms) to execute 2021-08-28 02:25:50.843845 I | auth: deleting token rFIGEDKFEXaKSLMC.373 for user conductor 2021-08-28 02:25:50.843886 I | auth: deleting token IdcNXzsSFrWCpkls.375 for user conductor 2021-08-28 02:25:50.843893 I | auth: deleting token aWBgorbURisUfGvC.376 for user conductor 2021-08-28 02:25:50.843900 I | auth: deleting token NmgCSeataMRxnvjP.377 for user conductor 2021-08-28 02:25:53.844113 I | auth: deleting token LeOmpmKRQcaDJEnw.378 for user conductor 2021-08-28 02:25:54.050619 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:54.745247 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.548874103s) to execute 2021-08-28 02:25:54.996390 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (150.857705ms) to execute 2021-08-28 02:25:55.798495 I | auth: deleting token ttkPbTzVxeRmEcZx.379 for user conductor 2021-08-28 02:25:55.798537 I | auth: deleting token fvSpyKCKMmpbvrRq.383 for user conductor 2021-08-28 02:25:55.798544 I | auth: deleting token CUfpcVvQFdHSyUot.381 for user conductor 2021-08-28 02:25:55.798550 I | auth: deleting token oTumklwINLQjUDmk.382 for user conductor 2021-08-28 02:25:57.448938 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.352374734s) to execute 2021-08-28 02:25:59.050811 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:25:59.798425 I | auth: deleting token NtoqKQnPNnjtlAcP.384 for user conductor 2021-08-28 02:26:00.798436 I | auth: deleting token OVSYMSTUvoQbrOHI.386 for user conductor 2021-08-28 02:26:00.798475 I | auth: deleting token TBBhJForyRifamQZ.385 for user conductor 2021-08-28 02:26:01.248865 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.652109576s) to execute 2021-08-28 02:26:01.249045 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.797968375s) to execute 2021-08-28 02:26:01.798386 I | auth: deleting token gYZzjKgKwHzehAJg.387 for user conductor 2021-08-28 02:26:03.798418 I | auth: deleting token BrbBzNmXnDYKOfvB.388 for user conductor 2021-08-28 02:26:04.143778 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:04.798400 I | auth: deleting token ZrYMNZxMNyxoevVa.390 for user conductor 2021-08-28 02:26:04.798451 I | auth: deleting token YtCgYRBJgPAqMoUR.389 for user conductor 2021-08-28 02:26:04.798466 I | auth: deleting token YteYsYBnfJegUjRN.391 for user conductor 2021-08-28 02:26:05.049825 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.304282406s) to execute 2021-08-28 02:26:05.798424 I | auth: deleting token fKuMTKQfkkkMjiOB.392 for user conductor 2021-08-28 02:26:06.444409 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.200394858s) to execute 2021-08-28 02:26:06.444519 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.392652196s) to execute 2021-08-28 02:26:06.444643 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.392764452s) to execute 2021-08-28 02:26:07.798397 I | auth: deleting token VNHCBLhZifOBHGqc.394 for user conductor 2021-08-28 02:26:07.798427 I | auth: deleting token ynyipYHhTgNwSIYD.393 for user conductor 2021-08-28 02:26:09.143957 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:09.798434 I | auth: deleting token CFIhxqnGigWLUHFk.397 for user conductor 2021-08-28 02:26:09.798515 I | auth: deleting token pDSwOabGErkmYsmu.396 for user conductor 2021-08-28 02:26:09.798533 I | auth: deleting token NfDXBiFmGNaswCHv.395 for user conductor 2021-08-28 02:26:10.247351 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.449274819s) to execute 2021-08-28 02:26:10.396506 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (146.863775ms) to execute 2021-08-28 02:26:10.496433 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (196.080967ms) to execute 2021-08-28 02:26:10.496501 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (246.840051ms) to execute 2021-08-28 02:26:13.044268 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.300327158s) to execute 2021-08-28 02:26:13.798429 I | auth: deleting token QaufwcoXgERhPxse.398 for user conductor 2021-08-28 02:26:14.144137 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:15.751660 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.307745123s) to execute 2021-08-28 02:26:15.999182 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (101.131897ms) to execute 2021-08-28 02:26:16.798409 I | auth: deleting token enaTLSsaZdTvzULL.399 for user conductor 2021-08-28 02:26:19.144344 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:19.798423 I | auth: deleting token hXyMZyuzIlbbgmUb.400 for user conductor 2021-08-28 02:26:23.798450 I | auth: deleting token ZdLWCTFWgnGzmCWk.401 for user conductor 2021-08-28 02:26:24.144594 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:24.798379 I | auth: deleting token ngUIpUdMHzceRvDB.402 for user conductor 2021-08-28 02:26:26.798418 I | auth: deleting token fxVnrhDINQrRozHx.403 for user conductor 2021-08-28 02:26:26.798448 I | auth: deleting token dBUfqATjcysfxxWA.404 for user conductor 2021-08-28 02:26:28.798436 I | auth: deleting token WZCqdCqwnsGPtAzR.405 for user conductor 2021-08-28 02:26:29.144829 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:31.046531 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (148.906141ms) to execute 2021-08-28 02:26:31.798438 I | auth: deleting token mifbPvDewZXHxxCf.406 for user conductor 2021-08-28 02:26:31.798495 I | auth: deleting token aCHmepcAvyTfTEja.408 for user conductor 2021-08-28 02:26:31.798508 I | auth: deleting token FQlrGdSkowMbLquk.407 for user conductor 2021-08-28 02:26:32.798381 I | auth: deleting token pVBJJftGMbYLWVSy.409 for user conductor 2021-08-28 02:26:34.145061 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:34.798428 I | auth: deleting token HIBzAmcNIIvlCWud.410 for user conductor 2021-08-28 02:26:35.843816 I | auth: deleting token QuFnjKHfzEyLcuth.411 for user conductor 2021-08-28 02:26:37.647109 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.249283766s) to execute 2021-08-28 02:26:37.798402 I | auth: deleting token wnnzcrMXNiVCkHMK.413 for user conductor 2021-08-28 02:26:37.798437 I | auth: deleting token LhrTouRVYwfeAlTj.412 for user conductor 2021-08-28 02:26:37.798445 I | auth: deleting token tyyAdLuSAnLgOfCg.414 for user conductor 2021-08-28 02:26:39.145342 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:39.798379 I | auth: deleting token XvyAUSlCiDKcRcwI.416 for user conductor 2021-08-28 02:26:39.798490 I | auth: deleting token dRxTcCmiQQxPofYH.415 for user conductor 2021-08-28 02:26:41.798424 I | auth: deleting token vEkzIKWngoGklGUP.418 for user conductor 2021-08-28 02:26:41.798475 I | auth: deleting token lryDmgEBllpxKiOL.417 for user conductor 2021-08-28 02:26:44.145624 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:44.798453 I | auth: deleting token dCHHCvszVCvjiIaR.419 for user conductor 2021-08-28 02:26:48.798408 I | auth: deleting token iYJGrguPPpdvXyze.420 for user conductor 2021-08-28 02:26:49.145798 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:50.798461 I | auth: deleting token uMrwMLbzhUBPABuY.422 for user conductor 2021-08-28 02:26:50.798516 I | auth: deleting token FmuwPWXIjvcXBfWg.421 for user conductor 2021-08-28 02:26:53.798414 I | auth: deleting token JJxBYhHTxnGQUiaP.424 for user conductor 2021-08-28 02:26:53.798560 I | auth: deleting token hyKOiyefjDwfUryx.423 for user conductor 2021-08-28 02:26:54.146041 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:26:55.798415 I | auth: deleting token giWQtLuaTnPaQQJY.426 for user conductor 2021-08-28 02:26:55.798455 I | auth: deleting token RwmnUGPJIXEGCMnv.425 for user conductor 2021-08-28 02:26:55.798466 I | auth: deleting token oXxeVREMnDTcoRJq.427 for user conductor 2021-08-28 02:26:58.798415 I | auth: deleting token GwslvzCTKMtrZZSp.428 for user conductor 2021-08-28 02:26:59.146217 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:01.798426 I | auth: deleting token oQOJChwTVCLfdcOq.429 for user conductor 2021-08-28 02:27:03.148055 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.051618656s) to execute 2021-08-28 02:27:04.146444 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:04.549047 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.205101157s) to execute 2021-08-28 02:27:05.798376 I | auth: deleting token WelhSfxLNnVHhSSA.430 for user conductor 2021-08-28 02:27:07.050498 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.306588403s) to execute 2021-08-28 02:27:07.050991 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.407087269s) to execute 2021-08-28 02:27:09.146621 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:09.798411 I | auth: deleting token KpVShnkbFgGjGLnT.431 for user conductor 2021-08-28 02:27:10.346286 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.099042118s) to execute 2021-08-28 02:27:10.496433 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (147.719011ms) to execute 2021-08-28 02:27:13.048975 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.352617153s) to execute 2021-08-28 02:27:13.197019 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (145.88413ms) to execute 2021-08-28 02:27:14.146805 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:14.798383 I | auth: deleting token buwoVBZGAoKnfVwU.433 for user conductor 2021-08-28 02:27:14.798416 I | auth: deleting token yWDovvUUKXdrcxJi.434 for user conductor 2021-08-28 02:27:14.798428 I | auth: deleting token CtQNELHCHxnLtUll.432 for user conductor 2021-08-28 02:27:14.798436 I | auth: deleting token kCMKRAZePUInFEvx.435 for user conductor 2021-08-28 02:27:15.798407 I | auth: deleting token XIbbdLJlytqtccop.436 for user conductor 2021-08-28 02:27:18.798433 I | auth: deleting token bwRkeJIvQREMOFjc.437 for user conductor 2021-08-28 02:27:19.147025 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:21.798413 I | auth: deleting token ulsTaLqEyNQAKdmo.438 for user conductor 2021-08-28 02:27:23.798411 I | auth: deleting token YpWSJwfEHLisnOcn.439 for user conductor 2021-08-28 02:27:24.147203 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:26.252269 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.15571386s) to execute 2021-08-28 02:27:27.843867 I | auth: deleting token wPCsTzGwluRkPZRo.440 for user conductor 2021-08-28 02:27:28.644881 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.144976118s) to execute 2021-08-28 02:27:28.843799 I | auth: deleting token hyMtIdssIGXaSOLV.441 for user conductor 2021-08-28 02:27:28.843842 I | auth: deleting token bVSynOhcJwfhChYW.442 for user conductor 2021-08-28 02:27:29.147578 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:29.851905 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.10674377s) to execute 2021-08-28 02:27:30.849626 I | auth: deleting token IDDOTrxpRoxeCKXC.443 for user conductor 2021-08-28 02:27:30.849675 I | auth: deleting token cATqIReaZvoiZIKX.444 for user conductor 2021-08-28 02:27:32.644635 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.600514009s) to execute 2021-08-28 02:27:32.644886 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.70096374s) to execute 2021-08-28 02:27:32.748247 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (101.160513ms) to execute 2021-08-28 02:27:32.843988 I | auth: deleting token JYbPpcNUKfSfkURG.445 for user conductor 2021-08-28 02:27:34.144983 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.396675945s) to execute 2021-08-28 02:27:34.147775 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:34.798480 I | auth: deleting token sEZPnsWHGxJhZMYm.446 for user conductor 2021-08-28 02:27:35.798418 I | auth: deleting token XRzTPmneoHBXAwcE.449 for user conductor 2021-08-28 02:27:35.798459 I | auth: deleting token mvaZFcCLRAkFsfZf.447 for user conductor 2021-08-28 02:27:36.650363 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.353800142s) to execute 2021-08-28 02:27:37.945950 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.200062558s) to execute 2021-08-28 02:27:38.798404 I | auth: deleting token RkEoQZctqndwUVMY.450 for user conductor 2021-08-28 02:27:39.147969 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:39.151835 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.407765843s) to execute 2021-08-28 02:27:39.152024 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.407946695s) to execute 2021-08-28 02:27:39.152171 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.20306338s) to execute 2021-08-28 02:27:39.152300 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.204309988s) to execute 2021-08-28 02:27:39.798439 I | auth: deleting token aNtetrAIkNrEzCDd.451 for user conductor 2021-08-28 02:27:40.546807 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.30052855s) to execute 2021-08-28 02:27:40.547056 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.299314183s) to execute 2021-08-28 02:27:40.843797 I | auth: deleting token TOhYrJzriAAiGsGs.452 for user conductor 2021-08-28 02:27:40.843840 I | auth: deleting token gLvvqprPjZaoYXGd.453 for user conductor 2021-08-28 02:27:41.843808 I | auth: deleting token sesPstETcroogzVq.455 for user conductor 2021-08-28 02:27:43.051092 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.354475822s) to execute 2021-08-28 02:27:43.798421 I | auth: deleting token fYhacEKZVYaJAMdo.457 for user conductor 2021-08-28 02:27:44.148162 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:44.352546 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.299500475s) to execute 2021-08-28 02:27:44.352618 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.108513592s) to execute 2021-08-28 02:27:44.352879 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.288836843s) to execute 2021-08-28 02:27:44.496453 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (141.789764ms) to execute 2021-08-28 02:27:45.798490 I | auth: deleting token vciPJErlmDGQnwMr.458 for user conductor 2021-08-28 02:27:48.798413 I | auth: deleting token VISJFEllxapwXfet.459 for user conductor 2021-08-28 02:27:49.148418 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:50.798521 I | auth: deleting token GIjIsqEIyyopKFcv.460 for user conductor 2021-08-28 02:27:51.798414 I | auth: deleting token fpnpuRMGCrIhWPrJ.461 for user conductor 2021-08-28 02:27:53.798420 I | auth: deleting token tfiiWIGrZHeoUvax.463 for user conductor 2021-08-28 02:27:53.798455 I | auth: deleting token uCwvfXpjmyfqubxl.462 for user conductor 2021-08-28 02:27:54.148651 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:55.798392 I | auth: deleting token RBZvtaYGsQCjGqAH.464 for user conductor 2021-08-28 02:27:55.798446 I | auth: deleting token tYDlfzwThgygHOmq.465 for user conductor 2021-08-28 02:27:55.798459 I | auth: deleting token bvLZMBfkKxDZavAb.466 for user conductor 2021-08-28 02:27:55.848912 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (803.396998ms) to execute 2021-08-28 02:27:58.798403 I | auth: deleting token hFzQvGaqvvaDhcMZ.467 for user conductor 2021-08-28 02:27:58.798448 I | auth: deleting token spZozxOYrezDnPoV.468 for user conductor 2021-08-28 02:27:59.148862 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:27:59.798435 I | auth: deleting token DCNFuZUwZSLbDIRD.469 for user conductor 2021-08-28 02:28:01.798392 I | auth: deleting token PEkolhbEUskvLeKW.470 for user conductor 2021-08-28 02:28:02.345525 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.10157674s) to execute 2021-08-28 02:28:02.843797 I | auth: deleting token LEuJIPqVbZSMyurH.472 for user conductor 2021-08-28 02:28:02.843839 I | auth: deleting token qgGAEPSneGDghGai.471 for user conductor 2021-08-28 02:28:03.843867 I | auth: deleting token zhsVfWUwyoOWGmwr.473 for user conductor 2021-08-28 02:28:04.149048 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:28:04.852000 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.25575941s) to execute 2021-08-28 02:28:06.798439 I | auth: deleting token sshtVaswxYFamGhz.474 for user conductor 2021-08-28 02:28:06.798485 I | auth: deleting token TZjrLbpeHJPrKevc.475 for user conductor 2021-08-28 02:28:09.149234 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:09.798418 I | auth: deleting token DafgJyxVyNFYbqeE.476 for user conductor 2021-08-28 02:28:09.798459 I | auth: deleting token ausMxUnZzOkQASMY.477 for user conductor 2021-08-28 02:28:12.798421 I | auth: deleting token JCoYvldRarRbDfgs.480 for user conductor 2021-08-28 02:28:12.798457 I | auth: deleting token gzshKBZmRhBwIizl.479 for user conductor 2021-08-28 02:28:12.798466 I | auth: deleting token nIhaWMMtmAYHDgbY.478 for user conductor 2021-08-28 02:28:14.149438 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:14.798374 I | auth: deleting token QojzMPsbcQmUPaAQ.482 for user conductor 2021-08-28 02:28:15.843778 I | auth: deleting token vMAgzCLwwjnXngOl.483 for user conductor 2021-08-28 02:28:15.843822 I | auth: deleting token zVGlpWProocMZhUu.481 for user conductor 2021-08-28 02:28:16.798408 I | auth: deleting token DoBrVvXggZTeJSOt.484 for user conductor 2021-08-28 02:28:19.149618 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:19.745065 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.201126681s) to execute 2021-08-28 02:28:19.798432 I | auth: deleting token uFyoGbfzMYqpuruH.485 for user conductor 2021-08-28 02:28:19.798460 I | auth: deleting token HNlSCDiytvBRtaRP.487 for user conductor 2021-08-28 02:28:19.798468 I | auth: deleting token KKYxaWOkHcLhvYmp.486 for user conductor 2021-08-28 02:28:22.148517 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.150305923s) to execute 2021-08-28 02:28:22.296248 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (145.08704ms) to execute 2021-08-28 02:28:22.798427 I | auth: deleting token EVSHCVmenSFlIADf.488 for user conductor 2021-08-28 02:28:23.351926 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.053950519s) to execute 2021-08-28 02:28:23.798400 I | auth: deleting token nqVnuVViibQidtaZ.489 for user conductor 2021-08-28 02:28:23.798438 I | auth: deleting token QjDQsEoxKIkKrukh.490 for user conductor 2021-08-28 02:28:24.149794 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:24.548814 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.052390149s) to execute 2021-08-28 02:28:24.843829 I | auth: deleting token EasLCvXmUyzNoVVG.491 for user conductor 2021-08-28 02:28:25.747451 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.050604783s) to execute 2021-08-28 02:28:25.747783 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.197033687s) to execute 2021-08-28 02:28:26.798422 I | auth: deleting token xembEgbYxphqZnZZ.492 for user conductor 2021-08-28 02:28:26.951835 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.105886212s) to execute 2021-08-28 02:28:27.843800 I | auth: deleting token hPEJKMAemVermNeR.493 for user conductor 2021-08-28 02:28:28.149361 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.052907615s) to execute 2021-08-28 02:28:29.149965 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:29.448386 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.296664661s) to execute 2021-08-28 02:28:29.448479 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.052302449s) to execute 2021-08-28 02:28:30.798420 I | auth: deleting token JoDlyOSZerdcPPtv.494 for user conductor 2021-08-28 02:28:33.798437 I | auth: deleting token mwyeERdJUSVOVsIa.495 for user conductor 2021-08-28 02:28:34.150162 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:36.751313 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (150.78686ms) to execute 2021-08-28 02:28:38.798500 I | auth: deleting token SbHkmpMfPBzCmIyf.496 for user conductor 2021-08-28 02:28:39.150367 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:41.798424 I | auth: deleting token aTRhJmnKiceciAjW.497 for user conductor 2021-08-28 02:28:44.150603 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:45.798448 I | auth: deleting token snxVAcKvvsaNoqKL.498 for user conductor 2021-08-28 02:28:49.150833 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:49.798407 I | auth: deleting token EiZiuNLEQByowiVu.499 for user conductor 2021-08-28 02:28:53.798405 I | auth: deleting token BEQrvWBhyYUuHLiL.500 for user conductor 2021-08-28 02:28:54.151052 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:54.548013 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.349441486s) to execute 2021-08-28 02:28:55.847195 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (701.916766ms) to execute 2021-08-28 02:28:56.843782 I | auth: deleting token gzSZLgxLGuWlObRK.502 for user conductor 2021-08-28 02:28:57.044799 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.146787307s) to execute 2021-08-28 02:28:59.151249 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:28:59.798451 I | auth: deleting token mUSmwrFhOiXvMhwO.503 for user conductor 2021-08-28 02:29:04.151450 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:04.798400 I | auth: deleting token MvBemiRLfdzKWQbA.504 for user conductor 2021-08-28 02:29:05.798429 I | auth: deleting token YiHPxTgbleZcxxVn.505 for user conductor 2021-08-28 02:29:08.798409 I | auth: deleting token IyNHheqgzyIWvMKX.506 for user conductor 2021-08-28 02:29:09.151666 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:09.798413 I | auth: deleting token sVTtXuHzFLgCUbyY.507 for user conductor 2021-08-28 02:29:09.798457 I | auth: deleting token GqpCmDraOEWFFgjh.509 for user conductor 2021-08-28 02:29:12.798430 I | auth: deleting token uvFrGYRLgmWgPMGa.510 for user conductor 2021-08-28 02:29:13.547628 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (551.499845ms) to execute 2021-08-28 02:29:13.796441 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (198.131707ms) to execute 2021-08-28 02:29:14.151833 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:16.798395 I | auth: deleting token EIUFbkgHHsRUYEIm.512 for user conductor 2021-08-28 02:29:17.149448 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (752.844348ms) to execute 2021-08-28 02:29:18.798418 I | auth: deleting token DCkhgcvZwxvgnSuP.513 for user conductor 2021-08-28 02:29:19.243890 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:20.798362 I | auth: deleting token AASJnOLrsZplNqba.515 for user conductor 2021-08-28 02:29:20.845822 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (846.6704ms) to execute 2021-08-28 02:29:21.798424 I | auth: deleting token gtiFfwCwwYhVwgNc.516 for user conductor 2021-08-28 02:29:22.798425 I | auth: deleting token BXcYJSnFrSaGlVAj.517 for user conductor 2021-08-28 02:29:24.244092 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:24.798421 I | auth: deleting token kKCxnNCBOcIyGone.518 for user conductor 2021-08-28 02:29:24.798463 I | auth: deleting token YxSxMoXjQLAdztCL.520 for user conductor 2021-08-28 02:29:25.798424 I | auth: deleting token keHwDLdaBAXDqMmf.521 for user conductor 2021-08-28 02:29:29.244394 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:29.798496 I | auth: deleting token SPKAmuYuXbEZTslZ.522 for user conductor 2021-08-28 02:29:31.798414 I | auth: deleting token UcxtukKsOoTVTVHN.525 for user conductor 2021-08-28 02:29:31.798460 I | auth: deleting token gJLHrrKvpOTUphcP.523 for user conductor 2021-08-28 02:29:31.798469 I | auth: deleting token vSPINHiKckmIOyqQ.524 for user conductor 2021-08-28 02:29:32.798434 I | auth: deleting token NTlVFAQcDFEdyXjP.527 for user conductor 2021-08-28 02:29:33.798395 I | auth: deleting token nxFbkPcLdQIGDbUb.528 for user conductor 2021-08-28 02:29:34.244675 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:36.798426 I | auth: deleting token IoDfnzbtFJyvXwdV.529 for user conductor 2021-08-28 02:29:39.244768 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:39.843794 I | auth: deleting token UGAAlyNCBwCQroJA.530 for user conductor 2021-08-28 02:29:40.952791 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.099881858s) to execute 2021-08-28 02:29:41.196439 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (241.45559ms) to execute 2021-08-28 02:29:42.449196 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.052281063s) to execute 2021-08-28 02:29:42.843815 I | auth: deleting token mJMHQvBggAoDUVoe.531 for user conductor 2021-08-28 02:29:43.744503 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.292287074s) to execute 2021-08-28 02:29:44.244974 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:44.951816 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.053332596s) to execute 2021-08-28 02:29:46.798410 I | auth: deleting token ERVbcrztbWfmBrGx.532 for user conductor 2021-08-28 02:29:49.245160 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:50.798454 I | auth: deleting token uDflIDCrVJBcOggW.533 for user conductor 2021-08-28 02:29:53.798438 I | auth: deleting token JpmrOXpaRGULgZFT.534 for user conductor 2021-08-28 02:29:54.245363 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:57.798420 I | auth: deleting token mnSWYTIvVRcWYSiT.535 for user conductor 2021-08-28 02:29:59.245562 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:29:59.798464 I | auth: deleting token mpoDnhhbuEzjJVms.538 for user conductor 2021-08-28 02:29:59.798503 I | auth: deleting token bpBGKemXqmSRLTLr.539 for user conductor 2021-08-28 02:30:01.798413 I | auth: deleting token REgGTrCCSbrETpcj.541 for user conductor 2021-08-28 02:30:02.798401 I | auth: deleting token HDbvVunadLLmQzDx.543 for user conductor 2021-08-28 02:30:02.798442 I | auth: deleting token FbXaIaUruhFOzgJb.542 for user conductor 2021-08-28 02:30:03.798425 I | auth: deleting token OwVAPblhdcdDMCwy.545 for user conductor 2021-08-28 02:30:04.245736 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:05.047981 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.550114976s) to execute 2021-08-28 02:30:05.843805 I | auth: deleting token VzCKKkvuQKSLTVtb.546 for user conductor 2021-08-28 02:30:07.798417 I | auth: deleting token kQrTBPUioxudZXJP.547 for user conductor 2021-08-28 02:30:07.798454 I | auth: deleting token UonZPDUEOLxRGyeg.548 for user conductor 2021-08-28 02:30:09.245904 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:09.843777 I | auth: deleting token nFyvnrgaRqGaJCcJ.551 for user conductor 2021-08-28 02:30:09.843821 I | auth: deleting token JfOyWKJSaXrSNICL.549 for user conductor 2021-08-28 02:30:09.843832 I | auth: deleting token FgiYPeeMLnFKQGtn.552 for user conductor 2021-08-28 02:30:09.852316 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.308368874s) to execute 2021-08-28 02:30:09.997350 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (142.905313ms) to execute 2021-08-28 02:30:13.843859 I | auth: deleting token cFvhyqkHihirNhvq.553 for user conductor 2021-08-28 02:30:13.843932 I | auth: deleting token jmmKcwVMmmkkmaWu.554 for user conductor 2021-08-28 02:30:13.843966 I | auth: deleting token TCtKFcghOyaXldHh.555 for user conductor 2021-08-28 02:30:13.843987 I | auth: deleting token GjxdCCNAXjmxKRbP.556 for user conductor 2021-08-28 02:30:14.246073 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:14.751276 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.55497584s) to execute 2021-08-28 02:30:15.097787 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (253.642186ms) to execute 2021-08-28 02:30:15.097894 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (253.688013ms) to execute 2021-08-28 02:30:15.099722 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (201.307423ms) to execute 2021-08-28 02:30:17.798363 I | auth: deleting token BCPUyOtMuQREYPMa.558 for user conductor 2021-08-28 02:30:18.444385 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.000350611s) to execute 2021-08-28 02:30:18.596357 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (149.916181ms) to execute 2021-08-28 02:30:18.843889 I | auth: deleting token byfeFrXbLZGCpwbi.559 for user conductor 2021-08-28 02:30:18.843922 I | auth: deleting token FUMbevEGlnAvCBNL.557 for user conductor 2021-08-28 02:30:18.843931 I | auth: deleting token NbWbKUyCqUColMXQ.560 for user conductor 2021-08-28 02:30:19.246299 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:19.798404 I | auth: deleting token fuzicqvmVxIECzSX.561 for user conductor 2021-08-28 02:30:19.798457 I | auth: deleting token BzwwJbyXvxzsqLNI.562 for user conductor 2021-08-28 02:30:21.145643 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.001684655s) to execute 2021-08-28 02:30:22.798416 I | auth: deleting token uKRyWIzbqCBJQdsv.564 for user conductor 2021-08-28 02:30:22.798451 I | auth: deleting token yJbLNupGCZFcOPVw.563 for user conductor 2021-08-28 02:30:23.798436 I | auth: deleting token VskCgVfEYvRcYQLK.565 for user conductor 2021-08-28 02:30:24.246508 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:27.798404 I | auth: deleting token YTrafUrsnpodLTfz.566 for user conductor 2021-08-28 02:30:27.844058 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (847.582274ms) to execute 2021-08-28 02:30:29.246648 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:30.798410 I | auth: deleting token oEWWMDanvwHDstyc.567 for user conductor 2021-08-28 02:30:34.246820 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:34.798395 I | auth: deleting token dnlUTfZCONFaGjib.568 for user conductor 2021-08-28 02:30:36.798403 I | auth: deleting token ilQiqQmLGTbgWHrq.569 for user conductor 2021-08-28 02:30:38.444305 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (798.690826ms) to execute 2021-08-28 02:30:38.798460 I | auth: deleting token vAnFZPZmBbBilaba.570 for user conductor 2021-08-28 02:30:38.798517 I | auth: deleting token cTaIYwmldapOhQHX.571 for user conductor 2021-08-28 02:30:39.247039 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:40.843852 I | auth: deleting token PlYkULeApZqYaRhS.572 for user conductor 2021-08-28 02:30:41.798446 I | auth: deleting token PpMHbvywBLEJIcAa.573 for user conductor 2021-08-28 02:30:42.349282 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (852.999264ms) to execute 2021-08-28 02:30:42.798436 I | auth: deleting token xQLJbBDlekoESUux.574 for user conductor 2021-08-28 02:30:43.446653 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (902.691155ms) to execute 2021-08-28 02:30:43.596473 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (147.83203ms) to execute 2021-08-28 02:30:44.247215 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:44.843822 I | auth: deleting token URclilEWowmwcFza.575 for user conductor 2021-08-28 02:30:45.798425 I | auth: deleting token BIZJqdXwPBrsjbNA.576 for user conductor 2021-08-28 02:30:45.845715 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (201.822495ms) to execute 2021-08-28 02:30:47.046430 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.14878414s) to execute 2021-08-28 02:30:49.247387 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:49.450291 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.152012223s) to execute 2021-08-28 02:30:49.798388 I | auth: deleting token SebchfFhoweeNNgb.579 for user conductor 2021-08-28 02:30:49.798420 I | auth: deleting token GjkWsXKddfQfszcE.578 for user conductor 2021-08-28 02:30:49.798435 I | auth: deleting token FEwfmsFACyZELlWm.580 for user conductor 2021-08-28 02:30:50.798368 I | auth: deleting token uQqAONhazzRKxElZ.581 for user conductor 2021-08-28 02:30:54.247524 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:30:54.798470 I | auth: deleting token HaqjklyVpzKlAcUX.583 for user conductor 2021-08-28 02:30:55.798518 I | auth: deleting token xIzTkcVWOraGMmYP.582 for user conductor 2021-08-28 02:30:55.798569 I | auth: deleting token RmuiyMEuNdOuicbj.586 for user conductor 2021-08-28 02:30:55.798581 I | auth: deleting token ftEcqJCuDupNjKqS.585 for user conductor 2021-08-28 02:30:55.798589 I | auth: deleting token jIefCJhKDqOFxZAO.584 for user conductor 2021-08-28 02:30:57.798516 I | auth: deleting token cTBtxktQbqKiaokB.587 for user conductor 2021-08-28 02:30:59.247703 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:01.798452 I | auth: deleting token zPiHsQiqqblPahWy.588 for user conductor 2021-08-28 02:31:01.798482 I | auth: deleting token xvhEMqeQIPDzeyuA.590 for user conductor 2021-08-28 02:31:01.798496 I | auth: deleting token jZdTTXaZzEHrcbub.591 for user conductor 2021-08-28 02:31:01.798505 I | auth: deleting token SFrKqcOFtnzWIBMV.589 for user conductor 2021-08-28 02:31:01.798510 I | auth: deleting token XcrPZSLvpxnAdsig.592 for user conductor 2021-08-28 02:31:02.944316 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.198393173s) to execute 2021-08-28 02:31:03.196296 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (197.96805ms) to execute 2021-08-28 02:31:03.198215 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.715704ms) to execute 2021-08-28 02:31:04.247881 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:05.452595 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.154704086s) to execute 2021-08-28 02:31:05.596347 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (141.698045ms) to execute 2021-08-28 02:31:05.798441 I | auth: deleting token pbuaCghNwoDcZaxy.594 for user conductor 2021-08-28 02:31:05.798572 I | auth: deleting token BCNWiSzCYFjwnOlm.593 for user conductor 2021-08-28 02:31:06.843823 I | auth: deleting token hPVmzHqWkopyxSum.595 for user conductor 2021-08-28 02:31:06.843875 I | auth: deleting token mwjbFmmCrRcgvqJk.597 for user conductor 2021-08-28 02:31:06.843884 I | auth: deleting token uWfgyTuzqTnCHNxP.596 for user conductor 2021-08-28 02:31:09.248087 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:10.798461 I | auth: deleting token TCIXPQYfniULpwRw.598 for user conductor 2021-08-28 02:31:10.798509 I | auth: deleting token BViftGKnylVwQLlN.600 for user conductor 2021-08-28 02:31:10.798520 I | auth: deleting token ljXukLKQoNgHoEoc.599 for user conductor 2021-08-28 02:31:13.798407 I | auth: deleting token BLBciYgTYOigbbfO.601 for user conductor 2021-08-28 02:31:13.798446 I | auth: deleting token iJvOZThuHeVcfNFI.602 for user conductor 2021-08-28 02:31:13.798458 I | auth: deleting token ZFrZsYueZItgEDUV.603 for user conductor 2021-08-28 02:31:14.248297 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:15.798464 I | auth: deleting token NxExqfeolvzFtRjk.605 for user conductor 2021-08-28 02:31:16.798421 I | auth: deleting token SenbJJPyOrThmvgS.604 for user conductor 2021-08-28 02:31:16.798469 I | auth: deleting token FtwgGwIndagTqGNj.606 for user conductor 2021-08-28 02:31:19.248555 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:19.798390 I | auth: deleting token ieICrpXuZXSQYWjE.607 for user conductor 2021-08-28 02:31:23.798432 I | auth: deleting token wUnKSFtcUJumeWzD.608 for user conductor 2021-08-28 02:31:24.248806 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:27.798437 I | auth: deleting token JOZyZIZQuNfwYYAa.609 for user conductor 2021-08-28 02:31:28.798413 I | auth: deleting token RyJiiaOfNZWLgWuN.610 for user conductor 2021-08-28 02:31:29.249102 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:30.798466 I | auth: deleting token UiduQOynCOVrVrqP.611 for user conductor 2021-08-28 02:31:30.846451 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.101351472s) to execute 2021-08-28 02:31:31.798410 I | auth: deleting token xEHnokEOtKhiurMH.612 for user conductor 2021-08-28 02:31:31.798452 I | auth: deleting token amJlIiftumhOfXyv.613 for user conductor 2021-08-28 02:31:32.798433 I | auth: deleting token OmQvUTtVNbIdplBg.614 for user conductor 2021-08-28 02:31:33.449308 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.151283362s) to execute 2021-08-28 02:31:34.252835 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:34.746854 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (750.472379ms) to execute 2021-08-28 02:31:34.798448 I | auth: deleting token ASvBxiCjIPcDnXBo.615 for user conductor 2021-08-28 02:31:35.798447 I | auth: deleting token KsYvIocjpRAdoeJk.616 for user conductor 2021-08-28 02:31:37.843893 I | auth: deleting token opyYwXvNKhYbGkSY.618 for user conductor 2021-08-28 02:31:37.843933 I | auth: deleting token efXEcSzeNwjqIRfI.617 for user conductor 2021-08-28 02:31:38.251987 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.499343894s) to execute 2021-08-28 02:31:39.253031 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:39.449331 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.197235851s) to execute 2021-08-28 02:31:39.543894 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.199777766s) to execute 2021-08-28 02:31:39.798399 I | auth: deleting token vpZPhxDNurvEOgQJ.619 for user conductor 2021-08-28 02:31:41.798484 I | auth: deleting token bZsAtEWxnCfknXEY.620 for user conductor 2021-08-28 02:31:42.798396 I | auth: deleting token NrkXzAvxkuyIKJBT.621 for user conductor 2021-08-28 02:31:44.253213 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:46.798405 I | auth: deleting token LEdQZjUUiZWPzvhc.622 for user conductor 2021-08-28 02:31:49.253415 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:50.798420 I | auth: deleting token kPFlaPoxDqOFcJdo.623 for user conductor 2021-08-28 02:31:54.253627 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:54.798423 I | auth: deleting token QKhqquJmGksCRkaU.624 for user conductor 2021-08-28 02:31:55.798401 I | auth: deleting token kpKwRREYecUpacUa.625 for user conductor 2021-08-28 02:31:57.798410 I | auth: deleting token yeQmdEPaFFBqJAne.626 for user conductor 2021-08-28 02:31:58.798542 I | auth: deleting token VxCnAYANRpeApzeP.627 for user conductor 2021-08-28 02:31:59.253815 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:31:59.798393 I | auth: deleting token ppkFAJPVboZIrZQP.628 for user conductor 2021-08-28 02:32:01.247204 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (603.268767ms) to execute 2021-08-28 02:32:02.452038 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.154373209s) to execute 2021-08-28 02:32:02.798435 I | auth: deleting token vFdOLSxRzryXUerg.629 for user conductor 2021-08-28 02:32:03.798422 I | auth: deleting token VaiVcXfMpSzArNCn.630 for user conductor 2021-08-28 02:32:04.253994 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:07.798412 I | auth: deleting token GzwDfIoxJEBguZrZ.636 for user conductor 2021-08-28 02:32:07.798452 I | auth: deleting token DYBRnaOuDIliXheN.634 for user conductor 2021-08-28 02:32:07.798474 I | auth: deleting token SSZGEsaYYkoSVuCC.633 for user conductor 2021-08-28 02:32:07.798480 I | auth: deleting token rplvAkHjuCAvaCEW.632 for user conductor 2021-08-28 02:32:07.798487 I | auth: deleting token ihrcUWkIjDdoCzAv.637 for user conductor 2021-08-28 02:32:09.254227 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:10.798412 I | auth: deleting token jTriENUKlfBguXPk.639 for user conductor 2021-08-28 02:32:10.798453 I | auth: deleting token vuYhOJMhqAgdYmLq.638 for user conductor 2021-08-28 02:32:13.798426 I | auth: deleting token YdCyNrRbznhzEXYA.642 for user conductor 2021-08-28 02:32:13.798465 I | auth: deleting token zEeDMnBVgrjIjVoz.640 for user conductor 2021-08-28 02:32:13.798482 I | auth: deleting token WfuAdjZBwumESqrm.641 for user conductor 2021-08-28 02:32:14.254418 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:16.798436 I | auth: deleting token ueJjVmmDoRbRSiME.643 for user conductor 2021-08-28 02:32:19.343844 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:20.050153 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.051988778s) to execute 2021-08-28 02:32:20.798479 I | auth: deleting token ImwRSaCHLNAsfenP.644 for user conductor 2021-08-28 02:32:23.798423 I | auth: deleting token rThYnsXdQqXAaLCg.645 for user conductor 2021-08-28 02:32:24.344036 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:25.946505 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.548265468s) to execute 2021-08-28 02:32:26.843895 I | auth: deleting token SmdPtXjCkfsuvDFs.646 for user conductor 2021-08-28 02:32:26.843976 I | auth: deleting token vIrZcZjbowlRtlWR.647 for user conductor 2021-08-28 02:32:27.247638 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.792617051s) to execute 2021-08-28 02:32:28.548434 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.204346408s) to execute 2021-08-28 02:32:28.548580 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.299017914s) to execute 2021-08-28 02:32:28.548658 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.29907186s) to execute 2021-08-28 02:32:28.551100 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.301164131s) to execute 2021-08-28 02:32:28.798426 I | auth: deleting token ynhHovdeRBwoyoWj.648 for user conductor 2021-08-28 02:32:29.344247 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:31.045602 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.147284903s) to execute 2021-08-28 02:32:32.798404 I | auth: deleting token fWqKsJRsqxbgJSZS.649 for user conductor 2021-08-28 02:32:32.798444 I | auth: deleting token abrPEmbmYPdbsAnc.651 for user conductor 2021-08-28 02:32:32.798454 I | auth: deleting token eQGRuRXYlyqkerNQ.650 for user conductor 2021-08-28 02:32:32.798464 I | auth: deleting token aQWQEkIWKwGDUVkv.652 for user conductor 2021-08-28 02:32:33.448483 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.052238777s) to execute 2021-08-28 02:32:33.798450 I | auth: deleting token auMAAqhgzVVsViVd.653 for user conductor 2021-08-28 02:32:34.344468 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:38.798431 I | auth: deleting token lgsbdsHVbHbKLigD.654 for user conductor 2021-08-28 02:32:38.798473 I | auth: deleting token JsBhcNbjvzcYpLAg.655 for user conductor 2021-08-28 02:32:39.344705 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:39.798417 I | auth: deleting token TeJNtfsByjShwadR.657 for user conductor 2021-08-28 02:32:39.798458 I | auth: deleting token WJqFIYWqVGZqzMge.658 for user conductor 2021-08-28 02:32:39.798480 I | auth: deleting token bPvZUyCpnAmNpuxH.656 for user conductor 2021-08-28 02:32:40.644260 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (247.470181ms) to execute 2021-08-28 02:32:43.798416 I | auth: deleting token fkpRtIJCGnOZXDmg.659 for user conductor 2021-08-28 02:32:44.344909 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:44.798440 I | auth: deleting token NxfckMevcikrNEtn.661 for user conductor 2021-08-28 02:32:44.798516 I | auth: deleting token cYwOISXPZMdkXTZv.660 for user conductor 2021-08-28 02:32:44.798531 I | auth: deleting token ZkIKIUiHbAVroZMF.663 for user conductor 2021-08-28 02:32:44.798542 I | auth: deleting token DSjDRlVzKmfHRJMI.662 for user conductor 2021-08-28 02:32:45.344903 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (700.804396ms) to execute 2021-08-28 02:32:47.843779 I | auth: deleting token xeSarLcrLkjgqCMZ.664 for user conductor 2021-08-28 02:32:49.150683 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (754.35164ms) to execute 2021-08-28 02:32:49.345089 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:50.347424 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.150905325s) to execute 2021-08-28 02:32:50.496624 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (146.502918ms) to execute 2021-08-28 02:32:51.798420 I | auth: deleting token GAxTqTcPdKPhnsyq.665 for user conductor 2021-08-28 02:32:54.345316 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:56.798432 I | auth: deleting token csRQeCZlAqtMlWVJ.667 for user conductor 2021-08-28 02:32:56.798484 I | auth: deleting token MqYcdTRNOqTikfWv.666 for user conductor 2021-08-28 02:32:57.798437 I | auth: deleting token JdSxZjzburGzmPKj.669 for user conductor 2021-08-28 02:32:59.345544 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:32:59.798416 I | auth: deleting token dPbrqvtZolKcFoFQ.672 for user conductor 2021-08-28 02:32:59.798452 I | auth: deleting token tPUeViTbAJcIrLJo.671 for user conductor 2021-08-28 02:33:02.798411 I | auth: deleting token XZnUDZBBZvRdOOyx.675 for user conductor 2021-08-28 02:33:02.798449 I | auth: deleting token lAuQiUjbAgyhNFzu.674 for user conductor 2021-08-28 02:33:04.345723 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:05.798403 I | auth: deleting token WEVggiZRowpvGoEz.678 for user conductor 2021-08-28 02:33:05.798449 I | auth: deleting token bnvWNyujgiyBATgN.676 for user conductor 2021-08-28 02:33:05.798463 I | auth: deleting token KjQCNqEWnUYETrGq.677 for user conductor 2021-08-28 02:33:07.798451 I | auth: deleting token BzNoEyGUTNLapODs.679 for user conductor 2021-08-28 02:33:09.345969 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:09.798424 I | auth: deleting token qqBVxDvtqGUyKQXQ.680 for user conductor 2021-08-28 02:33:10.798452 I | auth: deleting token csjNOTaVUXrNAwMl.681 for user conductor 2021-08-28 02:33:12.798392 I | auth: deleting token xHReJlAiqUQveFII.682 for user conductor 2021-08-28 02:33:13.798409 I | auth: deleting token futWIbKAbobKwxnr.683 for user conductor 2021-08-28 02:33:13.798450 I | auth: deleting token mSaJMgrerJBiGuSS.684 for user conductor 2021-08-28 02:33:13.852259 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.354470763s) to execute 2021-08-28 02:33:14.096639 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (152.547724ms) to execute 2021-08-28 02:33:14.099025 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.669526ms) to execute 2021-08-28 02:33:14.346195 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:15.798454 I | auth: deleting token cHukdSxosTcCYpap.685 for user conductor 2021-08-28 02:33:16.798381 I | auth: deleting token QmhvxtulQScnsyZW.686 for user conductor 2021-08-28 02:33:17.843848 I | auth: deleting token NzVNcczJkUxCJeAy.687 for user conductor 2021-08-28 02:33:18.798417 I | auth: deleting token GOQqfeYysUaRWPBT.688 for user conductor 2021-08-28 02:33:18.852141 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (806.203105ms) to execute 2021-08-28 02:33:19.346472 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:20.798425 I | auth: deleting token UCCiIGdCeOeQiGYm.689 for user conductor 2021-08-28 02:33:22.798465 I | auth: deleting token cSUugrjiqUtvzJTK.690 for user conductor 2021-08-28 02:33:22.798553 I | auth: deleting token hKrWKskFxOeJJQdi.691 for user conductor 2021-08-28 02:33:22.798592 I | auth: deleting token dvgZzYIFJwBSqRMg.692 for user conductor 2021-08-28 02:33:24.346720 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:24.798458 I | auth: deleting token WjSOpJtBvLEomVqb.693 for user conductor 2021-08-28 02:33:25.798455 I | auth: deleting token tMjgYLelNvNpOpQi.695 for user conductor 2021-08-28 02:33:26.798433 I | auth: deleting token mCvZnFnIBHmIaLaY.694 for user conductor 2021-08-28 02:33:26.798466 I | auth: deleting token yhqYacrHXufCkKWq.696 for user conductor 2021-08-28 02:33:28.798393 I | auth: deleting token KbuAStbATNVRsmVT.697 for user conductor 2021-08-28 02:33:29.346963 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:29.798442 I | auth: deleting token XHhDJzQQqzYvlvoi.699 for user conductor 2021-08-28 02:33:29.798489 I | auth: deleting token hUCOGjpnHLWGhUlG.700 for user conductor 2021-08-28 02:33:29.798502 I | auth: deleting token ZKBAvuIhKiWPoSmq.698 for user conductor 2021-08-28 02:33:30.798479 I | auth: deleting token LjqBnonoUaTEEWQH.701 for user conductor 2021-08-28 02:33:32.798460 I | auth: deleting token YVduxriOCENSJuXG.702 for user conductor 2021-08-28 02:33:33.798431 I | auth: deleting token rvoQxDNRPVWwfJKs.703 for user conductor 2021-08-28 02:33:33.798538 I | auth: deleting token CkpjVSFJOTveJlQb.704 for user conductor 2021-08-28 02:33:34.044268 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.146280175s) to execute 2021-08-28 02:33:34.347197 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:36.544779 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.148448409s) to execute 2021-08-28 02:33:36.796376 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (147.609028ms) to execute 2021-08-28 02:33:36.798389 I | auth: deleting token tKtrpFuLEnKBwZWA.705 for user conductor 2021-08-28 02:33:37.798402 I | auth: deleting token XldGkQnQnszBfHfK.706 for user conductor 2021-08-28 02:33:38.798522 I | auth: deleting token gUEQhxOzlXumgqWn.707 for user conductor 2021-08-28 02:33:39.347432 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:40.798535 I | auth: deleting token SkJDmjrsKkAwrJDt.708 for user conductor 2021-08-28 02:33:44.347622 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:44.798424 I | auth: deleting token NkaBUINkAxUoTFUT.709 for user conductor 2021-08-28 02:33:47.798440 I | auth: deleting token KUzQOVDsTJYMhrbZ.710 for user conductor 2021-08-28 02:33:49.347841 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:51.798436 I | auth: deleting token WmSEJbkkQklYwiru.711 for user conductor 2021-08-28 02:33:53.248798 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (151.152855ms) to execute 2021-08-28 02:33:54.348029 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:33:54.843805 I | auth: deleting token VlvexUFxVIsJVYxs.713 for user conductor 2021-08-28 02:33:54.843848 I | auth: deleting token iBDZVWDcGsLHIKmE.714 for user conductor 2021-08-28 02:33:54.843855 I | auth: deleting token ktXTVqYOkfvgFpXo.715 for user conductor 2021-08-28 02:33:55.750311 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.05374713s) to execute 2021-08-28 02:33:56.798421 I | auth: deleting token FTUctcTqumWlFvwR.717 for user conductor 2021-08-28 02:33:57.048766 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.052219786s) to execute 2021-08-28 02:33:57.048894 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.104881831s) to execute 2021-08-28 02:33:57.798427 I | auth: deleting token PBTUiizlnDqQRVRZ.719 for user conductor 2021-08-28 02:33:57.798470 I | auth: deleting token QIaqqIhTixpfRYQz.718 for user conductor 2021-08-28 02:33:58.843850 I | auth: deleting token FdkVMIkZiLVxwrRL.720 for user conductor 2021-08-28 02:33:59.348237 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:01.798411 I | auth: deleting token UPvDThOZFIXOUXUn.721 for user conductor 2021-08-28 02:34:04.348529 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:05.798403 I | auth: deleting token OUqyfjUjNyHkUDMy.722 for user conductor 2021-08-28 02:34:09.348746 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:09.798402 I | auth: deleting token bhcGpGQdDyrsGsSs.723 for user conductor 2021-08-28 02:34:10.798404 I | auth: deleting token lMgGKfwJwmbRETPe.724 for user conductor 2021-08-28 02:34:12.798453 I | auth: deleting token WgkGFHfWMfAmnvJU.725 for user conductor 2021-08-28 02:34:13.798567 I | auth: deleting token ZQnhFylhwJnNKTvi.726 for user conductor 2021-08-28 02:34:13.798620 I | auth: deleting token ULJdXQIzDSDHPdZu.727 for user conductor 2021-08-28 02:34:14.053076 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.397994369s) to execute 2021-08-28 02:34:14.348951 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:15.544059 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (947.720491ms) to execute 2021-08-28 02:34:16.798418 I | auth: deleting token zVZMWwYxmLCpMNnN.728 for user conductor 2021-08-28 02:34:17.798505 I | auth: deleting token nuVXTmZBvpFIwmbi.729 for user conductor 2021-08-28 02:34:17.798562 I | auth: deleting token YOMAZdZhtKKfYbBz.731 for user conductor 2021-08-28 02:34:18.248653 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.552106488s) to execute 2021-08-28 02:34:19.349167 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:19.798441 I | auth: deleting token eTdpLTPvPdgQGlgn.732 for user conductor 2021-08-28 02:34:21.798485 I | auth: deleting token muUyRURyUMWoXDCB.733 for user conductor 2021-08-28 02:34:21.798534 I | auth: deleting token SsKaHwCILVPIUVtl.734 for user conductor 2021-08-28 02:34:22.147646 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.302380469s) to execute 2021-08-28 02:34:22.296573 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (146.919037ms) to execute 2021-08-28 02:34:23.798450 I | auth: deleting token qcAZvuOILTgKGbaq.735 for user conductor 2021-08-28 02:34:24.349421 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:24.747275 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.149052037s) to execute 2021-08-28 02:34:25.953366 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.056791503s) to execute 2021-08-28 02:34:25.953563 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.109576351s) to execute 2021-08-28 02:34:27.247931 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.292572135s) to execute 2021-08-28 02:34:27.248056 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201088385s) to execute 2021-08-28 02:34:27.798441 I | auth: deleting token vLKHSUelIABDyhRM.737 for user conductor 2021-08-28 02:34:28.544260 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.198941005s) to execute 2021-08-28 02:34:28.544433 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.294340833s) to execute 2021-08-28 02:34:29.444019 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:30.843852 I | auth: deleting token rIZdwXMKplsNXXPd.738 for user conductor 2021-08-28 02:34:30.948328 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.40117177s) to execute 2021-08-28 02:34:30.948805 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.40267184s) to execute 2021-08-28 02:34:32.147977 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.103724815s) to execute 2021-08-28 02:34:32.148138 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.103794365s) to execute 2021-08-28 02:34:32.148198 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.100051234s) to execute 2021-08-28 02:34:33.351300 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.107362545s) to execute 2021-08-28 02:34:33.798427 I | auth: deleting token TYHaeGklwBRHvKWm.739 for user conductor 2021-08-28 02:34:34.444199 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:34.551292 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.054890408s) to execute 2021-08-28 02:34:35.944783 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.299489267s) to execute 2021-08-28 02:34:35.944957 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.391245572s) to execute 2021-08-28 02:34:36.097151 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (150.500423ms) to execute 2021-08-28 02:34:37.798462 I | auth: deleting token dyegDEtiDwXvRFek.741 for user conductor 2021-08-28 02:34:38.548084 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.004096024s) to execute 2021-08-28 02:34:38.798418 I | auth: deleting token rQNWgQhzjichBEUI.742 for user conductor 2021-08-28 02:34:39.444420 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:41.843815 I | auth: deleting token dDItpuNPIzkbeSoh.743 for user conductor 2021-08-28 02:34:41.843850 I | auth: deleting token GqGncLShovujjoFm.744 for user conductor 2021-08-28 02:34:42.249722 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.204367156s) to execute 2021-08-28 02:34:42.798440 I | auth: deleting token XSPVQsrqaQCMuPvd.745 for user conductor 2021-08-28 02:34:44.444640 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:44.798387 I | auth: deleting token ZOEGAxYpRhETXOTm.746 for user conductor 2021-08-28 02:34:44.798429 I | auth: deleting token hHHyTgeUPEewULce.747 for user conductor 2021-08-28 02:34:45.798440 I | auth: deleting token QdSmmdKPKKTmbKha.748 for user conductor 2021-08-28 02:34:45.798496 I | auth: deleting token dOYAslEcKSmaRUkG.749 for user conductor 2021-08-28 02:34:46.798437 I | auth: deleting token haxpwrHiprFBEvLQ.750 for user conductor 2021-08-28 02:34:49.444858 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:49.798434 I | auth: deleting token suhrbVPUUcVZPvhi.751 for user conductor 2021-08-28 02:34:49.798569 I | auth: deleting token bjmjdZpQdycQaQgw.752 for user conductor 2021-08-28 02:34:50.444624 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (897.552515ms) to execute 2021-08-28 02:34:51.798372 I | auth: deleting token nBaJnFnvrIQCLpVd.753 for user conductor 2021-08-28 02:34:53.843790 I | auth: deleting token RGslZdMHLzsIPAAN.755 for user conductor 2021-08-28 02:34:53.843833 I | auth: deleting token wiOKZFNloSxJuvoq.754 for user conductor 2021-08-28 02:34:54.050745 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (104.804541ms) to execute 2021-08-28 02:34:54.445072 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:55.798523 I | auth: deleting token KYAzYwkUDOYpWPLI.757 for user conductor 2021-08-28 02:34:56.798462 I | auth: deleting token qdSlgbSZHWdbhzzT.758 for user conductor 2021-08-28 02:34:57.798469 I | auth: deleting token fTJJqFHoGHgegQFw.759 for user conductor 2021-08-28 02:34:58.798514 I | auth: deleting token vbZUqOhopGGszvee.760 for user conductor 2021-08-28 02:34:59.445391 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:34:59.798534 I | auth: deleting token TYMwNhYtuJHFuzKp.761 for user conductor 2021-08-28 02:35:00.798423 I | auth: deleting token flXVaiuefhOxjPln.762 for user conductor 2021-08-28 02:35:04.445674 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:35:05.798464 I | auth: deleting token cdHQUIaMTEhJjvsO.765 for user conductor 2021-08-28 02:35:05.798509 I | auth: deleting token IZweaBchtOOqGRtc.763 for user conductor 2021-08-28 02:35:05.798516 I | auth: deleting token qGNRLXhxvRjlMDuj.764 for user conductor 2021-08-28 02:35:05.798564 I | auth: deleting token uXagaoVjsCInfqwc.767 for user conductor 2021-08-28 02:35:05.798578 I | auth: deleting token eSWaKgSHtgHyIcer.766 for user conductor 2021-08-28 02:35:09.445881 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:35:10.798388 I | auth: deleting token ObewbvwhVdMiOXAS.769 for user conductor 2021-08-28 02:35:10.798431 I | auth: deleting token bZQwBODldMNbzQBZ.770 for user conductor 2021-08-28 02:35:10.798439 I | auth: deleting token wccxDbpeGBvreGzV.772 for user conductor 2021-08-28 02:35:10.798445 I | auth: deleting token xjpqSbJXcgSEaFnF.771 for user conductor 2021-08-28 02:35:10.798452 I | auth: deleting token DKmgyVvIsmDGGEOU.768 for user conductor 2021-08-28 02:35:13.252568 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.154174213s) to execute 2021-08-28 02:35:14.446066 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:35:14.843843 I | auth: deleting token FPBYFLlySvmyVFDT.774 for user conductor 2021-08-28 02:35:15.548671 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (604.683776ms) to execute 2021-08-28 02:35:15.798413 I | auth: deleting token kHzxzKDdnEAUNeEh.776 for user conductor 2021-08-28 02:35:15.798451 I | auth: deleting token zpbJcJJdqtKnPDVr.775 for user conductor 2021-08-28 02:35:15.798459 I | auth: deleting token aIngyiioQduDdZhl.777 for user conductor 2021-08-28 02:35:15.798470 I | auth: deleting token sUiPQAPRvEBcRkiB.778 for user conductor 2021-08-28 02:35:15.798477 I | auth: deleting token RengljGyJiwQthWE.773 for user conductor 2021-08-28 02:35:16.852299 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.156061869s) to execute 2021-08-28 02:35:18.798433 I | auth: deleting token BMewrZfdeqBUVFLa.780 for user conductor 2021-08-28 02:35:18.798496 I | auth: deleting token UkmgMQQCKYVqRLIh.779 for user conductor 2021-08-28 02:35:19.446241 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:35:19.544415 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.100267147s) to execute 2021-08-28 02:35:21.798406 I | auth: deleting token prjcdawtBXzYAaEs.781 for user conductor 2021-08-28 02:35:21.798450 I | auth: deleting token JTqqjgRzOiJvCsBQ.782 for user conductor 2021-08-28 02:35:21.798459 I | auth: deleting token iVYgipaEvkZXITqD.783 for user conductor 2021-08-28 02:35:22.244836 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.100825838s) to execute 2021-08-28 02:35:23.798395 I | auth: deleting token hDFjIQwkubgsPsDI.784 for user conductor 2021-08-28 02:35:24.446489 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:35:24.798493 I | auth: deleting token lhbUUlgIMzOZTpbM.785 for user conductor 2021-08-28 02:35:26.445957 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.101943683s) to execute 2021-08-28 02:35:27.844302 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.200172307s) to execute 2021-08-28 02:35:27.844463 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.300295437s) to execute 2021-08-28 02:35:27.898660 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.354426612s) to execute 2021-08-28 02:35:27.997646 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (148.892989ms) to execute 2021-08-28 02:35:28.798432 I | auth: deleting token YBuBmLRJQGAuTWLW.786 for user conductor 2021-08-28 02:35:28.798503 I | auth: deleting token anUzRCGjwEfWKOVX.787 for user conductor 2021-08-28 02:35:29.544076 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:35:29.798447 I | auth: deleting token dqyROyktyOWberNq.788 for user conductor 2021-08-28 02:35:30.798446 I | auth: deleting token eYsLlvPyCwVxlMUY.789 for user conductor 2021-08-28 02:35:32.344007 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.690161016s) to execute 2021-08-28 02:35:33.549225 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103300851s) to execute 2021-08-28 02:35:33.549362 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.202932971s) to execute 2021-08-28 02:35:33.549424 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.20324551s) to execute 2021-08-28 02:35:34.544362 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:35:34.798438 I | auth: deleting token ntnikTMhFDksBBXs.790 for user conductor 2021-08-28 02:35:34.944697 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.297261149s) to execute 2021-08-28 02:35:35.843810 I | auth: deleting token SxxJZyIqpkiJLlpj.791 for user conductor 2021-08-28 02:35:36.343889 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.945889184s) to execute 2021-08-28 02:35:37.645921 