By type
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
Skipping self-checking
2021-10-22 01:40:14.020950 I | etcdmain: etcd Version: 3.2.24
2021-10-22 01:40:14.021114 I | etcdmain: Git SHA: 420a45226
2021-10-22 01:40:14.021122 I | etcdmain: Go Version: go1.8.7
2021-10-22 01:40:14.021128 I | etcdmain: Go OS/Arch: linux/amd64
2021-10-22 01:40:14.021134 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-10-22 01:40:14.021421 I | embed: listening for peers on http://0.0.0.0:2380
2021-10-22 01:40:14.118234 I | embed: listening for client requests on 0.0.0.0:2379
2021-10-22 01:40:14.235639 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd:2380 to 10.233.67.182:2380
2021-10-22 01:40:14.236454 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd:2380 to 10.233.67.182:2380
2021-10-22 01:40:15.232338 I | etcdserver: name = onap-oof-has-etcd-2
2021-10-22 01:40:15.232414 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-10-22 01:40:15.232430 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-10-22 01:40:15.232438 I | etcdserver: heartbeat = 100ms
2021-10-22 01:40:15.232446 I | etcdserver: election = 1000ms
2021-10-22 01:40:15.232454 I | etcdserver: snapshot count = 100000
2021-10-22 01:40:15.232493 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-2.oof-has-etcd:2379
2021-10-22 01:40:15.232513 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-10-22 01:40:15.232542 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-10-22 01:40:15.283109 I | etcdserver: starting member 2d249ba41c7e44fa in cluster e8b03869cbf54258
2021-10-22 01:40:15.283217 I | raft: 2d249ba41c7e44fa became follower at term 0
2021-10-22 01:40:15.283242 I | raft: newRaft 2d249ba41c7e44fa [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-10-22 01:40:15.283248 I | raft: 2d249ba41c7e44fa became follower at term 1
2021-10-22 01:40:15.330612 W | auth: simple token is not cryptographically signed
2021-10-22 01:40:15.428731 I | rafthttp: starting peer 72b38cc930a2fa6f...
2021-10-22 01:40:15.428835 I | rafthttp: started HTTP pipelining with peer 72b38cc930a2fa6f
2021-10-22 01:40:15.435106 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-10-22 01:40:15.518700 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-10-22 01:40:15.521680 I | rafthttp: started peer 72b38cc930a2fa6f
2021-10-22 01:40:15.521773 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-10-22 01:40:15.521796 I | rafthttp: added peer 72b38cc930a2fa6f
2021-10-22 01:40:15.521898 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-10-22 01:40:15.521989 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-10-22 01:40:15.522067 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream Message reader)
2021-10-22 01:40:15.522604 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-22 01:40:15.618566 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-22 01:40:15.722391 I | rafthttp: started peer 8aae4c350a2413a5
2021-10-22 01:40:15.722448 I | rafthttp: added peer 8aae4c350a2413a5
2021-10-22 01:40:15.722487 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-10-22 01:40:15.723552 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-10-22 01:40:15.723940 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-10-22 01:40:15.724746 I | rafthttp: peer 72b38cc930a2fa6f became active
2021-10-22 01:40:15.725303 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream Message reader)
2021-10-22 01:40:15.820595 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-22 01:40:15.822697 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-10-22 01:40:15.827157 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream MsgApp v2 writer)
2021-10-22 01:40:15.835310 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-22 01:40:15.835673 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-22 01:40:15.835905 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream Message writer)
2021-10-22 01:40:16.240096 I | raft: 2d249ba41c7e44fa [term: 1] received a MsgVote message with higher term from 72b38cc930a2fa6f [term: 2]
2021-10-22 01:40:16.240147 I | raft: 2d249ba41c7e44fa became follower at term 2
2021-10-22 01:40:16.240165 I | raft: 2d249ba41c7e44fa [logterm: 1, index: 3, vote: 0] cast MsgVote for 72b38cc930a2fa6f [logterm: 1, index: 3] at term 2
2021-10-22 01:40:16.248650 I | raft: raft.node: 2d249ba41c7e44fa elected leader 72b38cc930a2fa6f at term 2
2021-10-22 01:40:16.336131 I | etcdserver: published {Name:onap-oof-has-etcd-2 ClientURLs:[http://onap-oof-has-etcd-2.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-10-22 01:40:16.336359 I | embed: ready to serve client requests
2021-10-22 01:40:16.336780 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-10-22 01:40:16.518454 N | etcdserver/membership: set the initial cluster version to 3.0
2021-10-22 01:40:16.518621 I | etcdserver/api: enabled capabilities for version 3.0
2021-10-22 01:40:20.724513 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:25.724771 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:30.725057 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:35.725234 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:40.725493 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:45.725722 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:50.726080 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:55.726469 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:00.727106 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:05.727905 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:10.728268 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:15.728590 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:20.728945 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:25.729269 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:30.729596 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:35.731790 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:40.732090 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:45.732431 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:48.522903 N | auth: added a new user: root
2021-10-22 01:41:48.523613 W | etcdserver: request "header: auth_user_add:" with result "size:27" took too long (1.295034466s) to execute
2021-10-22 01:41:50.625290 N | auth: added a new user: conductor
2021-10-22 01:41:50.625392 W | etcdserver: request "header: auth_user_add:" with result "size:27" took too long (1.2653451s) to execute
2021-10-22 01:41:50.735141 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:51.168555 N | auth: Role conductor is created
2021-10-22 01:41:51.558896 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-10-22 01:41:51.927948 N | auth: granted role conductor to user conductor
2021-10-22 01:41:52.173231 N | auth: Role root is created
2021-10-22 01:41:52.328096 N | auth: granted role root to user root
2021-10-22 01:41:52.418447 N | auth: Authentication enabled
2021-10-22 01:41:55.735351 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:00.735766 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:05.736181 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:10.736587 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:15.736882 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:20.737245 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:25.737513 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:30.738011 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:35.738397 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:40.738632 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:45.738961 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:50.739293 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:55.739540 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:00.739917 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:05.740230 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:10.742282 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:15.742523 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:20.119933 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (788.702208ms) to execute
2021-10-22 01:43:20.742803 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:21.521340 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.397960703s) to execute
2021-10-22 01:43:24.426230 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.307812805s) to execute
2021-10-22 01:43:25.835783 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:29.022100 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.689731662s) to execute
2021-10-22 01:43:30.621018 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.092951747s) to execute
2021-10-22 01:43:30.836037 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:32.022484 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.202881871s) to execute
2021-10-22 01:43:32.228269 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (108.916529ms) to execute
2021-10-22 01:43:32.331892 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.1823ms) to execute
2021-10-22 01:43:35.319118 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.389538533s) to execute
2021-10-22 01:43:35.918394 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:38.525002 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.394923066s) to execute
2021-10-22 01:43:40.421417 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (997.797073ms) to execute
2021-10-22 01:43:40.918622 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:41.920894 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.495100927s) to execute
2021-10-22 01:43:43.519350 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.191285057s) to execute
2021-10-22 01:43:44.825252 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.294847825s) to execute
2021-10-22 01:43:45.918902 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:47.818910 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.390602084s) to execute
2021-10-22 01:43:50.919223 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:55.126515 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (205.678939ms) to execute