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.249517465s) to execute 2021-08-28 02:35:38.843817 I | auth: deleting token QhnAsRGnNLGpDyrM.792 for user conductor 2021-08-28 02:35:38.843877 I | auth: deleting token YVlhGJRDOxNWJWJR.793 for user conductor 2021-08-28 02:35:38.947414 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.248922517s) to execute 2021-08-28 02:35:38.947712 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.299794066s) to execute 2021-08-28 02:35:38.948110 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.6018761s) to execute 2021-08-28 02:35:39.544611 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:35:39.798461 I | auth: deleting token YjlPaLEtVAfXVpqU.794 for user conductor 2021-08-28 02:35:41.798452 I | auth: deleting token BtmhGBQSkblvzDiO.795 for user conductor 2021-08-28 02:35:42.798407 I | auth: deleting token eZPAvQrbKRSnuwYl.796 for user conductor 2021-08-28 02:35:43.798409 I | auth: deleting token NdezaQRdxuKfebcb.798 for user conductor 2021-08-28 02:35:43.798455 I | auth: deleting token SobkYdNogJWWubrT.797 for user conductor 2021-08-28 02:35:44.245590 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.747339049s) to execute 2021-08-28 02:35:44.396586 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (148.701396ms) to execute 2021-08-28 02:35:44.497660 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (249.595527ms) to execute 2021-08-28 02:35:44.497719 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (249.451002ms) to execute 2021-08-28 02:35:44.544879 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:35:44.596448 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.279141ms) to execute 2021-08-28 02:35:46.798421 I | auth: deleting token hylHwfFImhmLcYaR.799 for user conductor 2021-08-28 02:35:47.145901 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.201845038s) to execute 2021-08-28 02:35:47.798442 I | auth: deleting token zKSGxsDPXeBmDhpW.800 for user conductor 2021-08-28 02:35:47.798506 I | auth: deleting token WGZZDFcrBeBszGfE.801 for user conductor 2021-08-28 02:35:49.545105 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:35:49.798471 I | auth: deleting token eglmpaLpWWtMjFJY.802 for user conductor 2021-08-28 02:35:49.798520 I | auth: deleting token sBLnbgMzRBmtNtTi.803 for user conductor 2021-08-28 02:35:49.798530 I | auth: deleting token DAHiUawdSuNZvNLh.804 for user conductor 2021-08-28 02:35:51.798400 I | auth: deleting token CYdAFnhXzsYiDIyW.805 for user conductor 2021-08-28 02:35:52.798383 I | auth: deleting token DvNzZanmBnPgyrQC.806 for user conductor 2021-08-28 02:35:54.545308 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:35:56.798458 I | auth: deleting token sWwjIMvcCrfMdwzl.807 for user conductor 2021-08-28 02:35:59.545619 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:00.798494 I | auth: deleting token DWBtZoDfYtVvisqs.808 for user conductor 2021-08-28 02:36:03.798373 I | auth: deleting token IouxqHsCPurrvgcB.810 for user conductor 2021-08-28 02:36:03.798411 I | auth: deleting token QUEWSIhKrTGMMqqQ.809 for user conductor 2021-08-28 02:36:04.545771 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:05.644504 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (400.491521ms) to execute 2021-08-28 02:36:05.798461 I | auth: deleting token aYTmODbXspRmaJnw.811 for user conductor 2021-08-28 02:36:05.798498 I | auth: deleting token jcwJnIIQbycEDlwa.812 for user conductor 2021-08-28 02:36:05.798514 I | auth: deleting token tWWqWKPAxjCDfWpL.813 for user conductor 2021-08-28 02:36:06.949095 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.251324791s) to execute 2021-08-28 02:36:08.245959 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.294520943s) to execute 2021-08-28 02:36:08.246173 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.102002361s) to execute 2021-08-28 02:36:08.396385 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (148.17421ms) to execute 2021-08-28 02:36:08.798449 I | auth: deleting token NVIouuIMLhMXWrBh.815 for user conductor 2021-08-28 02:36:08.798500 I | auth: deleting token mgIWyqjnukCklFnK.814 for user conductor 2021-08-28 02:36:09.545953 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:09.651150 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.253131437s) to execute 2021-08-28 02:36:10.945553 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.749069061s) to execute 2021-08-28 02:36:11.798452 I | auth: deleting token YxxYPVRoDpEIuhOY.816 for user conductor 2021-08-28 02:36:12.246616 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.297530554s) to execute 2021-08-28 02:36:12.246771 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.102614959s) to execute 2021-08-28 02:36:13.649013 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.250544241s) to execute 2021-08-28 02:36:14.546214 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:14.949287 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.705371399s) to execute 2021-08-28 02:36:15.843858 I | auth: deleting token zLYgKOPHeCDOgksB.818 for user conductor 2021-08-28 02:36:16.252972 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.20888789s) to execute 2021-08-28 02:36:16.343884 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.199825961s) to execute 2021-08-28 02:36:19.549288 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:19.798407 I | auth: deleting token HpIDBJsvaNLnvAFb.819 for user conductor 2021-08-28 02:36:22.798418 I | auth: deleting token RcjPbWbOehdlVCNW.820 for user conductor 2021-08-28 02:36:24.549494 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:26.798435 I | auth: deleting token urqMofwTaGzbhdpR.821 for user conductor 2021-08-28 02:36:28.798427 I | auth: deleting token CdBjVuzFfUvMSDuV.822 for user conductor 2021-08-28 02:36:29.643829 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:31.844006 I | auth: deleting token vRzpsxClxGMFylQy.826 for user conductor 2021-08-28 02:36:31.844047 I | auth: deleting token NTsmDAUhnFTHgHHa.823 for user conductor 2021-08-28 02:36:31.844058 I | auth: deleting token oQqxKscsvcdVmxXA.824 for user conductor 2021-08-28 02:36:33.843791 I | auth: deleting token JiMdqbxBuVPMPYKH.828 for user conductor 2021-08-28 02:36:33.843841 I | auth: deleting token LPHErHSuXDkncAmc.829 for user conductor 2021-08-28 02:36:34.644074 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:34.798464 I | auth: deleting token GkoriiGcLsqaokPm.831 for user conductor 2021-08-28 02:36:39.644396 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:39.798444 I | auth: deleting token PcBcEiGoRfrTqqdD.836 for user conductor 2021-08-28 02:36:39.798507 I | auth: deleting token UBsEgeaZUyntmxHd.832 for user conductor 2021-08-28 02:36:39.798545 I | auth: deleting token doEndCqrFWXPxUDk.834 for user conductor 2021-08-28 02:36:39.798560 I | auth: deleting token BRmMPZpMfZBSurUz.833 for user conductor 2021-08-28 02:36:39.798571 I | auth: deleting token DZfFuOwdNUafKUyh.835 for user conductor 2021-08-28 02:36:41.798506 I | auth: deleting token GSgjjqmhBncQmDUX.838 for user conductor 2021-08-28 02:36:43.798422 I | auth: deleting token JazHvpDmHyQwpuOg.839 for user conductor 2021-08-28 02:36:44.644672 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:46.798446 I | auth: deleting token MLOHGoWAFEMkjLzH.840 for user conductor 2021-08-28 02:36:49.645010 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:49.798432 I | auth: deleting token CcYfrpssnNKTraNT.841 for user conductor 2021-08-28 02:36:53.798451 I | auth: deleting token faqxFdgRfOykPSwV.842 for user conductor 2021-08-28 02:36:54.645372 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:36:56.798416 I | auth: deleting token hxfoRLvesnugJawF.843 for user conductor 2021-08-28 02:36:58.798411 I | auth: deleting token mvyfXrCCCQoiVRVG.844 for user conductor 2021-08-28 02:36:59.250234 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.006054431s) to execute 2021-08-28 02:36:59.596490 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (197.710107ms) to execute 2021-08-28 02:36:59.645585 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:00.798453 I | auth: deleting token pDlslDmDMBNSbmrz.845 for user conductor 2021-08-28 02:37:00.847526 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (749.2982ms) to execute 2021-08-28 02:37:01.798491 I | auth: deleting token nDeJiCaxjJxzrsvZ.846 for user conductor 2021-08-28 02:37:02.798403 I | auth: deleting token kTMunCbSlOjdSBsu.848 for user conductor 2021-08-28 02:37:02.798443 I | auth: deleting token foPPMhTLfZPBmUlM.847 for user conductor 2021-08-28 02:37:03.446352 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.449690438s) to execute 2021-08-28 02:37:04.645794 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:04.798462 I | auth: deleting token nLkowfpYpOrFhJKN.849 for user conductor 2021-08-28 02:37:06.046699 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.55014244s) to execute 2021-08-28 02:37:06.046876 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.598687883s) to execute 2021-08-28 02:37:06.046929 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.598303283s) to execute 2021-08-28 02:37:06.197503 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (148.711918ms) to execute 2021-08-28 02:37:08.843814 I | auth: deleting token vyeRoIdwDBmViQlf.850 for user conductor 2021-08-28 02:37:09.645983 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:11.798417 I | auth: deleting token QlpaRxbWqESMkVGp.851 for user conductor 2021-08-28 02:37:12.949432 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.205366328s) to execute 2021-08-28 02:37:13.196448 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (152.432949ms) to execute 2021-08-28 02:37:13.196587 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (152.583591ms) to execute 2021-08-28 02:37:13.198259 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (154.250008ms) to execute 2021-08-28 02:37:13.198335 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (154.272584ms) to execute 2021-08-28 02:37:14.646216 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:15.798429 I | auth: deleting token VzejrUbahYqMnoXT.852 for user conductor 2021-08-28 02:37:16.798471 I | auth: deleting token inrpkasCgBzzwZno.853 for user conductor 2021-08-28 02:37:17.798517 I | auth: deleting token OiYykJTaPRkkZWLk.854 for user conductor 2021-08-28 02:37:19.646407 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:19.798479 I | auth: deleting token mzaefUytayYRNxgQ.855 for user conductor 2021-08-28 02:37:20.798466 I | auth: deleting token CWOVwUyhgyBgYoIv.856 for user conductor 2021-08-28 02:37:20.798506 I | auth: deleting token PrOxdvTwiBSOiEJI.857 for user conductor 2021-08-28 02:37:22.798447 I | auth: deleting token fhMliGAwnRAJEoGZ.858 for user conductor 2021-08-28 02:37:22.798513 I | auth: deleting token OmtYyUGKofSfwOmQ.859 for user conductor 2021-08-28 02:37:24.646624 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:28.798408 I | auth: deleting token znZXCcDeIvFshbSj.863 for user conductor 2021-08-28 02:37:28.798443 I | auth: deleting token lnTJOKXCJvpsnXKt.861 for user conductor 2021-08-28 02:37:28.798451 I | auth: deleting token xMuvWCZZtEkgDLny.864 for user conductor 2021-08-28 02:37:28.798460 I | auth: deleting token dhlfyLHDJwoZRWrj.862 for user conductor 2021-08-28 02:37:28.798467 I | auth: deleting token YmvQwypkTnjXXonD.860 for user conductor 2021-08-28 02:37:29.646834 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:31.798406 I | auth: deleting token FCUFVfOQlPJXCDvb.866 for user conductor 2021-08-28 02:37:31.798441 I | auth: deleting token KIHCGPPQtaAFdhDJ.865 for user conductor 2021-08-28 02:37:33.798444 I | auth: deleting token ukyNpIFgvZXHIUMz.869 for user conductor 2021-08-28 02:37:33.798507 I | auth: deleting token TaZkIkFMYkKLJTrh.868 for user conductor 2021-08-28 02:37:33.798521 I | auth: deleting token vlddcApFzxnIIjPp.867 for user conductor 2021-08-28 02:37:34.647069 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:34.798418 I | auth: deleting token cldcrVAPiREKEDqQ.870 for user conductor 2021-08-28 02:37:36.810333 I | auth: deleting token AzWoEOZoIUExRAeo.871 for user conductor 2021-08-28 02:37:37.444822 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (448.21478ms) to execute 2021-08-28 02:37:38.743873 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.245584034s) to execute 2021-08-28 02:37:39.647226 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:40.798443 I | auth: deleting token oxsrRxbPLrcNptZK.872 for user conductor 2021-08-28 02:37:40.798501 I | auth: deleting token TweEVpjuDgjmtPtO.873 for user conductor 2021-08-28 02:37:41.344036 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.497990103s) to execute 2021-08-28 02:37:42.798451 I | auth: deleting token jUSMPunXgLDZcNup.875 for user conductor 2021-08-28 02:37:44.647443 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:44.950505 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.053997422s) to execute 2021-08-28 02:37:45.843801 I | auth: deleting token NVHLiPEBXfHfKufS.878 for user conductor 2021-08-28 02:37:45.843839 I | auth: deleting token uUohtvlbYyZOtGUc.877 for user conductor 2021-08-28 02:37:46.454002 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (709.940507ms) to execute 2021-08-28 02:37:46.843875 I | auth: deleting token ZuDMgfMzObrTaAwi.879 for user conductor 2021-08-28 02:37:48.843916 I | auth: deleting token LsDQuNtyPktdtFqw.880 for user conductor 2021-08-28 02:37:49.647626 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:49.798406 I | auth: deleting token PKsaonQpZYiLYvcj.881 for user conductor 2021-08-28 02:37:50.798423 I | auth: deleting token GFhqTkbiQScllGjW.882 for user conductor 2021-08-28 02:37:50.798465 I | auth: deleting token dVtudXKoYkciGXwE.883 for user conductor 2021-08-28 02:37:52.798375 I | auth: deleting token IRteEXrUkkOybnQV.884 for user conductor 2021-08-28 02:37:53.946607 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (450.028325ms) to execute 2021-08-28 02:37:54.647853 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:55.798435 I | auth: deleting token pJUaqqoxvgIJBAbF.885 for user conductor 2021-08-28 02:37:59.648094 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:37:59.798492 I | auth: deleting token QqQomRwwGhfmNGvq.886 for user conductor 2021-08-28 02:38:02.798493 I | auth: deleting token zHzcNrnfZgOcbyOy.887 for user conductor 2021-08-28 02:38:04.648290 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:06.798460 I | auth: deleting token NwXMWPRcNWPzRgiB.888 for user conductor 2021-08-28 02:38:08.798432 I | auth: deleting token EpmFwoopwuSTGfDU.889 for user conductor 2021-08-28 02:38:09.144585 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (748.09899ms) to execute 2021-08-28 02:38:09.648467 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:10.798526 I | auth: deleting token ffbjSyOoufHEEHNy.890 for user conductor 2021-08-28 02:38:10.798568 I | auth: deleting token hxyKzvZPefgnsPxV.891 for user conductor 2021-08-28 02:38:14.648670 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:14.798431 I | auth: deleting token AumPYvCiXZjAeRJb.894 for user conductor 2021-08-28 02:38:14.798477 I | auth: deleting token yxTlFyUSzkEgxryU.893 for user conductor 2021-08-28 02:38:14.798492 I | auth: deleting token xJTDeEpuMaeOXDKi.895 for user conductor 2021-08-28 02:38:14.798498 I | auth: deleting token etBsLLZOXHsqqLVn.896 for user conductor 2021-08-28 02:38:15.798462 I | auth: deleting token GzZZFolgdltCHZuK.897 for user conductor 2021-08-28 02:38:17.798393 I | auth: deleting token KYfSrugELUbPcOPV.898 for user conductor 2021-08-28 02:38:19.648863 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:19.798400 I | auth: deleting token YSjJvWwZauiwflPh.900 for user conductor 2021-08-28 02:38:19.798447 I | auth: deleting token hfmeqUeaKcuTYyVV.899 for user conductor 2021-08-28 02:38:21.798393 I | auth: deleting token NRDyIJeMurvCRkvG.901 for user conductor 2021-08-28 02:38:21.798446 I | auth: deleting token zzpBaqTUlGVGEaQL.902 for user conductor 2021-08-28 02:38:22.798385 I | auth: deleting token AzVPIsbTfIjLCawf.903 for user conductor 2021-08-28 02:38:24.649090 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:25.798440 I | auth: deleting token lnRxSjJlTwXFHNXT.904 for user conductor 2021-08-28 02:38:28.396602 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (198.16011ms) to execute 2021-08-28 02:38:28.798461 I | auth: deleting token wAlztUXBOEQyRpOD.905 for user conductor 2021-08-28 02:38:29.649284 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:31.798421 I | auth: deleting token PGpIwdAfUqhqhZpH.906 for user conductor 2021-08-28 02:38:34.649512 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:34.798429 I | auth: deleting token PeRnPfJmOyrdlCgO.908 for user conductor 2021-08-28 02:38:34.798482 I | auth: deleting token pxNdGLmGuRWsJxNw.907 for user conductor 2021-08-28 02:38:36.798425 I | auth: deleting token yWzBPfnZCAEFDfit.912 for user conductor 2021-08-28 02:38:36.798465 I | auth: deleting token PbIyLrPDKHGQOHUy.909 for user conductor 2021-08-28 02:38:36.798475 I | auth: deleting token nAdCfZVBcQwaFimm.910 for user conductor 2021-08-28 02:38:37.151201 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.152115828s) to execute 2021-08-28 02:38:38.448651 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.152008098s) to execute 2021-08-28 02:38:39.656104 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:39.843789 I | auth: deleting token ZJyqahksEYxroQgi.913 for user conductor 2021-08-28 02:38:42.444333 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.847615759s) to execute 2021-08-28 02:38:42.444494 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.90048359s) to execute 2021-08-28 02:38:42.596475 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.751987ms) to execute 2021-08-28 02:38:42.596647 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.471412ms) to execute 2021-08-28 02:38:42.798414 I | auth: deleting token TKUXTCbInydmnZsT.914 for user conductor 2021-08-28 02:38:44.743779 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:46.798468 I | auth: deleting token CffkSvGvQoBDMSOe.915 for user conductor 2021-08-28 02:38:49.146304 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.149853895s) to execute 2021-08-28 02:38:49.344047 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.022326ms) to execute 2021-08-28 02:38:49.344277 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.244437ms) to execute 2021-08-28 02:38:49.397308 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.062522ms) to execute 2021-08-28 02:38:49.397425 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (153.276584ms) to execute 2021-08-28 02:38:49.496593 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.515447ms) to execute 2021-08-28 02:38:49.743967 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:49.843840 I | auth: deleting token GVZAyJhRbhnRBYCq.916 for user conductor 2021-08-28 02:38:51.096503 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (298.205713ms) to execute 2021-08-28 02:38:51.798434 I | auth: deleting token ejDxAkJAbvEqZYzw.917 for user conductor 2021-08-28 02:38:53.798479 I | auth: deleting token EQNRCRVqcdxjqXww.921 for user conductor 2021-08-28 02:38:53.798549 I | auth: deleting token SGLOHLcaznQFHJLY.919 for user conductor 2021-08-28 02:38:53.946694 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.150403154s) to execute 2021-08-28 02:38:54.744228 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:56.744724 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.148325636s) to execute 2021-08-28 02:38:57.798409 I | auth: deleting token cRvNgVNTopFjhBLA.924 for user conductor 2021-08-28 02:38:57.798453 I | auth: deleting token fxsbdLQgxwwbHAjY.922 for user conductor 2021-08-28 02:38:57.798466 I | auth: deleting token hTQwocpLTTmwqefN.923 for user conductor 2021-08-28 02:38:57.798471 I | auth: deleting token shjvQqTXukZVNbYM.925 for user conductor 2021-08-28 02:38:58.798431 I | auth: deleting token XyoPQhQTwDMTMSJt.926 for user conductor 2021-08-28 02:38:59.744412 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:38:59.798434 I | auth: deleting token LINqjZFLtgfxlimP.927 for user conductor 2021-08-28 02:39:01.646866 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (550.146812ms) to execute 2021-08-28 02:39:01.798436 I | auth: deleting token ryEAYxddrlLogUVX.928 for user conductor 2021-08-28 02:39:01.798546 I | auth: deleting token xQzXJdnmEdQmyQUy.929 for user conductor 2021-08-28 02:39:04.744622 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:04.798427 I | auth: deleting token AkhbtDDlvCwiUaNH.930 for user conductor 2021-08-28 02:39:06.347976 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.051745502s) to execute 2021-08-28 02:39:07.798406 I | auth: deleting token xREtXnNnvxrOISAP.931 for user conductor 2021-08-28 02:39:07.996734 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (197.423099ms) to execute 2021-08-28 02:39:08.843860 I | auth: deleting token OamkZocJdiEyFCAy.932 for user conductor 2021-08-28 02:39:09.248268 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (704.316724ms) to execute 2021-08-28 02:39:09.744793 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:10.798543 I | auth: deleting token ZlcsxOeLfyPFUAys.934 for user conductor 2021-08-28 02:39:10.798588 I | auth: deleting token vfuXSBRfhYeaGUzy.933 for user conductor 2021-08-28 02:39:14.745044 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:14.798438 I | auth: deleting token dkLVbmEUKoPNKxXY.936 for user conductor 2021-08-28 02:39:14.798475 I | auth: deleting token XwLrItRCAuGWflav.937 for user conductor 2021-08-28 02:39:14.798487 I | auth: deleting token pePPPXSRJikSpgoI.935 for user conductor 2021-08-28 02:39:15.697532 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (148.750645ms) to execute 2021-08-28 02:39:15.798470 I | auth: deleting token bNYcnuAxHptLmfVe.938 for user conductor 2021-08-28 02:39:16.951513 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (255.134086ms) to execute 2021-08-28 02:39:18.798461 I | auth: deleting token PxuSJoaLjwgXnEbC.940 for user conductor 2021-08-28 02:39:18.798510 I | auth: deleting token HPViYkfOZckPpuLj.942 for user conductor 2021-08-28 02:39:18.798525 I | auth: deleting token NdiysyyzRXtbkRDn.941 for user conductor 2021-08-28 02:39:18.798542 I | auth: deleting token wJWYMkkMcBzJQBdg.939 for user conductor 2021-08-28 02:39:19.745301 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:21.947156 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (803.009268ms) to execute 2021-08-28 02:39:22.843836 I | auth: deleting token QqzoFXlPNyfsPTgV.944 for user conductor 2021-08-28 02:39:22.843977 I | auth: deleting token GYVApxIXKKakPAnc.943 for user conductor 2021-08-28 02:39:22.844006 I | auth: deleting token MgjNvSCUxttjjmYV.945 for user conductor 2021-08-28 02:39:22.844053 I | auth: deleting token RzBcVwgymklHVmxQ.946 for user conductor 2021-08-28 02:39:24.745495 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:26.151498 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (855.145296ms) to execute 2021-08-28 02:39:26.798457 I | auth: deleting token CqFFBjhDMdKqxljn.948 for user conductor 2021-08-28 02:39:26.798523 I | auth: deleting token cdxxTHffYwSBpmDb.947 for user conductor 2021-08-28 02:39:26.798540 I | auth: deleting token DjbEvuZMBpAaeXfn.949 for user conductor 2021-08-28 02:39:28.798429 I | auth: deleting token fHpMHZKKlSvwPEkv.950 for user conductor 2021-08-28 02:39:29.745771 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:30.247632 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.149144141s) to execute 2021-08-28 02:39:31.798414 I | auth: deleting token xgeiTdnJomGzZvfh.954 for user conductor 2021-08-28 02:39:31.798453 I | auth: deleting token jYzjoYatyBkaFsAA.953 for user conductor 2021-08-28 02:39:31.798466 I | auth: deleting token OgZETetIVNGLWFTX.951 for user conductor 2021-08-28 02:39:31.798480 I | auth: deleting token peJgFKpEzyEIPYIF.952 for user conductor 2021-08-28 02:39:32.798463 I | auth: deleting token yhmPzzxzWvaHTzJr.955 for user conductor 2021-08-28 02:39:33.445307 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.24758633s) to execute 2021-08-28 02:39:34.745960 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:34.798405 I | auth: deleting token pvulDZzafBMoFMTF.956 for user conductor 2021-08-28 02:39:36.798475 I | auth: deleting token NYISlBSKFEopcOcU.958 for user conductor 2021-08-28 02:39:36.798534 I | auth: deleting token WQazbqOfcTXrBnsQ.957 for user conductor 2021-08-28 02:39:36.798552 I | auth: deleting token sXicSNbDSBTDdPPK.959 for user conductor 2021-08-28 02:39:38.651786 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.752832047s) to execute 2021-08-28 02:39:38.798392 I | auth: deleting token NNzdXBbpzxsPjAPW.961 for user conductor 2021-08-28 02:39:38.798432 I | auth: deleting token yUNhFbZzAIWFjsQR.960 for user conductor 2021-08-28 02:39:38.798444 I | auth: deleting token ONErswhAHOGmWaff.962 for user conductor 2021-08-28 02:39:38.896641 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.646987ms) to execute 2021-08-28 02:39:38.899243 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (155.248794ms) to execute 2021-08-28 02:39:38.899296 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (100.754667ms) to execute 2021-08-28 02:39:38.899346 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (155.217176ms) to execute 2021-08-28 02:39:39.746156 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:40.151606 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (407.47643ms) to execute 2021-08-28 02:39:41.544528 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.20040876s) to execute 2021-08-28 02:39:41.696625 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.944072ms) to execute 2021-08-28 02:39:42.798381 I | auth: deleting token qBWACFyidcSsixbf.964 for user conductor 2021-08-28 02:39:42.798418 I | auth: deleting token PoMVoIZliBXAmlwE.963 for user conductor 2021-08-28 02:39:42.798432 I | auth: deleting token QEDqKRzAJgztlRgQ.965 for user conductor 2021-08-28 02:39:44.148397 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.104401476s) to execute 2021-08-28 02:39:44.297052 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.482383ms) to execute 2021-08-28 02:39:44.496597 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (197.924218ms) to execute 2021-08-28 02:39:44.746367 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:46.798439 I | auth: deleting token DQKFfXToGLqwllTd.966 for user conductor 2021-08-28 02:39:47.798430 I | auth: deleting token RkaczsFJbBcfJUzD.967 for user conductor 2021-08-28 02:39:49.746566 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:50.798361 I | auth: deleting token iZcOmWVfBJRqxYtb.968 for user conductor 2021-08-28 02:39:50.798401 I | auth: deleting token RAEbTzmdKCnSfmEi.969 for user conductor 2021-08-28 02:39:51.798420 I | auth: deleting token ijMBxHxLpSmBZLJw.970 for user conductor 2021-08-28 02:39:53.843794 I | auth: deleting token tLAfwnTYrrOFQLxL.971 for user conductor 2021-08-28 02:39:54.445072 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (147.25656ms) to execute 2021-08-28 02:39:54.746766 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:54.843874 I | auth: deleting token ztaFqvBPXScfrDsZ.973 for user conductor 2021-08-28 02:39:54.843920 I | auth: deleting token kmgaGqgyekCPQZTY.972 for user conductor 2021-08-28 02:39:55.650599 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.152035073s) to execute 2021-08-28 02:39:56.949541 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.202980643s) to execute 2021-08-28 02:39:56.949623 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.005567659s) to execute 2021-08-28 02:39:57.096524 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (144.741214ms) to execute 2021-08-28 02:39:57.843810 I | auth: deleting token rNLwDpFPGUrJIflB.975 for user conductor 2021-08-28 02:39:57.843895 I | auth: deleting token RZusooZSaBSaxFTE.974 for user conductor 2021-08-28 02:39:58.351972 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.253493896s) to execute 2021-08-28 02:39:58.352919 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (408.843152ms) to execute 2021-08-28 02:39:59.746955 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:39:59.748001 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.247137481s) to execute 2021-08-28 02:40:01.044178 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.24777638s) to execute 2021-08-28 02:40:01.296706 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.698171ms) to execute 2021-08-28 02:40:01.843823 I | auth: deleting token qQEnksfoUMgaRLNq.976 for user conductor 2021-08-28 02:40:02.649235 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.005204856s) to execute 2021-08-28 02:40:03.950140 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.252406742s) to execute 2021-08-28 02:40:04.096474 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (144.31939ms) to execute 2021-08-28 02:40:04.747196 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:40:04.798497 I | auth: deleting token AVRpNVivOGvbHXYp.977 for user conductor 2021-08-28 02:40:06.749340 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.652844654s) to execute 2021-08-28 02:40:08.798448 I | auth: deleting token zTOGEmUbOaYNsBTh.979 for user conductor 2021-08-28 02:40:09.747447 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:40:10.798490 I | auth: deleting token pBEjctiAXfdkiJSq.980 for user conductor 2021-08-28 02:40:13.798449 I | auth: deleting token yxRrCDOraPlmPGgR.981 for user conductor 2021-08-28 02:40:13.798496 I | auth: deleting token bHqjOfdkjjDPNIWl.982 for user conductor 2021-08-28 02:40:14.747719 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:40:15.798508 I | auth: deleting token oyHKcchAdXwAqfQM.983 for user conductor 2021-08-28 02:40:17.798431 I | auth: deleting token MvdsoaOKndSuxhFn.984 for user conductor 2021-08-28 02:40:17.798491 I | auth: deleting token KHlMRCGkdqSfiQce.985 for user conductor 2021-08-28 02:40:19.747979 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:40:19.798449 I | auth: deleting token PCwwHzyqjYmuFClj.987 for user conductor 2021-08-28 02:40:19.798530 I | auth: deleting token TUQHDpIRscheFUnX.988 for user conductor 2021-08-28 02:40:19.798549 I | auth: deleting token XZxNOQEJvjnkltPh.986 for user conductor 2021-08-28 02:40:22.798453 I | auth: deleting token EkMpepkBjJQhkZtf.989 for user conductor 2021-08-28 02:40:22.798517 I | auth: deleting token TmPnSmklrRvCfUdM.990 for user conductor 2021-08-28 02:40:24.748235 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:40:25.948479 