2021-10-22 01:43:55.919478 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:00.522768 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.704300892s) to execute
2021-10-22 01:44:00.728393 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (109.532561ms) to execute
2021-10-22 01:44:00.729900 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.264557ms) to execute
2021-10-22 01:44:00.919930 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:05.920564 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:08.020632 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.399187598s) to execute
2021-10-22 01:44:09.325113 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.30067393s) to execute
2021-10-22 01:44:09.325234 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.30183014s) to execute
2021-10-22 01:44:10.922149 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:12.222091 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.203309668s) to execute
2021-10-22 01:44:12.328182 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (103.981882ms) to execute
2021-10-22 01:44:15.324151 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.596366375s) to execute
2021-10-22 01:44:15.727773 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (401.8553ms) to execute
2021-10-22 01:44:15.732178 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (102.127098ms) to execute
2021-10-22 01:44:15.922668 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:18.620156 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.898225014s) to execute
2021-10-22 01:44:19.927100 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.302926587s) to execute
2021-10-22 01:44:19.927225 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.305143007s) to execute
2021-10-22 01:44:20.923133 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:22.423616 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (805.199356ms) to execute
2021-10-22 01:44:22.618722 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.038212ms) to execute
2021-10-22 01:44:24.419619 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.19092206s) to execute
2021-10-22 01:44:26.018347 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:27.124951 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (390.426424ms) to execute
2021-10-22 01:44:30.720885 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.993344802s) to execute
2021-10-22 01:44:30.828255 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (104.420292ms) to execute
2021-10-22 01:44:31.018714 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:32.325164 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (202.252353ms) to execute
2021-10-22 01:44:33.823897 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (195.922123ms) to execute
2021-10-22 01:44:36.019848 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:41.020152 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:45.325094 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (404.374461ms) to execute
2021-10-22 01:44:46.020366 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:46.722948 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.392529884s) to execute
2021-10-22 01:44:46.928336 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (199.892998ms) to execute
2021-10-22 01:44:49.824142 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.494752706s) to execute
2021-10-22 01:44:49.928540 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (102.40361ms) to execute
2021-10-22 01:44:51.021137 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:51.324473 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.393818211s) to execute
2021-10-22 01:44:51.324649 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (496.682873ms) to execute
2021-10-22 01:44:52.826363 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (207.736564ms) to execute
2021-10-22 01:44:55.319863 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (691.665796ms) to execute
2021-10-22 01:44:56.021364 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:56.820088 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (101.603301ms) to execute
2021-10-22 01:45:00.623191 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.889982087s) to execute
2021-10-22 01:45:01.021682 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:02.121230 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.402577219s) to execute
2021-10-22 01:45:02.121503 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.402666779s) to execute
2021-10-22 01:45:03.924602 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.705747804s) to execute
2021-10-22 01:45:03.924762 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (996.82412ms) to execute
2021-10-22 01:45:05.323023 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.301116349s) to execute
2021-10-22 01:45:05.386554 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (753.193955ms) to execute
2021-10-22 01:45:06.021884 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:08.120318 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.433529853s) to execute
2021-10-22 01:45:09.819906 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.690456224s) to execute
2021-10-22 01:45:09.820069 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.697667794s) to execute
2021-10-22 01:45:11.027791 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:11.620499 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.50205154s) to execute
2021-10-22 01:45:13.024372 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.296211565s) to execute
2021-10-22 01:45:16.118404 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:17.322616 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.194405767s) to execute
2021-10-22 01:45:17.435101 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (110.154409ms) to execute
2021-10-22 01:45:21.118764 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:26.119211 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:28.618809 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (187.125647ms) to execute
2021-10-22 01:45:28.728068 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (102.017457ms) to execute
2021-10-22 01:45:31.119537 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:35.024904 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.286892116s) to execute
2021-10-22 01:45:36.119968 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:36.519573 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.490210331s) to execute
2021-10-22 01:45:40.421224 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.602800068s) to execute
2021-10-22 01:45:40.727891 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (209.656855ms) to execute
2021-10-22 01:45:41.120292 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:46.120566 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:51.120867 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:51.919091 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.389710276s) to execute
2021-10-22 01:45:56.121191 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:56.426297 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.798206237s) to execute
2021-10-22 01:45:56.728324 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (209.694365ms) to execute
2021-10-22 01:45:56.730674 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (204.10286ms) to execute
2021-10-22 01:45:56.730990 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (199.95705ms) to execute
2021-10-22 01:46:01.121523 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:06.121677 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:07.419462 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.500785409s) to execute
2021-10-22 01:46:08.924166 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.204787446s) to execute
2021-10-22 01:46:08.924609 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (1.502524424s) to execute
2021-10-22 01:46:10.520590 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.385750185s) to execute
2021-10-22 01:46:11.218201 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:11.723359 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.295043913s) to execute
2021-10-22 01:46:13.120619 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.299753265s) to execute
2021-10-22 01:46:13.120892 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.302373779s) to execute
2021-10-22 01:46:14.526117 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (1.307518057s) to execute
2021-10-22 01:46:15.925234 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.496982852s) to execute
2021-10-22 01:46:16.218557 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:17.320723 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.395397151s) to execute
2021-10-22 01:46:18.725095 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.396719922s) to execute
2021-10-22 01:46:18.725206 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (1.402797543s) to execute
2021-10-22 01:46:18.725569 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.403080293s) to execute
2021-10-22 01:46:18.828362 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:588" took too long (100.093203ms) to execute
2021-10-22 01:46:19.028541 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.370693ms) to execute
2021-10-22 01:46:21.218866 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:21.824296 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.296180325s) to execute
2021-10-22 01:46:26.219179 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:27.221996 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.303433181s) to execute
2021-10-22 01:46:31.219432 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:31.420568 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.099413716s) to execute
2021-10-22 01:46:31.420962 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.102462191s) to execute
2021-10-22 01:46:31.523440 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (100.020839ms) to execute
2021-10-22 01:46:34.019479 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (797.824546ms) to execute