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.15067585s) to execute 2021-08-28 02:40:26.843812 I | auth: deleting token DYsrIrbjfQEmTqTH.991 for user conductor 2021-08-28 02:40:28.798430 I | auth: deleting token XUjpzWaWeMEnVMKm.993 for user conductor 2021-08-28 02:40:28.798472 I | auth: deleting token yiiSZbrCbxYkOtJG.994 for user conductor 2021-08-28 02:40:28.798484 I | auth: deleting token qGOrimBNkWHnPikc.992 for user conductor 2021-08-28 02:40:28.798506 I | auth: deleting token tgLjSodLUDfwKJlP.996 for user conductor 2021-08-28 02:40:28.798519 I | auth: deleting token dfWTqpqGiqMdidod.995 for user conductor 2021-08-28 02:40:29.748464 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:40:31.244450 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (445.082136ms) to execute 2021-08-28 02:40:32.798445 I | auth: deleting token LqxFrpkJADDkUfPi.998 for user conductor 2021-08-28 02:40:33.798455 I | auth: deleting token HkSkyUbAiiXorIEH.999 for user conductor 2021-08-28 02:40:33.798492 I | auth: deleting token iigWmLJbHtvBZZlo.997 for user conductor 2021-08-28 02:40:33.798502 I | auth: deleting token TzzhtyQAREaINdVR.1000 for user conductor 2021-08-28 02:40:34.748749 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:40:36.798445 I | auth: deleting token PwUZqGMiAjRonAVJ.1001 for user conductor 2021-08-28 02:40:37.798420 I | auth: deleting token phQIVaozVCATqfbL.1002 for user conductor 2021-08-28 02:40:39.748993 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:40:39.798435 I | auth: deleting token nMSteJgVFNMVPykh.1004 for user conductor 2021-08-28 02:40:39.798479 I | auth: deleting token xMVEmJaGdCnVtJlI.1003 for user conductor 2021-08-28 02:40:39.798487 I | auth: deleting token lSSMrdsjuEfvyoiZ.1006 for user conductor 2021-08-28 02:40:39.798498 I | auth: deleting token qIpfuTabhypoIQNw.1005 for user conductor 2021-08-28 02:40:40.247999 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.151450637s) to execute 2021-08-28 02:40:41.946393 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (646.14787ms) to execute 2021-08-28 02:40:44.749268 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:40:44.798484 I | auth: deleting token JOpqgqjNtHNzSkba.1009 for user conductor 2021-08-28 02:40:44.798534 I | auth: deleting token HoVGNToNYGtpNWTU.1011 for user conductor 2021-08-28 02:40:44.798551 I | auth: deleting token zAUDCqstdnDTTeOb.1007 for user conductor 2021-08-28 02:40:44.798560 I | auth: deleting token gWYXgTznSwBcvGeu.1010 for user conductor 2021-08-28 02:40:44.798565 I | auth: deleting token dxoNBAVImIHeNzcn.1008 for user conductor 2021-08-28 02:40:45.745244 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.698705955s) to execute 2021-08-28 02:40:46.947673 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.199595462s) to execute 2021-08-28 02:40:46.948006 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.200247456s) to execute 2021-08-28 02:40:46.950338 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.10643108s) to execute 2021-08-28 02:40:47.798529 I | auth: deleting token SoaAzaTQVEZHtfYX.1014 for user conductor 2021-08-28 02:40:47.798583 I | auth: deleting token DIGYjuWxxNetTwec.1013 for user conductor 2021-08-28 02:40:47.798597 I | auth: deleting token EbeQOoDciFDnYEHj.1012 for user conductor 2021-08-28 02:40:48.346176 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.299905064s) to execute 2021-08-28 02:40:49.749518 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:40:50.798426 I | auth: deleting token BZSAJbjrnbyJEvcZ.1015 for user conductor 2021-08-28 02:40:51.850106 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.153756798s) to execute 2021-08-28 02:40:53.798435 I | auth: deleting token IRRnMffprypUWKUK.1016 for user conductor 2021-08-28 02:40:54.749728 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:40:57.798409 I | auth: deleting token KqSEmcbwzhIXiair.1017 for user conductor 2021-08-28 02:40:59.749916 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:01.798423 I | auth: deleting token DaqePKuvpwzfpTEA.1018 for user conductor 2021-08-28 02:41:04.750141 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:04.798436 I | auth: deleting token TJygAxAHRQCdZtfm.1019 for user conductor 2021-08-28 02:41:05.798441 I | auth: deleting token qQGoteCVfReLDdsq.1020 for user conductor 2021-08-28 02:41:07.348450 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.351936989s) to execute 2021-08-28 02:41:07.843873 I | auth: deleting token XObEeljKfrzHvQrU.1021 for user conductor 2021-08-28 02:41:08.843837 I | auth: deleting token pWSKSFGyNTWyGeyF.1023 for user conductor 2021-08-28 02:41:08.843900 I | auth: deleting token UkkWaFwcdImEwRPr.1022 for user conductor 2021-08-28 02:41:08.845960 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.399901341s) to execute 2021-08-28 02:41:08.846204 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.402168608s) to execute 2021-08-28 02:41:08.897950 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.453868649s) to execute 2021-08-28 02:41:09.750360 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:10.152585 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.304679582s) to execute 2021-08-28 02:41:10.152661 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.208731494s) to execute 2021-08-28 02:41:11.445775 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.101669622s) to execute 2021-08-28 02:41:11.798415 I | auth: deleting token hadWwnmYchBJVLEv.1026 for user conductor 2021-08-28 02:41:11.798469 I | auth: deleting token EriieITAoDkEWRPV.1024 for user conductor 2021-08-28 02:41:12.744480 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.295996559s) to execute 2021-08-28 02:41:12.843873 I | auth: deleting token lLXNLQgIutVhhcFQ.1028 for user conductor 2021-08-28 02:41:12.843922 I | auth: deleting token JbqTCxWfNTvQulfy.1027 for user conductor 2021-08-28 02:41:13.948886 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.204301873s) to execute 2021-08-28 02:41:13.949215 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.501459001s) to execute 2021-08-28 02:41:14.843894 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:15.248655 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.501455501s) to execute 2021-08-28 02:41:15.249589 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.202567137s) to execute 2021-08-28 02:41:15.249846 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.205718359s) to execute 2021-08-28 02:41:15.843817 I | auth: deleting token kCeGaoFMeXLnIhXV.1029 for user conductor 2021-08-28 02:41:15.843903 I | auth: deleting token SnBFpKDxLmrDmFjl.1030 for user conductor 2021-08-28 02:41:16.798465 I | auth: deleting token xVefeHgRssHMGFcy.1031 for user conductor 2021-08-28 02:41:16.798508 I | auth: deleting token wzaJjMKxyOArIyGc.1032 for user conductor 2021-08-28 02:41:17.752312 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.488106682s) to execute 2021-08-28 02:41:17.752390 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.405004449s) to execute 2021-08-28 02:41:17.843798 I | auth: deleting token QLGjocuwvJcTdqcD.1033 for user conductor 2021-08-28 02:41:19.047469 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.400483004s) to execute 2021-08-28 02:41:19.844310 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:20.345224 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.289163699s) to execute 2021-08-28 02:41:20.345438 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.290324148s) to execute 2021-08-28 02:41:20.399076 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.253248716s) to execute 2021-08-28 02:41:21.644339 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.296970447s) to execute 2021-08-28 02:41:21.644480 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.244535216s) to execute 2021-08-28 02:41:21.798440 I | auth: deleting token xvsPnZmxgvVFHIkD.1034 for user conductor 2021-08-28 02:41:24.047945 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.349334156s) to execute 2021-08-28 02:41:24.844548 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:25.344738 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.400780805s) to execute 2021-08-28 02:41:25.798382 I | auth: deleting token xjtspDnDWPMwmpiD.1035 for user conductor 2021-08-28 02:41:26.544047 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.197194485s) to execute 2021-08-28 02:41:26.544209 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.04756603s) to execute 2021-08-28 02:41:26.544384 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.197438437s) to execute 2021-08-28 02:41:26.696467 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (150.105089ms) to execute 2021-08-28 02:41:29.798402 I | auth: deleting token uqTAHWQrjLlgYGAK.1036 for user conductor 2021-08-28 02:41:29.844775 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:30.798455 I | auth: deleting token SsstkyoFebuopYbR.1037 for user conductor 2021-08-28 02:41:32.798431 I | auth: deleting token XHiigcuUpGAoIyrr.1038 for user conductor 2021-08-28 02:41:33.798403 I | auth: deleting token ECPLRIgowSvwxshg.1039 for user conductor 2021-08-28 02:41:34.798397 I | auth: deleting token qLxuqbAEQWzIsfpl.1040 for user conductor 2021-08-28 02:41:34.844981 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:37.798448 I | auth: deleting token SkLjZMJLhYAxaMvQ.1041 for user conductor 2021-08-28 02:41:38.948479 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (849.473928ms) to execute 2021-08-28 02:41:39.845189 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:40.798478 I | auth: deleting token SgRypUGlpoIkGwtH.1042 for user conductor 2021-08-28 02:41:44.798419 I | auth: deleting token GGFngnLVIPgCmmsE.1043 for user conductor 2021-08-28 02:41:44.845374 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:46.152293 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.702220025s) to execute 2021-08-28 02:41:47.449496 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.203866379s) to execute 2021-08-28 02:41:47.449842 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.277151395s) to execute 2021-08-28 02:41:47.450119 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.277150986s) to execute 2021-08-28 02:41:47.544212 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.371455368s) to execute 2021-08-28 02:41:48.798439 I | auth: deleting token JROgJenGtukpKovi.1044 for user conductor 2021-08-28 02:41:49.845521 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:49.953464 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.054973382s) to execute 2021-08-28 02:41:50.096570 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (140.623486ms) to execute 2021-08-28 02:41:52.752271 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.208254645s) to execute 2021-08-28 02:41:52.798412 I | auth: deleting token GtGDxQvOfrQtHbkY.1046 for user conductor 2021-08-28 02:41:52.897796 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (143.7071ms) to execute 2021-08-28 02:41:54.845834 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:41:56.798425 I | auth: deleting token xaLuPJrRtrELCeQg.1048 for user conductor 2021-08-28 02:41:56.798480 I | auth: deleting token yMmpbjvtcTyHgoeW.1047 for user conductor 2021-08-28 02:41:59.798395 I | auth: deleting token lzXZlsECDuCZUZiW.1051 for user conductor 2021-08-28 02:41:59.798440 I | auth: deleting token dovWetSYMlfjMoQK.1050 for user conductor 2021-08-28 02:41:59.846079 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:01.798438 I | auth: deleting token hEbIdecyUtFyDBwm.1053 for user conductor 2021-08-28 02:42:04.846242 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:05.751974 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.055911993s) to execute 2021-08-28 02:42:05.997944 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (150.942462ms) to execute 2021-08-28 02:42:06.843784 I | auth: deleting token jNTwcbAcfRfmhvQw.1057 for user conductor 2021-08-28 02:42:06.843819 I | auth: deleting token fcmArhbKIydHyxPj.1055 for user conductor 2021-08-28 02:42:06.843826 I | auth: deleting token hOwSHeZbzhODkJtr.1056 for user conductor 2021-08-28 02:42:06.843849 I | auth: deleting token TVGzLaHTGsKHHCdI.1058 for user conductor 2021-08-28 02:42:06.843859 I | auth: deleting token UwNyhjWBblukWmqU.1059 for user conductor 2021-08-28 02:42:08.349914 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.153301706s) to execute 2021-08-28 02:42:09.549210 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.052827284s) to execute 2021-08-28 02:42:09.549575 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.105114877s) to execute 2021-08-28 02:42:09.846427 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:09.897568 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (197.542467ms) to execute 2021-08-28 02:42:13.798454 I | auth: deleting token HjStTTiVWAjYidUl.1062 for user conductor 2021-08-28 02:42:13.798501 I | auth: deleting token dBplJTKQuzLsmQrw.1064 for user conductor 2021-08-28 02:42:13.798510 I | auth: deleting token MXgBuXDCOoWrqKjp.1060 for user conductor 2021-08-28 02:42:13.798518 I | auth: deleting token uEKWjutgfbWCWLMv.1061 for user conductor 2021-08-28 02:42:13.798526 I | auth: deleting token HiKGEygNxeiRxWBZ.1063 for user conductor 2021-08-28 02:42:14.798409 I | auth: deleting token qtyrPLdssKJVOuVJ.1065 for user conductor 2021-08-28 02:42:14.846693 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:17.798523 I | auth: deleting token CqzApTTiaTgwuHJa.1066 for user conductor 2021-08-28 02:42:19.846903 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:21.798441 I | auth: deleting token YxPlgabgKQEuRJeq.1067 for user conductor 2021-08-28 02:42:24.847099 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:25.146716 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (650.332477ms) to execute 2021-08-28 02:42:25.798487 I | auth: deleting token MbkLiirHGWkcIOLj.1068 for user conductor 2021-08-28 02:42:29.798424 I | auth: deleting token eltfImFQaqijAaIk.1069 for user conductor 2021-08-28 02:42:29.847285 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:33.798406 I | auth: deleting token msBXqwGsJQBlNEFR.1070 for user conductor 2021-08-28 02:42:34.847537 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:36.545398 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.046975308s) to execute 2021-08-28 02:42:37.798371 I | auth: deleting token TdAjSNRyFWrGJrha.1071 for user conductor 2021-08-28 02:42:38.847269 I | auth: deleting token BUjmuEpmziGuIthg.1073 for user conductor 2021-08-28 02:42:39.943894 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:40.051822 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (655.386271ms) to execute 2021-08-28 02:42:41.346905 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.20081992s) to execute 2021-08-28 02:42:41.798428 I | auth: deleting token qLSxqpTTNrPsCudA.1077 for user conductor 2021-08-28 02:42:41.798474 I | auth: deleting token cQrODGfhDgFDsulW.1076 for user conductor 2021-08-28 02:42:41.798483 I | auth: deleting token VTrsokdrXkipNuKQ.1079 for user conductor 2021-08-28 02:42:41.798492 I | auth: deleting token VTAGOoPFGKQCQAYR.1074 for user conductor 2021-08-28 02:42:42.551628 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.054632276s) to execute 2021-08-28 02:42:42.551764 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.20293137s) to execute 2021-08-28 02:42:44.047031 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.049368513s) to execute 2021-08-28 02:42:44.944140 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:45.798404 I | auth: deleting token hcjNBRCZXAAFxJRr.1080 for user conductor 2021-08-28 02:42:45.798446 I | auth: deleting token VscSAZQDMDUsuIqk.1081 for user conductor 2021-08-28 02:42:46.448206 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.204047296s) to execute 2021-08-28 02:42:46.798430 I | auth: deleting token aHuOOQXQcwqGnsRU.1082 for user conductor 2021-08-28 02:42:46.798472 I | auth: deleting token SpgkwuiRPRprWdnj.1083 for user conductor 2021-08-28 02:42:48.798382 I | auth: deleting token UclHpUxxjWfzmITi.1084 for user conductor 2021-08-28 02:42:49.798431 I | auth: deleting token HSpVRDzCmuiHNuGD.1086 for user conductor 2021-08-28 02:42:49.798470 I | auth: deleting token dEJHjDkLkPThEwkk.1085 for user conductor 2021-08-28 02:42:49.944331 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:52.798443 I | auth: deleting token tPfdcFSMaHCYESOy.1087 for user conductor 2021-08-28 02:42:54.798425 I | auth: deleting token PlJBbdSrLfbAzStq.1089 for user conductor 2021-08-28 02:42:54.798467 I | auth: deleting token yXQkDQmhZAlVMSqX.1088 for user conductor 2021-08-28 02:42:54.944572 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:42:55.798408 I | auth: deleting token ImyamaVTEoEvBovy.1090 for user conductor 2021-08-28 02:42:57.843793 I | auth: deleting token qckZwCEXFuAXDTzP.1091 for user conductor 2021-08-28 02:42:57.843857 I | auth: deleting token LJRUMeXnrwyDVixA.1092 for user conductor 2021-08-28 02:42:58.247479 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (903.356726ms) to execute 2021-08-28 02:42:59.944726 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:00.798433 I | auth: deleting token TPeBtZxWfXYzhEKy.1093 for user conductor 2021-08-28 02:43:01.948521 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (752.056836ms) to execute 2021-08-28 02:43:04.945011 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:05.548269 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.400830006s) to execute 2021-08-28 02:43:05.798459 I | auth: deleting token MpdVHDlhmxMgOWLZ.1095 for user conductor 2021-08-28 02:43:06.751345 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.105303688s) to execute 2021-08-28 02:43:06.751750 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.190624707s) to execute 2021-08-28 02:43:06.754609 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.11053083s) to execute 2021-08-28 02:43:06.896209 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (142.35278ms) to execute 2021-08-28 02:43:06.996793 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (152.679137ms) to execute 2021-08-28 02:43:09.798422 I | auth: deleting token QdQKRgWLZPLYOmzI.1097 for user conductor 2021-08-28 02:43:09.798461 I | auth: deleting token tQgLHhqfsmyfIroE.1096 for user conductor 2021-08-28 02:43:09.945244 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:10.798481 I | auth: deleting token oTtKkrwhXnmRwsRo.1099 for user conductor 2021-08-28 02:43:11.751402 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.607494682s) to execute 2021-08-28 02:43:12.843797 I | auth: deleting token FlcXsVdpfYHjShAF.1101 for user conductor 2021-08-28 02:43:14.798433 I | auth: deleting token VVhncxPHOsokRfAa.1102 for user conductor 2021-08-28 02:43:14.945478 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:15.646663 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.35024908s) to execute 2021-08-28 02:43:15.796681 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (148.074621ms) to execute 2021-08-28 02:43:15.798429 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (149.545655ms) to execute 2021-08-28 02:43:16.798393 I | auth: deleting token kekJSCwwWEwzcCpo.1103 for user conductor 2021-08-28 02:43:19.945708 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:20.798480 I | auth: deleting token wGeIRhpaMUGYPanm.1104 for user conductor 2021-08-28 02:43:21.798495 I | auth: deleting token dJmVtOTQfbkaLvxI.1105 for user conductor 2021-08-28 02:43:24.798427 I | auth: deleting token VWlkfHNpLLLIpgcd.1106 for user conductor 2021-08-28 02:43:24.798463 I | auth: deleting token MuXXFzYDgvhsxyIu.1107 for user conductor 2021-08-28 02:43:24.945970 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:25.798500 I | auth: deleting token GJpeCcYTWCSEXAEl.1109 for user conductor 2021-08-28 02:43:28.798410 I | auth: deleting token ThzLAuttJIUXqFBZ.1111 for user conductor 2021-08-28 02:43:28.798510 I | auth: deleting token lCCKGDGNbLzfbcab.1110 for user conductor 2021-08-28 02:43:29.798409 I | auth: deleting token oWrtdViutcWRidXY.1112 for user conductor 2021-08-28 02:43:29.946192 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:32.798435 I | auth: deleting token hoOEVYadaamoPUGE.1113 for user conductor 2021-08-28 02:43:32.798480 I | auth: deleting token mlsAFtvtYqNhjzVb.1114 for user conductor 2021-08-28 02:43:33.752254 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.30719006s) to execute 2021-08-28 02:43:33.798400 I | auth: deleting token SRkhcVXrueLqmvth.1115 for user conductor 2021-08-28 02:43:33.898272 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (143.46317ms) to execute 2021-08-28 02:43:34.096559 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (248.994062ms) to execute 2021-08-28 02:43:34.946451 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:36.644955 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (800.97475ms) to execute 2021-08-28 02:43:36.798385 I | auth: deleting token htkBOJVoihmbvJFa.1116 for user conductor 2021-08-28 02:43:37.843864 I | auth: deleting token AhSphvoiCgiyRIzH.1117 for user conductor 2021-08-28 02:43:39.946740 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:42.798392 I | auth: deleting token CraAcCLrNVWLcrkt.1121 for user conductor 2021-08-28 02:43:42.798431 I | auth: deleting token gAQkiHPwnhZFeDQV.1119 for user conductor 2021-08-28 02:43:42.798442 I | auth: deleting token fwmrBEBcRqazCmww.1122 for user conductor 2021-08-28 02:43:42.798447 I | auth: deleting token SmVwulGSiRWfzhhN.1120 for user conductor 2021-08-28 02:43:42.798452 I | auth: deleting token RiagelSoxwtpOEnn.1123 for user conductor 2021-08-28 02:43:43.846202 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.148081071s) to execute 2021-08-28 02:43:43.997381 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (145.223985ms) to execute 2021-08-28 02:43:44.946865 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:46.346484 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.544828632s) to execute 2021-08-28 02:43:47.548435 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.104385417s) to execute 2021-08-28 02:43:49.798436 I | auth: deleting token MMStbdOacWAmrnxy.1128 for user conductor 2021-08-28 02:43:49.798489 I | auth: deleting token tMjnamqQQlOuiBAo.1124 for user conductor 2021-08-28 02:43:49.798497 I | auth: deleting token pgSLporinDmylKpU.1126 for user conductor 2021-08-28 02:43:49.798509 I | auth: deleting token llfJlJpntFSkoYJf.1125 for user conductor 2021-08-28 02:43:49.798533 I | auth: deleting token UzwRxrMXSDguGqxg.1127 for user conductor 2021-08-28 02:43:49.947064 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:50.051328 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.607310169s) to execute 2021-08-28 02:43:50.143930 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.399947964s) to execute 2021-08-28 02:43:50.144419 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.579373765s) to execute 2021-08-28 02:43:50.296076 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (149.560542ms) to execute 2021-08-28 02:43:50.296166 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.536726ms) to execute 2021-08-28 02:43:51.798457 I | auth: deleting token xtxAIkNgjqzMxulv.1129 for user conductor 2021-08-28 02:43:52.746560 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.148058482s) to execute 2021-08-28 02:43:54.798415 I | auth: deleting token ogfmsWLSHceZiZVx.1130 for user conductor 2021-08-28 02:43:54.798457 I | auth: deleting token JiqXnUeecZBkraDG.1132 for user conductor 2021-08-28 02:43:54.798471 I | auth: deleting token VZRJocqRxLmGdiJx.1131 for user conductor 2021-08-28 02:43:54.947315 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:43:55.444177 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.998884449s) to execute 2021-08-28 02:43:57.750534 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (953.004423ms) to execute 2021-08-28 02:43:57.798423 I | auth: deleting token JbGNcggbcFnOaKle.1134 for user conductor 2021-08-28 02:43:57.798459 I | auth: deleting token pgLAlZQtVBKFHkdV.1133 for user conductor 2021-08-28 02:43:57.798469 I | auth: deleting token hiNHPAtOuzHHJygW.1135 for user conductor 2021-08-28 02:43:58.950183 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.106204817s) to execute 2021-08-28 02:43:59.196491 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (150.091521ms) to execute 2021-08-28 02:43:59.947557 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:01.547589 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.201811857s) to execute 2021-08-28 02:44:01.798426 I | auth: deleting token PkVBrdJNPCdQIsei.1136 for user conductor 2021-08-28 02:44:02.746355 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.196543755s) to execute 2021-08-28 02:44:02.746627 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.049943927s) to execute 2021-08-28 02:44:02.798508 I | auth: deleting token wNdjEENmguAmhatR.1137 for user conductor 2021-08-28 02:44:03.798488 I | auth: deleting token YMaWZCxLRAVhFyZW.1139 for user conductor 2021-08-28 02:44:04.947736 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:06.548727 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.302868313s) to execute 2021-08-28 02:44:06.697777 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.902274ms) to execute 2021-08-28 02:44:06.798410 I | auth: deleting token xbXxBPXMlJaovmkh.1141 for user conductor 2021-08-28 02:44:06.798578 I | auth: deleting token yFEgKjsYcDeWAeDP.1142 for user conductor 2021-08-28 02:44:08.798426 I | auth: deleting token uitsbWpTjzxcUfqu.1143 for user conductor 2021-08-28 02:44:09.152133 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.555664228s) to execute 2021-08-28 02:44:09.798479 I | auth: deleting token FcFAZEpTYNejifeo.1145 for user conductor 2021-08-28 02:44:09.798533 I | auth: deleting token RFpVxKzQsWtBiGoM.1144 for user conductor 2021-08-28 02:44:09.947926 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:11.798452 I | auth: deleting token BlVxzvdZrflfUyyd.1146 for user conductor 2021-08-28 02:44:12.798423 I | auth: deleting token sUwkIgkafZpNfsvr.1147 for user conductor 2021-08-28 02:44:13.148255 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.851336347s) to execute 2021-08-28 02:44:13.148687 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.904642077s) to execute 2021-08-28 02:44:14.550941 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.206931057s) to execute 2021-08-28 02:44:14.798461 I | auth: deleting token XHZdycgyVFMOHIbT.1148 for user conductor 2021-08-28 02:44:14.948202 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:15.798470 I | auth: deleting token vWngZnTRPJWvIyyl.1149 for user conductor 2021-08-28 02:44:17.146925 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.50107318s) to execute 2021-08-28 02:44:17.296557 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (146.821254ms) to execute 2021-08-28 02:44:17.843830 I | auth: deleting token EmyZarLRLUupjIxl.1150 for user conductor 2021-08-28 02:44:17.843868 I | auth: deleting token DNwZydRTmNQsMLhw.1151 for user conductor 2021-08-28 02:44:18.798418 I | auth: deleting token KSXCxXHUeQCJVLih.1152 for user conductor 2021-08-28 02:44:19.949265 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:21.146173 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.598146504s) to execute 2021-08-28 02:44:21.297480 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.284839ms) to execute 2021-08-28 02:44:22.843765 I | auth: deleting token DjvGfFkAoSRKTPfr.1153 for user conductor 2021-08-28 02:44:22.843799 I | auth: deleting token WqDeSVkokoTPYVlG.1154 for user conductor 2021-08-28 02:44:23.843830 I | auth: deleting token awcQvMrJqvKwVOoN.1155 for user conductor 2021-08-28 02:44:24.852219 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.303951453s) to execute 2021-08-28 02:44:24.949476 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:24.996457 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (141.87297ms) to execute 2021-08-28 02:44:24.998289 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (143.516838ms) to execute 2021-08-28 02:44:25.843876 I | auth: deleting token cPAUamhVLXlGWGwf.1156 for user conductor 2021-08-28 02:44:26.247755 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (251.287777ms) to execute 2021-08-28 02:44:26.887098 I | auth: deleting token TihIHwxqCwtagBix.1157 for user conductor 2021-08-28 02:44:26.887138 I | auth: deleting token AzsJeUVjdmcAGLRB.1158 for user conductor 2021-08-28 02:44:27.547270 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.249109025s) to execute 2021-08-28 02:44:28.752290 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.055764983s) to execute 2021-08-28 02:44:28.752397 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.108354881s) to execute 2021-08-28 02:44:29.798433 I | auth: deleting token YhnnjSFxocGojvUf.1159 for user conductor 2021-08-28 02:44:29.949663 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:30.798386 I | auth: deleting token OSehOLnhlvKUjHIc.1161 for user conductor 2021-08-28 02:44:31.446055 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.699379254s) to execute 2021-08-28 02:44:32.649126 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.151014512s) to execute 2021-08-28 02:44:32.743970 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.295620198s) to execute 2021-08-28 02:44:33.798485 I | auth: deleting token uumcvmscczLETuBr.1163 for user conductor 2021-08-28 02:44:33.798527 I | auth: deleting token SBrcuywbtNwgpbID.1162 for user conductor 2021-08-28 02:44:33.798537 I | auth: deleting token ZPByeVZPWDkdhmpD.1164 for user conductor 2021-08-28 02:44:34.050201 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.249882148s) to execute 2021-08-28 02:44:34.949884 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:35.345877 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.235251093s) to execute 2021-08-28 02:44:36.644145 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.289288407s) to execute 2021-08-28 02:44:36.644297 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.100174436s) to execute 2021-08-28 02:44:38.045290 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (948.536429ms) to execute 2021-08-28 02:44:38.045427 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.297749789s) to execute 2021-08-28 02:44:38.798477 I | auth: deleting token fkdEDBerSbhyTvYY.1166 for user conductor 2021-08-28 02:44:39.798439 I | auth: deleting token EnvXLkNPxZpDZQyQ.1167 for user conductor 2021-08-28 02:44:39.798510 I | auth: deleting token ISGfzVTNVwaCaPen.1165 for user conductor 2021-08-28 02:44:39.798523 I | auth: deleting token CPIIiSeSPQLfSRoj.1168 for user conductor 2021-08-28 02:44:39.798536 I | auth: deleting token JolfvuILwzzuYaqb.1169 for user conductor 2021-08-28 02:44:39.950103 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:40.798524 I | auth: deleting token awBidtmhQqHYsoPF.1170 for user conductor 2021-08-28 02:44:41.651726 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.554981216s) to execute 2021-08-28 02:44:41.843867 I | auth: deleting token zSfJxZVJDLXUImQm.1171 for user conductor 2021-08-28 02:44:41.843916 I | auth: deleting token ACxWGsyOkSOnuvEa.1172 for user conductor 2021-08-28 02:44:42.945316 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.199699727s) to execute 2021-08-28 02:44:42.945556 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.279721834s) to execute 2021-08-28 02:44:42.947930 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.281975674s) to execute 2021-08-28 02:44:42.948107 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.282267872s) to execute 2021-08-28 02:44:44.798443 I | auth: deleting token xxhqJIMTzloUZBss.1175 for user conductor 2021-08-28 02:44:44.798488 I | auth: deleting token iYMNUhLwWHzBjATQ.1174 for user conductor 2021-08-28 02:44:44.798500 I | auth: deleting token bYJagRvoKsuWPfxj.1173 for user conductor 2021-08-28 02:44:44.950289 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:46.844896 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.588950127s) to execute 2021-08-28 02:44:48.798437 I | auth: deleting token hVXDkdXYuHsIKixf.1176 for user conductor 2021-08-28 02:44:49.346779 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.498543409s) to execute 2021-08-28 02:44:49.347125 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.500350724s) to execute 2021-08-28 02:44:49.347236 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.500382465s) to execute 2021-08-28 02:44:49.798422 I | auth: deleting token fkKxAxOSPZfQvTeq.1177 for user conductor 2021-08-28 02:44:49.950503 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:50.645796 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.201599494s) to execute 2021-08-28 02:44:50.645996 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.197359885s) to execute 2021-08-28 02:44:51.798449 I | auth: deleting token gvWWoElcnlSRYFtz.1178 for user conductor 2021-08-28 02:44:51.849750 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.105667646s) to execute 2021-08-28 02:44:51.996897 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (145.000343ms) to execute 2021-08-28 02:44:53.798452 I | auth: deleting token CLLMfUgDNBqnrLyv.1179 for user conductor 2021-08-28 02:44:54.345654 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.14927381s) to execute 2021-08-28 02:44:54.798417 I | auth: deleting token pWnQJDOZevVPlzLO.1180 for user conductor 2021-08-28 02:44:54.950705 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:44:56.798393 I | auth: deleting token ioqgHDgqdGaJGLhH.1181 for user conductor 2021-08-28 02:44:57.798449 I | auth: deleting token sIHRoUUtIXoWJpJb.1183 for user conductor 2021-08-28 02:44:57.798511 I | auth: deleting token YXaPptHcgSycDXlU.1182 for user conductor 2021-08-28 02:44:58.798414 I | auth: deleting token njfEcQsYAhqMCAqC.1185 for user conductor 2021-08-28 02:44:58.798476 I | auth: deleting token VmWGggnlYSHQvqOU.1184 for user conductor 2021-08-28 02:44:59.950958 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:01.798512 I | auth: deleting token rYDsCgTLvwVVmVUI.1186 for user conductor 2021-08-28 02:45:01.798587 I | auth: deleting token ogKfZrMkjkACSxNX.1187 for user conductor 2021-08-28 02:45:02.798416 I | auth: deleting token OnhqTinqleatkgEl.1188 for user conductor 2021-08-28 02:45:04.798401 I | auth: deleting token DfkmVHaxXrgBtTgE.1189 for user conductor 2021-08-28 02:45:04.798470 I | auth: deleting token ElPCBeAixMgHJRbi.1190 for user conductor 2021-08-28 02:45:04.951161 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:06.798480 I | auth: deleting token CbYbaoXozhsfzmEs.1191 for user conductor 2021-08-28 02:45:06.798521 I | auth: deleting token eYkecSitwwIPLUWt.1192 for user conductor 2021-08-28 02:45:07.798438 I | auth: deleting token QYMchbsHOLsOCkXK.1193 for user conductor 2021-08-28 02:45:08.798651 I | auth: deleting token tlVoJmieoJhWagEn.1194 for user conductor 2021-08-28 02:45:09.951429 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:12.798434 I | auth: deleting token HFdnKpAwxPcYooMu.1195 for user conductor 2021-08-28 02:45:14.951635 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:16.250812 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.054584839s) to execute 2021-08-28 02:45:16.798449 I | auth: deleting token pnfFClPNHPpkTIHn.1196 for user conductor 2021-08-28 02:45:18.848835 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.947584381s) to execute 2021-08-28 02:45:19.798411 I | auth: deleting token eBvFXhbEiRKQZinl.1197 for user conductor 2021-08-28 02:45:20.043838 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:20.050203 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.104565019s) to execute 2021-08-28 02:45:20.050596 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.106452813s) to execute 2021-08-28 02:45:21.447582 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.002484209s) to execute 2021-08-28 02:45:21.798432 I | auth: deleting token WwAOJmVlhKnJeUTC.1198 for user conductor 2021-08-28 02:45:22.647539 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.050838783s) to execute 2021-08-28 02:45:22.798380 I | auth: deleting token blWkcqEAlfEHctpc.1199 for user conductor 2021-08-28 02:45:23.798384 I | auth: deleting token flActXKPyYlAXJIp.1200 for user conductor 2021-08-28 02:45:25.044034 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:25.050018 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.104476199s) to execute 2021-08-28 02:45:26.798413 I | auth: deleting token lGzgWJJAliHnCpGo.1202 for user conductor 2021-08-28 02:45:26.798478 I | auth: deleting token euxfuDVeESwiqSDB.1201 for user conductor 2021-08-28 02:45:27.798433 I | auth: deleting token PQEfwnUAlzgUoIVY.1203 for user conductor 2021-08-28 02:45:27.798467 I | auth: deleting token urXNztPJaCTGElgu.1204 for user conductor 2021-08-28 02:45:30.044305 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:30.798455 I | auth: deleting token upnZTujJYRCcnelU.1205 for user conductor 2021-08-28 02:45:31.843841 I | auth: deleting token lVrqhuGlpGbiFmvC.1208 for user conductor 2021-08-28 02:45:31.843934 I | auth: deleting token aWTQEAAtSsuxyMZy.1206 for user conductor 2021-08-28 02:45:32.550685 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (703.648847ms) to execute 2021-08-28 02:45:34.798430 I | auth: deleting token jwQcuCCAsgKRrHtm.1209 for user conductor 2021-08-28 02:45:35.044562 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:36.246320 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (649.379892ms) to execute 2021-08-28 02:45:38.646125 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.24895579s) to execute 2021-08-28 02:45:40.044786 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:40.798394 I | auth: deleting token uSQleQFsdIhTOVMN.1210 for user conductor 2021-08-28 02:45:40.798439 I | auth: deleting token HgLzoVSyQfZZyyay.1211 for user conductor 2021-08-28 02:45:40.798454 I | auth: deleting token sppxWufntyOskKKZ.1212 for user conductor 2021-08-28 02:45:41.248596 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.804600421s) to execute 2021-08-28 02:45:42.450643 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.104750891s) to execute 2021-08-28 02:45:42.451059 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.2000193s) to execute 2021-08-28 02:45:42.844069 I | auth: deleting token xOriTUMBQnFKeKhf.1215 for user conductor 2021-08-28 02:45:43.849397 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.250607041s) to execute 2021-08-28 02:45:45.045003 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:45.798420 I | auth: deleting token TMZJhlyFTVxCgbrC.1216 for user conductor 2021-08-28 02:45:46.345155 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.348777935s) to execute 2021-08-28 02:45:47.550323 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.202230147s) to execute 2021-08-28 02:45:47.550534 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.203215756s) to execute 2021-08-28 02:45:47.550649 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.203241127s) to execute 2021-08-28 02:45:47.798456 I | auth: deleting token kQOXvJseLaZRLgTt.1218 for user conductor 2021-08-28 02:45:47.798499 I | auth: deleting token JFlfKllWfDzFnslL.1219 for user conductor 2021-08-28 02:45:47.798509 I | auth: deleting token tPIZdqUEseuNHsrQ.1217 for user conductor 2021-08-28 02:45:47.798518 I | auth: deleting token BLlCOZAPTvajmtJI.1221 for user conductor 2021-08-28 02:45:48.798444 I | auth: deleting token EWWkNBOUzuzELjcg.1222 for user conductor 2021-08-28 02:45:49.052741 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.403184685s) to execute 2021-08-28 02:45:50.045253 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:50.344409 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.147947471s) to execute 2021-08-28 02:45:52.744893 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (745.681557ms) to execute 2021-08-28 02:45:52.843840 I | auth: deleting token HafCBlongsbzVPnE.1223 for user conductor 2021-08-28 02:45:52.843890 I | auth: deleting token DXIiioeDRVGUMLjd.1224 for user conductor 2021-08-28 02:45:53.945880 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.147908698s) to execute 2021-08-28 02:45:54.798448 I | auth: deleting token CAgmogAKayfxQAQa.1225 for user conductor 2021-08-28 02:45:55.045456 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:45:56.445215 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.101155131s) to execute 2021-08-28 02:45:56.598284 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (150.830598ms) to execute 2021-08-28 02:45:57.798439 I | auth: deleting token cWOxFYCMIJqwYdkO.1226 for user conductor 2021-08-28 02:46:00.045760 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:01.798463 I | auth: deleting token GvGyzbuObSNwtMZS.1227 for user conductor 2021-08-28 02:46:04.798417 I | auth: deleting token VYaMKxngIliNizrn.1228 for user conductor 2021-08-28 02:46:05.045976 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:07.147843 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.10148623s) to execute 2021-08-28 02:46:07.798441 I | auth: deleting token OfWvDQhfIKpBWOsA.1231 for user conductor 2021-08-28 02:46:09.548386 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (847.796426ms) to execute 2021-08-28 02:46:09.798445 I | auth: deleting token EEtTOLzcqSabxBNh.1229 for user conductor 2021-08-28 02:46:09.798505 I | auth: deleting token uWOAvllDcyzhbcXe.1233 for user conductor 2021-08-28 02:46:09.798524 I | auth: deleting token frCChJBxjzhxaUDp.1232 for user conductor 2021-08-28 02:46:09.798540 I | auth: deleting token hQpFUJErDTvpVRHK.1230 for user conductor 2021-08-28 02:46:10.046400 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:10.751285 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.152844494s) to execute 2021-08-28 02:46:10.896727 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (143.554117ms) to execute 2021-08-28 02:46:12.798423 I | auth: deleting token MUSqMCwkBAmDzkhf.1234 for user conductor 2021-08-28 02:46:13.250087 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.152536137s) to execute 2021-08-28 02:46:14.798425 I | auth: deleting token bVErOFbbJHgTEkas.1236 for user conductor 2021-08-28 02:46:14.798471 I | auth: deleting token YFlmSLXMKCrQneNY.1235 for user conductor 2021-08-28 02:46:15.046617 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:15.748246 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.098423645s) to execute 2021-08-28 02:46:15.798404 I | auth: deleting token WLLOnYVZlBHdVXZp.1238 for user conductor 2021-08-28 02:46:15.798432 I | auth: deleting token xITBMBlQOxehxuJc.1237 for user conductor 2021-08-28 02:46:15.798449 I | auth: deleting token tFBfCcjuGgGcQMvc.1239 for user conductor 2021-08-28 02:46:18.352502 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.054383255s) to execute 2021-08-28 02:46:18.496675 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (142.3715ms) to execute 2021-08-28 02:46:20.046866 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:20.798445 I | auth: deleting token ZLwlQuGGjBHbOTKD.1241 for user conductor 2021-08-28 02:46:20.798482 I | auth: deleting token rwVuIyTLuTDSFhWR.1240 for user conductor 2021-08-28 02:46:20.798495 I | auth: deleting token WBrYcFVcjKplYEjG.1242 for user conductor 2021-08-28 02:46:20.798502 I | auth: deleting token iQZVCNdRQvXGIKjE.1243 for user conductor 2021-08-28 02:46:21.945913 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200697439s) to execute 2021-08-28 02:46:22.843855 I | auth: deleting token eCufGEHAMQCvcYNC.1244 for user conductor 2021-08-28 02:46:24.344263 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.000325331s) to execute 2021-08-28 02:46:25.047073 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:25.798434 I | auth: deleting token vxcaCJnzKHHjqJBY.1246 for user conductor 2021-08-28 02:46:25.798483 I | auth: deleting token SEvfKmkOilNilIwH.1245 for user conductor 2021-08-28 02:46:26.798421 I | auth: deleting token UMDwmFRKKZeGOWEG.1247 for user conductor 2021-08-28 02:46:26.798483 I | auth: deleting token gmEreVCasqchUFNH.1249 for user conductor 2021-08-28 02:46:26.798492 I | auth: deleting token zOsTdBCARXxtsbhN.1248 for user conductor 2021-08-28 02:46:26.847026 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.149315947s) to execute 2021-08-28 02:46:27.798441 I | auth: deleting token RzmaqOXNkeMPmNQR.1250 for user conductor 2021-08-28 02:46:29.251599 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.15370889s) to execute 2021-08-28 02:46:30.047268 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:31.798440 I | auth: deleting token daUtwJRwBKgZkTLD.1251 for user conductor 2021-08-28 02:46:34.843836 I | auth: deleting token KoGDKCovJhjvcYhv.1252 for user conductor 2021-08-28 02:46:35.047460 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:35.796566 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (145.630388ms) to execute 2021-08-28 02:46:38.152792 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (808.736038ms) to execute 2021-08-28 02:46:39.798385 I | auth: deleting token KMFKumHzHrJaCtXe.1253 for user conductor 2021-08-28 02:46:39.798511 I | auth: deleting token NmHzcpumPUaRwHsC.1254 for user conductor 2021-08-28 02:46:40.047674 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:40.798410 I | auth: deleting token YFmUBBZbPqalDocx.1256 for user conductor 2021-08-28 02:46:41.798526 I | auth: deleting token fqDuTqVYIVusIFDN.1258 for user conductor 2021-08-28 02:46:42.049292 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (905.280787ms) to execute 2021-08-28 02:46:45.048039 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:45.952243 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (855.735368ms) to execute 2021-08-28 02:46:47.345346 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.29938787s) to execute 2021-08-28 02:46:47.798426 I | auth: deleting token BTDxJTvEcBApKlCo.1262 for user conductor 2021-08-28 02:46:47.798464 I | auth: deleting token azaPmHKFjzkIAEDy.1261 for user conductor 2021-08-28 02:46:47.798471 I | auth: deleting token IBWNYUsYIHlmjyYd.1259 for user conductor 2021-08-28 02:46:47.798480 I | auth: deleting token sSUaXpnsqdihrSGu.1263 for user conductor 2021-08-28 02:46:47.798490 I | auth: deleting token HwieeMUEzXyniFOk.1260 for user conductor 2021-08-28 02:46:50.048260 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:50.798455 I | auth: deleting token noZIywPtWBaIFdyE.1264 for user conductor 2021-08-28 02:46:50.798522 I | auth: deleting token PylzTnkDSaMfIAJT.1265 for user conductor 2021-08-28 02:46:52.798454 I | auth: deleting token IzOgFkylREsTaszK.1267 for user conductor 2021-08-28 02:46:53.798413 I | auth: deleting token xiQECfoLGvbjGkdK.1266 for user conductor 2021-08-28 02:46:53.798459 I | auth: deleting token FqiDqDXviuYKlOPU.1268 for user conductor 2021-08-28 02:46:54.798460 I | auth: deleting token CNDfPldqsdmucTrW.1269 for user conductor 2021-08-28 02:46:55.048536 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:46:57.798465 I | auth: deleting token CRTngyxFlZUJZmtB.1270 for user conductor 2021-08-28 02:47:00.048811 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:47:00.798473 I | auth: deleting token MQtHeVVdjqportUh.1271 for user conductor 2021-08-28 02:47:03.798385 I | auth: deleting token bPVWWGSieyCpDoMN.1272 for user conductor 2021-08-28 02:47:05.049044 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:06.798410 I | auth: deleting token lQABkSngqwnJJkLp.1274 for user conductor 2021-08-28 02:47:06.798443 I | auth: deleting token SdaqiDCgDZLfrMyh.1273 for user conductor 2021-08-28 02:47:08.798482 I | auth: deleting token alVQXYcnTycqmhXz.1276 for user conductor 2021-08-28 02:47:09.798411 I | auth: deleting token HkTUgKmEFALOlqHd.1275 for user conductor 2021-08-28 02:47:09.798450 I | auth: deleting token tDSSzXJvhofESCBw.1277 for user conductor 2021-08-28 02:47:10.049318 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:10.798452 I | auth: deleting token cMuBgbrwAxguCRuD.1279 for user conductor 2021-08-28 02:47:10.798497 I | auth: deleting token CGlIdrwixBTsfIio.1278 for user conductor 2021-08-28 02:47:13.798386 I | auth: deleting token DpsuGYXXAHLZrnah.1280 for user conductor 2021-08-28 02:47:15.049564 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:17.798420 I | auth: deleting token wFlJwQwQnmUFWzEv.1281 for user conductor 2021-08-28 02:47:19.048532 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (952.224119ms) to execute 2021-08-28 02:47:20.049796 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:20.798524 I | auth: deleting token kixWvEzJEvGtEvIx.1282 for user conductor 2021-08-28 02:47:21.798488 I | auth: deleting token jDCZkOcYeVoiCckP.1283 for user conductor 2021-08-28 02:47:24.798471 I | auth: deleting token xvFbKuzerqTrrHJV.1284 for user conductor 2021-08-28 02:47:25.049971 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:25.843970 I | auth: deleting token gVBHaRssXwPsPPtS.1285 for user conductor 2021-08-28 02:47:25.844015 I | auth: deleting token RUxXSEZotRaztonV.1286 for user conductor 2021-08-28 02:47:26.648649 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.851103526s) to execute 2021-08-28 02:47:26.796277 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (145.74678ms) to execute 2021-08-28 02:47:26.798402 I | auth: deleting token XVeCLlRcSQertunW.1287 for user conductor 2021-08-28 02:47:26.896313 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (245.693679ms) to execute 2021-08-28 02:47:26.896444 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (245.669826ms) to execute 2021-08-28 02:47:28.798493 I | auth: deleting token uouObwCEZfEpvFlf.1288 for user conductor 2021-08-28 02:47:30.050247 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:32.798428 I | auth: deleting token kbOtzyQpRGOLnmSm.1289 for user conductor 2021-08-28 02:47:35.050515 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:35.798393 I | auth: deleting token TpGxNYlyePybxcDq.1290 for user conductor 2021-08-28 02:47:36.843841 I | auth: deleting token hJyzqNqvkvpTjqUj.1292 for user conductor 2021-08-28 02:47:37.946306 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (650.068862ms) to execute 2021-08-28 02:47:39.798440 I | auth: deleting token DsoTKmQlDeywCDCT.1293 for user conductor 2021-08-28 02:47:40.050767 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:40.798524 I | auth: deleting token TtxgIvdPCSwFkHIs.1294 for user conductor 2021-08-28 02:47:41.798446 I | auth: deleting token ZzNqanFtaToxsQjF.1295 for user conductor 2021-08-28 02:47:42.798401 I | auth: deleting token dIourBtiooLPWMjj.1296 for user conductor 2021-08-28 02:47:42.798439 I | auth: deleting token nZLueCshsNxyaWff.1297 for user conductor 2021-08-28 02:47:44.798430 I | auth: deleting token rWvYneXJSdpigUzH.1299 for user conductor 2021-08-28 02:47:45.051019 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:45.551312 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.252621557s) to execute 2021-08-28 02:47:45.553154 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.056945303s) to execute 2021-08-28 02:47:46.843834 I | auth: deleting token zpqqmiXXRgdsvQxg.1301 for user conductor 2021-08-28 02:47:46.843868 I | auth: deleting token EcIkodquPZfuRjXv.1303 for user conductor 2021-08-28 02:47:46.843878 I | auth: deleting token pVasYgRQbKPWgLvC.1302 for user conductor 2021-08-28 02:47:46.843888 I | auth: deleting token rLMybwoFZolMYHsV.1300 for user conductor 2021-08-28 02:47:46.945033 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.241768066s) to execute 2021-08-28 02:47:48.351369 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (554.96073ms) to execute 2021-08-28 02:47:49.745666 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.24893682s) to execute 2021-08-28 02:47:50.143924 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:50.843820 I | auth: deleting token iKTtjgHcfrqAPMFd.1304 for user conductor 2021-08-28 02:47:50.951909 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.203795948s) to execute 2021-08-28 02:47:50.951986 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.055209469s) to execute 2021-08-28 02:47:52.352609 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.008522085s) to execute 2021-08-28 02:47:53.653026 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.109084533s) to execute 2021-08-28 02:47:53.843836 I | auth: deleting token rkngxDEsdQVSwlDs.1305 for user conductor 2021-08-28 02:47:55.045610 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.249146165s) to execute 2021-08-28 02:47:55.045800 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.389384181s) to execute 2021-08-28 02:47:55.144209 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:47:56.344713 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.243682921s) to execute 2021-08-28 02:47:56.344852 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (800.742662ms) to execute 2021-08-28 02:47:57.550626 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.15298878s) to execute 2021-08-28 02:47:58.751577 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.055087936s) to execute 2021-08-28 02:47:58.843811 I | auth: deleting token nLmTcgTDabDfJzHI.1306 for user conductor 2021-08-28 02:47:58.843860 I | auth: deleting token YmWeqhAXYWZMyjBL.1307 for user conductor 2021-08-28 02:47:58.843880 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.199815221s) to execute 2021-08-28 02:47:58.997409 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (151.710318ms) to execute 2021-08-28 02:47:59.843852 I | auth: deleting token QbMvSgBihhgotIds.1309 for user conductor 2021-08-28 02:48:00.144395 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:00.247521 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.249142975s) to execute 2021-08-28 02:48:01.644173 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.848090751s) to execute 2021-08-28 02:48:02.798407 I | auth: deleting token dkCDgaSRhWuoIcDk.1311 for user conductor 2021-08-28 02:48:02.847548 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.150036037s) to execute 2021-08-28 02:48:02.847647 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.201284578s) to execute 2021-08-28 02:48:02.997137 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (147.61394ms) to execute 2021-08-28 02:48:04.152557 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (506.817298ms) to execute 2021-08-28 02:48:05.144658 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:05.544814 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.24843662s) to execute 2021-08-28 02:48:05.798410 I | auth: deleting token FUgZBfaIeoABejMX.1312 for user conductor 2021-08-28 02:48:06.798439 I | auth: deleting token CjCfhxYUmnLCvaer.1313 for user conductor 2021-08-28 02:48:06.798487 I | auth: deleting token jfpuumqjGlxBgzXB.1314 for user conductor 2021-08-28 02:48:06.846336 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.249963844s) to execute 2021-08-28 02:48:06.846446 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.299537351s) to execute 2021-08-28 02:48:06.997513 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.096501ms) to execute 2021-08-28 02:48:07.843812 I | auth: deleting token iHmnEedfGEyudOrF.1315 for user conductor 2021-08-28 02:48:07.844556 I | auth: deleting token nbiHigkqbrClYDPy.1317 for user conductor 2021-08-28 02:48:10.144819 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:10.944726 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.49462468s) to execute 2021-08-28 02:48:11.798440 I | auth: deleting token LhRvTeihPxuxfqRa.1320 for user conductor 2021-08-28 02:48:12.247113 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.300486945s) to execute 2021-08-28 02:48:12.247208 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.249242259s) to execute 2021-08-28 02:48:12.247295 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.3005738s) to execute 2021-08-28 02:48:12.397576 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (148.18882ms) to execute 2021-08-28 02:48:12.798395 I | auth: deleting token ZTgpJWSBGmlYLzBN.1319 for user conductor 2021-08-28 02:48:12.798439 I | auth: deleting token LiPcxQSgugsnISOB.1318 for user conductor 2021-08-28 02:48:12.798452 I | auth: deleting token dnFbiJMNorkZstMG.1322 for user conductor 2021-08-28 02:48:12.798457 I | auth: deleting token AKRUHuyEhpuYMwaV.1323 for user conductor 2021-08-28 02:48:13.552550 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.154006771s) to execute 2021-08-28 02:48:13.552809 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (656.588246ms) to execute 2021-08-28 02:48:14.844620 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (900.608938ms) to execute 2021-08-28 02:48:15.145069 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:15.798418 I | auth: deleting token DmzmWdwMkGlJiiun.1325 for user conductor 2021-08-28 02:48:15.798460 I | auth: deleting token RnXTaUntKSlMqKTf.1324 for user conductor 2021-08-28 02:48:16.810253 I | auth: deleting token TfuRYBpnJiOhAMwk.1327 for user conductor 2021-08-28 02:48:16.810299 I | auth: deleting token FQEYFXGWFjVaDawU.1326 for user conductor 2021-08-28 02:48:17.445233 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.246944695s) to execute 2021-08-28 02:48:20.145352 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:20.798410 I | auth: deleting token vzwjfXLAWZZoekoa.1328 for user conductor 2021-08-28 02:48:23.798423 I | auth: deleting token uOyhKZTtxgDPoNpu.1329 for user conductor 2021-08-28 02:48:25.145628 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:26.798425 I | auth: deleting token wesBGrIlFzNtbVpY.1330 for user conductor 2021-08-28 02:48:30.145844 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:30.798455 I | auth: deleting token xXPawbIoLQrRydmx.1331 for user conductor 2021-08-28 02:48:33.798442 I | auth: deleting token oQxqlNkrigZnfywx.1334 for user conductor 2021-08-28 02:48:34.798471 I | auth: deleting token MiTImZDSUnktGgkt.1335 for user conductor 2021-08-28 02:48:34.798531 I | auth: deleting token hRQIWnKrtNkXhTxX.1333 for user conductor 2021-08-28 02:48:34.798551 I | auth: deleting token aNWuXhvnFyyvWhbC.1332 for user conductor 2021-08-28 02:48:35.146158 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:36.798451 I | auth: deleting token mYPgIALOYzIyIteb.1337 for user conductor 2021-08-28 02:48:36.798507 I | auth: deleting token jMkujXLDaiNHSSrm.1336 for user conductor 2021-08-28 02:48:38.843838 I | auth: deleting token mGwOfeocjOnsusrd.1338 for user conductor 2021-08-28 02:48:38.843879 I | auth: deleting token aHwcuJKOYWXeguQl.1339 for user conductor 2021-08-28 02:48:40.146393 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:41.245556 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.149203505s) to execute 2021-08-28 02:48:41.496388 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (248.8648ms) to execute 2021-08-28 02:48:41.843847 I | auth: deleting token NEnnxJdAePkdTvOu.1340 for user conductor 2021-08-28 02:48:41.843892 I | auth: deleting token KokvPKlNaPTsBKKU.1341 for user conductor 2021-08-28 02:48:43.947533 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.149262845s) to execute 2021-08-28 02:48:44.798465 I | auth: deleting token tDEymlJnSdTjsInH.1343 for user conductor 2021-08-28 02:48:44.798510 I | auth: deleting token fDqYEYBZftKuhbCQ.1342 for user conductor 2021-08-28 02:48:45.146644 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:45.348123 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.251621896s) to execute 2021-08-28 02:48:45.348261 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.304073315s) to execute 2021-08-28 02:48:45.496630 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.22462ms) to execute 2021-08-28 02:48:46.798488 I | auth: deleting token IsKGtovBWxSKhEif.1344 for user conductor 2021-08-28 02:48:47.850074 I | auth: deleting token WYdnbsFMUFDzeoKt.1345 for user conductor 2021-08-28 02:48:48.046720 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.050109423s) to execute 2021-08-28 02:48:49.347111 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.298399784s) to execute 2021-08-28 02:48:49.347190 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.102892457s) to execute 2021-08-28 02:48:49.497761 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (148.596944ms) to execute 2021-08-28 02:48:50.146914 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:50.798450 I | auth: deleting token UGDEJyKXNIFOOLKY.1348 for user conductor 2021-08-28 02:48:50.798490 I | auth: deleting token glCPmCCZfMMhIxeh.1349 for user conductor 2021-08-28 02:48:50.798498 I | auth: deleting token ZaJvXACYCJSmkAgr.1346 for user conductor 2021-08-28 02:48:50.798512 I | auth: deleting token puCcPYDigaQzTJLt.1347 for user conductor 2021-08-28 02:48:52.144502 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.247959103s) to execute 2021-08-28 02:48:52.396360 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (152.282416ms) to execute 2021-08-28 02:48:52.398908 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.493041ms) to execute 2021-08-28 02:48:53.744205 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.045384246s) to execute 2021-08-28 02:48:53.843840 I | auth: deleting token ZRUFREKANIDXjxsS.1351 