2021-10-22 01:46:35.522922 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (693.03375ms) to execute
2021-10-22 01:46:36.219886 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:41.021055 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (992.623921ms) to execute
2021-10-22 01:46:41.220192 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:42.525928 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (697.968273ms) to execute
2021-10-22 01:46:44.024176 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.305474329s) to execute
2021-10-22 01:46:46.220418 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:46.918262 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.88805554s) to execute
2021-10-22 01:46:48.320668 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.2021836s) to execute
2021-10-22 01:46:48.320810 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.399481932s) to execute
2021-10-22 01:46:48.321026 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.400691312s) to execute
2021-10-22 01:46:50.321484 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.402972835s) to execute
2021-10-22 01:46:51.318249 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:53.326239 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.897681254s) to execute
2021-10-22 01:46:53.520400 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (181.400176ms) to execute
2021-10-22 01:46:53.530062 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (190.859651ms) to execute
2021-10-22 01:46:55.019360 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.497150574s) to execute
2021-10-22 01:46:56.318544 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:56.524203 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.696448186s) to execute
2021-10-22 01:46:59.524907 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.005904157s) to execute
2021-10-22 01:47:01.318873 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:03.923560 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.795831s) to execute
2021-10-22 01:47:04.027965 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.770942ms) to execute
2021-10-22 01:47:04.128051 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (198.771349ms) to execute
2021-10-22 01:47:06.319175 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:06.825637 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.497859052s) to execute
2021-10-22 01:47:08.319196 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.491174435s) to execute
2021-10-22 01:47:08.319402 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.391232184s) to execute
2021-10-22 01:47:10.118289 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.784970452s) to execute
2021-10-22 01:47:10.118456 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.09866969s) to execute
2021-10-22 01:47:11.319441 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:12.919507 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.600302646s) to execute
2021-10-22 01:47:14.320836 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.400411343s) to execute
2021-10-22 01:47:14.321338 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.398740319s) to execute
2021-10-22 01:47:16.020911 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.697193432s) to execute
2021-10-22 01:47:16.021251 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.602246699s) to execute
2021-10-22 01:47:16.319943 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:17.426629 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.198866083s) to execute
2021-10-22 01:47:17.528642 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.123889ms) to execute
2021-10-22 01:47:21.320212 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:21.522328 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.303689905s) to execute
2021-10-22 01:47:21.628059 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (103.644075ms) to execute
2021-10-22 01:47:26.320509 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:26.426898 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.307446594s) to execute
2021-10-22 01:47:26.530538 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.518834ms) to execute
2021-10-22 01:47:29.722990 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.794706633s) to execute
2021-10-22 01:47:31.320908 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:33.920500 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.100823336s) to execute
2021-10-22 01:47:33.920850 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.194677514s) to execute
2021-10-22 01:47:36.321593 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:38.922696 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.503247379s) to execute
2021-10-22 01:47:39.028049 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (103.174952ms) to execute
2021-10-22 01:47:40.624955 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (996.979801ms) to execute
2021-10-22 01:47:40.828122 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (196.066538ms) to execute
2021-10-22 01:47:41.321835 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:42.322408 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (990.726728ms) to execute
2021-10-22 01:47:43.722430 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.303470943s) to execute
2021-10-22 01:47:43.828316 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.986534ms) to execute
2021-10-22 01:47:45.225418 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.106926413s) to execute
2021-10-22 01:47:46.322187 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:47.626733 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (493.606483ms) to execute
2021-10-22 01:47:49.020210 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.292118433s) to execute
2021-10-22 01:47:51.322422 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:51.826895 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.397778698s) to execute
2021-10-22 01:47:55.020081 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.691076692s) to execute
2021-10-22 01:47:56.322788 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:57.722672 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.694385561s) to execute
2021-10-22 01:48:01.323044 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:02.724968 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.30657762s) to execute
2021-10-22 01:48:04.419194 I | auth: deleting token ChzaFvXgqlDPErCa.17 for user conductor
2021-10-22 01:48:05.926787 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.596723166s) to execute
2021-10-22 01:48:06.323295 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:06.419040 I | auth: deleting token CiYYLZSmWWmaGDwH.19 for user conductor
2021-10-22 01:48:07.419140 I | auth: deleting token LXVhJZMbTeaQJuMv.21 for user conductor
2021-10-22 01:48:07.521683 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.390519077s) to execute
2021-10-22 01:48:08.926228 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.396417901s) to execute
2021-10-22 01:48:09.419130 I | auth: deleting token vAAkbhJXrqDSLfXb.23 for user conductor
2021-10-22 01:48:10.624847 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (506.276048ms) to execute
2021-10-22 01:48:11.323659 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:11.419084 I | auth: deleting token levddGtpHNVeCMtO.24 for user conductor
2021-10-22 01:48:13.420622 I | auth: deleting token RWGVoKMvJHZsINYz.26 for user conductor
2021-10-22 01:48:14.419089 I | auth: deleting token wKaxZFeRonhtkQge.27 for user conductor
2021-10-22 01:48:16.418240 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:16.419093 I | auth: deleting token VbtXjXzOiIcKurpr.30 for user conductor
2021-10-22 01:48:18.020005 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.499852204s) to execute
2021-10-22 01:48:18.419051 I | auth: deleting token rdeMVVephplPtFwb.31 for user conductor
2021-10-22 01:48:19.626903 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (197.24139ms) to execute
2021-10-22 01:48:20.419128 I | auth: deleting token mcBiKNRoRlDCYunw.34 for user conductor
2021-10-22 01:48:21.019095 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.38426383s) to execute
2021-10-22 01:48:21.418576 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:22.419044 I | auth: deleting token JSoyRLmgdrfoZXVn.37 for user conductor
2021-10-22 01:48:22.419106 I | auth: deleting token OIEGrifpeivAAgWX.36 for user conductor
2021-10-22 01:48:24.024357 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.591096967s) to execute
2021-10-22 01:48:24.228345 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (106.972056ms) to execute
2021-10-22 01:48:25.418959 I | auth: deleting token RLmpogXmnbtzRdGG.40 for user conductor
2021-10-22 01:48:25.419049 I | auth: deleting token JSsLYDSoJooNTyhh.39 for user conductor
2021-10-22 01:48:26.418891 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:26.419220 I | auth: deleting token vMPRVTzNFmuELdqd.42 for user conductor
2021-10-22 01:48:28.126156 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.093836757s) to execute
2021-10-22 01:48:29.420037 I | auth: deleting token mRpYJHkOzYqUkPBc.44 for user conductor
2021-10-22 01:48:29.420112 I | auth: deleting token feJFZkdoRqHXeFnj.46 for user conductor
2021-10-22 01:48:29.420129 I | auth: deleting token abKHXNhSVOYYfaAp.45 for user conductor
2021-10-22 01:48:29.622187 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.402405957s) to execute
2021-10-22 01:48:29.622427 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.402151118s) to execute
2021-10-22 01:48:31.118886 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.494109675s) to execute
2021-10-22 01:48:31.119055 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.400592814s) to execute
2021-10-22 01:48:31.419029 I | auth: deleting token dZlSkhGdothOfmAA.48 for user conductor
2021-10-22 01:48:31.419166 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:32.419109 I | auth: deleting token gNZPDFmrrvAMFrPI.49 for user conductor