for user conductor 2021-08-28 02:48:53.843883 I | auth: deleting token DMsnSqPmFqpVypGt.1350 for user conductor 2021-08-28 02:48:54.951008 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.054248252s) to execute 2021-08-28 02:48:55.147145 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:48:55.798392 I | auth: deleting token rbFqFNZejYaZksxP.1352 for user conductor 2021-08-28 02:48:55.798430 I | auth: deleting token HsgWtRtKxLNkpTUe.1354 for user conductor 2021-08-28 02:48:55.798439 I | auth: deleting token TsmaATwCeKMYqXHF.1353 for user conductor 2021-08-28 02:48:57.744686 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200489271s) to execute 2021-08-28 02:48:57.798413 I | auth: deleting token uKuKNBKlAmROCIAC.1355 for user conductor 2021-08-28 02:48:59.047074 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.299986803s) to execute 2021-08-28 02:48:59.047209 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.10312171s) to execute 2021-08-28 02:48:59.196559 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (147.22385ms) to execute 2021-08-28 02:48:59.843855 I | auth: deleting token qkajMnNEgICsjbSC.1356 for user conductor 2021-08-28 02:48:59.843903 I | auth: deleting token eiLQxgTxhHQGuWhB.1357 for user conductor 2021-08-28 02:49:00.147300 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:00.448966 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.237136612s) to execute 2021-08-28 02:49:01.843808 I | auth: deleting token OsToNsIbCYEPqXYw.1358 for user conductor 2021-08-28 02:49:01.843854 I | auth: deleting token YIqKxBQLYWyUojFJ.1359 for user conductor 2021-08-28 02:49:01.844357 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.100285514s) to execute 2021-08-28 02:49:03.250371 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.253829736s) to execute 2021-08-28 02:49:03.250516 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.404001694s) to execute 2021-08-28 02:49:03.798423 I | auth: deleting token kXJRCXiSUCsiQgMN.1360 for user conductor 2021-08-28 02:49:03.798467 I | auth: deleting token ESsKUqcUpcIJiKhe.1361 for user conductor 2021-08-28 02:49:05.147657 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:06.052550 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.155583614s) to execute 2021-08-28 02:49:06.798444 I | auth: deleting token qBydeSkzEicDzPFk.1364 for user conductor 2021-08-28 02:49:06.798513 I | auth: deleting token XzTXKQcqriLIXvoG.1363 for user conductor 2021-08-28 02:49:06.798532 I | auth: deleting token kxWHrNaDGZCYgiXz.1365 for user conductor 2021-08-28 02:49:06.798547 I | auth: deleting token CvbSQakIaiobKiCF.1366 for user conductor 2021-08-28 02:49:07.446679 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.05000041s) to execute 2021-08-28 02:49:07.446827 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.300643816s) to execute 2021-08-28 02:49:07.596522 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (147.699633ms) to execute 2021-08-28 02:49:07.697778 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (150.824379ms) to execute 2021-08-28 02:49:09.798452 I | auth: deleting token brJpFvJCvRVpCPAK.1368 for user conductor 2021-08-28 02:49:10.147858 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:11.646058 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.849601003s) to execute 2021-08-28 02:49:11.796507 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (147.834101ms) to execute 2021-08-28 02:49:13.050974 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.303551237s) to execute 2021-08-28 02:49:13.798383 I | auth: deleting token rDdLrTGBPPesFwlq.1372 for user conductor 2021-08-28 02:49:13.798422 I | auth: deleting token ajgupHnkpPyyIPCw.1370 for user conductor 2021-08-28 02:49:13.798433 I | auth: deleting token dVFnCZUFeMxAqsrQ.1371 for user conductor 2021-08-28 02:49:13.798438 I | auth: deleting token ZqaLfEzZotEZdOsb.1373 for user conductor 2021-08-28 02:49:13.798450 I | auth: deleting token ejagGEQDRWbvAVuP.1369 for user conductor 2021-08-28 02:49:14.351393 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.555086378s) to execute 2021-08-28 02:49:15.148060 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:15.646539 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.20148125s) to execute 2021-08-28 02:49:15.646771 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.200906305s) to execute 2021-08-28 02:49:15.796581 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (147.417269ms) to execute 2021-08-28 02:49:17.051587 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.252931565s) to execute 2021-08-28 02:49:17.798453 I | auth: deleting token XaKmOzoWjllNdzNm.1376 for user conductor 2021-08-28 02:49:17.798517 I | auth: deleting token ZIndEzBDvScOMkPj.1374 for user conductor 2021-08-28 02:49:17.798529 I | auth: deleting token CugGdohbGSzAwsIR.1375 for user conductor 2021-08-28 02:49:18.445144 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.801102089s) to execute 2021-08-28 02:49:18.596651 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.0581ms) to execute 2021-08-28 02:49:20.148258 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:21.798463 I | auth: deleting token mfKKJPsDTdOztuTV.1378 for user conductor 2021-08-28 02:49:21.798512 I | auth: deleting token qzrnJGOvLVXHvtxO.1380 for user conductor 2021-08-28 02:49:21.798523 I | auth: deleting token tgaBPILduFvhEvvH.1377 for user conductor 2021-08-28 02:49:21.798541 I | auth: deleting token uuCIfkLcAqLgVYfZ.1379 for user conductor 2021-08-28 02:49:24.752935 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (508.942085ms) to execute 2021-08-28 02:49:25.148410 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:25.798486 I | auth: deleting token ybPhRXupPkxJxAwW.1384 for user conductor 2021-08-28 02:49:25.798555 I | auth: deleting token oZaVgdNCquyPaOfX.1383 for user conductor 2021-08-28 02:49:25.798564 I | auth: deleting token lwUvNZQApVzknMSt.1382 for user conductor 2021-08-28 02:49:25.798573 I | auth: deleting token aAqBjUYwHruKVOdK.1381 for user conductor 2021-08-28 02:49:26.798416 I | auth: deleting token VUDEGpMoqcwESTbd.1385 for user conductor 2021-08-28 02:49:28.798426 I | auth: deleting token HkXtEdUUyjFLnEnP.1386 for user conductor 2021-08-28 02:49:29.798424 I | auth: deleting token cZFztOhArNoUEnTZ.1388 for user conductor 2021-08-28 02:49:29.798463 I | auth: deleting token PmysxusgSAXJnHBw.1387 for user conductor 2021-08-28 02:49:30.148646 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:31.798388 I | auth: deleting token XzwkkpHsycOujmNh.1390 for user conductor 2021-08-28 02:49:31.798513 I | auth: deleting token jAEUPTkPWPaoQfHf.1389 for user conductor 2021-08-28 02:49:33.798472 I | auth: deleting token kpehIOibuGqsBEyA.1392 for user conductor 2021-08-28 02:49:33.798518 I | auth: deleting token jrUIQEEqhcokYRTz.1391 for user conductor 2021-08-28 02:49:35.148909 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:35.798511 I | auth: deleting token OnvACWwekMPRdoEa.1393 for user conductor 2021-08-28 02:49:35.798559 I | auth: deleting token cWzRBqZuyuXoEVth.1394 for user conductor 2021-08-28 02:49:36.798419 I | auth: deleting token EAQodVsYXbsFgTOS.1395 for user conductor 2021-08-28 02:49:37.798462 I | auth: deleting token AvnGYMCMrpHSjznU.1396 for user conductor 2021-08-28 02:49:38.798457 I | auth: deleting token rzymoHMVskeefFCs.1397 for user conductor 2021-08-28 02:49:40.149169 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:43.798455 I | auth: deleting token NKfxvaZCJRxqUhtX.1401 for user conductor 2021-08-28 02:49:43.798499 I | auth: deleting token HzSeJrxWQCpXpLwZ.1402 for user conductor 2021-08-28 02:49:43.798507 I | auth: deleting token RWqyVWbIQpCSCcNB.1398 for user conductor 2021-08-28 02:49:43.798514 I | auth: deleting token vkEqhRbWXlfjqGYY.1399 for user conductor 2021-08-28 02:49:43.798528 I | auth: deleting token NTLiLOuPrVWLVEZj.1400 for user conductor 2021-08-28 02:49:45.149490 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:49.798480 I | auth: deleting token fhUncjOxiWdbSrfG.1404 for user conductor 2021-08-28 02:49:49.798522 I | auth: deleting token qOIIZQTRWCycEoQX.1403 for user conductor 2021-08-28 02:49:49.798531 I | auth: deleting token XNNHLVORPZObPfOE.1405 for user conductor 2021-08-28 02:49:49.798540 I | auth: deleting token ZTNIOgNmJPFoYZRd.1407 for user conductor 2021-08-28 02:49:49.798550 I | auth: deleting token fyAZFYlqHhfYihQv.1406 for user conductor 2021-08-28 02:49:50.149785 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:52.798402 I | auth: deleting token tQEAZWdpXsXlicDR.1409 for user conductor 2021-08-28 02:49:52.798515 I | auth: deleting token mtFtsdVDIRlsNHdK.1408 for user conductor 2021-08-28 02:49:53.798433 I | auth: deleting token JtlfBJwNevtFSxFT.1410 for user conductor 2021-08-28 02:49:54.798420 I | auth: deleting token iNPZtLLsFfnSVUPO.1411 for user conductor 2021-08-28 02:49:54.798492 I | auth: deleting token vywbELAYQSSuEadn.1412 for user conductor 2021-08-28 02:49:55.243902 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:49:56.151240 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.154747251s) to execute 2021-08-28 02:49:56.843809 I | auth: deleting token EkKcjVhjeWZMgfGS.1413 for user conductor 2021-08-28 02:49:57.644251 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.34797474s) to execute 2021-08-28 02:49:57.796688 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (150.531414ms) to execute 2021-08-28 02:49:59.147528 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (401.791334ms) to execute 2021-08-28 02:49:59.798444 I | auth: deleting token aExPXKLnXflQpYJi.1414 for user conductor 2021-08-28 02:50:00.244081 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:00.351901 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.055480772s) to execute 2021-08-28 02:50:03.045368 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.548921504s) to execute 2021-08-28 02:50:03.045699 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.601641238s) to execute 2021-08-28 02:50:03.196451 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (149.128506ms) to execute 2021-08-28 02:50:03.798423 I | auth: deleting token CkIeGGUiTMxHKzJh.1415 for user conductor 2021-08-28 02:50:05.244382 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:06.798447 I | auth: deleting token OtnaphDzbzCKwCVw.1416 for user conductor 2021-08-28 02:50:07.648221 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.130819614s) to execute 2021-08-28 02:50:09.798434 I | auth: deleting token FEHHclNDqxUgKCnr.1417 for user conductor 2021-08-28 02:50:10.244629 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:10.347943 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.103851647s) to execute 2021-08-28 02:50:10.496385 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (146.202782ms) to execute 2021-08-28 02:50:12.810413 I | auth: deleting token hWWDPGAYAoXtzIyM.1418 for user conductor 2021-08-28 02:50:13.052019 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.00805296s) to execute 2021-08-28 02:50:13.296548 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.584072ms) to execute 2021-08-28 02:50:13.397831 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (199.034892ms) to execute 2021-08-28 02:50:15.244936 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:15.945564 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.249204363s) to execute 2021-08-28 02:50:16.798459 I | auth: deleting token lwiKvPrEoPAAKEoz.1419 for user conductor 2021-08-28 02:50:16.798517 I | auth: deleting token ssEOuWkWbVGGMjDZ.1420 for user conductor 2021-08-28 02:50:19.798443 I | auth: deleting token haURIqZHzIUsbqLo.1421 for user conductor 2021-08-28 02:50:19.848574 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.850075241s) to execute 2021-08-28 02:50:19.849228 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.901627053s) to execute 2021-08-28 02:50:20.245108 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:20.798425 I | auth: deleting token KYRPakSzqekYJhhG.1424 for user conductor 2021-08-28 02:50:20.798471 I | auth: deleting token VjUvyKEMmxoWruWz.1423 for user conductor 2021-08-28 02:50:20.798488 I | auth: deleting token IjNSgRlNehSxlNpQ.1422 for user conductor 2021-08-28 02:50:21.798408 I | auth: deleting token hJvmqNWzjqkgHnsS.1425 for user conductor 2021-08-28 02:50:22.798428 I | auth: deleting token XBpwhwQRHnxvlEjX.1426 for user conductor 2021-08-28 02:50:22.798472 I | auth: deleting token jZCTIGivDVbFRbIf.1427 for user conductor 2021-08-28 02:50:23.948367 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.599637353s) to execute 2021-08-28 02:50:24.199209 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.719193ms) to execute 2021-08-28 02:50:25.245365 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:25.798419 I | auth: deleting token TDDBWKoYnvWNZVsQ.1430 for user conductor 2021-08-28 02:50:25.798471 I | auth: deleting token ngkDVWBXktLwtlqa.1428 for user conductor 2021-08-28 02:50:25.798487 I | auth: deleting token hYHwuKOrbXpzxCWi.1429 for user conductor 2021-08-28 02:50:26.745313 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.248347916s) to execute 2021-08-28 02:50:27.798489 I | auth: deleting token opgEwKFdVbyybGrV.1431 for user conductor 2021-08-28 02:50:30.245592 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:30.252509 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.756074451s) to execute 2021-08-28 02:50:30.798416 I | auth: deleting token GWJxCmaIrDmrpEOi.1432 for user conductor 2021-08-28 02:50:31.843860 I | auth: deleting token vUPHAVYgTPyszhkL.1433 for user conductor 2021-08-28 02:50:32.798446 I | auth: deleting token qRPYSJlszbqAbVRI.1434 for user conductor 2021-08-28 02:50:32.798500 I | auth: deleting token FkAQSGUKHqFEivwz.1435 for user conductor 2021-08-28 02:50:33.044721 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.199321892s) to execute 2021-08-28 02:50:34.798475 I | auth: deleting token eVwcJdzZERdrWxVw.1436 for user conductor 2021-08-28 02:50:35.245763 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:35.745326 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.148846098s) to execute 2021-08-28 02:50:36.798429 I | auth: deleting token MOWUfuAgoLaBCXOd.1437 for user conductor 2021-08-28 02:50:38.798544 I | auth: deleting token CasDuDJUeErnxcvr.1439 for user conductor 2021-08-28 02:50:38.798651 I | auth: deleting token IqfniJARJamCouHC.1438 for user conductor 2021-08-28 02:50:39.646178 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.547892455s) to execute 2021-08-28 02:50:39.796379 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (148.172197ms) to execute 2021-08-28 02:50:39.798011 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.310123ms) to execute 2021-08-28 02:50:39.798376 I | auth: deleting token sZRmaplEDPpWukSU.1440 for user conductor 2021-08-28 02:50:40.245977 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:41.798413 I | auth: deleting token tJSszBhFHnteiLPu.1442 for user conductor 2021-08-28 02:50:41.798461 I | auth: deleting token uRlwgeYWDwfSlowc.1441 for user conductor 2021-08-28 02:50:42.798415 I | auth: deleting token dZNpRyelJyDwenwg.1445 for user conductor 2021-08-28 02:50:42.798458 I | auth: deleting token HHmgcXuGzlMVgSoy.1443 for user conductor 2021-08-28 02:50:42.798473 I | auth: deleting token ExiCrjEJMROXoBcU.1444 for user conductor 2021-08-28 02:50:43.246282 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.049878772s) to execute 2021-08-28 02:50:45.246152 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:45.852484 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.256015301s) to execute 2021-08-28 02:50:47.798412 I | auth: deleting token qpXegeXQvPwWkshS.1447 for user conductor 2021-08-28 02:50:47.798459 I | auth: deleting token PldbllIXHRWTaueI.1448 for user conductor 2021-08-28 02:50:47.798475 I | auth: deleting token KdEdYKdxnAyKhfHz.1449 for user conductor 2021-08-28 02:50:47.798487 I | auth: deleting token zXiRtDtMRdaqcEbU.1446 for user conductor 2021-08-28 02:50:47.798507 I | auth: deleting token YlakwKNaRYrAbOcL.1450 for user conductor 2021-08-28 02:50:48.647414 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.151100512s) to execute 2021-08-28 02:50:50.246367 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:50.798409 I | auth: deleting token XymxmgTtREFolPuZ.1451 for user conductor 2021-08-28 02:50:50.798525 I | auth: deleting token idZlRnEWAFdZHmuf.1452 for user conductor 2021-08-28 02:50:51.446750 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.348943473s) to execute 2021-08-28 02:50:52.798388 I | auth: deleting token emKnlVNOpMPziQNm.1453 for user conductor 2021-08-28 02:50:54.798451 I | auth: deleting token nprYNRHXhTFiPRKv.1454 for user conductor 2021-08-28 02:50:54.798529 I | auth: deleting token AwZmGkfIseFzpGoD.1455 for user conductor 2021-08-28 02:50:55.047471 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.051099446s) to execute 2021-08-28 02:50:55.196681 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (147.307948ms) to execute 2021-08-28 02:50:55.246639 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:50:56.798460 I | auth: deleting token SqjuBAcRjdmzWhSG.1457 for user conductor 2021-08-28 02:50:56.798528 I | auth: deleting token JaRULthiyREHrPHV.1458 for user conductor 2021-08-28 02:50:56.798544 I | auth: deleting token RuOdBotuTIfbcaBB.1456 for user conductor 2021-08-28 02:50:57.945416 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.301320552s) to execute 2021-08-28 02:50:58.097666 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (150.018383ms) to execute 2021-08-28 02:50:59.798571 I | auth: deleting token tRWEUnzDipWmGXyO.1459 for user conductor 2021-08-28 02:51:00.246832 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:00.646489 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.102436947s) to execute 2021-08-28 02:51:01.798430 I | auth: deleting token iRxSsrFZsgViAERi.1460 for user conductor 2021-08-28 02:51:03.347092 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.203063444s) to execute 2021-08-28 02:51:03.496387 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (146.879758ms) to execute 2021-08-28 02:51:04.798439 I | auth: deleting token XoYQZejkKgxsMRSF.1461 for user conductor 2021-08-28 02:51:05.247012 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:07.798417 I | auth: deleting token LdubKgUOevpNLKGJ.1463 for user conductor 2021-08-28 02:51:07.798461 I | auth: deleting token gzPfPmyxbQcBQgcu.1462 for user conductor 2021-08-28 02:51:09.798425 I | auth: deleting token sBmGPiGcfWwPlbgL.1464 for user conductor 2021-08-28 02:51:10.247253 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:11.798412 I | auth: deleting token xFWETVSXFwqwxJSD.1465 for user conductor 2021-08-28 02:51:11.798472 I | auth: deleting token qOrjvcIGiTvHDnWE.1466 for user conductor 2021-08-28 02:51:13.798436 I | auth: deleting token VWbrFsHFcuySPKPX.1469 for user conductor 2021-08-28 02:51:13.798492 I | auth: deleting token nZDpwEJnNSOerlSU.1468 for user conductor 2021-08-28 02:51:13.798503 I | auth: deleting token ZMNtKyuzcBkYeaTG.1467 for user conductor 2021-08-28 02:51:15.247513 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:15.798460 I | auth: deleting token UcYDPZGRKKonDHCh.1471 for user conductor 2021-08-28 02:51:16.798419 I | auth: deleting token sKKKXnpEFsZSSkUr.1472 for user conductor 2021-08-28 02:51:16.798475 I | auth: deleting token EOdcKUtUuRlOLDjL.1470 for user conductor 2021-08-28 02:51:18.798421 I | auth: deleting token WrqPBFLvOOWLyUBE.1473 for user conductor 2021-08-28 02:51:18.798472 I | auth: deleting token qiLOUTviLgGtzbGE.1474 for user conductor 2021-08-28 02:51:19.843887 I | auth: deleting token tilcbqPGgKlbHVKQ.1475 for user conductor 2021-08-28 02:51:20.247727 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:22.798389 I | auth: deleting token aGLByXuujyBTPJAT.1476 for user conductor 2021-08-28 02:51:22.798434 I | auth: deleting token UWsqIASGAIYngeoo.1477 for user conductor 2021-08-28 02:51:23.648883 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.104889394s) to execute 2021-08-28 02:51:24.843765 I | auth: deleting token klZiSmXSpZSJvlVb.1480 for user conductor 2021-08-28 02:51:24.843828 I | auth: deleting token fWqDwhSNuJFpRsay.1478 for user conductor 2021-08-28 02:51:24.843842 I | auth: deleting token COlXGFNVYpZZkXuz.1479 for user conductor 2021-08-28 02:51:24.944761 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.246805618s) to execute 2021-08-28 02:51:25.247914 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:26.246034 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.594766461s) to execute 2021-08-28 02:51:26.246164 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.149447617s) to execute 2021-08-28 02:51:26.396367 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (148.166946ms) to execute 2021-08-28 02:51:27.746568 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (649.667634ms) to execute 2021-08-28 02:51:27.798459 I | auth: deleting token yTymEaYDQnzCXNSG.1481 for user conductor 2021-08-28 02:51:27.798574 I | auth: deleting token CuaMLzLVaUTuqbRI.1482 for user conductor 2021-08-28 02:51:27.798605 I | auth: deleting token KOTgpmWVinLXloAH.1483 for user conductor 2021-08-28 02:51:29.798421 I | auth: deleting token MfhOYzjqEjUtznHW.1484 for user conductor 2021-08-28 02:51:29.798467 I | auth: deleting token qDFiJAFXPDNZwfqC.1485 for user conductor 2021-08-28 02:51:30.248121 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:30.798446 I | auth: deleting token ocYSOXlbtxylHBko.1486 for user conductor 2021-08-28 02:51:31.645289 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.895235134s) to execute 2021-08-28 02:51:31.798462 I | auth: deleting token GfhnughHvNPOtIMO.1488 for user conductor 2021-08-28 02:51:32.948767 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.300742838s) to execute 2021-08-28 02:51:32.948905 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.301464004s) to execute 2021-08-28 02:51:33.043988 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.395930601s) to execute 2021-08-28 02:51:33.044061 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.396224731s) to execute 2021-08-28 02:51:33.097759 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (145.854ms) to execute 2021-08-28 02:51:33.798423 I | auth: deleting token HuIIHMDDlEwwSHJL.1489 for user conductor 2021-08-28 02:51:35.248287 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:35.798456 I | auth: deleting token tTzzBQCFcWJUnxUx.1490 for user conductor 2021-08-28 02:51:37.798491 I | auth: deleting token pxnADAYiVbPKwiwU.1491 for user conductor 2021-08-28 02:51:38.798480 I | auth: deleting token SwFjgQAzHsDtGXwq.1493 for user conductor 2021-08-28 02:51:38.798543 I | auth: deleting token kinzfQFmLjxKuPuc.1492 for user conductor 2021-08-28 02:51:39.798413 I | auth: deleting token TpgUraFXOlHxrwgP.1494 for user conductor 2021-08-28 02:51:40.248503 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:42.798438 I | auth: deleting token aRoRJpxfbLHnhQUX.1495 for user conductor 2021-08-28 02:51:42.798479 I | auth: deleting token XWFkxsvNloyCpRRk.1496 for user conductor 2021-08-28 02:51:43.844173 I | auth: deleting token LVaKSzGePkjirWHz.1497 for user conductor 2021-08-28 02:51:44.798447 I | auth: deleting token LwJQrQrcFGsZpoWw.1498 for user conductor 2021-08-28 02:51:45.248731 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:46.798409 I | auth: deleting token QrtXNwZZoQSqtHDx.1499 for user conductor 2021-08-28 02:51:47.798447 I | auth: deleting token sxCoEkDdlAjpUvVS.1500 for user conductor 2021-08-28 02:51:47.798516 I | auth: deleting token kNrBWxtOKpYzeFrL.1501 for user conductor 2021-08-28 02:51:48.798411 I | auth: deleting token tdrCnkRFpWKVFzEp.1502 for user conductor 2021-08-28 02:51:50.248933 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:52.798444 I | auth: deleting token CNFVWKmmYsfbWiqW.1503 for user conductor 2021-08-28 02:51:55.249149 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:51:55.798465 I | auth: deleting token zdkuAXdFNdwxVzBr.1504 for user conductor 2021-08-28 02:51:59.798435 I | auth: deleting token AERUWCpZqclzwRvQ.1505 for user conductor 2021-08-28 02:52:00.249394 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:52:02.798407 I | auth: deleting token BcjluXhbSllWyIwF.1506 for user conductor 2021-08-28 02:52:05.249624 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:52:06.798415 I | auth: deleting token hcidJImCkvurarlv.1507 for user conductor 2021-08-28 02:52:09.798462 I | auth: deleting token SlBxqlwITBbcyrOj.1508 for user conductor 2021-08-28 02:52:10.249855 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:52:14.798493 I | auth: deleting token VRduAhdKDRSYpXno.1509 for user conductor 2021-08-28 02:52:14.949280 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.005264228s) to execute 2021-08-28 02:52:15.096582 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (145.227827ms) to execute 2021-08-28 02:52:15.250042 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:52:15.798420 I | auth: deleting token ouyFwOrHkSxfwQse.1510 for user conductor 2021-08-28 02:52:17.798396 I | auth: deleting token WwhcBEgEGcFbDaXt.1511 for user conductor 2021-08-28 02:52:19.646968 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.150567546s) to execute 2021-08-28 02:52:19.796481 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (147.370529ms) to execute 2021-08-28 02:52:19.798403 I | auth: deleting token ATMLNAkwDyAfzqee.1513 for user conductor 2021-08-28 02:52:19.798446 I | auth: deleting token xhlZfsXBBOKjFqrP.1512 for user conductor 2021-08-28 02:52:20.250321 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:52:20.798378 I | auth: deleting token VdydvurKgaiNZqrz.1514 for user conductor 2021-08-28 02:52:21.798441 I | auth: deleting token VcSWscxrwWueoHtC.1515 for user conductor 2021-08-28 02:52:24.148053 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (451.733901ms) to execute 2021-08-28 02:52:25.250519 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:52:26.798373 I | auth: deleting token tcUZUsJcljqIjipK.1518 for user conductor 2021-08-28 02:52:26.798429 I | auth: deleting token bOhPPbJTBfaoQNgx.1519 for user conductor 2021-08-28 02:52:27.798447 I | auth: deleting token EVFRXOCKFJBszNRo.1520 for user conductor 2021-08-28 02:52:27.798486 I | auth: deleting token CevZKFKukoLsvGKn.1516 for user conductor 2021-08-28 02:52:27.798493 I | auth: deleting token FMTRJgJgmcbiCiMH.1517 for user conductor 2021-08-28 02:52:29.798454 I | auth: deleting token TyRpMKIWVEvHWYLg.1521 for user conductor 2021-08-28 02:52:30.250774 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:52:31.244021 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (742.832991ms) to execute 2021-08-28 02:52:33.798429 I | auth: deleting token oaOzRzvhEkVKwMfl.1522 for user conductor 2021-08-28 02:52:35.251044 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:52:38.445308 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (499.840244ms) to execute 2021-08-28 02:52:38.844055 I | auth: deleting token ptlkFtgaJaBEAgNf.1524 for user conductor 2021-08-28 02:52:38.844103 I | auth: deleting token xjmkJkTCUXoPVCmg.1523 for user conductor 2021-08-28 02:52:39.843792 I | auth: deleting token xSOzHpRStINZyQpq.1526 for user conductor 2021-08-28 02:52:40.343859 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:52:41.798397 I | auth: deleting token bKwGygvnhBRMFuyR.1528 for user conductor 2021-08-28 02:52:43.798417 I | auth: deleting token FKKLBYvILLGGAmbl.1529 for user conductor 2021-08-28 02:52:44.798443 I | auth: deleting token dfQwAjQFYUDswMau.1530 for user conductor 2021-08-28 02:52:45.344084 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:52:45.798533 I | auth: deleting token zvrPjNzjZTnLkEdg.1532 for user conductor 2021-08-28 02:52:45.798617 I | auth: deleting token YFkxLbVTkTmZKfjw.1531 for user conductor 2021-08-28 02:52:47.798470 I | auth: deleting token XtHIbvEmvLxhrnhO.1534 for user conductor 2021-08-28 02:52:48.798491 I | auth: deleting token vDnOxKmVKIMfkFLk.1535 for user conductor 2021-08-28 02:52:50.344647 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:52:50.810620 I | auth: deleting token hNeWOkkYPOtLhhMX.1536 for user conductor 2021-08-28 02:52:51.798438 I | auth: deleting token QzNBphgfbuSwxFTr.1538 for user conductor 2021-08-28 02:52:51.798489 I | auth: deleting token oukoiObBvgZBfjRN.1537 for user conductor 2021-08-28 02:52:52.798410 I | auth: deleting token QEvWwdQevcoTQXVw.1539 for user conductor 2021-08-28 02:52:53.798442 I | auth: deleting token eRXMPltsDTpWEbgG.1540 for user conductor 2021-08-28 02:52:55.344862 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:52:55.843833 I | auth: deleting token GZKPNsUhLMNcTAAu.1542 for user conductor 2021-08-28 02:52:55.843879 I | auth: deleting token cPCcQEUQzpDbCbny.1541 for user conductor 2021-08-28 02:52:56.452262 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.053025041s) to execute 2021-08-28 02:52:56.798411 I | auth: deleting token HSmTtFOhXKCMxcFP.1543 for user conductor 2021-08-28 02:52:58.798371 I | auth: deleting token HbPtxQuhkUwLBNJj.1544 for user conductor 2021-08-28 02:52:59.096345 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (196.751389ms) to execute 2021-08-28 02:52:59.798443 I | auth: deleting token erUvykqzkQyaDmgY.1546 for user conductor 2021-08-28 02:52:59.798484 I | auth: deleting token RdlhRDPDZvKgGjNF.1545 for user conductor 2021-08-28 02:53:00.345040 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:01.798407 I | auth: deleting token yFMVMWpipMteBRhU.1547 for user conductor 2021-08-28 02:53:01.798449 I | auth: deleting token LVadiaLDocnGvkwM.1548 for user conductor 2021-08-28 02:53:03.798459 I | auth: deleting token ptFKPvIZwcevAcMk.1549 for user conductor 2021-08-28 02:53:03.798502 I | auth: deleting token enmurWwnTqvrKLwv.1550 for user conductor 2021-08-28 02:53:04.798418 I | auth: deleting token kGniujKYTmEDmtye.1551 for user conductor 2021-08-28 02:53:05.345230 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:05.798470 I | auth: deleting token QbVfByDtlYDjciQt.1552 for user conductor 2021-08-28 02:53:07.798468 I | auth: deleting token NEmSqNHSmuLNwznX.1555 for user conductor 2021-08-28 02:53:07.798546 I | auth: deleting token VOUSplDPthMrkjqo.1554 for user conductor 2021-08-28 02:53:07.798563 I | auth: deleting token XlGNwxKJFJIWpLKT.1553 for user conductor 2021-08-28 02:53:10.345427 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:11.798460 I | auth: deleting token uPOwYNfhxqUmzCRV.1556 for user conductor 2021-08-28 02:53:12.843859 I | auth: deleting token NcPNpCVpQdCkCadO.1558 for user conductor 2021-08-28 02:53:12.843898 I | auth: deleting token pzQCnPzjNwPpLNpM.1557 for user conductor 2021-08-28 02:53:12.843909 I | auth: deleting token GOcutRDtZSLfDavB.1559 for user conductor 2021-08-28 02:53:13.798457 I | auth: deleting token lmjutOLGXuMcZDQc.1560 for user conductor 2021-08-28 02:53:15.345769 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:15.798405 I | auth: deleting token JjWfejnjYNJfZbOV.1562 for user conductor 2021-08-28 02:53:15.798449 I | auth: deleting token ZLnmrIpkKppWlCyg.1561 for user conductor 2021-08-28 02:53:16.644668 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.298989661s) to execute 2021-08-28 02:53:17.798487 I | auth: deleting token HHXYKFakwQBHNglM.1565 for user conductor 2021-08-28 02:53:17.798557 I | auth: deleting token mTdIkQROmEELWxTr.1563 for user conductor 2021-08-28 02:53:17.798571 I | auth: deleting token rOuzIGRDKtFFDBdg.1564 for user conductor 2021-08-28 02:53:20.346011 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:21.798422 I | auth: deleting token YggdInnxYKEYQSpA.1566 for user conductor 2021-08-28 02:53:25.346235 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:25.798442 I | auth: deleting token MRBDSMkLKxBlZUol.1567 for user conductor 2021-08-28 02:53:29.798446 I | auth: deleting token TuMwqtcLpnEwXjDY.1568 for user conductor 2021-08-28 02:53:30.346418 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:32.798475 I | auth: deleting token EukogYMoQdzMLkPg.1569 for user conductor 2021-08-28 02:53:35.346685 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:36.798472 I | auth: deleting token DvrUxsyhnCvGOMXp.1570 for user conductor 2021-08-28 02:53:37.798388 I | auth: deleting token xReyfVTaTyRFniVu.1571 for user conductor 2021-08-28 02:53:40.346873 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:40.798428 I | auth: deleting token aXqVVTJXgDLEFIur.1572 for user conductor 2021-08-28 02:53:41.798407 I | auth: deleting token wABcSJBgJtXIkrUs.1575 for user conductor 2021-08-28 02:53:41.798459 I | auth: deleting token BoaqUNMGDWqpbbDY.1574 for user conductor 2021-08-28 02:53:44.798434 I | auth: deleting token fBEyTdqOIOrkoaqV.1577 for user conductor 2021-08-28 02:53:45.347072 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:45.798435 I | auth: deleting token sRMeEHqStVSwrBWi.1576 for user conductor 2021-08-28 02:53:45.798475 I | auth: deleting token JAgCBqPAHbpehEPe.1578 for user conductor 2021-08-28 02:53:45.798489 I | auth: deleting token TwjLcrpQXjCAkVsi.1579 for user conductor 2021-08-28 02:53:47.347447 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (601.134817ms) to execute 2021-08-28 02:53:48.550018 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.053607125s) to execute 2021-08-28 02:53:48.798416 I | auth: deleting token EtKBrZMAOSFNVzlG.1580 for user conductor 2021-08-28 02:53:49.798453 I | auth: deleting token uXLCeUgYxSfMZTQv.1581 for user conductor 2021-08-28 02:53:49.798486 I | auth: deleting token yRlXBNqqEMuTZCMs.1583 for user conductor 2021-08-28 02:53:49.798502 I | auth: deleting token akerrTWKZqwdVqNP.1582 for user conductor 2021-08-28 02:53:50.347306 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:52.144309 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.643224006s) to execute 2021-08-28 02:53:52.798427 I | auth: deleting token VeReaCykZGygHpRD.1584 for user conductor 2021-08-28 02:53:52.798482 I | auth: deleting token DgdOIYpluCjtyjRx.1585 for user conductor 2021-08-28 02:53:53.345328 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.099317708s) to execute 2021-08-28 02:53:53.345485 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.199143631s) to execute 2021-08-28 02:53:53.798396 I | auth: deleting token HgdlVjgCIqyWQKRr.1586 for user conductor 2021-08-28 02:53:54.549044 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.201400631s) to execute 2021-08-28 02:53:54.549734 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.053417391s) to execute 2021-08-28 02:53:54.698034 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (146.163139ms) to execute 2021-08-28 02:53:55.347591 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:53:55.798396 I | auth: deleting token EnGrrMLAOtnmJCKq.1589 for user conductor 2021-08-28 02:53:55.798457 I | auth: deleting token LdQgPAFbzUPVYZlw.1588 for user conductor 2021-08-28 02:53:57.145415 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.246978801s) to execute 2021-08-28 02:53:57.296629 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.174191ms) to execute 2021-08-28 02:53:57.843876 I | auth: deleting token cVNEcwxAGmBYHnDm.1591 for user conductor 2021-08-28 02:53:58.798422 I | auth: deleting token BBASjohoyURjsepC.1590 for user conductor 2021-08-28 02:53:59.744551 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.148024012s) to execute 2021-08-28 02:53:59.798427 I | auth: deleting token XIyWkiLfNOVLXYVP.1593 for user conductor 2021-08-28 02:53:59.798478 I | auth: deleting token MsqAECApPagPltLn.1592 for user conductor 2021-08-28 02:53:59.996520 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (195.897871ms) to execute 2021-08-28 02:54:00.347782 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:02.347876 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.151708072s) to execute 2021-08-28 02:54:02.798495 I | auth: deleting token FIjlalJtxuusCFPG.1595 for user conductor 2021-08-28 02:54:02.798548 I | auth: deleting token NfRTRAhVeeFsNLdS.1594 for user conductor 2021-08-28 02:54:03.544733 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.048139295s) to execute 2021-08-28 02:54:03.544844 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.1949732s) to execute 2021-08-28 02:54:03.798427 I | auth: deleting token vEmoOJQOLWfvcakx.1596 for user conductor 2021-08-28 02:54:03.798473 I | auth: deleting token iQhBYmftirwvsLqZ.1597 for user conductor 2021-08-28 02:54:05.347945 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:06.051653 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.407703819s) to execute 2021-08-28 02:54:06.196724 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (142.893855ms) to execute 2021-08-28 02:54:06.396080 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (197.712226ms) to execute 2021-08-28 02:54:06.798509 I | auth: deleting token bygnlCATDPtulTIJ.1598 for user conductor 2021-08-28 02:54:06.798577 I | auth: deleting token BCBUwrPDrdIxnoID.1599 for user conductor 2021-08-28 02:54:07.798397 I | auth: deleting token CDsRjwIyKQLcfwlz.1600 for user conductor 2021-08-28 02:54:07.798454 I | auth: deleting token YiLfoXXJzSIDlUQc.1601 for user conductor 2021-08-28 02:54:10.348154 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:11.798412 I | auth: deleting token fKtphQJQZAkNTfDm.1602 for user conductor 2021-08-28 02:54:11.798449 I | auth: deleting token ukuGemGczWpEATFw.1604 for user conductor 2021-08-28 02:54:11.798460 I | auth: deleting token ynOObcAHfpulHIxH.1603 for user conductor 2021-08-28 02:54:12.798369 I | auth: deleting token qGTmxcAoiXBthrSM.1605 for user conductor 2021-08-28 02:54:14.798447 I | auth: deleting token vdRWrSaeiZQmZVvC.1606 for user conductor 2021-08-28 02:54:15.348396 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:15.843815 I | auth: deleting token znAeSdWgCKrqMEyE.1608 for user conductor 2021-08-28 02:54:15.843863 I | auth: deleting token WXLLiSvcThvnFSKm.1607 for user conductor 2021-08-28 02:54:16.798396 I | auth: deleting token hFwgKBYVaaQXABzf.1609 for user conductor 2021-08-28 02:54:18.843853 I | auth: deleting token pmUIzVQTjMFlluTD.1612 for user conductor 2021-08-28 02:54:18.843889 I | auth: deleting token IaAIwMivmychSCYn.1610 for user conductor 2021-08-28 02:54:18.843906 I | auth: deleting token wtIIzpoMRnCnDAzv.1611 for user conductor 2021-08-28 02:54:20.348577 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:20.798456 I | auth: deleting token IBJsIJUKougMZtWX.1613 for user conductor 2021-08-28 02:54:21.044663 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.400493132s) to execute 2021-08-28 02:54:22.251188 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.054674743s) to execute 2021-08-28 02:54:22.798413 I | auth: deleting token UcbYPSpIrOKFlrwX.1614 for user conductor 2021-08-28 02:54:23.451235 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.199906814s) to execute 2021-08-28 02:54:23.451573 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.197148084s) to execute 2021-08-28 02:54:23.843960 I | auth: deleting token saHawrfFqpbPrmHI.1615 for user conductor 2021-08-28 02:54:24.750189 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.204534804s) to execute 2021-08-28 02:54:24.750328 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.206260098s) to execute 2021-08-28 02:54:24.798396 I | auth: deleting token MThjoztEVkKYrzOs.1616 for user conductor 2021-08-28 02:54:25.348824 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:25.798436 I | auth: deleting token kqzMSGToooBoaMcI.1617 for user conductor 2021-08-28 02:54:26.047709 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.295341589s) to execute 2021-08-28 02:54:26.047899 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.103871177s) to execute 2021-08-28 02:54:26.798469 I | auth: deleting token QEQgbnuFnilRMvPz.1618 for user conductor 2021-08-28 02:54:27.843867 I | auth: deleting token AkKRcRwrVbzVczQh.1619 for user conductor 2021-08-28 02:54:30.349083 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:32.798479 I | auth: deleting token iMzThcwgunFRFUsp.1620 for user conductor 2021-08-28 02:54:35.349336 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:36.798507 I | auth: deleting token MftGRsafZYIBrVol.1621 for user conductor 2021-08-28 02:54:40.349573 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:40.798423 I | auth: deleting token fVEsBGdoEElvKavs.1622 for user conductor 2021-08-28 02:54:43.798435 I | auth: deleting token aSofHRxvmmHYBmaA.1623 for user conductor 2021-08-28 02:54:45.349787 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:47.798483 I | auth: deleting token KEOzZJIRcAYbovrS.1624 for user conductor 2021-08-28 02:54:50.350028 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:51.798443 I | auth: deleting token DwoXrICRpCrcdZFD.1625 for user conductor 2021-08-28 02:54:55.350343 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:54:55.798412 I | auth: deleting token eYBhnQmydiwqACaK.1626 for user conductor 2021-08-28 02:54:57.798436 I | auth: deleting token cOTjcNzlPxUinwuP.1628 for user conductor 2021-08-28 02:54:58.798428 I | auth: deleting token JRgurvRfNIgEkqjf.1629 for user conductor 2021-08-28 02:54:59.798439 I | auth: deleting token LRTEYArSakLGDBfI.1630 for user conductor 2021-08-28 02:55:00.350587 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:03.798454 I | auth: deleting token onLrXXIvWdKKawqZ.1633 for user conductor 2021-08-28 02:55:03.798501 I | auth: deleting token DOBqxBJpGwfVgnEn.1632 for user conductor 2021-08-28 02:55:03.798510 I | auth: deleting token EPRXktOaTUmnphin.1635 for user conductor 2021-08-28 02:55:03.798519 I | auth: deleting token XrqChKQpiDMkRzay.1634 for user conductor 2021-08-28 02:55:03.798529 I | auth: deleting token FyXBaISgtfldFFiW.1631 for user conductor 2021-08-28 02:55:05.350843 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:05.798537 I | auth: deleting token cRzPUhqEFzWMXRoB.1637 for user conductor 2021-08-28 02:55:07.798492 I | auth: deleting token hQspBREAUBqiqCyw.1638 for user conductor 2021-08-28 02:55:07.798546 I | auth: deleting token KfzztCmCDVltyEGU.1639 for user conductor 2021-08-28 02:55:08.798441 I | auth: deleting token mjDzjCJltiXakuNI.1640 for user conductor 2021-08-28 02:55:10.351130 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:10.798431 I | auth: deleting token apSWtILUtGlBqxon.1642 for user conductor 2021-08-28 02:55:10.798488 I | auth: deleting token mxnTzDeBwcLgrSOP.1643 for user conductor 2021-08-28 02:55:10.798510 I | auth: deleting token oFdDnhylYIiFfuJD.1641 for user conductor 2021-08-28 02:55:11.752259 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (855.940028ms) to execute 2021-08-28 02:55:13.798434 I | auth: deleting token cGyYyxBpwVgvMwBQ.1645 for user conductor 2021-08-28 02:55:13.798488 I | auth: deleting token uDhkJOfHMaXNgEXM.1644 for user conductor 2021-08-28 02:55:15.443901 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:16.798512 I | auth: deleting token RavYqnrtvpkbWcWf.1646 for user conductor 2021-08-28 02:55:18.748524 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.051715394s) to execute 2021-08-28 02:55:20.444159 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:20.798444 I | auth: deleting token KfLOlbsEOSlJXmlU.1651 for user conductor 2021-08-28 02:55:20.798738 I | auth: deleting token BSVMKxeNbUJsepZf.1647 for user conductor 2021-08-28 02:55:20.798812 I | auth: deleting token zGAkPZCwuldmSASY.1648 for user conductor 2021-08-28 02:55:20.798905 I | auth: deleting token fOQSmwUEfxgwTbuT.1649 for user conductor 2021-08-28 02:55:20.799059 I | auth: deleting token lFEkJIcTufKuspkv.1650 for user conductor 2021-08-28 02:55:21.049120 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (105.126193ms) to execute 2021-08-28 02:55:24.798412 I | auth: deleting token gjRSCRHKUZsxQSgL.1653 for user conductor 2021-08-28 02:55:24.798452 I | auth: deleting token GIyejZGLbDksQtkr.1652 for user conductor 2021-08-28 02:55:24.798464 I | auth: deleting token MiiNYrwwAuEshVSm.1654 for user conductor 2021-08-28 02:55:25.444461 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:26.044021 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.146142776s) to execute 2021-08-28 02:55:26.798474 I | auth: deleting token iPUUhePZgRlhTcNw.1655 for user conductor 2021-08-28 02:55:27.843895 I | auth: deleting token cjlrknlJTNukuzWy.1656 for user conductor 2021-08-28 02:55:27.843953 I | auth: deleting token UKEmrfLleEvKbqPB.1657 for user conductor 2021-08-28 02:55:28.351317 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.154765023s) to execute 2021-08-28 02:55:28.351581 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.305688706s) to execute 2021-08-28 02:55:28.596871 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (152.83181ms) to execute 2021-08-28 02:55:29.945559 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.446905748s) to execute 2021-08-28 02:55:30.444651 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:30.798475 I | auth: deleting token HxZxeAWCAwtaXenJ.1658 for user conductor 2021-08-28 02:55:30.798525 I | auth: deleting token jTzmSlDnDWuHjTMI.1660 for user conductor 2021-08-28 02:55:30.798534 I | auth: deleting token ZAyhAoIgjpIHKmaT.1659 for user conductor 2021-08-28 02:55:31.147585 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.347756041s) to execute 2021-08-28 02:55:32.348494 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.199056497s) to execute 2021-08-28 02:55:32.348615 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.004330794s) to execute 2021-08-28 02:55:32.496810 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (146.177035ms) to execute 2021-08-28 02:55:33.798428 I | auth: deleting token XRtAewtHMEXGlNCq.1662 for user conductor 2021-08-28 02:55:33.798542 I | auth: deleting token DnglmcnCyaAAzcQv.1661 for user conductor 2021-08-28 02:55:33.798575 I | auth: deleting token IlincVcRGXfIZfzU.1663 for user conductor 2021-08-28 02:55:35.444894 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:35.798491 I | auth: deleting token EMKDNlVzspDnMGXB.1664 for user conductor 2021-08-28 02:55:35.798617 I | auth: deleting token swoLDeXnwBtPPBFA.1665 for user conductor 2021-08-28 02:55:36.798474 I | auth: deleting token oRUuIQILoyUmInRM.1666 for user conductor 2021-08-28 02:55:38.745822 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.249404745s) to execute 2021-08-28 02:55:39.798424 I | auth: deleting token KniInIRaUxlrSuTS.1669 for user conductor 2021-08-28 02:55:39.798459 I | auth: deleting token EZwuvZUgKUuTwXgk.1670 for user conductor 2021-08-28 02:55:39.798467 I | auth: deleting token umXTqKfIUSMoveVH.1667 for user conductor 2021-08-28 02:55:39.798476 I | auth: deleting token ukQJPCWCElAKoGdP.1668 for user conductor 2021-08-28 02:55:40.445243 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:43.798498 I | auth: deleting token dvuCxvxgVCUuKqkL.1672 for user conductor 2021-08-28 02:55:43.798564 I | auth: deleting token AHQKfNgctgfDkjhE.1671 for user conductor 2021-08-28 02:55:45.445432 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:46.843948 I | auth: deleting token ufysFPEWgAgHbJTJ.1673 for user conductor 2021-08-28 02:55:46.844000 I | auth: deleting token OKmTXclRaamJLvJw.1674 for user conductor 2021-08-28 02:55:46.844013 I | auth: deleting token gaFzrIvAAAVmDTTa.1675 for user conductor 2021-08-28 02:55:48.843923 I | auth: deleting token CrzLumymavuzuhlC.1676 for user conductor 2021-08-28 02:55:48.843964 I | auth: deleting token JzIVRZcwGvsosSoF.1678 for user conductor 2021-08-28 02:55:48.843975 I | auth: deleting token HHGBvVCdBjWuQUBy.1677 for user conductor 2021-08-28 02:55:50.445712 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:50.450911 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.005119723s) to execute 2021-08-28 02:55:50.696431 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.431053ms) to execute 2021-08-28 02:55:51.798403 I | auth: deleting token PxEuXsSzkwJSAnWp.1679 for user conductor 2021-08-28 02:55:51.798468 I | auth: deleting token BQxAyMwzjTyoJlAJ.1680 for user conductor 2021-08-28 02:55:51.848721 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (404.605537ms) to execute 2021-08-28 02:55:52.798454 I | auth: deleting token eGjKVgwjsWFwoKeo.1681 for user conductor 2021-08-28 02:55:55.445894 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:55:55.546658 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (650.256284ms) to execute 2021-08-28 02:55:55.798480 I | auth: deleting token UOmhnaZOyWzxrZPN.1683 for user conductor 2021-08-28 02:55:55.798553 I | auth: deleting token jZQcagIFhcdVRVsF.1682 for user conductor 2021-08-28 02:55:58.798381 I | auth: deleting token XtuJwKrdxBvLIvzS.1685 for user conductor 2021-08-28 02:55:58.798431 I | auth: deleting token wshJyvvZSlJekQVd.1684 for user conductor 2021-08-28 02:55:58.798453 I | auth: deleting token gYxhfzbIIZXidhnD.1686 for user conductor 2021-08-28 02:55:59.346898 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (702.838702ms) to execute 2021-08-28 02:56:00.446131 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:00.798413 I | auth: deleting token YsPbRXNgiGjfnKOV.1688 for user conductor 2021-08-28 02:56:00.798452 I | auth: deleting token OQRlCDwLNtXGGOyA.1689 for user conductor 2021-08-28 02:56:00.798469 I | auth: deleting token cyTSKRPgeNVHBoHe.1687 for user conductor 2021-08-28 02:56:01.703501 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (104.284091ms) to execute 2021-08-28 02:56:03.798478 I | auth: deleting token goaBYaoDMDxXqNLL.1690 for user conductor 2021-08-28 02:56:03.798512 I | auth: deleting token GomcmVADEraVRRoS.1692 for user conductor 2021-08-28 02:56:03.798519 I | auth: deleting token UuPxGhgLIbWMdYzy.1691 for user conductor 2021-08-28 02:56:05.446335 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:06.798415 I | auth: deleting token diqLnHlKcVPQPrWU.1693 for user conductor 2021-08-28 02:56:07.798424 I | auth: deleting token wDEeWAJbqdFfptkZ.1694 for user conductor 2021-08-28 02:56:10.446538 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:11.798421 I | auth: deleting token mSkvmKaQKjiCUewb.1695 for user conductor 2021-08-28 02:56:15.446746 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:15.798398 I | auth: deleting token iXZPeHMWRcuWRJQh.1696 for user conductor 2021-08-28 02:56:18.249784 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (753.549032ms) to execute 2021-08-28 02:56:18.843810 I | auth: deleting token saHxJMusqAtaVxth.1697 for user conductor 2021-08-28 02:56:20.446999 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:20.652067 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.054479436s) to execute 2021-08-28 02:56:21.843979 I | auth: deleting token kPzQpIDCyEjoQitZ.1698 for user conductor 2021-08-28 02:56:22.147347 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (502.99777ms) to execute 2021-08-28 02:56:23.798391 I | auth: deleting token uhUegORTruDvadwm.1700 for user conductor 2021-08-28 02:56:24.548129 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.397976929s) to execute 2021-08-28 02:56:25.447232 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:25.752064 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.203549461s) to execute 2021-08-28 02:56:25.752214 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.10803834s) to execute 2021-08-28 02:56:25.798472 I | auth: deleting token bwKDITgTpQNcassJ.1699 for user conductor 2021-08-28 02:56:25.798526 I | auth: deleting token avnqeVXnPZWoqSXB.1701 for user conductor 2021-08-28 02:56:25.996560 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (242.538849ms) to execute 2021-08-28 02:56:26.096612 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (342.498266ms) to execute 2021-08-28 02:56:26.798410 I | auth: deleting token LMCStvPTUlMzxBsk.1704 for user conductor 2021-08-28 02:56:26.798446 I | auth: deleting token bdoCLhWjZkOQyBnG.1702 for user conductor 2021-08-28 02:56:27.798420 I | auth: deleting token GkNZsSFVErZOcqxf.1705 for user conductor 2021-08-28 02:56:30.447471 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:33.800928 I | auth: deleting token nfwonbqAQtikxNUA.1706 for user conductor 2021-08-28 02:56:33.800971 I | auth: deleting token jkEKGRiqrbHqNbUo.1710 for user conductor 2021-08-28 02:56:33.800984 I | auth: deleting token doSLSfIQMAVDKCvU.1708 for user conductor 2021-08-28 02:56:33.800992 I | auth: deleting token MWvIZTqFiYJPMmmH.1707 for user conductor 2021-08-28 02:56:33.801018 I | auth: deleting token BiwoEVdgakcyQSqp.1709 for user conductor 2021-08-28 02:56:34.798441 I | auth: deleting token kbPHDLmouqNdNyYq.1711 for user conductor 2021-08-28 02:56:35.447737 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:36.798463 I | auth: deleting token RpveInwRNspImZIK.1712 for user conductor 2021-08-28 02:56:37.798453 I | auth: deleting token EvmpnFoxjVLBuNLR.1714 for user conductor 2021-08-28 02:56:37.798504 I | auth: deleting token MqEBKDqhDDpNKgWh.1713 for user conductor 2021-08-28 02:56:38.748343 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (151.913735ms) to execute 2021-08-28 02:56:40.447968 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:40.798536 I | auth: deleting token HpIuTHsBHrBVdRug.1715 for user conductor 2021-08-28 02:56:41.798388 I | auth: deleting token mYEUgeOnbrSnMrzt.1716 for user conductor 2021-08-28 02:56:44.551426 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.053107292s) to execute 2021-08-28 02:56:45.448193 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:45.798470 I | auth: deleting token IPOPjxdqtvjYNzVR.1717 for user conductor 2021-08-28 02:56:47.347239 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.450886816s) to execute 2021-08-28 02:56:48.798452 I | auth: deleting token HtHXtAiruLstYRya.1718 for user conductor 2021-08-28 02:56:49.844074 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.347720078s) to execute 2021-08-28 02:56:49.844306 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.494654051s) to execute 2021-08-28 02:56:50.448430 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:51.146694 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.300449118s) to execute 2021-08-28 02:56:52.445641 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.44569797s) to execute 2021-08-28 02:56:52.445709 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.149322715s) to execute 2021-08-28 02:56:52.798455 I | auth: deleting token jzpBRrRzsaFnhyVV.1719 for user conductor 2021-08-28 02:56:53.651616 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.153253477s) to execute 2021-08-28 02:56:53.651825 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.204287245s) to execute 2021-08-28 02:56:55.448683 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:56:56.244228 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.498189601s) to execute 2021-08-28 02:56:56.244534 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.500484354s) to execute 2021-08-28 02:56:57.550762 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.302388044s) to execute 2021-08-28 02:56:57.550925 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.304560118s) to execute 2021-08-28 02:56:57.551120 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.304472064s) to execute 2021-08-28 02:56:57.798499 I | auth: deleting token CYWEfweKchNmHlBF.1720 for user conductor 2021-08-28 02:56:59.651870 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (307.859032ms) to execute 2021-08-28 02:57:00.448901 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:00.798468 I | auth: deleting token VXrIzwaNKwyWNGzS.1721 for user conductor 2021-08-28 02:57:01.245485 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.498871173s) to execute 2021-08-28 02:57:03.645751 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.347075974s) to execute 2021-08-28 02:57:03.796461 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (147.386198ms) to execute 2021-08-28 02:57:03.798499 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (147.746378ms) to execute 2021-08-28 02:57:04.798395 I | auth: deleting token CSebrEcChksdBIgZ.1722 for user conductor 2021-08-28 02:57:05.449160 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:08.750634 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.752995917s) to execute 2021-08-28 02:57:08.843838 I | auth: deleting token TlVeYyPXcbBsNiIu.1723 for user conductor 2021-08-28 02:57:10.046853 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.293662337s) to execute 2021-08-28 02:57:10.047074 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.294075833s) to execute 2021-08-28 02:57:10.144244 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.199797532s) to execute 2021-08-28 02:57:10.144328 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.200105935s) to execute 2021-08-28 02:57:10.451119 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:11.348789 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.198510735s) to execute 2021-08-28 02:57:12.798439 I | auth: deleting token DjMigPtFRgAhsPyj.1724 for user conductor 2021-08-28 02:57:13.746952 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.346349066s) to execute 2021-08-28 02:57:15.046898 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200652398s) to execute 2021-08-28 02:57:15.047022 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.295820352s) to execute 2021-08-28 02:57:15.047160 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.295781946s) to execute 2021-08-28 02:57:15.451432 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:15.843910 I | auth: deleting token arTjgYXTJWTLpgvZ.1726 for user conductor 2021-08-28 02:57:15.843970 I | auth: deleting token QSAlGZwSBNHDslEr.1725 for user conductor 2021-08-28 02:57:16.347117 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.200953949s) to execute 2021-08-28 02:57:18.746655 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.302761812s) to execute 2021-08-28 02:57:19.798514 I | auth: deleting token QzcvmJddWZsyCxAj.1728 for user conductor 2021-08-28 02:57:19.798584 I | auth: deleting token aqNwMcuOnyUwxpll.1729 for user conductor 2021-08-28 02:57:19.798601 I | auth: deleting token deAvcjjIFzDJzFcX.1730 for user conductor 2021-08-28 02:57:19.798608 I | auth: deleting token uZFdgLravKyClKVU.1727 for user conductor 2021-08-28 02:57:19.949538 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.199544438s) to execute 2021-08-28 02:57:19.949984 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.200700157s) to execute 2021-08-28 02:57:20.045942 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.296409506s) to execute 2021-08-28 02:57:20.451628 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:20.798486 I | auth: deleting token jMpNUFUyJbSSudGi.1731 for user conductor 2021-08-28 02:57:21.252545 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.208466678s) to execute 2021-08-28 02:57:21.252633 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.205286531s) to execute 2021-08-28 02:57:22.551781 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.105788465s) to execute 2021-08-28 02:57:23.752870 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.106915671s) to execute 2021-08-28 02:57:23.843815 I | auth: deleting token CcHffVHvCxDSuMes.1732 for user conductor 2021-08-28 02:57:24.798393 I | auth: deleting token KVYcOiJFNsOgDYNf.1734 for user conductor 2021-08-28 02:57:24.798438 I | auth: deleting token dWYRNuNGbYWDZbFc.1733 for user conductor 2021-08-28 02:57:25.451827 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:25.843887 I | auth: deleting token oYjJdMRhIjfnBGbb.1735 for user conductor 2021-08-28 02:57:26.348537 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.004561227s) to execute 2021-08-28 02:57:26.597676 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (149.895826ms) to execute 2021-08-28 02:57:26.798412 I | auth: deleting token OhiPFRJTiQOXIcvd.1736 for user conductor 2021-08-28 02:57:28.843956 I | auth: deleting token LlbiHtnGOFUFxfXY.1737 for user conductor 2021-08-28 02:57:28.953143 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.654057927s) to execute 2021-08-28 02:57:29.196423 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (149.657932ms) to execute 2021-08-28 02:57:30.452031 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:30.798513 I | auth: deleting token CcOfmqXjxHQYOmMM.1738 for user conductor 2021-08-28 02:57:31.649574 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.205534804s) to execute 2021-08-28 02:57:31.798449 I | auth: deleting token LvgKtfzDeSnIxHbb.1740 for user conductor 2021-08-28 02:57:31.798489 I | auth: deleting token kuANOaAXXxVOowAy.1739 for user conductor 2021-08-28 02:57:32.843831 I | auth: deleting token fVkYUZdVFoBknuiF.1741 for user conductor 2021-08-28 02:57:34.348676 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.204745276s) to execute 2021-08-28 02:57:34.496791 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (146.334034ms) to execute 2021-08-28 02:57:34.696583 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.057698ms) to execute 2021-08-28 02:57:34.798395 I | auth: deleting token OwCZWdrQYtUmonMG.1743 for user conductor 2021-08-28 02:57:34.798428 I | auth: deleting token fjJtaEHIMgVNiSvu.1742 for user conductor 2021-08-28 02:57:35.452219 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:35.844174 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (644.523388ms) to execute 2021-08-28 02:57:37.047478 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.149192564s) to execute 2021-08-28 02:57:37.798400 I | auth: deleting token AiOoqQkWOOdguTnF.1744 for user conductor 2021-08-28 02:57:38.798479 I | auth: deleting token bkQEAFIusdmBypYr.1747 for user conductor 2021-08-28 02:57:38.798553 I | auth: deleting token YLCzzRJsDgDNwudC.1745 for user conductor 2021-08-28 02:57:40.452488 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:40.798514 I | auth: deleting token jpVlznWZUlfEqdeh.1748 for user conductor 2021-08-28 02:57:41.798393 I | auth: deleting token QMffaQMVhEEYykaM.1749 for user conductor 2021-08-28 02:57:41.798435 I | auth: deleting token ucXKFvSnuDslStLp.1750 for user conductor 2021-08-28 02:57:45.452784 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:45.798465 I | auth: deleting token DAfaISsAliaABnDz.1751 for user conductor 2021-08-28 02:57:48.798431 I | auth: deleting token cqsWtUcRXvcvguFw.1752 for user conductor 2021-08-28 02:57:50.452912 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:51.798424 I | auth: deleting token VPnrzGHxWZHDkOjx.1753 for user conductor 2021-08-28 02:57:55.453100 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:57:55.798453 I | auth: deleting token APfGRvHKlATLRskQ.1754 for user conductor 2021-08-28 02:57:56.447206 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (848.954336ms) to execute 2021-08-28 02:57:56.843852 I | auth: deleting token JyQGjGotJaGVftyt.1756 for user conductor 2021-08-28 02:57:57.996898 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (152.876107ms) to execute 2021-08-28 02:57:59.844040 I | auth: deleting token QotYIdYUoReVdABY.1758 for user conductor 2021-08-28 02:57:59.844078 I | auth: deleting token VwAaQCvMAWwIuQnc.1757 for user conductor 2021-08-28 02:57:59.949685 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (853.305368ms) to execute 2021-08-28 02:58:00.453417 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:00.798437 I | auth: deleting token NgUSxQOFIUcAEPeK.1759 for user conductor 2021-08-28 02:58:01.147494 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.049557038s) to execute 2021-08-28 02:58:01.798431 I | auth: deleting token DSkFOdnwkMfKiFsi.1760 for user conductor 2021-08-28 02:58:02.352449 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.106086366s) to execute 2021-08-28 02:58:03.647816 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.05144205s) to execute 2021-08-28 02:58:03.798435 I | auth: deleting token wBlFWsBnLBPHELkk.1761 for user conductor 2021-08-28 02:58:03.798470 I | auth: deleting token MkOegKNfOLEKOINs.1762 for user conductor 2021-08-28 02:58:05.453566 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:05.798423 I | auth: deleting token KoBGyYxPUPyWNRAu.1763 for user conductor 2021-08-28 02:58:06.798436 I | auth: deleting token xymsWYdrayEzfqLt.1764 for user conductor 2021-08-28 02:58:07.748419 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.251642426s) to execute 2021-08-28 02:58:07.843849 I | auth: deleting token sFOBzgFZyVjKtidn.1765 for user conductor 2021-08-28 02:58:08.950383 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.105029255s) to execute 2021-08-28 02:58:08.950511 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.199469873s) to execute 2021-08-28 02:58:10.543916 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:10.843881 I | auth: deleting token wZBewIMfFoQfdTgl.1766 for user conductor 2021-08-28 02:58:11.447221 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.103110893s) to execute 2021-08-28 02:58:12.798439 I | auth: deleting token CUNsBLznYjysPzJd.1767 for user conductor 2021-08-28 02:58:13.798418 I | auth: deleting token WjOdSUsBwoRpxcHS.1768 for user conductor 2021-08-28 02:58:14.798393 I | auth: deleting token lNPVOTfeEaQLcJHU.1769 for user conductor 2021-08-28 02:58:15.544140 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:16.798405 I | auth: deleting token JSignHRnqYwqrPjk.1770 for user conductor 2021-08-28 02:58:16.798445 I | auth: deleting token SXbTPASIzWGfBwqP.1771 for user conductor 2021-08-28 02:58:17.798429 I | auth: deleting token pReeQtrgvDDBuXsm.1772 for user conductor 2021-08-28 02:58:20.544393 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:20.798451 I | auth: deleting token ImhyxiPIpOyMhKEH.1773 for user conductor 2021-08-28 02:58:25.544661 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:25.798493 I | auth: deleting token yEROPNAvOYKQHWsB.1774 for user conductor 2021-08-28 02:58:28.798395 I | auth: deleting token sNZBZuVzfBpIAYcj.1775 for user conductor 2021-08-28 02:58:30.544984 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:32.798435 I | auth: deleting token DwElpPBLeJdNCyEC.1776 for user conductor 2021-08-28 02:58:35.545317 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:35.798419 I | auth: deleting token rOZBuoHnYQneMZjW.1777 for user conductor 2021-08-28 02:58:39.798449 I | auth: deleting token nSIGnDNUgUAvXHcy.1778 for user conductor 2021-08-28 02:58:40.545640 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:42.798447 I | auth: deleting token xKjMBusxNnzyUoIM.1779 for user conductor 2021-08-28 02:58:45.545880 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:47.798451 I | auth: deleting token ZkOZaUvRevtkpJmO.1780 for user conductor 2021-08-28 02:58:48.798436 I | auth: deleting token yeingLCYduBgydte.1781 for user conductor 2021-08-28 02:58:48.798494 I | auth: deleting token rVkZfZRTiiCpGCzt.1782 for user conductor 2021-08-28 02:58:50.547857 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:52.798389 I | auth: deleting token IMWEOWJlKmLDjaCL.1786 for user conductor 2021-08-28 02:58:52.798421 I | auth: deleting token IUvsvKLUOFEfHYRk.1784 for user conductor 2021-08-28 02:58:53.798423 I | auth: deleting token UYENjEpFoVrUwRmG.1787 for user conductor 2021-08-28 02:58:54.798427 I | auth: deleting token sLFyPdaxuZPAJiaW.1790 for user conductor 2021-08-28 02:58:54.798481 I | auth: deleting token vDNigtYmMhJUdwJw.1788 for user conductor 2021-08-28 02:58:54.798488 I | auth: deleting token yzUFRptAYYVORngN.1789 for user conductor 2021-08-28 02:58:55.548147 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:58:57.798526 I | auth: deleting token JNLPaqELlVisNNbI.1792 for user conductor 2021-08-28 02:58:57.798577 I | auth: deleting token CuXpZReKTiiGKTZB.1794 for user conductor 2021-08-28 02:58:57.798590 I | auth: deleting token FtGWUXbYcwNZOiqi.1791 for user conductor 2021-08-28 02:58:57.844581 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (400.446128ms) to execute 2021-08-28 02:58:58.196826 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.020626ms) to execute 2021-08-28 02:58:59.798461 I | auth: deleting token DfQQGhRvmggcXJAp.1795 for user conductor 2021-08-28 02:59:00.548353 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.44:2380: getsockopt: connection refused 2021-08-28 02:59:00.798455 I | auth: deleting token bMULaXJgUgiAsYze.1797 for user conductor 2021-08-28 02:59:00.798604 I | auth: deleting token klipWFLkKaAOXQEf.1796 for user conductor 2021-08-28 02:59:02.798416 I | auth: deleting token gCjGxlPaGHnnpriw.1798 for user conductor 2021-08-28 02:59:03.798441 I | auth: deleting token JTUyjexwFkONAcXk.1800 for user conductor 2021-08-28 02:59:03.798483 I | auth: deleting token JpqLYbAurpNcNJnl.1799 for user conductor 2021-08-28 02:59:05.548595 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:06.801915 I | auth: deleting token izSrdHgnkQKrczLL.1803 for user conductor 2021-08-28 02:59:06.801957 I | auth: deleting token DcWXfaSTNhZONHaX.1802 for user conductor 2021-08-28 02:59:06.801968 I | auth: deleting token nWcwztDsQwVSqQgQ.1801 for user conductor 2021-08-28 02:59:07.843860 I | auth: deleting token eiafNOTEIaIHEJiw.1804 for user conductor 2021-08-28 02:59:10.548793 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:10.844595 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.348065495s) to execute 2021-08-28 02:59:11.798491 I | auth: deleting token hIMTKfIiUHThSICm.1805 for user conductor 2021-08-28 02:59:13.450998 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.206828691s) to execute 2021-08-28 02:59:14.747525 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.201746839s) to execute 2021-08-28 02:59:14.747867 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.149712621s) to execute 2021-08-28 02:59:14.944450 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.118024ms) to execute 2021-08-28 02:59:15.548978 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:16.444886 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.50052199s) to execute 2021-08-28 02:59:16.798423 I | auth: deleting token isJIQYwdeKiolYLA.1806 for user conductor 2021-08-28 02:59:16.798470 I | auth: deleting token NIzmzPclYaxhQLjY.1807 for user conductor 2021-08-28 02:59:17.748089 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.503809754s) to execute 2021-08-28 02:59:17.798400 I | auth: deleting token pSJMtQiZHJiTvueZ.1809 for user conductor 2021-08-28 02:59:20.549159 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:21.798421 I | auth: deleting token zaZTSnjWyxNkJboF.1811 for user conductor 2021-08-28 02:59:21.798473 I | auth: deleting token EXdBzlfkiRNMQWVN.1812 for user conductor 2021-08-28 02:59:23.798422 I | auth: deleting token eXdPHMxvPdrJKHcw.1816 for user conductor 2021-08-28 02:59:23.798456 I | auth: deleting token KGRNgytsVTeoeJng.1813 for user conductor 2021-08-28 02:59:24.798430 I | auth: deleting token JdcovYPwDuwhRUUJ.1815 for user conductor 2021-08-28 02:59:25.549444 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:25.798454 I | auth: deleting token MjlhKXyQrczhIWRZ.1818 for user conductor 2021-08-28 02:59:25.798501 I | auth: deleting token JnInUTGCnzDhleoh.1817 for user conductor 2021-08-28 02:59:26.798452 I | auth: deleting token GkcaSgjDNcKSYhGu.1819 for user conductor 2021-08-28 02:59:27.798502 I | auth: deleting token ZoafHkmqiZxeiung.1820 for user conductor 2021-08-28 02:59:27.798580 I | auth: deleting token SgrjkmETyOAkquTS.1821 for user conductor 2021-08-28 02:59:29.798437 I | auth: deleting token qPvmzKCAgoqrgnrF.1822 for user conductor 2021-08-28 02:59:30.549715 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:31.798473 I | auth: deleting token CsHnXFxJdjfxEeBs.1823 for user conductor 2021-08-28 02:59:34.798519 I | auth: deleting token lVQWHavwsgAoZOrU.1825 for user conductor 2021-08-28 02:59:35.549938 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:35.645943 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (601.742955ms) to execute 2021-08-28 02:59:38.798440 I | auth: deleting token HJCPOuCHZNRDFtHq.1826 for user conductor 2021-08-28 02:59:40.643885 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:41.843877 I | auth: deleting token ZSagrpYuBPmRXtnK.1827 for user conductor 2021-08-28 02:59:43.852230 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (955.984562ms) to execute 2021-08-28 02:59:45.644219 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:46.844333 I | auth: deleting token reuUHYbFWspeYqHq.1828 for user conductor 2021-08-28 02:59:49.843884 I | auth: deleting token NOOBuPtPRAUNyHzK.1829 for user conductor 2021-08-28 02:59:50.045936 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (249.453936ms) to execute 2021-08-28 02:59:50.644475 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:53.798401 I | auth: deleting token OnwVOvoNfDWJLUWD.1830 for user conductor 2021-08-28 02:59:55.644735 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 02:59:56.798449 I | auth: deleting token vTxVJOyaWPEczzeB.1832 for user conductor 2021-08-28 03:00:00.645022 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:00.798458 I | auth: deleting token qDiGuZvmXtAKycDY.1833 for user conductor 2021-08-28 03:00:04.798475 I | auth: deleting token THInGFjqXefenrCA.1834 for user conductor 2021-08-28 03:00:05.645279 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:06.151655 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.252626281s) to execute 2021-08-28 03:00:07.844007 I | auth: deleting token ZTbxtDTUCooSJKrc.1835 for user conductor 2021-08-28 03:00:10.645483 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:10.798432 I | auth: deleting token JzgFVYMdRTgseyBb.1837 for user conductor 2021-08-28 03:00:12.798481 I | auth: deleting token IsSmUydjupUcvtSE.1839 for user conductor 2021-08-28 03:00:13.798473 I | auth: deleting token FXzCyMjZiBrvvOAP.1840 for user conductor 2021-08-28 03:00:14.798472 I | auth: deleting token mVIEBiKQQKhnHSbt.1841 for user conductor 2021-08-28 03:00:15.645791 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:16.798434 I | auth: deleting token bBtQbZASSidUMgck.1842 for user conductor 2021-08-28 03:00:17.798501 I | auth: deleting token nsfSUwCQUOrPFQlW.1843 for user conductor 2021-08-28 03:00:19.798364 I | auth: deleting token OfVNeSYeqLNNFElR.1845 for user conductor 2021-08-28 03:00:20.646030 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:21.047120 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (603.152918ms) to execute 2021-08-28 03:00:21.798443 I | auth: deleting token iQyVjnhswPvfMNos.1847 for user conductor 2021-08-28 03:00:21.798560 I | auth: deleting token LkrmgFjKABnpKqdw.1846 for user conductor 2021-08-28 03:00:22.798455 I | auth: deleting token XfOSpLSwLsBKVbwv.1848 for user conductor 2021-08-28 03:00:25.646203 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:25.897286 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (148.177136ms) to execute 2021-08-28 03:00:26.798427 I | auth: deleting token LKcOnztZQiHgUsCE.1850 for user conductor 2021-08-28 03:00:28.798426 I | auth: deleting token OOZVoXUyshLfYZjC.1849 for user conductor 2021-08-28 03:00:28.798465 I | auth: deleting token rpyDpqbRmYUKXkgm.1852 for user conductor 2021-08-28 03:00:28.798474 I | auth: deleting token bhznnWUqhHgpSQUg.1851 for user conductor 2021-08-28 03:00:28.798480 I | auth: deleting token odohpAZnLXcPQGjf.1853 for user conductor 2021-08-28 03:00:30.646495 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:31.798402 I | auth: deleting token gtMZzaXiEEDShLfD.1855 for user conductor 2021-08-28 03:00:31.798446 I | auth: deleting token NlpgqNGIheWMaeoM.1856 for user conductor 2021-08-28 03:00:32.798430 I | auth: deleting token PWXhEqjmNkgfqzdx.1857 for user conductor 2021-08-28 03:00:32.798481 I | auth: deleting token sHYmanIFtIltmPTg.1858 for user conductor 2021-08-28 03:00:34.798501 I | auth: deleting token ScOBxXkXMdLVyoDw.1859 for user conductor 2021-08-28 03:00:35.646672 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:37.450279 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.252324127s) to execute 2021-08-28 03:00:37.843802 I | auth: deleting token vWXBvQDxXAXqBxDz.1860 for user conductor 2021-08-28 03:00:39.798409 I | auth: deleting token kXEjCwbBkzVAvVTK.1862 for user conductor 2021-08-28 03:00:40.146300 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.344816156s) to execute 2021-08-28 03:00:40.646878 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:40.843792 I | auth: deleting token WJXPfaDEjmeHDKcL.1863 for user conductor 2021-08-28 03:00:41.546355 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.399967356s) to execute 2021-08-28 03:00:42.798413 I | auth: deleting token iZUAHvvPPllfNBvo.1864 for user conductor 2021-08-28 03:00:42.944099 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (347.545604ms) to execute 2021-08-28 03:00:43.798436 I | auth: deleting token PsofaPEByXvDmBWK.1865 for user conductor 2021-08-28 03:00:43.798473 I | auth: deleting token UQprkCHKaXthoJhe.1866 for user conductor 2021-08-28 03:00:45.647074 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:46.798452 I | auth: deleting token ZVEsFxYmqvzcWYRQ.1867 for user conductor 2021-08-28 03:00:47.798404 I | auth: deleting token bfvzFcyDiRjUIcYc.1868 for user conductor 2021-08-28 03:00:47.798443 I | auth: deleting token OtvOVXhGYjQXmASm.1869 for user conductor 2021-08-28 03:00:49.296642 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.996657ms) to execute 2021-08-28 03:00:50.449250 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (505.250973ms) to execute 2021-08-28 03:00:50.647300 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:50.843842 I | auth: deleting token wDScmwczYuGExgGD.1871 for user conductor 2021-08-28 03:00:50.843879 I | auth: deleting token ClPPpVlldMGkGCNW.1870 for user conductor 2021-08-28 03:00:52.798439 I | auth: deleting token GAtwFQMydxzesAom.1872 for user conductor 2021-08-28 03:00:52.798484 I | auth: deleting token hRNVNPRmfMYtVesW.1873 for user conductor 2021-08-28 03:00:54.551030 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.106950974s) to execute 2021-08-28 03:00:54.798443 I | auth: deleting token CQJbZmuHKusILKYq.1874 for user conductor 2021-08-28 03:00:55.647694 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:00:55.845367 I | auth: deleting token KzjRwbODTswGJuHY.1875 for user conductor 2021-08-28 03:00:55.845399 I | auth: deleting token EuNnTdLEXeQjigmr.1876 for user conductor 2021-08-28 03:00:57.252979 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.456593729s) to execute 2021-08-28 03:00:57.253226 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.609172771s) to execute 2021-08-28 03:00:58.550546 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.153609417s) to execute 2021-08-28 03:00:58.550762 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.206643495s) to execute 2021-08-28 03:00:58.550993 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.206928348s) to execute 2021-08-28 03:00:58.798414 I | auth: deleting token fJkYcyYXqVqLpsJr.1877 for user conductor 2021-08-28 03:00:59.798394 I | auth: deleting token fnGAhoxWQTIafvDf.1879 for user conductor 2021-08-28 03:00:59.798435 I | auth: deleting token HVWqHtVzpiAGBmLg.1878 for user conductor 2021-08-28 03:00:59.948295 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.202248144s) to execute 2021-08-28 03:01:00.647963 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:01.798423 I | auth: deleting token MtXAHiWLlcyPCKmE.1880 for user conductor 2021-08-28 03:01:02.647163 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (803.209145ms) to execute 2021-08-28 03:01:03.798405 I | auth: deleting token MEGOZnVTdLLVzpXH.1881 for user conductor 2021-08-28 03:01:05.648232 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:06.798421 I | auth: deleting token OBYiLPtoZLyQruMg.1882 for user conductor 2021-08-28 03:01:10.648452 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:10.798422 I | auth: deleting token WWEjGlydMqotPTEi.1884 for user conductor 2021-08-28 03:01:12.096286 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (198.2404ms) to execute 2021-08-28 03:01:14.798442 I | auth: deleting token XNGIjzDTILwILMUB.1885 for user conductor 2021-08-28 03:01:15.648667 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:18.798426 I | auth: deleting token BEcyrOZwxohgftkk.1886 for user conductor 2021-08-28 03:01:18.798472 I | auth: deleting token hBIvjVGzqwFigOjD.1887 for user conductor 2021-08-28 03:01:20.648876 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:20.798451 I | auth: deleting token JomjJdWdAwPhmmZB.1889 for user conductor 2021-08-28 03:01:21.798442 I | auth: deleting token HfhypACjGcTwRSBf.1890 for user conductor 2021-08-28 03:01:22.798400 I | auth: deleting token mNQevfSgHoQqGaKh.1892 for user conductor 2021-08-28 03:01:25.649076 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:25.798534 I | auth: deleting token MeDYHOtCIDWPzbMn.1894 for user conductor 2021-08-28 03:01:26.798416 I | auth: deleting token ipUERlxJpqOqqFYh.1897 for user conductor 2021-08-28 03:01:26.798452 I | auth: deleting token KeEZjrfACZqYVHYE.1896 for user conductor 2021-08-28 03:01:26.798471 I | auth: deleting token JfrLdAkPbZfQnpDv.1899 for user conductor 2021-08-28 03:01:26.798484 I | auth: deleting token TTQmVeAeckUgEfsa.1895 for user conductor 2021-08-28 03:01:30.649423 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:30.798449 I | auth: deleting token eJTRxbhZtLToGrPo.1900 for user conductor 2021-08-28 03:01:34.798427 I | auth: deleting token lEJbxmGMFURyvwPh.1901 for user conductor 2021-08-28 03:01:35.649789 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:38.798435 I | auth: deleting token ppldmaHIXpRJGonK.1902 for user conductor 2021-08-28 03:01:39.843807 I | auth: deleting token qTtVbjyYEKqvThlf.1903 for user conductor 2021-08-28 03:01:40.048158 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (804.141434ms) to execute 2021-08-28 03:01:40.649980 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:40.798410 I | auth: deleting token SSWRokPFJlYionmU.1905 for user conductor 2021-08-28 03:01:42.798430 I | auth: deleting token KSWRRPgjGIPdBppi.1907 for user conductor 2021-08-28 03:01:44.798424 I | auth: deleting token rDhfqTiCMGxbsfxT.1908 for user conductor 2021-08-28 03:01:44.798474 I | auth: deleting token qvYSoHcvPiBoZoRf.1909 for user conductor 2021-08-28 03:01:45.650247 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:47.798431 I | auth: deleting token xhMQTrcVYuGKhEnm.1910 for user conductor 2021-08-28 03:01:50.650509 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:50.798440 I | auth: deleting token uMtAJjFWDWKMTyYV.1915 for user conductor 2021-08-28 03:01:50.798548 I | auth: deleting token XkhPaTEVXUxrYQOn.1912 for user conductor 2021-08-28 03:01:50.798585 I | auth: deleting token mEctaTGxqBmYcarv.1911 for user conductor 2021-08-28 03:01:50.798610 I | auth: deleting token fRpHEMFDFLvtqRdW.1914 for user conductor 2021-08-28 03:01:50.798630 I | auth: deleting token QfFaQFjjJQSznzQF.1913 for user conductor 2021-08-28 03:01:52.798453 I | auth: deleting token FjECSJEwYanoouaJ.1916 for user conductor 2021-08-28 03:01:53.798432 I | auth: deleting token OxFenLpzZIbhJBaJ.1918 for user conductor 2021-08-28 03:01:55.650796 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:01:56.798430 I | auth: deleting token tFILYHmJKGxRJXXp.1917 for user conductor 2021-08-28 03:01:56.798468 I | auth: deleting token oupbieKSKwXHiOlU.1920 for user conductor 2021-08-28 03:01:57.799528 I | auth: deleting token CZFrpKwNkstZrvmc.1921 for user conductor 2021-08-28 03:01:57.799584 I | auth: deleting token VwOtXQYBNiUadxcr.1922 for user conductor 2021-08-28 03:01:57.799604 I | auth: deleting token bUMaMkuPebofTAZV.1919 for user conductor 2021-08-28 03:01:59.798408 I | auth: deleting token DeSUzfQopMuWvomZ.1923 for user conductor 2021-08-28 03:02:00.651008 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:00.798494 I | auth: deleting token MuzLOuJnkgfQcCUM.1924 for user conductor 2021-08-28 03:02:03.798469 I | auth: deleting token ReJQeWlfNzGkvlJR.1926 for user conductor 2021-08-28 03:02:03.798586 I | auth: deleting token HwueUqQHmMcTNzvp.1925 for user conductor 2021-08-28 03:02:03.798617 I | auth: deleting token ivBVNzqrehCvGBgu.1927 for user conductor 2021-08-28 03:02:03.798640 I | auth: deleting token hxBVPDluqWeXGYmm.1928 for user conductor 2021-08-28 03:02:05.651192 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:08.798459 I | auth: deleting token JpqPSUEOUDeMWhDV.1931 for user conductor 2021-08-28 03:02:10.651386 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:10.798399 I | auth: deleting token gTSfMOKsDkiRxszD.1929 for user conductor 2021-08-28 03:02:10.798444 I | auth: deleting token smibubNtemEjhQCU.1930 for user conductor 2021-08-28 03:02:10.798455 I | auth: deleting token mJbjuiDqNTTsYiMG.1933 for user conductor 2021-08-28 03:02:10.798464 I | auth: deleting token hfmxhrUvrDoPUlWr.1932 for user conductor 2021-08-28 03:02:10.798494 I | auth: deleting token zxBWiRsFLaDebsOT.1934 for user conductor 2021-08-28 03:02:11.547149 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.050796713s) to execute 2021-08-28 03:02:14.798438 I | auth: deleting token BoHJgYIWRGcQKafa.1936 for user conductor 2021-08-28 03:02:15.651710 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:15.798438 I | auth: deleting token cleqNrPFGxrIAift.1938 for user conductor 2021-08-28 03:02:15.798498 I | auth: deleting token NIimBpoRQTXUsTdc.1935 for user conductor 2021-08-28 03:02:15.798515 I | auth: deleting token rfciVXoeZAVJfjcm.1939 for user conductor 2021-08-28 03:02:15.798527 I | auth: deleting token PHeyguAJLgITBbHP.1937 for user conductor 2021-08-28 03:02:18.798436 I | auth: deleting token JqrgXRsStWJBoIdp.1942 for user conductor 2021-08-28 03:02:20.651949 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:20.798462 I | auth: deleting token uuiXLWtwMhkuZluW.1943 for user conductor 2021-08-28 03:02:20.798508 I | auth: deleting token jcahSiSTGBlGJMgT.1940 for user conductor 2021-08-28 03:02:20.798519 I | auth: deleting token QwPljKmmeVDNefTp.1944 for user conductor 2021-08-28 03:02:20.798526 I | auth: deleting token ZLFQoFjpeBEJRfOX.1941 for user conductor 2021-08-28 03:02:21.843851 I | auth: deleting token MyVdqjhHxXnxmUNF.1945 for user conductor 2021-08-28 03:02:22.543855 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.051600306s) to execute 2021-08-28 03:02:24.798411 I | auth: deleting token pUkLTivcptRgSmTj.1948 for user conductor 2021-08-28 03:02:24.798472 I | auth: deleting token VMGcsngHFmBgwcyn.1947 for user conductor 2021-08-28 03:02:24.798494 I | auth: deleting token wChKIFfEctxyPGBX.1946 for user conductor 2021-08-28 03:02:25.652149 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:26.844017 I | auth: deleting token fLBYUfXkufPNsyec.1950 for user conductor 2021-08-28 03:02:26.844059 I | auth: deleting token aeehQdKcxNkofLpZ.1949 for user conductor 2021-08-28 03:02:29.798421 I | auth: deleting token NMqOshDlWhCbcCSC.1952 for user conductor 2021-08-28 03:02:29.798477 I | auth: deleting token pjRcJdloyBurAlvP.1953 for user conductor 2021-08-28 03:02:29.798494 I | auth: deleting token ezciWwUayqJbMaNa.1951 for user conductor 2021-08-28 03:02:30.652374 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:31.798441 I | auth: deleting token vRKXWWSUnONepcpD.1955 for user conductor 2021-08-28 03:02:31.798477 I | auth: deleting token TEeyXcYKBlVKvjwf.1954 for user conductor 2021-08-28 03:02:32.798407 I | auth: deleting token JQMXkCqcThFwsCTH.1956 for user conductor 2021-08-28 03:02:34.798482 I | auth: deleting token djzYtOFoSxsILuKR.1958 for user conductor 2021-08-28 03:02:34.798533 I | auth: deleting token OKZGQMSTJouumAlb.1957 for user conductor 2021-08-28 03:02:35.652643 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:36.798472 I | auth: deleting token WhdoqkVfBZAbUKAS.1959 for user conductor 2021-08-28 03:02:37.798413 I | auth: deleting token MjnYFUKQNjZVuOCn.1961 for user conductor 2021-08-28 03:02:37.798463 I | auth: deleting token fKlcfGrNBgMEOSeE.1960 for user conductor 2021-08-28 03:02:39.798460 I | auth: deleting token ImJzFREaKZLhGdCm.1962 for user conductor 2021-08-28 03:02:40.652929 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:42.798437 I | auth: deleting token hUlpPeVLKuIaoARi.1963 for user conductor 2021-08-28 03:02:44.798420 I | auth: deleting token kaLirdtPrQnenPrF.1964 for user conductor 2021-08-28 03:02:45.653211 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:48.798602 I | auth: deleting token RbAhtzSnaiPCIOea.1965 for user conductor 2021-08-28 03:02:49.843879 I | auth: deleting token DttHSXvrotBKQsmB.1966 for user conductor 2021-08-28 03:02:50.653359 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:50.843798 I | auth: deleting token iUboosTYQquOJlKp.1967 for user conductor 2021-08-28 03:02:51.596544 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (145.750031ms) to execute 2021-08-28 03:02:52.809991 I | auth: deleting token HgvxnxppfeNkeiKM.1968 for user conductor 2021-08-28 03:02:54.346742 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (802.647712ms) to execute 2021-08-28 03:02:54.843851 I | auth: deleting token UjoesXRnDlNaHoeS.1969 for user conductor 2021-08-28 03:02:55.653567 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:02:55.798429 I | auth: deleting token LYzIkfXywOPXEEhO.1970 for user conductor 2021-08-28 03:02:56.798532 I | auth: deleting token WaSLdvbvVHoifqQR.1971 for user conductor 2021-08-28 03:02:56.798580 I | auth: deleting token ZJYdZCEBAxiVCYdF.1972 for user conductor 2021-08-28 03:02:58.798435 I | auth: deleting token zwVvQDRncAdHCByK.1973 for user conductor 2021-08-28 03:02:59.544313 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.100265982s) to execute 2021-08-28 03:03:00.653806 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:03:00.798435 I | auth: deleting token BKnjdQbJhChyprGt.1975 for user conductor 2021-08-28 03:03:00.798475 I | auth: deleting token dBWxTAJcLMJBNERI.1974 for user conductor 2021-08-28 03:03:01.843795 I | auth: deleting token PrEkPgzWwmwGCGYs.1977 for user conductor 2021-08-28 03:03:02.843883 I | auth: deleting token XlCiShJdBHfZRtsW.1978 for user conductor 2021-08-28 03:03:03.798476 I | auth: deleting token XGZvIOQLmPeCQWXR.1981 for user conductor 2021-08-28 03:03:03.798558 I | auth: deleting token ZmINiRgqXUGPavUg.1980 for user conductor 2021-08-28 03:03:04.444866 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (848.261842ms) to execute 2021-08-28 03:03:05.743798 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:03:05.798461 I | auth: deleting token brskPWdgcuJUjcdV.1982 for user conductor 2021-08-28 03:03:07.798413 I | auth: deleting token dIJvUIZhYSamXhSt.1983 for user conductor 2021-08-28 03:03:08.798426 I | auth: deleting token rMOBQgCVfNeVMuzs.1985 for user conductor 2021-08-28 03:03:09.798446 I | auth: deleting token AAlwuBeSkimZSmOc.1987 for user conductor 2021-08-28 03:03:09.798487 I | auth: deleting token vqJgRkYAWrWdpQuB.1986 for user conductor 2021-08-28 03:03:10.744046 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:03:11.798509 I | auth: deleting token ukkhfeyPoeXUecRw.1988 for user conductor 2021-08-28 03:03:11.798556 I | auth: deleting token asDUweEmDzeIOAnG.1990 for user conductor 2021-08-28 03:03:11.798574 I | auth: deleting token sqLNfnxaXYvMmTtF.1989 for user conductor 2021-08-28 03:03:14.798463 I | auth: deleting token ZHGzpGgBAZdcVpiX.1991 for user conductor 2021-08-28 03:03:15.744248 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host 2021-08-28 03:03:17.048171 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (904.061651ms) to execute 2021-08-28 03:03:17.843750 I | auth: deleting token KONtDFNSJPCIFJLB.1992 for user conductor 2021-08-28 03:03:18.696326 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (195.945367ms) to execute