2021-10-22 01:48:32.419172 I | auth: deleting token pfuVWXNCeEhhcncu.51 for user conductor
2021-10-22 01:48:32.419189 I | auth: deleting token rWYURebSTUoTKoDl.50 for user conductor
2021-10-22 01:48:32.519561 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.199568505s) to execute
2021-10-22 01:48:34.021939 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.088058457s) to execute
2021-10-22 01:48:35.419116 I | auth: deleting token jLxKIaxlvmcRZuoX.52 for user conductor
2021-10-22 01:48:35.419164 I | auth: deleting token qBPcArRZSQcuZOIK.53 for user conductor
2021-10-22 01:48:36.419138 I | auth: deleting token CopzYDhyoPBMPWXB.54 for user conductor
2021-10-22 01:48:36.419413 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:39.419121 I | auth: deleting token BukRllvpfIZjZfIv.56 for user conductor
2021-10-22 01:48:39.419199 I | auth: deleting token hiYUqdKNHbLMvbUa.57 for user conductor
2021-10-22 01:48:39.419225 I | auth: deleting token UMzdtAPBdNpkSKfX.55 for user conductor
2021-10-22 01:48:41.419108 I | auth: deleting token LAkfKpSVFwvyJabj.58 for user conductor
2021-10-22 01:48:41.419670 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:42.419132 I | auth: deleting token NRTzMJfxowvPlSQm.60 for user conductor
2021-10-22 01:48:42.419187 I | auth: deleting token cdkbwgGYujEHEzKO.59 for user conductor
2021-10-22 01:48:44.419120 I | auth: deleting token rEgYppqZlIqFaEPu.61 for user conductor
2021-10-22 01:48:45.319314 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (991.141461ms) to execute
2021-10-22 01:48:45.419177 I | auth: deleting token xrNwfOcRkbTspTep.63 for user conductor
2021-10-22 01:48:45.419224 I | auth: deleting token mrVwHfrbOonVHTax.64 for user conductor
2021-10-22 01:48:45.419234 I | auth: deleting token JOUcQBzbsFGstMhC.62 for user conductor
2021-10-22 01:48:46.419929 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:47.121323 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (990.975622ms) to execute
2021-10-22 01:48:48.419188 I | auth: deleting token XbambGQEDqapZQdf.67 for user conductor
2021-10-22 01:48:48.419270 I | auth: deleting token HijkSkHmghzANfeA.65 for user conductor
2021-10-22 01:48:48.419291 I | auth: deleting token SsPmoUGiNVPAtgyO.66 for user conductor
2021-10-22 01:48:49.419394 I | auth: deleting token qlpRZVQnTyCyvlXn.68 for user conductor
2021-10-22 01:48:50.618922 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (783.740156ms) to execute
2021-10-22 01:48:51.418975 I | auth: deleting token YNOTYGZXNTiTQJiZ.69 for user conductor
2021-10-22 01:48:51.420113 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:52.120449 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.498138791s) to execute
2021-10-22 01:48:53.419060 I | auth: deleting token QnpvBGSAgWRZjIQA.70 for user conductor
2021-10-22 01:48:55.023924 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.703633177s) to execute
2021-10-22 01:48:55.024377 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.901094758s) to execute
2021-10-22 01:48:55.218779 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (192.872049ms) to execute
2021-10-22 01:48:55.423186 I | auth: deleting token NFGtoEwiywPyGOhF.71 for user conductor
2021-10-22 01:48:55.423240 I | auth: deleting token TvffKnnkkSXPsSAK.72 for user conductor
2021-10-22 01:48:56.420457 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:56.625668 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.507250865s) to execute
2021-10-22 01:48:56.625897 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.598168873s) to execute
2021-10-22 01:48:57.419098 I | auth: deleting token NwxCkrshmNPyDbse.74 for user conductor
2021-10-22 01:48:57.419126 I | auth: deleting token OShPpIfGHmJoRXEd.73 for user conductor
2021-10-22 01:48:59.421730 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.503100169s) to execute
2021-10-22 01:48:59.528702 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (102.220962ms) to execute
2021-10-22 01:49:01.418969 I | auth: deleting token rOijcgptcJndtZvr.77 for user conductor
2021-10-22 01:49:01.419051 I | auth: deleting token exyyCSDRQctOYyEQ.76 for user conductor
2021-10-22 01:49:01.419064 I | auth: deleting token pkStXPzRQdwnsMjw.75 for user conductor
2021-10-22 01:49:01.421083 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:02.419237 I | auth: deleting token PsvfGvVFHSXFJCkv.78 for user conductor
2021-10-22 01:49:02.521089 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.993215586s) to execute
2021-10-22 01:49:03.419218 I | auth: deleting token xuKocdeQednKMWLy.79 for user conductor
2021-10-22 01:49:04.023324 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.495791582s) to execute
2021-10-22 01:49:04.023521 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.500200169s) to execute
2021-10-22 01:49:05.419070 I | auth: deleting token GHlvnetUFusEKbOI.80 for user conductor
2021-10-22 01:49:05.826594 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (394.338868ms) to execute
2021-10-22 01:49:06.421308 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:07.420294 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.491772663s) to execute
2021-10-22 01:49:08.419098 I | auth: deleting token RcZkSnfhnxzWauFZ.82 for user conductor
2021-10-22 01:49:09.222558 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (294.440993ms) to execute
2021-10-22 01:49:09.419225 I | auth: deleting token vnHawAnkOxibyoRQ.81 for user conductor
2021-10-22 01:49:10.419045 I | auth: deleting token hziWdyPrYndxjJyY.83 for user conductor
2021-10-22 01:49:10.419086 I | auth: deleting token bsEVnZFyenZfQvph.84 for user conductor
2021-10-22 01:49:10.818651 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.592531676s) to execute
2021-10-22 01:49:11.421675 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:12.419154 I | auth: deleting token NRbdbHecDipMEoDJ.86 for user conductor
2021-10-22 01:49:12.419189 I | auth: deleting token DcyxtlFxTxFbLzYx.85 for user conductor
2021-10-22 01:49:12.419196 I | auth: deleting token IToqfaQGIFOqDBks.87 for user conductor
2021-10-22 01:49:13.725338 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.704784972s) to execute
2021-10-22 01:49:13.818797 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.996867803s) to execute
2021-10-22 01:49:15.220357 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.399112376s) to execute
2021-10-22 01:49:15.220589 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.401957765s) to execute
2021-10-22 01:49:15.220766 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.397137117s) to execute
2021-10-22 01:49:15.419151 I | auth: deleting token qYzUKJuGtfFbgFeL.88 for user conductor
2021-10-22 01:49:16.419156 I | auth: deleting token lCkiJFYSIpEJrQXq.89 for user conductor
2021-10-22 01:49:16.419207 I | auth: deleting token nMdareCgNJqAFrkc.90 for user conductor
2021-10-22 01:49:16.422327 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:19.420165 I | auth: deleting token bvkpVRCnwhkOQyPe.91 for user conductor
2021-10-22 01:49:19.918651 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.987221856s) to execute
2021-10-22 01:49:20.028705 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (108.195628ms) to execute
2021-10-22 01:49:20.129724 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (209.157726ms) to execute
2021-10-22 01:49:20.131696 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.190624ms) to execute
2021-10-22 01:49:20.419132 I | auth: deleting token FncMMtDxyoenOrjg.94 for user conductor
2021-10-22 01:49:20.419182 I | auth: deleting token GpdFPkwPSIpnttrY.93 for user conductor
2021-10-22 01:49:20.419195 I | auth: deleting token qZmBNHRYooxQBfvR.92 for user conductor
2021-10-22 01:49:21.518285 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:23.120419 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.692538486s) to execute
2021-10-22 01:49:23.419062 I | auth: deleting token drkgyDNWtPWJiUuV.95 for user conductor
2021-10-22 01:49:23.419114 I | auth: deleting token sMiQhJNNjTtJcKNg.96 for user conductor
2021-10-22 01:49:25.418953 I | auth: deleting token MGZvvoqhANpHFzMU.99 for user conductor
2021-10-22 01:49:25.419149 I | auth: deleting token pzoIbmajOLOyRTNS.98 for user conductor
2021-10-22 01:49:25.419434 I | auth: deleting token iEWuJiggXuepJssK.97 for user conductor
2021-10-22 01:49:25.823453 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.694019048s) to execute
2021-10-22 01:49:25.824247 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.702146957s) to execute
2021-10-22 01:49:26.518606 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:27.418956 I | auth: deleting token YQLDolfNbLjFFJUb.101 for user conductor
2021-10-22 01:49:27.418999 I | auth: deleting token oIbQEaAXfHGaxHph.100 for user conductor
2021-10-22 01:49:28.924788 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.206217979s) to execute
2021-10-22 01:49:31.419071 I | auth: deleting token nctPTJoPPqukkDaG.104 for user conductor
2021-10-22 01:49:31.419131 I | auth: deleting token xygYJhxrKxjnCHdA.103 for user conductor
2021-10-22 01:49:31.419147 I | auth: deleting token VapTBRpLbxVzMqua.105 for user conductor
2021-10-22 01:49:31.419157 I | auth: deleting token bkliSICPAuNFFrxu.102 for user conductor
2021-10-22 01:49:31.519112 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:32.419122 I | auth: deleting token UMecdGOtaNcEQwuD.107 for user conductor
2021-10-22 01:49:33.019534 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (591.343209ms) to execute
2021-10-22 01:49:33.419168 I | auth: deleting token RXGJBFkgQlaIPGoK.108 for user conductor
2021-10-22 01:49:34.419056 I | auth: deleting token LgcpImsuICjFvPzM.111 for user conductor
2021-10-22 01:49:34.419105 I | auth: deleting token YWNofvoYIttBOOKg.110 for user conductor
2021-10-22 01:49:36.422889 I | auth: deleting token eWRvSyZlvWzBjspW.114 for user conductor
2021-10-22 01:49:36.422942 I | auth: deleting token nIvOHtyYoDyRTXix.113 for user conductor
2021-10-22 01:49:36.519384 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:36.824264 W | etcdserver: request "header: authenticate: