Results

By type

          Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
Skipping self-checking
2021-10-22 01:40:14.020950 I | etcdmain: etcd Version: 3.2.24
2021-10-22 01:40:14.021114 I | etcdmain: Git SHA: 420a45226
2021-10-22 01:40:14.021122 I | etcdmain: Go Version: go1.8.7
2021-10-22 01:40:14.021128 I | etcdmain: Go OS/Arch: linux/amd64
2021-10-22 01:40:14.021134 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-10-22 01:40:14.021421 I | embed: listening for peers on http://0.0.0.0:2380
2021-10-22 01:40:14.118234 I | embed: listening for client requests on 0.0.0.0:2379
2021-10-22 01:40:14.235639 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd:2380 to 10.233.67.182:2380
2021-10-22 01:40:14.236454 I | pkg/netutil: resolving onap-oof-has-etcd-2.oof-has-etcd:2380 to 10.233.67.182:2380
2021-10-22 01:40:15.232338 I | etcdserver: name = onap-oof-has-etcd-2
2021-10-22 01:40:15.232414 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-10-22 01:40:15.232430 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-10-22 01:40:15.232438 I | etcdserver: heartbeat = 100ms
2021-10-22 01:40:15.232446 I | etcdserver: election = 1000ms
2021-10-22 01:40:15.232454 I | etcdserver: snapshot count = 100000
2021-10-22 01:40:15.232493 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-2.oof-has-etcd:2379
2021-10-22 01:40:15.232513 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-10-22 01:40:15.232542 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-10-22 01:40:15.283109 I | etcdserver: starting member 2d249ba41c7e44fa in cluster e8b03869cbf54258
2021-10-22 01:40:15.283217 I | raft: 2d249ba41c7e44fa became follower at term 0
2021-10-22 01:40:15.283242 I | raft: newRaft 2d249ba41c7e44fa [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-10-22 01:40:15.283248 I | raft: 2d249ba41c7e44fa became follower at term 1
2021-10-22 01:40:15.330612 W | auth: simple token is not cryptographically signed
2021-10-22 01:40:15.428731 I | rafthttp: starting peer 72b38cc930a2fa6f...
2021-10-22 01:40:15.428835 I | rafthttp: started HTTP pipelining with peer 72b38cc930a2fa6f
2021-10-22 01:40:15.435106 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-10-22 01:40:15.518700 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-10-22 01:40:15.521680 I | rafthttp: started peer 72b38cc930a2fa6f
2021-10-22 01:40:15.521773 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-10-22 01:40:15.521796 I | rafthttp: added peer 72b38cc930a2fa6f
2021-10-22 01:40:15.521898 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-10-22 01:40:15.521989 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-10-22 01:40:15.522067 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream Message reader)
2021-10-22 01:40:15.522604 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-22 01:40:15.618566 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-22 01:40:15.722391 I | rafthttp: started peer 8aae4c350a2413a5
2021-10-22 01:40:15.722448 I | rafthttp: added peer 8aae4c350a2413a5
2021-10-22 01:40:15.722487 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-10-22 01:40:15.723552 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-10-22 01:40:15.723940 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-10-22 01:40:15.724746 I | rafthttp: peer 72b38cc930a2fa6f became active
2021-10-22 01:40:15.725303 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream Message reader)
2021-10-22 01:40:15.820595 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-22 01:40:15.822697 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-10-22 01:40:15.827157 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream MsgApp v2 writer)
2021-10-22 01:40:15.835310 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-22 01:40:15.835673 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-22 01:40:15.835905 I | rafthttp: established a TCP streaming connection with peer 72b38cc930a2fa6f (stream Message writer)
2021-10-22 01:40:16.240096 I | raft: 2d249ba41c7e44fa [term: 1] received a MsgVote message with higher term from 72b38cc930a2fa6f [term: 2]
2021-10-22 01:40:16.240147 I | raft: 2d249ba41c7e44fa became follower at term 2
2021-10-22 01:40:16.240165 I | raft: 2d249ba41c7e44fa [logterm: 1, index: 3, vote: 0] cast MsgVote for 72b38cc930a2fa6f [logterm: 1, index: 3] at term 2
2021-10-22 01:40:16.248650 I | raft: raft.node: 2d249ba41c7e44fa elected leader 72b38cc930a2fa6f at term 2
2021-10-22 01:40:16.336131 I | etcdserver: published {Name:onap-oof-has-etcd-2 ClientURLs:[http://onap-oof-has-etcd-2.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-10-22 01:40:16.336359 I | embed: ready to serve client requests
2021-10-22 01:40:16.336780 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-10-22 01:40:16.518454 N | etcdserver/membership: set the initial cluster version to 3.0
2021-10-22 01:40:16.518621 I | etcdserver/api: enabled capabilities for version 3.0
2021-10-22 01:40:20.724513 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:25.724771 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:30.725057 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:35.725234 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:40.725493 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:45.725722 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:50.726080 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:40:55.726469 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:00.727106 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:05.727905 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:10.728268 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:15.728590 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:20.728945 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:25.729269 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:30.729596 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:35.731790 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:40.732090 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:45.732431 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:48.522903 N | auth: added a new user: root
2021-10-22 01:41:48.523613 W | etcdserver: request "header: auth_user_add:" with result "size:27" took too long (1.295034466s) to execute
2021-10-22 01:41:50.625290 N | auth: added a new user: conductor
2021-10-22 01:41:50.625392 W | etcdserver: request "header: auth_user_add:" with result "size:27" took too long (1.2653451s) to execute
2021-10-22 01:41:50.735141 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:41:51.168555 N | auth: Role conductor is created
2021-10-22 01:41:51.558896 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-10-22 01:41:51.927948 N | auth: granted role conductor to user conductor
2021-10-22 01:41:52.173231 N | auth: Role root is created
2021-10-22 01:41:52.328096 N | auth: granted role root to user root
2021-10-22 01:41:52.418447 N | auth: Authentication enabled
2021-10-22 01:41:55.735351 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:00.735766 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:05.736181 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:10.736587 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:15.736882 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:20.737245 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:25.737513 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:30.738011 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:35.738397 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:40.738632 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:45.738961 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:50.739293 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:42:55.739540 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:00.739917 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:05.740230 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:10.742282 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:15.742523 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:20.119933 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (788.702208ms) to execute
2021-10-22 01:43:20.742803 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:21.521340 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.397960703s) to execute
2021-10-22 01:43:24.426230 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.307812805s) to execute
2021-10-22 01:43:25.835783 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:29.022100 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.689731662s) to execute
2021-10-22 01:43:30.621018 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.092951747s) to execute
2021-10-22 01:43:30.836037 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:32.022484 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.202881871s) to execute
2021-10-22 01:43:32.228269 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (108.916529ms) to execute
2021-10-22 01:43:32.331892 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.1823ms) to execute
2021-10-22 01:43:35.319118 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.389538533s) to execute
2021-10-22 01:43:35.918394 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:38.525002 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.394923066s) to execute
2021-10-22 01:43:40.421417 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (997.797073ms) to execute
2021-10-22 01:43:40.918622 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:41.920894 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.495100927s) to execute
2021-10-22 01:43:43.519350 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.191285057s) to execute
2021-10-22 01:43:44.825252 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.294847825s) to execute
2021-10-22 01:43:45.918902 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:47.818910 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.390602084s) to execute
2021-10-22 01:43:50.919223 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:43:55.126515 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (205.678939ms) to execute
2021-10-22 01:43:55.919478 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:00.522768 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.704300892s) to execute
2021-10-22 01:44:00.728393 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (109.532561ms) to execute
2021-10-22 01:44:00.729900 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.264557ms) to execute
2021-10-22 01:44:00.919930 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:05.920564 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:08.020632 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.399187598s) to execute
2021-10-22 01:44:09.325113 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.30067393s) to execute
2021-10-22 01:44:09.325234 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.30183014s) to execute
2021-10-22 01:44:10.922149 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:12.222091 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.203309668s) to execute
2021-10-22 01:44:12.328182 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (103.981882ms) to execute
2021-10-22 01:44:15.324151 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.596366375s) to execute
2021-10-22 01:44:15.727773 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (401.8553ms) to execute
2021-10-22 01:44:15.732178 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (102.127098ms) to execute
2021-10-22 01:44:15.922668 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:18.620156 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.898225014s) to execute
2021-10-22 01:44:19.927100 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.302926587s) to execute
2021-10-22 01:44:19.927225 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.305143007s) to execute
2021-10-22 01:44:20.923133 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:22.423616 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (805.199356ms) to execute
2021-10-22 01:44:22.618722 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.038212ms) to execute
2021-10-22 01:44:24.419619 W | etcdserver: request "header: authenticate:" with result "size:48" took too long (1.19092206s) to execute
2021-10-22 01:44:26.018347 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:27.124951 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (390.426424ms) to execute
2021-10-22 01:44:30.720885 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.993344802s) to execute
2021-10-22 01:44:30.828255 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (104.420292ms) to execute
2021-10-22 01:44:31.018714 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:32.325164 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (202.252353ms) to execute
2021-10-22 01:44:33.823897 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (195.922123ms) to execute
2021-10-22 01:44:36.019848 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:41.020152 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:45.325094 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (404.374461ms) to execute
2021-10-22 01:44:46.020366 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:46.722948 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.392529884s) to execute
2021-10-22 01:44:46.928336 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (199.892998ms) to execute
2021-10-22 01:44:49.824142 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.494752706s) to execute
2021-10-22 01:44:49.928540 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (102.40361ms) to execute
2021-10-22 01:44:51.021137 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:51.324473 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.393818211s) to execute
2021-10-22 01:44:51.324649 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (496.682873ms) to execute
2021-10-22 01:44:52.826363 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (207.736564ms) to execute
2021-10-22 01:44:55.319863 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (691.665796ms) to execute
2021-10-22 01:44:56.021364 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:44:56.820088 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (101.603301ms) to execute
2021-10-22 01:45:00.623191 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.889982087s) to execute
2021-10-22 01:45:01.021682 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:02.121230 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.402577219s) to execute
2021-10-22 01:45:02.121503 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.402666779s) to execute
2021-10-22 01:45:03.924602 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.705747804s) to execute
2021-10-22 01:45:03.924762 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (996.82412ms) to execute
2021-10-22 01:45:05.323023 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.301116349s) to execute
2021-10-22 01:45:05.386554 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (753.193955ms) to execute
2021-10-22 01:45:06.021884 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:08.120318 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.433529853s) to execute
2021-10-22 01:45:09.819906 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.690456224s) to execute
2021-10-22 01:45:09.820069 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.697667794s) to execute
2021-10-22 01:45:11.027791 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:11.620499 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.50205154s) to execute
2021-10-22 01:45:13.024372 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.296211565s) to execute
2021-10-22 01:45:16.118404 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:17.322616 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.194405767s) to execute
2021-10-22 01:45:17.435101 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (110.154409ms) to execute
2021-10-22 01:45:21.118764 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:26.119211 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:28.618809 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (187.125647ms) to execute
2021-10-22 01:45:28.728068 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (102.017457ms) to execute
2021-10-22 01:45:31.119537 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:35.024904 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.286892116s) to execute
2021-10-22 01:45:36.119968 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:36.519573 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.490210331s) to execute
2021-10-22 01:45:40.421224 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.602800068s) to execute
2021-10-22 01:45:40.727891 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (209.656855ms) to execute
2021-10-22 01:45:41.120292 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:46.120566 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:51.120867 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:51.919091 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.389710276s) to execute
2021-10-22 01:45:56.121191 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:45:56.426297 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.798206237s) to execute
2021-10-22 01:45:56.728324 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (209.694365ms) to execute
2021-10-22 01:45:56.730674 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (204.10286ms) to execute
2021-10-22 01:45:56.730990 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (199.95705ms) to execute
2021-10-22 01:46:01.121523 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:06.121677 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:07.419462 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.500785409s) to execute
2021-10-22 01:46:08.924166 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.204787446s) to execute
2021-10-22 01:46:08.924609 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (1.502524424s) to execute
2021-10-22 01:46:10.520590 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.385750185s) to execute
2021-10-22 01:46:11.218201 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:11.723359 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.295043913s) to execute
2021-10-22 01:46:13.120619 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.299753265s) to execute
2021-10-22 01:46:13.120892 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.302373779s) to execute
2021-10-22 01:46:14.526117 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (1.307518057s) to execute
2021-10-22 01:46:15.925234 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.496982852s) to execute
2021-10-22 01:46:16.218557 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:17.320723 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.395397151s) to execute
2021-10-22 01:46:18.725095 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.396719922s) to execute
2021-10-22 01:46:18.725206 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:588" took too long (1.402797543s) to execute
2021-10-22 01:46:18.725569 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.403080293s) to execute
2021-10-22 01:46:18.828362 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:588" took too long (100.093203ms) to execute
2021-10-22 01:46:19.028541 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.370693ms) to execute
2021-10-22 01:46:21.218866 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:21.824296 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.296180325s) to execute
2021-10-22 01:46:26.219179 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:27.221996 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.303433181s) to execute
2021-10-22 01:46:31.219432 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:31.420568 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.099413716s) to execute
2021-10-22 01:46:31.420962 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.102462191s) to execute
2021-10-22 01:46:31.523440 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (100.020839ms) to execute
2021-10-22 01:46:34.019479 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (797.824546ms) to execute
2021-10-22 01:46:35.522922 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (693.03375ms) to execute
2021-10-22 01:46:36.219886 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:41.021055 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (992.623921ms) to execute
2021-10-22 01:46:41.220192 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:42.525928 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (697.968273ms) to execute
2021-10-22 01:46:44.024176 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.305474329s) to execute
2021-10-22 01:46:46.220418 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:46.918262 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.88805554s) to execute
2021-10-22 01:46:48.320668 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.2021836s) to execute
2021-10-22 01:46:48.320810 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.399481932s) to execute
2021-10-22 01:46:48.321026 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.400691312s) to execute
2021-10-22 01:46:50.321484 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.402972835s) to execute
2021-10-22 01:46:51.318249 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:53.326239 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.897681254s) to execute
2021-10-22 01:46:53.520400 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (181.400176ms) to execute
2021-10-22 01:46:53.530062 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (190.859651ms) to execute
2021-10-22 01:46:55.019360 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.497150574s) to execute
2021-10-22 01:46:56.318544 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:46:56.524203 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.696448186s) to execute
2021-10-22 01:46:59.524907 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.005904157s) to execute
2021-10-22 01:47:01.318873 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:03.923560 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.795831s) to execute
2021-10-22 01:47:04.027965 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.770942ms) to execute
2021-10-22 01:47:04.128051 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (198.771349ms) to execute
2021-10-22 01:47:06.319175 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:06.825637 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.497859052s) to execute
2021-10-22 01:47:08.319196 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.491174435s) to execute
2021-10-22 01:47:08.319402 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.391232184s) to execute
2021-10-22 01:47:10.118289 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.784970452s) to execute
2021-10-22 01:47:10.118456 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.09866969s) to execute
2021-10-22 01:47:11.319441 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:12.919507 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.600302646s) to execute
2021-10-22 01:47:14.320836 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.400411343s) to execute
2021-10-22 01:47:14.321338 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.398740319s) to execute
2021-10-22 01:47:16.020911 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.697193432s) to execute
2021-10-22 01:47:16.021251 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.602246699s) to execute
2021-10-22 01:47:16.319943 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:17.426629 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.198866083s) to execute
2021-10-22 01:47:17.528642 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.123889ms) to execute
2021-10-22 01:47:21.320212 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:21.522328 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.303689905s) to execute
2021-10-22 01:47:21.628059 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (103.644075ms) to execute
2021-10-22 01:47:26.320509 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:26.426898 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.307446594s) to execute
2021-10-22 01:47:26.530538 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.518834ms) to execute
2021-10-22 01:47:29.722990 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.794706633s) to execute
2021-10-22 01:47:31.320908 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:33.920500 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.100823336s) to execute
2021-10-22 01:47:33.920850 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.194677514s) to execute
2021-10-22 01:47:36.321593 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:38.922696 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.503247379s) to execute
2021-10-22 01:47:39.028049 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (103.174952ms) to execute
2021-10-22 01:47:40.624955 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (996.979801ms) to execute
2021-10-22 01:47:40.828122 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (196.066538ms) to execute
2021-10-22 01:47:41.321835 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:42.322408 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (990.726728ms) to execute
2021-10-22 01:47:43.722430 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.303470943s) to execute
2021-10-22 01:47:43.828316 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.986534ms) to execute
2021-10-22 01:47:45.225418 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.106926413s) to execute
2021-10-22 01:47:46.322187 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:47.626733 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (493.606483ms) to execute
2021-10-22 01:47:49.020210 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.292118433s) to execute
2021-10-22 01:47:51.322422 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:51.826895 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.397778698s) to execute
2021-10-22 01:47:55.020081 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.691076692s) to execute
2021-10-22 01:47:56.322788 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:47:57.722672 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.694385561s) to execute
2021-10-22 01:48:01.323044 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:02.724968 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.30657762s) to execute
2021-10-22 01:48:04.419194 I | auth: deleting token ChzaFvXgqlDPErCa.17 for user conductor
2021-10-22 01:48:05.926787 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.596723166s) to execute
2021-10-22 01:48:06.323295 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:06.419040 I | auth: deleting token CiYYLZSmWWmaGDwH.19 for user conductor
2021-10-22 01:48:07.419140 I | auth: deleting token LXVhJZMbTeaQJuMv.21 for user conductor
2021-10-22 01:48:07.521683 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.390519077s) to execute
2021-10-22 01:48:08.926228 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.396417901s) to execute
2021-10-22 01:48:09.419130 I | auth: deleting token vAAkbhJXrqDSLfXb.23 for user conductor
2021-10-22 01:48:10.624847 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (506.276048ms) to execute
2021-10-22 01:48:11.323659 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:11.419084 I | auth: deleting token levddGtpHNVeCMtO.24 for user conductor
2021-10-22 01:48:13.420622 I | auth: deleting token RWGVoKMvJHZsINYz.26 for user conductor
2021-10-22 01:48:14.419089 I | auth: deleting token wKaxZFeRonhtkQge.27 for user conductor
2021-10-22 01:48:16.418240 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:16.419093 I | auth: deleting token VbtXjXzOiIcKurpr.30 for user conductor
2021-10-22 01:48:18.020005 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.499852204s) to execute
2021-10-22 01:48:18.419051 I | auth: deleting token rdeMVVephplPtFwb.31 for user conductor
2021-10-22 01:48:19.626903 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (197.24139ms) to execute
2021-10-22 01:48:20.419128 I | auth: deleting token mcBiKNRoRlDCYunw.34 for user conductor
2021-10-22 01:48:21.019095 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.38426383s) to execute
2021-10-22 01:48:21.418576 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:22.419044 I | auth: deleting token JSoyRLmgdrfoZXVn.37 for user conductor
2021-10-22 01:48:22.419106 I | auth: deleting token OIEGrifpeivAAgWX.36 for user conductor
2021-10-22 01:48:24.024357 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.591096967s) to execute
2021-10-22 01:48:24.228345 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (106.972056ms) to execute
2021-10-22 01:48:25.418959 I | auth: deleting token RLmpogXmnbtzRdGG.40 for user conductor
2021-10-22 01:48:25.419049 I | auth: deleting token JSsLYDSoJooNTyhh.39 for user conductor
2021-10-22 01:48:26.418891 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:26.419220 I | auth: deleting token vMPRVTzNFmuELdqd.42 for user conductor
2021-10-22 01:48:28.126156 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.093836757s) to execute
2021-10-22 01:48:29.420037 I | auth: deleting token mRpYJHkOzYqUkPBc.44 for user conductor
2021-10-22 01:48:29.420112 I | auth: deleting token feJFZkdoRqHXeFnj.46 for user conductor
2021-10-22 01:48:29.420129 I | auth: deleting token abKHXNhSVOYYfaAp.45 for user conductor
2021-10-22 01:48:29.622187 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.402405957s) to execute
2021-10-22 01:48:29.622427 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.402151118s) to execute
2021-10-22 01:48:31.118886 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.494109675s) to execute
2021-10-22 01:48:31.119055 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.400592814s) to execute
2021-10-22 01:48:31.419029 I | auth: deleting token dZlSkhGdothOfmAA.48 for user conductor
2021-10-22 01:48:31.419166 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:32.419109 I | auth: deleting token gNZPDFmrrvAMFrPI.49 for user conductor
2021-10-22 01:48:32.419172 I | auth: deleting token pfuVWXNCeEhhcncu.51 for user conductor
2021-10-22 01:48:32.419189 I | auth: deleting token rWYURebSTUoTKoDl.50 for user conductor
2021-10-22 01:48:32.519561 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.199568505s) to execute
2021-10-22 01:48:34.021939 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.088058457s) to execute
2021-10-22 01:48:35.419116 I | auth: deleting token jLxKIaxlvmcRZuoX.52 for user conductor
2021-10-22 01:48:35.419164 I | auth: deleting token qBPcArRZSQcuZOIK.53 for user conductor
2021-10-22 01:48:36.419138 I | auth: deleting token CopzYDhyoPBMPWXB.54 for user conductor
2021-10-22 01:48:36.419413 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:39.419121 I | auth: deleting token BukRllvpfIZjZfIv.56 for user conductor
2021-10-22 01:48:39.419199 I | auth: deleting token hiYUqdKNHbLMvbUa.57 for user conductor
2021-10-22 01:48:39.419225 I | auth: deleting token UMzdtAPBdNpkSKfX.55 for user conductor
2021-10-22 01:48:41.419108 I | auth: deleting token LAkfKpSVFwvyJabj.58 for user conductor
2021-10-22 01:48:41.419670 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:42.419132 I | auth: deleting token NRTzMJfxowvPlSQm.60 for user conductor
2021-10-22 01:48:42.419187 I | auth: deleting token cdkbwgGYujEHEzKO.59 for user conductor
2021-10-22 01:48:44.419120 I | auth: deleting token rEgYppqZlIqFaEPu.61 for user conductor
2021-10-22 01:48:45.319314 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (991.141461ms) to execute
2021-10-22 01:48:45.419177 I | auth: deleting token xrNwfOcRkbTspTep.63 for user conductor
2021-10-22 01:48:45.419224 I | auth: deleting token mrVwHfrbOonVHTax.64 for user conductor
2021-10-22 01:48:45.419234 I | auth: deleting token JOUcQBzbsFGstMhC.62 for user conductor
2021-10-22 01:48:46.419929 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:47.121323 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (990.975622ms) to execute
2021-10-22 01:48:48.419188 I | auth: deleting token XbambGQEDqapZQdf.67 for user conductor
2021-10-22 01:48:48.419270 I | auth: deleting token HijkSkHmghzANfeA.65 for user conductor
2021-10-22 01:48:48.419291 I | auth: deleting token SsPmoUGiNVPAtgyO.66 for user conductor
2021-10-22 01:48:49.419394 I | auth: deleting token qlpRZVQnTyCyvlXn.68 for user conductor
2021-10-22 01:48:50.618922 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (783.740156ms) to execute
2021-10-22 01:48:51.418975 I | auth: deleting token YNOTYGZXNTiTQJiZ.69 for user conductor
2021-10-22 01:48:51.420113 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:52.120449 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.498138791s) to execute
2021-10-22 01:48:53.419060 I | auth: deleting token QnpvBGSAgWRZjIQA.70 for user conductor
2021-10-22 01:48:55.023924 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.703633177s) to execute
2021-10-22 01:48:55.024377 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.901094758s) to execute
2021-10-22 01:48:55.218779 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (192.872049ms) to execute
2021-10-22 01:48:55.423186 I | auth: deleting token NFGtoEwiywPyGOhF.71 for user conductor
2021-10-22 01:48:55.423240 I | auth: deleting token TvffKnnkkSXPsSAK.72 for user conductor
2021-10-22 01:48:56.420457 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:48:56.625668 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.507250865s) to execute
2021-10-22 01:48:56.625897 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.598168873s) to execute
2021-10-22 01:48:57.419098 I | auth: deleting token NwxCkrshmNPyDbse.74 for user conductor
2021-10-22 01:48:57.419126 I | auth: deleting token OShPpIfGHmJoRXEd.73 for user conductor
2021-10-22 01:48:59.421730 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.503100169s) to execute
2021-10-22 01:48:59.528702 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (102.220962ms) to execute
2021-10-22 01:49:01.418969 I | auth: deleting token rOijcgptcJndtZvr.77 for user conductor
2021-10-22 01:49:01.419051 I | auth: deleting token exyyCSDRQctOYyEQ.76 for user conductor
2021-10-22 01:49:01.419064 I | auth: deleting token pkStXPzRQdwnsMjw.75 for user conductor
2021-10-22 01:49:01.421083 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:02.419237 I | auth: deleting token PsvfGvVFHSXFJCkv.78 for user conductor
2021-10-22 01:49:02.521089 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.993215586s) to execute
2021-10-22 01:49:03.419218 I | auth: deleting token xuKocdeQednKMWLy.79 for user conductor
2021-10-22 01:49:04.023324 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.495791582s) to execute
2021-10-22 01:49:04.023521 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.500200169s) to execute
2021-10-22 01:49:05.419070 I | auth: deleting token GHlvnetUFusEKbOI.80 for user conductor
2021-10-22 01:49:05.826594 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (394.338868ms) to execute
2021-10-22 01:49:06.421308 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:07.420294 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.491772663s) to execute
2021-10-22 01:49:08.419098 I | auth: deleting token RcZkSnfhnxzWauFZ.82 for user conductor
2021-10-22 01:49:09.222558 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (294.440993ms) to execute
2021-10-22 01:49:09.419225 I | auth: deleting token vnHawAnkOxibyoRQ.81 for user conductor
2021-10-22 01:49:10.419045 I | auth: deleting token hziWdyPrYndxjJyY.83 for user conductor
2021-10-22 01:49:10.419086 I | auth: deleting token bsEVnZFyenZfQvph.84 for user conductor
2021-10-22 01:49:10.818651 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.592531676s) to execute
2021-10-22 01:49:11.421675 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:12.419154 I | auth: deleting token NRbdbHecDipMEoDJ.86 for user conductor
2021-10-22 01:49:12.419189 I | auth: deleting token DcyxtlFxTxFbLzYx.85 for user conductor
2021-10-22 01:49:12.419196 I | auth: deleting token IToqfaQGIFOqDBks.87 for user conductor
2021-10-22 01:49:13.725338 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.704784972s) to execute
2021-10-22 01:49:13.818797 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.996867803s) to execute
2021-10-22 01:49:15.220357 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.399112376s) to execute
2021-10-22 01:49:15.220589 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.401957765s) to execute
2021-10-22 01:49:15.220766 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.397137117s) to execute
2021-10-22 01:49:15.419151 I | auth: deleting token qYzUKJuGtfFbgFeL.88 for user conductor
2021-10-22 01:49:16.419156 I | auth: deleting token lCkiJFYSIpEJrQXq.89 for user conductor
2021-10-22 01:49:16.419207 I | auth: deleting token nMdareCgNJqAFrkc.90 for user conductor
2021-10-22 01:49:16.422327 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:19.420165 I | auth: deleting token bvkpVRCnwhkOQyPe.91 for user conductor
2021-10-22 01:49:19.918651 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.987221856s) to execute
2021-10-22 01:49:20.028705 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (108.195628ms) to execute
2021-10-22 01:49:20.129724 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (209.157726ms) to execute
2021-10-22 01:49:20.131696 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.190624ms) to execute
2021-10-22 01:49:20.419132 I | auth: deleting token FncMMtDxyoenOrjg.94 for user conductor
2021-10-22 01:49:20.419182 I | auth: deleting token GpdFPkwPSIpnttrY.93 for user conductor
2021-10-22 01:49:20.419195 I | auth: deleting token qZmBNHRYooxQBfvR.92 for user conductor
2021-10-22 01:49:21.518285 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:23.120419 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.692538486s) to execute
2021-10-22 01:49:23.419062 I | auth: deleting token drkgyDNWtPWJiUuV.95 for user conductor
2021-10-22 01:49:23.419114 I | auth: deleting token sMiQhJNNjTtJcKNg.96 for user conductor
2021-10-22 01:49:25.418953 I | auth: deleting token MGZvvoqhANpHFzMU.99 for user conductor
2021-10-22 01:49:25.419149 I | auth: deleting token pzoIbmajOLOyRTNS.98 for user conductor
2021-10-22 01:49:25.419434 I | auth: deleting token iEWuJiggXuepJssK.97 for user conductor
2021-10-22 01:49:25.823453 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.694019048s) to execute
2021-10-22 01:49:25.824247 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.702146957s) to execute
2021-10-22 01:49:26.518606 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:27.418956 I | auth: deleting token YQLDolfNbLjFFJUb.101 for user conductor
2021-10-22 01:49:27.418999 I | auth: deleting token oIbQEaAXfHGaxHph.100 for user conductor
2021-10-22 01:49:28.924788 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.206217979s) to execute
2021-10-22 01:49:31.419071 I | auth: deleting token nctPTJoPPqukkDaG.104 for user conductor
2021-10-22 01:49:31.419131 I | auth: deleting token xygYJhxrKxjnCHdA.103 for user conductor
2021-10-22 01:49:31.419147 I | auth: deleting token VapTBRpLbxVzMqua.105 for user conductor
2021-10-22 01:49:31.419157 I | auth: deleting token bkliSICPAuNFFrxu.102 for user conductor
2021-10-22 01:49:31.519112 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:32.419122 I | auth: deleting token UMecdGOtaNcEQwuD.107 for user conductor
2021-10-22 01:49:33.019534 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (591.343209ms) to execute
2021-10-22 01:49:33.419168 I | auth: deleting token RXGJBFkgQlaIPGoK.108 for user conductor
2021-10-22 01:49:34.419056 I | auth: deleting token LgcpImsuICjFvPzM.111 for user conductor
2021-10-22 01:49:34.419105 I | auth: deleting token YWNofvoYIttBOOKg.110 for user conductor
2021-10-22 01:49:36.422889 I | auth: deleting token eWRvSyZlvWzBjspW.114 for user conductor
2021-10-22 01:49:36.422942 I | auth: deleting token nIvOHtyYoDyRTXix.113 for user conductor
2021-10-22 01:49:36.519384 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:36.824264 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.002571708s) to execute
2021-10-22 01:49:37.419169 I | auth: deleting token tnlhZFRztjTQCmyb.116 for user conductor
2021-10-22 01:49:38.219185 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.000666105s) to execute
2021-10-22 01:49:38.419077 I | auth: deleting token gXMEFURMLkcUOcUw.117 for user conductor
2021-10-22 01:49:39.419123 I | auth: deleting token PpzmjySKUGvbqBEf.119 for user conductor
2021-10-22 01:49:39.419171 I | auth: deleting token YjsGRUoRNpbLxfEe.121 for user conductor
2021-10-22 01:49:41.419044 I | auth: deleting token AnvDxFsGLcyREbxk.122 for user conductor
2021-10-22 01:49:41.519699 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:42.725448 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.094885674s) to execute
2021-10-22 01:49:43.419184 I | auth: deleting token exCcVORQrGGkmKrH.123 for user conductor
2021-10-22 01:49:44.225197 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.306761445s) to execute
2021-10-22 01:49:44.225340 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.496843272s) to execute
2021-10-22 01:49:45.419052 I | auth: deleting token deeUoRkFHeUNVPiZ.124 for user conductor
2021-10-22 01:49:45.622951 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.894156556s) to execute
2021-10-22 01:49:45.623082 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.204417808s) to execute
2021-10-22 01:49:45.623201 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.304583082s) to execute
2021-10-22 01:49:46.520186 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:47.125919 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.403356063s) to execute
2021-10-22 01:49:47.419058 I | auth: deleting token EZmuRqCMHyqAsnAm.127 for user conductor
2021-10-22 01:49:47.419138 I | auth: deleting token lhzSxBniRoZrYtdm.128 for user conductor
2021-10-22 01:49:47.419150 I | auth: deleting token lpUmkBIqxwuZoWAC.126 for user conductor
2021-10-22 01:49:48.720535 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.401953841s) to execute
2021-10-22 01:49:50.318669 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.200210525s) to execute
2021-10-22 01:49:50.419082 I | auth: deleting token RKazlSVmfhhkushR.132 for user conductor
2021-10-22 01:49:50.419228 I | auth: deleting token qOUHJqmqAiJyfNQv.129 for user conductor
2021-10-22 01:49:50.419246 I | auth: deleting token QyyCTKtRHJDRbAXh.130 for user conductor
2021-10-22 01:49:51.418988 I | auth: deleting token vJKFlQFhiJDmTAVp.133 for user conductor
2021-10-22 01:49:51.520494 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:52.119247 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.60056353s) to execute
2021-10-22 01:49:52.229086 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (103.938263ms) to execute
2021-10-22 01:49:52.419078 I | auth: deleting token ChhhIndQOXoTDnJL.134 for user conductor
2021-10-22 01:49:53.418981 I | auth: deleting token DavxtTJWIDCpWmlE.137 for user conductor
2021-10-22 01:49:53.419083 I | auth: deleting token wdvWnsgaRTrvFSdT.135 for user conductor
2021-10-22 01:49:53.826133 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (998.249424ms) to execute
2021-10-22 01:49:55.419111 I | auth: deleting token cuVBUGvqRAlmWJyV.138 for user conductor
2021-10-22 01:49:55.419178 I | auth: deleting token xeuoaxDPlubHegoY.139 for user conductor
2021-10-22 01:49:55.526184 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (907.477849ms) to execute
2021-10-22 01:49:56.520778 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:49:57.420047 I | auth: deleting token zgWixsvPccELiONh.140 for user conductor
2021-10-22 01:49:57.420109 I | auth: deleting token ryhPYlKGttzWifav.141 for user conductor
2021-10-22 01:49:59.722954 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.70323533s) to execute
2021-10-22 01:50:01.121051 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.395781845s) to execute
2021-10-22 01:50:01.121210 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.202684914s) to execute
2021-10-22 01:50:01.419042 I | auth: deleting token vvVLHZIrInAmxEoV.142 for user conductor
2021-10-22 01:50:01.521170 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:02.419036 I | auth: deleting token QjChTtvygWvVMaVw.144 for user conductor
2021-10-22 01:50:02.419080 I | auth: deleting token pzcjmTbLwBpDRETB.145 for user conductor
2021-10-22 01:50:02.419092 I | auth: deleting token jPosaeNwxkFLHowV.143 for user conductor
2021-10-22 01:50:02.521675 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.389870125s) to execute
2021-10-22 01:50:03.419565 I | auth: deleting token adBJitWPGOBMIUxi.147 for user conductor
2021-10-22 01:50:04.021294 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.401392461s) to execute
2021-10-22 01:50:04.419155 I | auth: deleting token PbUVlMZSOGOAFAIW.148 for user conductor
2021-10-22 01:50:04.419317 I | auth: deleting token wONTYxAKbolXvbUT.149 for user conductor
2021-10-22 01:50:05.418988 I | auth: deleting token kNibhuGcZRrYCArG.150 for user conductor
2021-10-22 01:50:06.419076 I | auth: deleting token ynJogLYyCrUohnuh.152 for user conductor
2021-10-22 01:50:06.521511 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:07.220319 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.901482771s) to execute
2021-10-22 01:50:07.220624 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.102062736s) to execute
2021-10-22 01:50:07.324381 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (101.870623ms) to execute
2021-10-22 01:50:08.419082 I | auth: deleting token iPsqkgJiEwruYAHK.154 for user conductor
2021-10-22 01:50:08.419139 I | auth: deleting token hCXPtVNZPwJmDhUV.153 for user conductor
2021-10-22 01:50:10.322082 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.103569619s) to execute
2021-10-22 01:50:10.419023 I | auth: deleting token YUmWsAAfCpNtFlTc.155 for user conductor
2021-10-22 01:50:10.419063 I | auth: deleting token OHdIBKGgVwUZCPKP.157 for user conductor
2021-10-22 01:50:10.419072 I | auth: deleting token JYnAnXGKvQyqPTai.156 for user conductor
2021-10-22 01:50:11.521778 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:11.921655 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (693.934513ms) to execute
2021-10-22 01:50:12.419141 I | auth: deleting token ASYCRwkATfchQdWZ.158 for user conductor
2021-10-22 01:50:13.419077 I | auth: deleting token whpTXdtkClaHjayl.161 for user conductor
2021-10-22 01:50:13.419147 I | auth: deleting token YvkwdXkXVpAtXtof.160 for user conductor
2021-10-22 01:50:13.419164 I | auth: deleting token AqJfcWSzHiiWRXrR.162 for user conductor
2021-10-22 01:50:14.419070 I | auth: deleting token kXaJsKXrUlXPzPsR.163 for user conductor
2021-10-22 01:50:16.523421 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:17.419062 I | auth: deleting token AUyqmMPUGcCwWbSm.164 for user conductor
2021-10-22 01:50:17.419127 I | auth: deleting token amEaoXZtuQHECxmk.167 for user conductor
2021-10-22 01:50:18.121122 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.397496832s) to execute
2021-10-22 01:50:18.419123 I | auth: deleting token dkBwghwKfWDIWqNU.168 for user conductor
2021-10-22 01:50:18.419188 I | auth: deleting token UFyxbFkZeIGJIuCH.166 for user conductor
2021-10-22 01:50:19.419083 I | auth: deleting token SuOMZjOyUgXFfogy.170 for user conductor
2021-10-22 01:50:19.625547 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.407035147s) to execute
2021-10-22 01:50:21.325272 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.394615119s) to execute
2021-10-22 01:50:21.418980 I | auth: deleting token EtTWuLijFFxynYMk.171 for user conductor
2021-10-22 01:50:21.538441 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:23.419039 I | auth: deleting token FWTkVimNJWHEUgOs.173 for user conductor
2021-10-22 01:50:23.419075 I | auth: deleting token GZJbLQFYrHgOFvGp.172 for user conductor
2021-10-22 01:50:24.419094 I | auth: deleting token TnBQLOWePRgScnQS.175 for user conductor
2021-10-22 01:50:25.419102 I | auth: deleting token DqHfXECPUwblokMU.177 for user conductor
2021-10-22 01:50:25.620193 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.199735582s) to execute
2021-10-22 01:50:26.419163 I | auth: deleting token HslrqSyNTlWKaUEQ.178 for user conductor
2021-10-22 01:50:26.538749 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:27.025949 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.402562645s) to execute
2021-10-22 01:50:27.026344 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.403919181s) to execute
2021-10-22 01:50:27.119839 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.497357776s) to execute
2021-10-22 01:50:27.120099 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.497630521s) to execute
2021-10-22 01:50:27.419064 I | auth: deleting token VRcWLCduhOVYudNn.179 for user conductor
2021-10-22 01:50:29.420567 I | auth: deleting token MBIMKqQIJJdvTAjg.180 for user conductor
2021-10-22 01:50:29.420625 I | auth: deleting token ZtNrPTbFHYLciCgo.181 for user conductor
2021-10-22 01:50:30.419143 I | auth: deleting token BMhkOnFkvAxYHjsP.183 for user conductor
2021-10-22 01:50:30.419216 I | auth: deleting token CWELlCIaqjvHQEdU.182 for user conductor
2021-10-22 01:50:31.539078 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:31.819448 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.291685424s) to execute
2021-10-22 01:50:32.419071 I | auth: deleting token yOYspHSShxXGLnsL.184 for user conductor
2021-10-22 01:50:35.419170 I | auth: deleting token hMWtbepMIKleJrtN.185 for user conductor
2021-10-22 01:50:35.422991 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.004482224s) to execute
2021-10-22 01:50:36.623431 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:36.923229 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.39229812s) to execute
2021-10-22 01:50:36.923301 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (688.137626ms) to execute
2021-10-22 01:50:37.418985 I | auth: deleting token dUcyRzFwPmOTKuAX.188 for user conductor
2021-10-22 01:50:37.419079 I | auth: deleting token WyahshYiSBFDyyku.189 for user conductor
2021-10-22 01:50:37.419101 I | auth: deleting token lJcBQFVSuZiIMEfb.187 for user conductor
2021-10-22 01:50:37.419117 I | auth: deleting token xRahKGSjouOWrFzz.186 for user conductor
2021-10-22 01:50:38.518337 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.487091671s) to execute
2021-10-22 01:50:38.518472 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (597.657746ms) to execute
2021-10-22 01:50:39.921352 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.388673357s) to execute
2021-10-22 01:50:39.921606 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (189.454275ms) to execute
2021-10-22 01:50:41.418979 I | auth: deleting token biIaaSlrTifeSuYo.192 for user conductor
2021-10-22 01:50:41.419094 I | auth: deleting token ufMrSOMRgcVWlaBW.190 for user conductor
2021-10-22 01:50:41.419113 I | auth: deleting token KuflYrVxDPmEMTIR.191 for user conductor
2021-10-22 01:50:41.419123 I | auth: deleting token wfAbRvGxOtMvKSqO.193 for user conductor
2021-10-22 01:50:41.621771 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.600350921s) to execute
2021-10-22 01:50:41.623662 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:42.419119 I | auth: deleting token GdGZsBeUFVhvUBRM.194 for user conductor
2021-10-22 01:50:43.125699 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.006217196s) to execute
2021-10-22 01:50:44.419114 I | auth: deleting token ianPlDwShejDnzzQ.195 for user conductor
2021-10-22 01:50:44.723390 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.594297744s) to execute
2021-10-22 01:50:46.225682 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (687.846231ms) to execute
2021-10-22 01:50:46.419069 I | auth: deleting token iJUeluIhEjGgOZzB.196 for user conductor
2021-10-22 01:50:46.624073 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:47.720103 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.40172478s) to execute
2021-10-22 01:50:49.220618 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.496852671s) to execute
2021-10-22 01:50:50.620173 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.897377693s) to execute
2021-10-22 01:50:50.620234 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.301562314s) to execute
2021-10-22 01:50:50.620402 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.397698563s) to execute
2021-10-22 01:50:50.828803 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (205.00868ms) to execute
2021-10-22 01:50:51.624646 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:52.419186 I | auth: deleting token xNqVVideNhEGFhgT.199 for user conductor
2021-10-22 01:50:52.419251 I | auth: deleting token wbMcQkyvHrnGBOjt.200 for user conductor
2021-10-22 01:50:52.419265 I | auth: deleting token FFXQQrBFqYTiJhyO.197 for user conductor
2021-10-22 01:50:52.419282 I | auth: deleting token acEuQZzteVhvrObM.198 for user conductor
2021-10-22 01:50:52.419332 I | auth: deleting token xOFImXFZmOxNqPGN.201 for user conductor
2021-10-22 01:50:52.419362 I | auth: deleting token AOZoQTguuqFdDkps.202 for user conductor
2021-10-22 01:50:52.520073 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.688918094s) to execute
2021-10-22 01:50:53.925519 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.697433472s) to execute
2021-10-22 01:50:56.624931 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:50:57.418978 I | auth: deleting token qwGllYboRnMDpMSQ.205 for user conductor
2021-10-22 01:50:57.419070 I | auth: deleting token mfOzbzDNedNZjojo.208 for user conductor
2021-10-22 01:50:57.419083 I | auth: deleting token yxzmrjGBzwTlyENV.204 for user conductor
2021-10-22 01:50:57.419103 I | auth: deleting token sPmswWSkAjohDoGO.207 for user conductor
2021-10-22 01:50:57.419112 I | auth: deleting token VMcyYrRPspSOTeCw.203 for user conductor
2021-10-22 01:50:57.419120 I | auth: deleting token AOtBmUJnJOrXJwDd.206 for user conductor
2021-10-22 01:50:58.420211 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.400349601s) to execute
2021-10-22 01:50:58.420602 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.493194387s) to execute
2021-10-22 01:50:58.528321 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (101.991529ms) to execute
2021-10-22 01:50:59.418960 I | auth: deleting token AaPkSvTASESQZVEO.209 for user conductor
2021-10-22 01:51:01.425915 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.297765744s) to execute
2021-10-22 01:51:01.518276 I | auth: deleting token tcWbyvjODPiyPaCB.210 for user conductor
2021-10-22 01:51:01.625245 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:02.923676 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (903.874068ms) to execute
2021-10-22 01:51:03.424200 I | auth: deleting token cCGTVWKmbqBZZeQH.211 for user conductor
2021-10-22 01:51:04.320518 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.300683501s) to execute
2021-10-22 01:51:04.419057 I | auth: deleting token CayVXjgWvyeLYvVq.212 for user conductor
2021-10-22 01:51:06.625570 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:08.420442 I | auth: deleting token vSDAMIkxehppwEbI.214 for user conductor
2021-10-22 01:51:08.420503 I | auth: deleting token simhvKLOazbRFMUw.213 for user conductor
2021-10-22 01:51:09.418975 I | auth: deleting token FHjKfHoDnoIPhuQO.216 for user conductor
2021-10-22 01:51:09.419025 I | auth: deleting token JXBAgPeExmkKSIJJ.215 for user conductor
2021-10-22 01:51:10.419108 I | auth: deleting token ysYfUQPrroClVwps.217 for user conductor
2021-10-22 01:51:11.625852 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:12.419062 I | auth: deleting token gqUXKVnqTwVPsNEa.218 for user conductor
2021-10-22 01:51:13.419116 I | auth: deleting token OjfBdbcECcpSEJef.221 for user conductor
2021-10-22 01:51:13.419191 I | auth: deleting token wyahrGTOrpyFCHEv.220 for user conductor
2021-10-22 01:51:13.419207 I | auth: deleting token PKKihKGRZXAfLdbC.219 for user conductor
2021-10-22 01:51:13.419218 I | auth: deleting token dosuFOJnUoqhnrXU.223 for user conductor
2021-10-22 01:51:14.726969 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.006906309s) to execute
2021-10-22 01:51:16.419154 I | auth: deleting token lsCPlJXbwBswNcYi.224 for user conductor
2021-10-22 01:51:16.419279 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.389483113s) to execute
2021-10-22 01:51:16.419588 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.598393156s) to execute
2021-10-22 01:51:16.626086 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:16.633093 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (211.460993ms) to execute
2021-10-22 01:51:17.419119 I | auth: deleting token GdxqqosHWRRLQaMV.225 for user conductor
2021-10-22 01:51:17.419164 I | auth: deleting token PLXAxeeJZsswYUVb.227 for user conductor
2021-10-22 01:51:18.026786 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.389397417s) to execute
2021-10-22 01:51:19.419051 I | auth: deleting token esOJKsEhbxPkJoEu.229 for user conductor
2021-10-22 01:51:19.419116 I | auth: deleting token VihUUlDqGfMGtRZz.226 for user conductor
2021-10-22 01:51:19.419147 I | auth: deleting token tXbtLybXqMwAzpwv.230 for user conductor
2021-10-22 01:51:19.423298 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.695220893s) to execute
2021-10-22 01:51:20.721673 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.201123191s) to execute
2021-10-22 01:51:20.721800 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.199761315s) to execute
2021-10-22 01:51:20.929316 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (107.807137ms) to execute
2021-10-22 01:51:21.626423 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:22.419088 I | auth: deleting token IBTpTsAkNJQyempK.231 for user conductor
2021-10-22 01:51:22.419148 I | auth: deleting token MHFmQTIBPOdncEFq.233 for user conductor
2021-10-22 01:51:22.419161 I | auth: deleting token dLZznqlIAKOxSsSP.228 for user conductor
2021-10-22 01:51:22.419184 I | auth: deleting token jkyJxgQFydaeRxNm.232 for user conductor
2021-10-22 01:51:23.224621 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (594.930906ms) to execute
2021-10-22 01:51:23.518391 I | auth: deleting token iUJzlBnichmEVFCE.235 for user conductor
2021-10-22 01:51:23.519862 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (196.724032ms) to execute
2021-10-22 01:51:25.121521 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.003048011s) to execute
2021-10-22 01:51:26.718347 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:27.419042 I | auth: deleting token RGTqvoBCIKbuUQyi.236 for user conductor
2021-10-22 01:51:29.423757 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.695614532s) to execute
2021-10-22 01:51:30.920874 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.493847606s) to execute
2021-10-22 01:51:30.921143 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.4943622s) to execute
2021-10-22 01:51:31.718578 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:32.419075 I | auth: deleting token HUzLbOHbBlhmKAOT.241 for user conductor
2021-10-22 01:51:32.419140 I | auth: deleting token QpDozAYeVJPObIae.238 for user conductor
2021-10-22 01:51:32.419166 I | auth: deleting token XcwinLUbkoVrdxkB.240 for user conductor
2021-10-22 01:51:32.419179 I | auth: deleting token xrVVnkMowXvFnsNZ.239 for user conductor
2021-10-22 01:51:32.419188 I | auth: deleting token XywJnaRcuMTXdsFQ.237 for user conductor
2021-10-22 01:51:32.525761 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.506961988s) to execute
2021-10-22 01:51:32.526680 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.495555238s) to execute
2021-10-22 01:51:32.526918 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (676.628084ms) to execute
2021-10-22 01:51:32.827819 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (194.49465ms) to execute
2021-10-22 01:51:34.326126 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (706.440162ms) to execute
2021-10-22 01:51:34.419037 I | auth: deleting token JKnIubamzoMIYBty.243 for user conductor
2021-10-22 01:51:34.419078 I | auth: deleting token OgqpoiBfqGhaIjHa.242 for user conductor
2021-10-22 01:51:35.924822 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (495.34473ms) to execute
2021-10-22 01:51:36.419143 I | auth: deleting token SKhhGrKgMjMhiswJ.245 for user conductor
2021-10-22 01:51:36.419199 I | auth: deleting token zMHcqTxzKlgOLfYa.244 for user conductor
2021-10-22 01:51:36.718909 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:37.419434 I | auth: deleting token TTeorMYnrLCVSoLg.246 for user conductor
2021-10-22 01:51:38.423149 I | auth: deleting token bkonzTQDOeBcXNSJ.247 for user conductor
2021-10-22 01:51:38.423244 I | auth: deleting token qlkWLAYrbUdDzxWK.248 for user conductor
2021-10-22 01:51:41.419107 I | auth: deleting token UePwOzdogHOpOTaW.250 for user conductor
2021-10-22 01:51:41.419167 I | auth: deleting token fzZtQtBXhHZVwQeO.251 for user conductor
2021-10-22 01:51:41.419181 I | auth: deleting token KBWhPlQxGCjAHCKI.249 for user conductor
2021-10-22 01:51:41.719231 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:43.419134 I | auth: deleting token SwzJvAfkhMvsitke.252 for user conductor
2021-10-22 01:51:44.419087 I | auth: deleting token bgVvAaZZYXlXXLYF.254 for user conductor
2021-10-22 01:51:44.419137 I | auth: deleting token ADARQffHOuoDbRZB.255 for user conductor
2021-10-22 01:51:44.419151 I | auth: deleting token PSFCrSmJuFnpjnMY.253 for user conductor
2021-10-22 01:51:46.719502 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:47.418518 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (186.025845ms) to execute
2021-10-22 01:51:47.419094 I | auth: deleting token vXXqZLeQGSOzbXce.256 for user conductor
2021-10-22 01:51:47.419123 I | auth: deleting token YaOrtdCQePhlGTgB.258 for user conductor
2021-10-22 01:51:48.419123 I | auth: deleting token KFLquywViRZFyttI.257 for user conductor
2021-10-22 01:51:48.419192 I | auth: deleting token gBlphCCEBCOJLahI.259 for user conductor
2021-10-22 01:51:49.419036 I | auth: deleting token kTxgElyGoiinpmdM.260 for user conductor
2021-10-22 01:51:50.419056 I | auth: deleting token cHUOmpYPJYfSZkUj.261 for user conductor
2021-10-22 01:51:51.218523 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.387494589s) to execute
2021-10-22 01:51:51.720373 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:53.419060 I | auth: deleting token qmRvHpEjMAaqoZbB.262 for user conductor
2021-10-22 01:51:53.419200 I | auth: deleting token TkXmbWcdEbznUhxy.265 for user conductor
2021-10-22 01:51:54.419229 I | auth: deleting token SZIpMGDkyOqUvXNt.263 for user conductor
2021-10-22 01:51:54.419314 I | auth: deleting token ETiIqmfeKgayAXUv.266 for user conductor
2021-10-22 01:51:54.419329 I | auth: deleting token TDCAbnvwYDsQDFxR.264 for user conductor
2021-10-22 01:51:56.720670 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:51:56.826231 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.298041014s) to execute
2021-10-22 01:51:57.419069 I | auth: deleting token bvsYezGNXRwHUGQd.268 for user conductor
2021-10-22 01:51:57.419223 I | auth: deleting token JWCyHkiqlpXedtSU.270 for user conductor
2021-10-22 01:51:57.419237 I | auth: deleting token YeVgtesKOOVhlNaI.269 for user conductor
2021-10-22 01:51:57.419245 I | auth: deleting token WRYRUVQYdXDGwJak.267 for user conductor
2021-10-22 01:51:58.520200 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.591605608s) to execute
2021-10-22 01:51:59.921998 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.288571825s) to execute
2021-10-22 01:51:59.922172 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.298824196s) to execute
2021-10-22 01:52:00.028410 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (104.371971ms) to execute
2021-10-22 01:52:00.419820 I | auth: deleting token OLgGQIBDArhyfjAL.272 for user conductor
2021-10-22 01:52:00.419858 I | auth: deleting token EipoMGMCaBpANnfm.271 for user conductor
2021-10-22 01:52:00.419871 I | auth: deleting token cwnpbACubiFNBBFy.274 for user conductor
2021-10-22 01:52:00.419885 I | auth: deleting token dEDEEVutUDNHfreg.273 for user conductor
2021-10-22 01:52:01.522051 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.491825289s) to execute
2021-10-22 01:52:01.720944 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:03.021356 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.10289823s) to execute
2021-10-22 01:52:03.128853 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (103.952785ms) to execute
2021-10-22 01:52:04.419077 I | auth: deleting token ktuhJyqEJybbBoLU.276 for user conductor
2021-10-22 01:52:04.419135 I | auth: deleting token MjzFMzvKMeBKBCfi.275 for user conductor
2021-10-22 01:52:04.419157 I | auth: deleting token nBciLapdTLDXUiXB.279 for user conductor
2021-10-22 01:52:04.419169 I | auth: deleting token zXPgYxuLjWlECuMi.278 for user conductor
2021-10-22 01:52:04.419175 I | auth: deleting token MGIOLevIQXFRTmYx.277 for user conductor
2021-10-22 01:52:06.721227 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:07.419128 I | auth: deleting token kfcuPYPRvwSimuzk.281 for user conductor
2021-10-22 01:52:07.419191 I | auth: deleting token CSNSZgrfkmfzfnrn.280 for user conductor
2021-10-22 01:52:08.419114 I | auth: deleting token sPTcJIGBOBXckSLh.283 for user conductor
2021-10-22 01:52:08.419170 I | auth: deleting token CwLJxCvVFfKoMYTg.282 for user conductor
2021-10-22 01:52:09.420110 I | auth: deleting token NTfgWyteUraTwDon.284 for user conductor
2021-10-22 01:52:10.419022 I | auth: deleting token olHiAydWOWZlcFAF.285 for user conductor
2021-10-22 01:52:11.721535 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:13.419168 I | auth: deleting token bhWhniVZdUCUhsvi.287 for user conductor
2021-10-22 01:52:14.419046 I | auth: deleting token RjPevHdNwsjEAaQp.289 for user conductor
2021-10-22 01:52:14.419106 I | auth: deleting token cKwEkMUGSiNSonrr.290 for user conductor
2021-10-22 01:52:14.419132 I | auth: deleting token uTshDgqEJwFwxVgP.286 for user conductor
2021-10-22 01:52:15.320448 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.59668522s) to execute
2021-10-22 01:52:15.419132 I | auth: deleting token TrptZVPvVrTaNoZp.292 for user conductor
2021-10-22 01:52:15.419216 I | auth: deleting token hvpMQMPIJCYvuEWq.291 for user conductor
2021-10-22 01:52:15.419238 I | auth: deleting token JrUyKaTJgMiQAzQD.288 for user conductor
2021-10-22 01:52:16.818370 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:16.926843 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.308220831s) to execute
2021-10-22 01:52:16.927158 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.403448096s) to execute
2021-10-22 01:52:16.927436 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.40341837s) to execute
2021-10-22 01:52:17.018231 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.403398525s) to execute
2021-10-22 01:52:17.118470 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (189.365304ms) to execute
2021-10-22 01:52:18.419277 I | auth: deleting token lGxDVIBXuuxhztyY.294 for user conductor
2021-10-22 01:52:18.419314 I | auth: deleting token akseDwrBaAHMiouv.293 for user conductor
2021-10-22 01:52:18.419321 I | auth: deleting token YGQcuNhHuFmRaPSZ.295 for user conductor
2021-10-22 01:52:18.424195 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.402798374s) to execute
2021-10-22 01:52:21.519424 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.289969624s) to execute
2021-10-22 01:52:21.818760 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:22.419054 I | auth: deleting token OHUMXUJGNODyuMkT.296 for user conductor
2021-10-22 01:52:22.419091 I | auth: deleting token DOrJlgsBMahqbHlf.297 for user conductor
2021-10-22 01:52:22.419103 I | auth: deleting token dUWxsrXGaJHfHbHc.299 for user conductor
2021-10-22 01:52:22.419120 I | auth: deleting token csPnHkNBmGZAIwle.298 for user conductor
2021-10-22 01:52:24.419066 I | auth: deleting token qYylTIiqMOklecYe.301 for user conductor
2021-10-22 01:52:24.419126 I | auth: deleting token uDaKcviTpWxSMhWg.300 for user conductor
2021-10-22 01:52:24.721703 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.993216803s) to execute
2021-10-22 01:52:26.224786 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (395.056661ms) to execute
2021-10-22 01:52:26.819039 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:27.420045 I | auth: deleting token fqhhAikOPMAiZfIk.303 for user conductor
2021-10-22 01:52:27.420083 I | auth: deleting token kUQFBmaCmTfaviHt.304 for user conductor
2021-10-22 01:52:27.420094 I | auth: deleting token IAPseMntSrzQpTuH.302 for user conductor
2021-10-22 01:52:27.921988 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (394.111239ms) to execute
2021-10-22 01:52:30.419034 I | auth: deleting token RvHaJvbKKzeyDtNh.305 for user conductor
2021-10-22 01:52:31.819410 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:33.421236 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.801594089s) to execute
2021-10-22 01:52:34.419031 I | auth: deleting token MjvBfsKgfHCAExRj.310 for user conductor
2021-10-22 01:52:34.419060 I | auth: deleting token VvnjXJLMmhkNvRfk.308 for user conductor
2021-10-22 01:52:34.419074 I | auth: deleting token NwXNtimIkXdEbVtn.306 for user conductor
2021-10-22 01:52:34.419080 I | auth: deleting token dguEtMHzfSXFUwTl.309 for user conductor
2021-10-22 01:52:34.419087 I | auth: deleting token ZunpwzHwJtXSnQmF.307 for user conductor
2021-10-22 01:52:36.419120 I | auth: deleting token RGPexjgxjUXENFny.311 for user conductor
2021-10-22 01:52:36.419155 I | auth: deleting token eLptyuYmMvcvErDo.312 for user conductor
2021-10-22 01:52:36.819697 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:37.820709 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.602279415s) to execute
2021-10-22 01:52:39.138201 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.311932805s) to execute
2021-10-22 01:52:39.138457 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.312242884s) to execute
2021-10-22 01:52:39.138590 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.220031264s) to execute
2021-10-22 01:52:39.418993 I | auth: deleting token litefEcNeylEGItY.313 for user conductor
2021-10-22 01:52:39.419078 I | auth: deleting token ITUZWbThFzdqFaBx.314 for user conductor
2021-10-22 01:52:39.419101 I | auth: deleting token EMfrdBhlXGsHlTRY.315 for user conductor
2021-10-22 01:52:40.620797 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.390698533s) to execute
2021-10-22 01:52:40.827932 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (205.181128ms) to execute
2021-10-22 01:52:40.933165 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (103.7083ms) to execute
2021-10-22 01:52:41.419124 I | auth: deleting token hrYRtBxUVOctpMav.316 for user conductor
2021-10-22 01:52:41.419172 I | auth: deleting token yIdCHgZpWKogTBcD.317 for user conductor
2021-10-22 01:52:41.820065 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:42.419131 I | auth: deleting token BmOvnLjnRnXVEEXl.318 for user conductor
2021-10-22 01:52:44.419100 I | auth: deleting token MFTHBlfcCGHEiGqg.320 for user conductor
2021-10-22 01:52:44.419163 I | auth: deleting token bymnccvATsMhFBMP.319 for user conductor
2021-10-22 01:52:45.419098 I | auth: deleting token mMAKjMcEThbOWbDW.321 for user conductor
2021-10-22 01:52:45.419157 I | auth: deleting token CMwMxBxGlcULqsQH.322 for user conductor
2021-10-22 01:52:46.419076 I | auth: deleting token mRpfmWhchCkTausK.323 for user conductor
2021-10-22 01:52:46.820298 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:48.419089 I | auth: deleting token OdnztJYRXjKAcEkK.324 for user conductor
2021-10-22 01:52:48.625611 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.097405219s) to execute
2021-10-22 01:52:48.820229 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (191.999304ms) to execute
2021-10-22 01:52:48.928371 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (106.903825ms) to execute
2021-10-22 01:52:49.419582 I | auth: deleting token ClVOBrWVZRzTChuG.326 for user conductor
2021-10-22 01:52:49.419612 I | auth: deleting token rtmYqedKVUiMpqfY.325 for user conductor
2021-10-22 01:52:49.419620 I | auth: deleting token ufhAYLtIJDjsVqxs.327 for user conductor
2021-10-22 01:52:50.719360 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (899.163794ms) to execute
2021-10-22 01:52:51.820533 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:52.418971 I | auth: deleting token KGQaYpgmvQSFcNXL.330 for user conductor
2021-10-22 01:52:52.419075 I | auth: deleting token CVrHpBxuRggQurSx.328 for user conductor
2021-10-22 01:52:52.419092 I | auth: deleting token GIZnjxxyUmtlokCO.329 for user conductor
2021-10-22 01:52:52.421207 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (501.694068ms) to execute
2021-10-22 01:52:55.423036 I | auth: deleting token bglGkCRyaCTaczqt.332 for user conductor
2021-10-22 01:52:55.423168 I | auth: deleting token kgVESEWiXLNMQCfJ.334 for user conductor
2021-10-22 01:52:55.423202 I | auth: deleting token WsLOuLZdAJmggEay.333 for user conductor
2021-10-22 01:52:55.423226 I | auth: deleting token DyVqkuorNOYpNmhr.331 for user conductor
2021-10-22 01:52:56.820809 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:52:58.419173 I | auth: deleting token iyVzjIrcaFtRIcTs.336 for user conductor
2021-10-22 01:52:58.419261 I | auth: deleting token NjplmQiYSqhNejMW.338 for user conductor
2021-10-22 01:52:58.419290 I | auth: deleting token sCghnAfAFilbrrFj.337 for user conductor
2021-10-22 01:52:58.419311 I | auth: deleting token OvlVqXYUTbYfwiDn.335 for user conductor
2021-10-22 01:53:00.419114 I | auth: deleting token IcuDtLMcMbMfTPkw.339 for user conductor
2021-10-22 01:53:01.821074 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:03.419193 I | auth: deleting token lMCuqyVVURgkeJaO.340 for user conductor
2021-10-22 01:53:03.419267 I | auth: deleting token PZmeflDSBcBnJHjx.341 for user conductor
2021-10-22 01:53:03.419287 I | auth: deleting token llNcCSzQtrOWNRAA.342 for user conductor
2021-10-22 01:53:06.419124 I | auth: deleting token afyRktjneTbcIVPl.345 for user conductor
2021-10-22 01:53:06.419178 I | auth: deleting token IgwzhjYMGYKjBTMa.343 for user conductor
2021-10-22 01:53:06.419193 I | auth: deleting token xoCROqkcMNMautcj.344 for user conductor
2021-10-22 01:53:06.821491 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:08.418975 I | auth: deleting token QLdvsvhfgBqHuvQj.346 for user conductor
2021-10-22 01:53:09.419219 I | auth: deleting token VlRNvMHUMUrMTgbl.349 for user conductor
2021-10-22 01:53:09.419270 I | auth: deleting token nFfbZPPWuOZrjSgc.347 for user conductor
2021-10-22 01:53:09.419286 I | auth: deleting token TLDNJAqapQMcqZTp.348 for user conductor
2021-10-22 01:53:11.419052 I | auth: deleting token BaDxwTBrsPvuEZGh.351 for user conductor
2021-10-22 01:53:11.419109 I | auth: deleting token VjExtljDGgwcRndw.350 for user conductor
2021-10-22 01:53:11.918456 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:12.124413 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.395626697s) to execute
2021-10-22 01:53:12.228417 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.334526ms) to execute
2021-10-22 01:53:12.419180 I | auth: deleting token VBHuayonafSlUcHS.352 for user conductor
2021-10-22 01:53:14.924926 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.396996975s) to execute
2021-10-22 01:53:16.420866 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.199869868s) to execute
2021-10-22 01:53:16.421256 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.493827461s) to execute
2021-10-22 01:53:16.919118 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:18.123068 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (802.138533ms) to execute
2021-10-22 01:53:18.419042 I | auth: deleting token fNUjxpHRoKeMIZxb.353 for user conductor
2021-10-22 01:53:18.419101 I | auth: deleting token hzUoVEeeAcDPlIyZ.354 for user conductor
2021-10-22 01:53:18.419114 I | auth: deleting token iXkWsUYLZfZZCpsz.356 for user conductor
2021-10-22 01:53:18.419136 I | auth: deleting token vAenufLaWsewOldq.358 for user conductor
2021-10-22 01:53:18.419148 I | auth: deleting token BQDWjjNYYNHktOXa.357 for user conductor
2021-10-22 01:53:18.419160 I | auth: deleting token SmGzZArTCumEnFal.355 for user conductor
2021-10-22 01:53:20.118271 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.702507763s) to execute
2021-10-22 01:53:20.418949 I | auth: deleting token cTGUljNnjjfHPqdN.359 for user conductor
2021-10-22 01:53:21.419091 I | auth: deleting token KKVKbotqCxCdcdgL.362 for user conductor
2021-10-22 01:53:21.419144 I | auth: deleting token PbryDADwHMxzCSjz.360 for user conductor
2021-10-22 01:53:21.419187 I | auth: deleting token MGWswZvqTCthPPgY.361 for user conductor
2021-10-22 01:53:21.422579 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.304156426s) to execute
2021-10-22 01:53:21.422828 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.301000275s) to execute
2021-10-22 01:53:21.919427 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:24.419026 I | auth: deleting token EtatGzhWujdEbhyi.366 for user conductor
2021-10-22 01:53:24.419073 I | auth: deleting token zlahUsiHUMrBQIcz.363 for user conductor
2021-10-22 01:53:24.419091 I | auth: deleting token gkIsLlBhlcqIJyrA.365 for user conductor
2021-10-22 01:53:24.419110 I | auth: deleting token fejtfkSyrhnlNbUL.364 for user conductor
2021-10-22 01:53:25.726659 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.098051933s) to execute
2021-10-22 01:53:26.919642 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:27.219143 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.290867351s) to execute
2021-10-22 01:53:27.219534 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.30103653s) to execute
2021-10-22 01:53:27.219594 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.301050264s) to execute
2021-10-22 01:53:28.419048 I | auth: deleting token OcrzVTxylupsDQJQ.369 for user conductor
2021-10-22 01:53:28.419106 I | auth: deleting token cPrVZzRzXjTVKbTN.367 for user conductor
2021-10-22 01:53:28.718298 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.40381802s) to execute
2021-10-22 01:53:30.125566 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.803826703s) to execute
2021-10-22 01:53:30.125871 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.486975804s) to execute
2021-10-22 01:53:30.126228 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (897.834959ms) to execute
2021-10-22 01:53:30.427536 I | auth: deleting token wbWcfJplIPmafrEd.371 for user conductor
2021-10-22 01:53:30.427610 I | auth: deleting token ZVvkJSexFqWHGxsn.370 for user conductor
2021-10-22 01:53:30.427623 I | auth: deleting token sTwbpnNpFPhrOTKB.368 for user conductor
2021-10-22 01:53:31.820703 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.501885597s) to execute
2021-10-22 01:53:31.919847 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:33.321882 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.495305103s) to execute
2021-10-22 01:53:33.322535 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.204194482s) to execute
2021-10-22 01:53:33.419038 I | auth: deleting token KmUovKKifhkrqeUE.372 for user conductor
2021-10-22 01:53:33.419132 I | auth: deleting token VvVZNKNkDsypgcCV.373 for user conductor
2021-10-22 01:53:33.419147 I | auth: deleting token rvyjBLDSGUFwnGij.374 for user conductor
2021-10-22 01:53:33.928960 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (587.605972ms) to execute
2021-10-22 01:53:33.930605 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (512.093443ms) to execute
2021-10-22 01:53:34.419059 I | auth: deleting token zELwaYxCGWztYczN.375 for user conductor
2021-10-22 01:53:34.419106 I | auth: deleting token crtAASLYoDRWTGez.376 for user conductor
2021-10-22 01:53:35.419430 I | auth: deleting token iJeGnwKMtOpmOlwH.377 for user conductor
2021-10-22 01:53:36.920224 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:37.418980 I | auth: deleting token cJPNwgEUQNPJeriC.378 for user conductor
2021-10-22 01:53:37.822176 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (593.09122ms) to execute
2021-10-22 01:53:38.030823 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (180.51564ms) to execute
2021-10-22 01:53:38.518186 I | auth: deleting token sNfcffOoFKeBhDUZ.379 for user conductor
2021-10-22 01:53:39.427860 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (608.999956ms) to execute
2021-10-22 01:53:39.728122 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (197.371517ms) to execute
2021-10-22 01:53:40.419123 I | auth: deleting token ycAaoIiAAybZTeJW.380 for user conductor
2021-10-22 01:53:41.920667 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:42.419037 I | auth: deleting token dLlYJcqIfqnLCKPM.381 for user conductor
2021-10-22 01:53:43.720852 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.592069603s) to execute
2021-10-22 01:53:44.518274 I | auth: deleting token PLrGcuuroiTIJZGi.382 for user conductor
2021-10-22 01:53:45.418972 I | auth: deleting token sTSfvegcrjDQloKf.383 for user conductor
2021-10-22 01:53:46.419098 I | auth: deleting token BqjwBmBwbgPeHOfw.384 for user conductor
2021-10-22 01:53:46.625615 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.207126322s) to execute
2021-10-22 01:53:46.921015 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:47.419055 I | auth: deleting token EBAQlBYkVdLubiqf.386 for user conductor
2021-10-22 01:53:47.419108 I | auth: deleting token tOWMvwwPorgbAaWp.385 for user conductor
2021-10-22 01:53:48.419181 I | auth: deleting token MRLahTMdjmjuWrPS.387 for user conductor
2021-10-22 01:53:49.338778 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (209.802892ms) to execute
2021-10-22 01:53:51.029225 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (200.826381ms) to execute
2021-10-22 01:53:51.419221 I | auth: deleting token PmqgNSdjwmoAAhuL.388 for user conductor
2021-10-22 01:53:51.921367 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:53.626797 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (998.529583ms) to execute
2021-10-22 01:53:55.419036 I | auth: deleting token qkvNsgtxSchhDLpv.392 for user conductor
2021-10-22 01:53:55.419083 I | auth: deleting token skTNkbIwgsxFDvOw.394 for user conductor
2021-10-22 01:53:55.419094 I | auth: deleting token yfkdoRnnykogxgfG.393 for user conductor
2021-10-22 01:53:55.419102 I | auth: deleting token HnAoFTraAgjvhtUc.391 for user conductor
2021-10-22 01:53:55.419112 I | auth: deleting token vPwheOGcIOQXtClp.389 for user conductor
2021-10-22 01:53:55.419122 I | auth: deleting token LZPcAbKKYwrZSRtD.390 for user conductor
2021-10-22 01:53:56.921592 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:53:58.026063 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.206265965s) to execute
2021-10-22 01:53:58.228345 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (109.847334ms) to execute
2021-10-22 01:53:58.228449 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (109.973554ms) to execute
2021-10-22 01:53:58.319481 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (200.958748ms) to execute
2021-10-22 01:53:59.720404 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.092193511s) to execute
2021-10-22 01:54:00.418984 I | auth: deleting token gZPOHBnDvfQklcqx.396 for user conductor
2021-10-22 01:54:00.419063 I | auth: deleting token ylcFIGaDMbCUcIYh.395 for user conductor
2021-10-22 01:54:00.419089 I | auth: deleting token VktTKEeXMEQiRTib.397 for user conductor
2021-10-22 01:54:00.419105 I | auth: deleting token adQyLtdMpVMqQGmu.398 for user conductor
2021-10-22 01:54:01.921826 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:54:03.321636 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.503224359s) to execute
2021-10-22 01:54:03.418996 I | auth: deleting token hjvWWmHpjNDuwTbZ.400 for user conductor
2021-10-22 01:54:03.419046 I | auth: deleting token icikaxzVHCNkuFNt.399 for user conductor
2021-10-22 01:54:03.419063 I | auth: deleting token VqqMghveQcnnMurI.401 for user conductor
2021-10-22 01:54:04.419029 I | auth: deleting token PyLlDHamcUKBoIqv.403 for user conductor
2021-10-22 01:54:04.419082 I | auth: deleting token XMvbzHNbLDftuSII.402 for user conductor
2021-10-22 01:54:04.419095 I | auth: deleting token NsnzQhdoHvaaerYG.404 for user conductor
2021-10-22 01:54:04.720480 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.395919317s) to execute
2021-10-22 01:54:04.720579 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.292324435s) to execute
2021-10-22 01:54:04.828037 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (104.244996ms) to execute
2021-10-22 01:54:06.126319 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.394119477s) to execute
2021-10-22 01:54:06.126653 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (408.067995ms) to execute
2021-10-22 01:54:06.419014 I | auth: deleting token isuHOCkMzRZRIWvy.405 for user conductor
2021-10-22 01:54:06.922030 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:54:07.722235 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (490.96556ms) to execute
2021-10-22 01:54:08.418960 I | auth: deleting token YMAxRUGcaPaFSKjI.408 for user conductor
2021-10-22 01:54:08.419052 I | auth: deleting token UrVHLmQtldAGXCNS.406 for user conductor
2021-10-22 01:54:08.419073 I | auth: deleting token dbVXkwCsqboyrcDK.407 for user conductor
2021-10-22 01:54:09.124872 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.206472891s) to execute
2021-10-22 01:54:09.419088 I | auth: deleting token SerMgGzursaZVYiw.409 for user conductor
2021-10-22 01:54:10.422895 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.29486979s) to execute
2021-10-22 01:54:10.423198 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.102278583s) to execute
2021-10-22 01:54:10.627834 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (202.820969ms) to execute
2021-10-22 01:54:11.922254 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:54:13.425275 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.196126322s) to execute
2021-10-22 01:54:14.419075 I | auth: deleting token vshRCWIjItnbBfvM.412 for user conductor
2021-10-22 01:54:14.419138 I | auth: deleting token HplxKkQBTdtEstBw.414 for user conductor
2021-10-22 01:54:14.419149 I | auth: deleting token eSVJUByKSVlFJvNN.413 for user conductor
2021-10-22 01:54:14.419172 I | auth: deleting token WTEETYsfAGBZNkty.410 for user conductor
2021-10-22 01:54:14.419183 I | auth: deleting token KYkoGVVvpbgQEVou.411 for user conductor
2021-10-22 01:54:15.419980 I | auth: deleting token cSOEYJjrEGassHYK.415 for user conductor
2021-10-22 01:54:16.922510 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:54:20.419250 I | auth: deleting token QFXsNwIKKnXpwteA.420 for user conductor
2021-10-22 01:54:20.419305 I | auth: deleting token YoWrtsXxzGSxJxqG.416 for user conductor
2021-10-22 01:54:20.419320 I | auth: deleting token VCeEXSdFKUuTBMNv.419 for user conductor
2021-10-22 01:54:20.419328 I | auth: deleting token eNfzqgfTbRNviCzl.417 for user conductor
2021-10-22 01:54:20.419372 I | auth: deleting token KffRLjRTqYGRztAq.418 for user conductor
2021-10-22 01:54:21.922797 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:54:23.418975 I | auth: deleting token AfAKpEfFfbhteRPp.423 for user conductor
2021-10-22 01:54:23.419047 I | auth: deleting token IdqFGPoEcqAspcHs.421 for user conductor
2021-10-22 01:54:25.018711 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.390690893s) to execute
2021-10-22 01:54:26.418948 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.398259726s) to execute
2021-10-22 01:54:26.419223 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.190175443s) to execute
2021-10-22 01:54:26.419372 I | auth: deleting token jxofRsFsEtAkqewO.427 for user conductor
2021-10-22 01:54:26.419405 I | auth: deleting token iteGSyxeXPhdCDyK.425 for user conductor
2021-10-22 01:54:26.419420 I | auth: deleting token TegmFUGwmHXKBZQh.426 for user conductor
2021-10-22 01:54:26.419428 I | auth: deleting token UQiEhrlLvqZIREdG.428 for user conductor
2021-10-22 01:54:26.419439 I | auth: deleting token KaROfXhFfcaqlZvF.424 for user conductor
2021-10-22 01:54:26.419466 I | auth: deleting token gYmggctGctZlAMvp.422 for user conductor
2021-10-22 01:54:26.923072 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 01:54:28.121013 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.602371103s) to execute
2021-10-22 01:54:29.419276 I | auth: deleting token uqLukRjMCkpqtVKL.430 for user conductor
2021-10-22 01:54:29.419317 I | auth: deleting token djUrdNTMIUsPQpSk.429 for user conductor
2021-10-22 01:54:29.419346 I | auth: deleting token HyXJQVAeUJpMSpjj.431 for user conductor
2021-10-22 01:54:30.022104 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.381085088s) to execute
2021-10-22 01:54:31.419248 I | auth: deleting token onDLJiwJsCCqjqBg.433 for user conductor
2021-10-22 01:54:31.419299 I | auth: deleting token URBTkDgFpVCUskTt.432 for user conductor
2021-10-22 01:54:31.524764 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.50098414s) to execute
2021-10-22 01:54:31.524936 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.306175223s) to execute
2021-10-22 01:54:31.923548 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:54:33.518579 I | auth: deleting token bsYuExdEseanqpNd.434 for user conductor
2021-10-22 01:54:33.518641 I | auth: deleting token SDMJrjxgIRTHjkTB.435 for user conductor
2021-10-22 01:54:34.419088 I | auth: deleting token qLOhVuBoiDizEGpl.436 for user conductor
2021-10-22 01:54:34.725774 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.197772448s) to execute
2021-10-22 01:54:36.419073 I | auth: deleting token tJaNtRmPCQOlUzdw.437 for user conductor
2021-10-22 01:54:36.828827 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (191.899322ms) to execute
2021-10-22 01:54:36.923842 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:54:37.419165 I | auth: deleting token LHeVAwcVCwWNmbDo.438 for user conductor
2021-10-22 01:54:38.423136 I | auth: deleting token RZpmLdJXweADdOUd.441 for user conductor
2021-10-22 01:54:38.423200 I | auth: deleting token eeOQpeywBLCLcnOB.440 for user conductor
2021-10-22 01:54:38.423218 I | auth: deleting token CuTvWelTbgRsauEE.439 for user conductor
2021-10-22 01:54:38.821329 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (288.91124ms) to execute
2021-10-22 01:54:41.924368 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:54:43.419056 I | auth: deleting token NPNpdVKIvSkeTXob.442 for user conductor
2021-10-22 01:54:43.419120 I | auth: deleting token qMpNvRrANWzWMOaT.444 for user conductor
2021-10-22 01:54:44.419000 I | auth: deleting token WjTtPvPknyQvvPxR.443 for user conductor
2021-10-22 01:54:44.419080 I | auth: deleting token tUoweQzrIUIxpXiF.445 for user conductor
2021-10-22 01:54:44.925063 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.30362164s) to execute
2021-10-22 01:54:46.419796 I | auth: deleting token hgsWADguURpctMPX.446 for user conductor
2021-10-22 01:54:46.419839 I | auth: deleting token JUIriMbksWUPBAMk.447 for user conductor
2021-10-22 01:54:46.419862 I | auth: deleting token TyQSomoROCdAdVie.448 for user conductor
2021-10-22 01:54:46.924654 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:54:48.021386 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.58872692s) to execute
2021-10-22 01:54:48.130072 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (106.85952ms) to execute
2021-10-22 01:54:48.418396 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (288.070412ms) to execute
2021-10-22 01:54:49.418986 I | auth: deleting token iNgDZGKfhzHkNpFt.450 for user conductor
2021-10-22 01:54:49.419046 I | auth: deleting token yUgakWXBKSBqUEoT.449 for user conductor
2021-10-22 01:54:49.419058 I | auth: deleting token yWxsympPCUFbMdAj.451 for user conductor
2021-10-22 01:54:50.418971 I | auth: deleting token jJuEYpbgGmoRmNcf.452 for user conductor
2021-10-22 01:54:51.625227 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.397480814s) to execute
2021-10-22 01:54:51.927152 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:54:52.418977 I | auth: deleting token GpTMvjXmWLNTmjXq.454 for user conductor
2021-10-22 01:54:52.419047 I | auth: deleting token fNVYvvBILbeQJgxK.453 for user conductor
2021-10-22 01:54:52.419060 I | auth: deleting token pCZpXKyMWisNwJmf.455 for user conductor
2021-10-22 01:54:53.326379 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (607.681047ms) to execute
2021-10-22 01:54:54.419142 I | auth: deleting token KgaKQRKvoHANQEMu.456 for user conductor
2021-10-22 01:54:54.419213 I | auth: deleting token CrqKdsQBzesVpilB.457 for user conductor
2021-10-22 01:54:54.823491 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.205089933s) to execute
2021-10-22 01:54:55.128411 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (302.848316ms) to execute
2021-10-22 01:54:56.419892 I | auth: deleting token nQEfZRduXBCQxqkO.458 for user conductor
2021-10-22 01:54:56.419947 I | auth: deleting token jonOTIwcHWZYFMaw.459 for user conductor
2021-10-22 01:54:56.824926 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (406.353322ms) to execute
2021-10-22 01:54:57.018252 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:54:57.420220 I | auth: deleting token pkKoexNKcDvXeecM.460 for user conductor
2021-10-22 01:55:00.226193 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.396252062s) to execute
2021-10-22 01:55:00.419102 I | auth: deleting token VbASXtXSonYeCrlh.463 for user conductor
2021-10-22 01:55:00.419167 I | auth: deleting token wLKlxvDDZcjOXhxs.462 for user conductor
2021-10-22 01:55:00.419181 I | auth: deleting token lTmAOvhrqoQDaUwS.461 for user conductor
2021-10-22 01:55:01.419130 I | auth: deleting token pPSIqAMulhATlqoV.464 for user conductor
2021-10-22 01:55:01.419166 I | auth: deleting token KiHAiTuFMcfVYGrh.465 for user conductor
2021-10-22 01:55:01.825691 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.497921726s) to execute
2021-10-22 01:55:02.019069 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:03.424282 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.137466731s) to execute
2021-10-22 01:55:03.424563 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.137491445s) to execute
2021-10-22 01:55:03.424728 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.504848075s) to execute
2021-10-22 01:55:03.424830 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.59663385s) to execute
2021-10-22 01:55:03.727975 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (209.377374ms) to execute
2021-10-22 01:55:04.419088 I | auth: deleting token tVQlTgJsxKJaWBau.466 for user conductor
2021-10-22 01:55:04.419148 I | auth: deleting token rlMLXZdUmWZJhxDt.468 for user conductor
2021-10-22 01:55:05.122720 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.501618711s) to execute
2021-10-22 01:55:07.019268 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:07.418983 I | auth: deleting token UbKzyREqYdtUVsdP.469 for user conductor
2021-10-22 01:55:07.518278 I | auth: deleting token MCRYiqgoAnAZDzrU.471 for user conductor
2021-10-22 01:55:07.518323 I | auth: deleting token DKmjUKjnyTiziMFA.472 for user conductor
2021-10-22 01:55:07.518334 I | auth: deleting token iMtkPQtLUdSABSzF.467 for user conductor
2021-10-22 01:55:07.518346 I | auth: deleting token NdBhHUMIcCNcdDAT.470 for user conductor
2021-10-22 01:55:08.320951 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.291146342s) to execute
2021-10-22 01:55:09.823646 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.395944169s) to execute
2021-10-22 01:55:09.918355 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.589900926s) to execute
2021-10-22 01:55:09.918524 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.589948443s) to execute
2021-10-22 01:55:10.028643 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (107.359273ms) to execute
2021-10-22 01:55:10.129270 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (108.071532ms) to execute
2021-10-22 01:55:10.420455 I | auth: deleting token FoylFqwxrhYrzjdW.473 for user conductor
2021-10-22 01:55:10.420512 I | auth: deleting token aRYzMeCSjKweUcXt.474 for user conductor
2021-10-22 01:55:11.419254 I | auth: deleting token pmghUfvnUxMViFFh.475 for user conductor
2021-10-22 01:55:12.027142 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:12.423134 I | auth: deleting token JRCNEcSrpcmmLPTx.476 for user conductor
2021-10-22 01:55:12.423205 I | auth: deleting token PYizXRKYfTXCMDxI.477 for user conductor
2021-10-22 01:55:13.419571 I | auth: deleting token uCjUwXGRRGiFJUfz.478 for user conductor
2021-10-22 01:55:15.419626 I | auth: deleting token lPiqTeJCxIuorcOY.479 for user conductor
2021-10-22 01:55:15.419668 I | auth: deleting token EVkefkewSfwDglnN.480 for user conductor
2021-10-22 01:55:16.424719 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (906.285819ms) to execute
2021-10-22 01:55:17.027338 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:17.419070 I | auth: deleting token GZUDpmbjCMRfgPFD.481 for user conductor
2021-10-22 01:55:17.419127 I | auth: deleting token wfpAFAYrjSxpLJQm.482 for user conductor
2021-10-22 01:55:18.122773 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.602459599s) to execute
2021-10-22 01:55:18.419252 I | auth: deleting token dcnESLvnNtSyGsJH.483 for user conductor
2021-10-22 01:55:19.419106 I | auth: deleting token dDorDossXLPabRAn.484 for user conductor
2021-10-22 01:55:20.419119 I | auth: deleting token IeAuimTNfaZtFyXi.485 for user conductor
2021-10-22 01:55:21.423126 I | auth: deleting token UhyhyMwGiHfLuWGs.486 for user conductor
2021-10-22 01:55:22.119045 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:22.619180 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.477671985s) to execute
2021-10-22 01:55:22.619517 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.401045891s) to execute
2021-10-22 01:55:22.730137 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (108.935381ms) to execute
2021-10-22 01:55:22.828269 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (206.501218ms) to execute
2021-10-22 01:55:22.828443 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (205.683696ms) to execute
2021-10-22 01:55:27.119378 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:27.419107 I | auth: deleting token ZUKmXsNfkIPAQgEh.489 for user conductor
2021-10-22 01:55:27.419149 I | auth: deleting token NtDSbMFPXpxpkjpT.488 for user conductor
2021-10-22 01:55:27.419166 I | auth: deleting token oDBnoINeavhsmVtC.491 for user conductor
2021-10-22 01:55:27.419176 I | auth: deleting token ERHlKehoTidoTQEq.490 for user conductor
2021-10-22 01:55:27.419189 I | auth: deleting token ZXIwgHuFCBJaAuwz.487 for user conductor
2021-10-22 01:55:29.321916 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.303144254s) to execute
2021-10-22 01:55:29.418956 I | auth: deleting token HgvYXueaXyqwUURK.493 for user conductor
2021-10-22 01:55:29.419018 I | auth: deleting token qgpAJNGGlITozqht.492 for user conductor
2021-10-22 01:55:30.418981 I | auth: deleting token NAqcLkYncRmjdmVQ.494 for user conductor
2021-10-22 01:55:30.822636 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.401248565s) to execute
2021-10-22 01:55:30.822781 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.404170627s) to execute
2021-10-22 01:55:32.119634 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:32.420320 I | auth: deleting token JhUZGLHWfcnriQPE.496 for user conductor
2021-10-22 01:55:32.420385 I | auth: deleting token OBwpAsnmMqRCDYDf.495 for user conductor
2021-10-22 01:55:33.419312 I | auth: deleting token WbkAyqgAmMElPQuY.497 for user conductor
2021-10-22 01:55:33.826189 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.898161077s) to execute
2021-10-22 01:55:33.826752 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.908170368s) to execute
2021-10-22 01:55:33.931057 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (102.565874ms) to execute
2021-10-22 01:55:34.018734 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.109759ms) to execute
2021-10-22 01:55:35.422339 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.48874927s) to execute
2021-10-22 01:55:36.419064 I | auth: deleting token BDuzGANyiiLaXXHn.498 for user conductor
2021-10-22 01:55:36.419126 I | auth: deleting token CVFTspMlnBhBgnMd.499 for user conductor
2021-10-22 01:55:37.120365 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:37.419078 I | auth: deleting token TDIkiNtfMKJtJcnH.500 for user conductor
2021-10-22 01:55:37.419138 I | auth: deleting token EBKxqRqpYVvqAily.501 for user conductor
2021-10-22 01:55:38.722186 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.193868518s) to execute
2021-10-22 01:55:39.419121 I | auth: deleting token DrlqCPhtSyGMWjcZ.502 for user conductor
2021-10-22 01:55:39.419177 I | auth: deleting token JguUBpYKciUQDQgp.503 for user conductor
2021-10-22 01:55:40.419061 I | auth: deleting token SrCvwQyZJvvtocfr.505 for user conductor
2021-10-22 01:55:40.419110 I | auth: deleting token gIcIGgSpQxBrGmPa.504 for user conductor
2021-10-22 01:55:41.622734 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.801470051s) to execute
2021-10-22 01:55:41.623046 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.898725488s) to execute
2021-10-22 01:55:41.623178 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.80459245s) to execute
2021-10-22 01:55:42.218278 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:42.419040 I | auth: deleting token VqcGHYnnTSyLHXBb.506 for user conductor
2021-10-22 01:55:43.122339 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.403743439s) to execute
2021-10-22 01:55:43.419102 I | auth: deleting token xLzCCLOABjXvVFRw.507 for user conductor
2021-10-22 01:55:44.523489 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.799140006s) to execute
2021-10-22 01:55:44.523615 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.393222132s) to execute
2021-10-22 01:55:45.419059 I | auth: deleting token AIIdeNRWzVOiDxds.510 for user conductor
2021-10-22 01:55:45.419200 I | auth: deleting token bEjvcsqCxLMSKEaj.509 for user conductor
2021-10-22 01:55:45.419265 I | auth: deleting token fsHTWsiTWyztstMD.508 for user conductor
2021-10-22 01:55:45.921282 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.393326542s) to execute
2021-10-22 01:55:45.921565 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.395261031s) to execute
2021-10-22 01:55:46.419054 I | auth: deleting token SZmYLdndNtMiOAWq.511 for user conductor
2021-10-22 01:55:47.218599 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:47.528615 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.597584017s) to execute
2021-10-22 01:55:47.528887 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (700.799827ms) to execute
2021-10-22 01:55:47.928142 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (196.455932ms) to execute
2021-10-22 01:55:48.419088 I | auth: deleting token tbRXwqwUbquwIvhz.513 for user conductor
2021-10-22 01:55:49.419130 I | auth: deleting token nHvxQpkFjfuUEVXG.512 for user conductor
2021-10-22 01:55:51.419019 I | auth: deleting token mqlNAlCupMmDbAhx.514 for user conductor
2021-10-22 01:55:51.419071 I | auth: deleting token ogqziJmnvXKzKzff.516 for user conductor
2021-10-22 01:55:51.419084 I | auth: deleting token WDuJbXnYhPzUVYFo.515 for user conductor
2021-10-22 01:55:51.625250 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.094661664s) to execute
2021-10-22 01:55:52.218853 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:53.522106 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.183594481s) to execute
2021-10-22 01:55:54.419778 I | auth: deleting token aHPerWJPigJYIzGi.517 for user conductor
2021-10-22 01:55:57.219355 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:55:58.222675 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.503979806s) to execute
2021-10-22 01:55:59.418991 I | auth: deleting token vYBhZrYaGEHOUmbG.520 for user conductor
2021-10-22 01:55:59.419051 I | auth: deleting token DOciWRjVoGcHBIXK.519 for user conductor
2021-10-22 01:55:59.419069 I | auth: deleting token UDFKomwxZesquoyM.518 for user conductor
2021-10-22 01:55:59.419079 I | auth: deleting token kgTLpanAlcQCshep.522 for user conductor
2021-10-22 01:55:59.419091 I | auth: deleting token IafRPnCackOTvkhK.521 for user conductor
2021-10-22 01:55:59.922661 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.60356452s) to execute
2021-10-22 01:55:59.922966 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.69712555s) to execute
2021-10-22 01:55:59.928663 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.610181303s) to execute
2021-10-22 01:55:59.928828 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.702473411s) to execute
2021-10-22 01:56:00.029524 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (103.993023ms) to execute
2021-10-22 01:56:00.128480 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (179.429061ms) to execute
2021-10-22 01:56:02.219589 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:02.419043 I | auth: deleting token ifPpPMDauYMzYoqZ.523 for user conductor
2021-10-22 01:56:02.419090 I | auth: deleting token bBrqyizwKoAbnmkJ.525 for user conductor
2021-10-22 01:56:02.419114 I | auth: deleting token yCGVljyqshrOwkfk.524 for user conductor
2021-10-22 01:56:02.923282 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.295519257s) to execute
2021-10-22 01:56:03.028381 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (103.026698ms) to execute
2021-10-22 01:56:03.419121 I | auth: deleting token JXmWBuFfBHnmaphm.526 for user conductor
2021-10-22 01:56:04.419031 I | auth: deleting token dkdujggTgmBjNhNP.527 for user conductor
2021-10-22 01:56:04.419177 I | auth: deleting token cjJmOVlnjQkLACLz.528 for user conductor
2021-10-22 01:56:05.419554 I | auth: deleting token uLiPJlxQeLzjlDrx.529 for user conductor
2021-10-22 01:56:05.419739 I | auth: deleting token cBJodshxsyJXkltQ.530 for user conductor
2021-10-22 01:56:05.927104 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.308567584s) to execute
2021-10-22 01:56:07.219864 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:07.419153 I | auth: deleting token GeFUalDzpvoNNEhT.531 for user conductor
2021-10-22 01:56:09.419088 I | auth: deleting token NaytgxHebXFYpePh.532 for user conductor
2021-10-22 01:56:10.419123 I | auth: deleting token OLKmydMaQVwEiGlR.533 for user conductor
2021-10-22 01:56:12.318511 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:12.419035 I | auth: deleting token kYGnEjruNfaTpcWk.534 for user conductor
2021-10-22 01:56:12.820943 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (601.043325ms) to execute
2021-10-22 01:56:14.327672 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.401166056s) to execute
2021-10-22 01:56:15.518332 I | auth: deleting token lncZQnexRXcgKywS.536 for user conductor
2021-10-22 01:56:15.518391 I | auth: deleting token DmLncdxaUXWeSyzr.535 for user conductor
2021-10-22 01:56:15.723793 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.20510749s) to execute
2021-10-22 01:56:15.724002 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.305647962s) to execute
2021-10-22 01:56:17.222606 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.391750267s) to execute
2021-10-22 01:56:17.319069 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:17.419092 I | auth: deleting token RTFGmjwuMbAPtymd.537 for user conductor
2021-10-22 01:56:17.419140 I | auth: deleting token TmbWbNtwkgpWQtvc.539 for user conductor
2021-10-22 01:56:17.419162 I | auth: deleting token yUinXPwHhmURclSu.538 for user conductor
2021-10-22 01:56:18.819342 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.291405936s) to execute
2021-10-22 01:56:20.226603 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.405394383s) to execute
2021-10-22 01:56:20.228192 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.200358128s) to execute
2021-10-22 01:56:20.419182 I | auth: deleting token FQbrGWavBDuPJNTs.540 for user conductor
2021-10-22 01:56:20.429742 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (199.315389ms) to execute
2021-10-22 01:56:21.418975 I | auth: deleting token PSoLqCcAaSrspDoK.543 for user conductor
2021-10-22 01:56:21.419093 I | auth: deleting token TsRQYBseyOIhaWJi.541 for user conductor
2021-10-22 01:56:21.419116 I | auth: deleting token WpUABTumymboWfdM.542 for user conductor
2021-10-22 01:56:21.419128 I | auth: deleting token cVOjfVuTyimpAGoF.544 for user conductor
2021-10-22 01:56:22.319360 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:23.419173 I | auth: deleting token TBOwouMIRlYFBdql.545 for user conductor
2021-10-22 01:56:23.423698 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.695881751s) to execute
2021-10-22 01:56:24.419148 I | auth: deleting token sAUokeabmcvIybJT.546 for user conductor
2021-10-22 01:56:25.419088 I | auth: deleting token FoQgNGFoBhaZkTVW.548 for user conductor
2021-10-22 01:56:25.419253 I | auth: deleting token ZDSOUGvjlNdTAKQH.547 for user conductor
2021-10-22 01:56:26.419344 I | auth: deleting token cVKgCTPeFeGvzYcC.549 for user conductor
2021-10-22 01:56:26.622258 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.19208853s) to execute
2021-10-22 01:56:26.622528 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.19669554s) to execute
2021-10-22 01:56:27.321481 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:28.120689 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.399792398s) to execute
2021-10-22 01:56:28.120952 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.496659686s) to execute
2021-10-22 01:56:28.123406 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.498692007s) to execute
2021-10-22 01:56:28.421619 I | auth: deleting token ayLERNRgAawTnYtr.550 for user conductor
2021-10-22 01:56:29.819689 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.601005757s) to execute
2021-10-22 01:56:29.819821 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.696404534s) to execute
2021-10-22 01:56:30.418991 I | auth: deleting token rpccoAULaFypWVep.552 for user conductor
2021-10-22 01:56:31.418993 I | auth: deleting token UXuHaKOyUiEtiaiT.551 for user conductor
2021-10-22 01:56:31.419049 I | auth: deleting token nEecQfLtmYpmAnix.553 for user conductor
2021-10-22 01:56:31.419057 I | auth: deleting token QVDgZctFAXuovRGd.554 for user conductor
2021-10-22 01:56:32.386592 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:32.820979 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.901052903s) to execute
2021-10-22 01:56:32.821139 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.302695814s) to execute
2021-10-22 01:56:32.821187 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.902404734s) to execute
2021-10-22 01:56:33.418988 I | auth: deleting token VeQrmliJzKQDORCE.556 for user conductor
2021-10-22 01:56:33.419049 I | auth: deleting token UeBOmVyDoXeSEeLu.555 for user conductor
2021-10-22 01:56:34.418966 I | auth: deleting token YERSkePhekXHOfYq.557 for user conductor
2021-10-22 01:56:34.522355 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.603354343s) to execute
2021-10-22 01:56:35.419130 I | auth: deleting token NGPLlcmXNBpHoTTD.558 for user conductor
2021-10-22 01:56:36.324306 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.69645308s) to execute
2021-10-22 01:56:36.419123 I | auth: deleting token hJGlXATUZbQMClwx.559 for user conductor
2021-10-22 01:56:36.419185 I | auth: deleting token wMscgUAUEtIxSYQC.560 for user conductor
2021-10-22 01:56:37.386843 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:37.419463 I | auth: deleting token dceLiRWKgtlZjIWs.561 for user conductor
2021-10-22 01:56:37.818587 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.399305629s) to execute
2021-10-22 01:56:37.818939 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.199943817s) to execute
2021-10-22 01:56:39.419091 I | auth: deleting token wXfoRZSwmtxgrISD.562 for user conductor
2021-10-22 01:56:39.919601 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.001152931s) to execute
2021-10-22 01:56:40.419063 I | auth: deleting token xmtWzZqWWpVPeqVg.563 for user conductor
2021-10-22 01:56:41.622561 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.492786554s) to execute
2021-10-22 01:56:42.418317 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:42.419114 I | auth: deleting token tQYtGwNsmwxklWzm.564 for user conductor
2021-10-22 01:56:43.322828 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.394998947s) to execute
2021-10-22 01:56:43.322953 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.591665658s) to execute
2021-10-22 01:56:44.419268 I | auth: deleting token CUlCTyDlJCFdPHNj.565 for user conductor
2021-10-22 01:56:46.419102 I | auth: deleting token pjqIwLPokpXjxQOp.566 for user conductor
2021-10-22 01:56:47.418711 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:47.418992 I | auth: deleting token ewVcfgnwRJktexOD.567 for user conductor
2021-10-22 01:56:48.419416 I | auth: deleting token esOBFYGDidaIqFKh.568 for user conductor
2021-10-22 01:56:48.721125 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.092797241s) to execute
2021-10-22 01:56:48.829766 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (105.701529ms) to execute
2021-10-22 01:56:48.929558 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (111.171733ms) to execute
2021-10-22 01:56:50.419202 I | auth: deleting token IiONaFQKEDPagfvM.569 for user conductor
2021-10-22 01:56:50.419280 I | auth: deleting token ThALayfNfdfhryQq.570 for user conductor
2021-10-22 01:56:52.321801 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.403203477s) to execute
2021-10-22 01:56:52.418938 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:52.419039 I | auth: deleting token jihzmGVZjjXjvyCq.572 for user conductor
2021-10-22 01:56:52.419064 I | auth: deleting token ZWXNWDTlxXGyPIQt.571 for user conductor
2021-10-22 01:56:52.529534 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (196.240464ms) to execute
2021-10-22 01:56:53.418935 I | auth: deleting token oJsoRYQTnZsQLYjC.573 for user conductor
2021-10-22 01:56:54.225676 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (707.011705ms) to execute
2021-10-22 01:56:54.419044 I | auth: deleting token HkQlMRvBYOwBRxRq.574 for user conductor
2021-10-22 01:56:55.819061 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.589707763s) to execute
2021-10-22 01:56:57.321471 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.499971522s) to execute
2021-10-22 01:56:57.321812 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.203213159s) to execute
2021-10-22 01:56:57.419255 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:56:57.420846 I | auth: deleting token wEKLoamxbuEASIPG.575 for user conductor
2021-10-22 01:56:57.428570 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (104.841879ms) to execute
2021-10-22 01:56:59.022803 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.394750336s) to execute
2021-10-22 01:56:59.419351 I | auth: deleting token EdPxjUMbrzRMUXOh.577 for user conductor
2021-10-22 01:57:00.419053 I | auth: deleting token nPFiJwxtqwCMLcuV.576 for user conductor
2021-10-22 01:57:00.419092 I | auth: deleting token JqRXZudJQUvvyjeF.580 for user conductor
2021-10-22 01:57:00.419101 I | auth: deleting token SdinJGePeZXrMAtU.578 for user conductor
2021-10-22 01:57:00.419110 I | auth: deleting token TVTDHWDRlnmTHieB.579 for user conductor
2021-10-22 01:57:00.624014 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.105505174s) to execute
2021-10-22 01:57:02.419495 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:03.419062 I | auth: deleting token BQhtAFtTRlFDLBuo.581 for user conductor
2021-10-22 01:57:03.419124 I | auth: deleting token cSMUCYeLglOjrqdZ.583 for user conductor
2021-10-22 01:57:03.419137 I | auth: deleting token wMvvwoHBmFRgzaoq.584 for user conductor
2021-10-22 01:57:03.419165 I | auth: deleting token izHOdSEtheOPrzTS.582 for user conductor
2021-10-22 01:57:04.419058 I | auth: deleting token vXhzRavECKLrSqOd.585 for user conductor
2021-10-22 01:57:06.419171 I | auth: deleting token JxtzFNMOQtHVeyna.586 for user conductor
2021-10-22 01:57:07.419832 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:08.419073 I | auth: deleting token IPJmNXEVsokPdvjB.587 for user conductor
2021-10-22 01:57:08.923900 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.296037966s) to execute
2021-10-22 01:57:09.419110 I | auth: deleting token vizqyelhQNgvtfTb.588 for user conductor
2021-10-22 01:57:10.619340 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.500911636s) to execute
2021-10-22 01:57:10.619431 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.692938422s) to execute
2021-10-22 01:57:12.523243 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.607393648s) to execute
2021-10-22 01:57:12.523353 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:14.122225 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.09442905s) to execute
2021-10-22 01:57:15.425687 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.197834442s) to execute
2021-10-22 01:57:15.425892 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.260089867s) to execute
2021-10-22 01:57:16.419508 I | auth: deleting token lCrDKaeWgSpfgnbg.590 for user conductor
2021-10-22 01:57:17.221560 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.50154869s) to execute
2021-10-22 01:57:17.221971 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.59899293s) to execute
2021-10-22 01:57:17.419078 I | auth: deleting token uIohDBmgOcxOsiOd.592 for user conductor
2021-10-22 01:57:17.419137 I | auth: deleting token nsZGIcapsQDjSpaP.593 for user conductor
2021-10-22 01:57:17.419157 I | auth: deleting token jgymZpsVqaZcInQB.591 for user conductor
2021-10-22 01:57:17.419180 I | auth: deleting token krUkdoOILwsejDAg.589 for user conductor
2021-10-22 01:57:17.523646 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:18.827630 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.499236839s) to execute
2021-10-22 01:57:18.828109 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.603687482s) to execute
2021-10-22 01:57:19.419020 I | auth: deleting token RDfUMvOuqXkXRHbX.594 for user conductor
2021-10-22 01:57:19.419068 I | auth: deleting token dFEURwXjDxHSpBOZ.595 for user conductor
2021-10-22 01:57:20.321522 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.2020636s) to execute
2021-10-22 01:57:21.719047 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.80038765s) to execute
2021-10-22 01:57:21.719189 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.200820458s) to execute
2021-10-22 01:57:22.419106 I | auth: deleting token MRrUCtjIVToTNJGG.598 for user conductor
2021-10-22 01:57:22.419142 I | auth: deleting token myRCDzqgOtZLthzi.596 for user conductor
2021-10-22 01:57:22.419160 I | auth: deleting token AtShyHTftSuFqbTh.597 for user conductor
2021-10-22 01:57:22.618247 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:23.320389 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.901572069s) to execute
2021-10-22 01:57:23.320536 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.598101916s) to execute
2021-10-22 01:57:23.320684 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.599098456s) to execute
2021-10-22 01:57:25.419052 I | auth: deleting token RgrblnrQWmFhozDl.602 for user conductor
2021-10-22 01:57:25.419113 I | auth: deleting token UAJBVKviuxqeBjsj.601 for user conductor
2021-10-22 01:57:25.419125 I | auth: deleting token jmgQdwutTQLbpkbm.599 for user conductor
2021-10-22 01:57:25.419134 I | auth: deleting token FrrRMGpUZIGpqPNy.600 for user conductor
2021-10-22 01:57:26.318917 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.900156032s) to execute
2021-10-22 01:57:26.419047 I | auth: deleting token KcOarinPHOPgWPub.603 for user conductor
2021-10-22 01:57:26.419095 I | auth: deleting token RXBcxepveWKSKhXb.604 for user conductor
2021-10-22 01:57:27.618533 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:28.119676 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.601144634s) to execute
2021-10-22 01:57:28.419268 I | auth: deleting token hKBUVcJuHdjDXbfR.605 for user conductor
2021-10-22 01:57:28.419332 I | auth: deleting token mpRJhJZSLuqPBvgs.606 for user conductor
2021-10-22 01:57:29.419579 I | auth: deleting token xFBdlzijXGxpKGat.607 for user conductor
2021-10-22 01:57:29.721881 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.598904861s) to execute
2021-10-22 01:57:29.722154 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.599211549s) to execute
2021-10-22 01:57:29.722303 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.4037779s) to execute
2021-10-22 01:57:29.828547 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (103.780605ms) to execute
2021-10-22 01:57:29.929652 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (194.352413ms) to execute
2021-10-22 01:57:32.618987 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:33.423114 I | auth: deleting token pCVIphKklYUwEMUS.611 for user conductor
2021-10-22 01:57:33.423151 I | auth: deleting token pZiAvRirPdQwpORR.609 for user conductor
2021-10-22 01:57:34.419051 I | auth: deleting token FVeWUzIPQkCkzUYi.610 for user conductor
2021-10-22 01:57:34.419109 I | auth: deleting token sdkLnGMFvklonWHg.608 for user conductor
2021-10-22 01:57:34.419122 I | auth: deleting token CSwtXOGCqeXkJqJg.612 for user conductor
2021-10-22 01:57:34.720141 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.192547278s) to execute
2021-10-22 01:57:34.828285 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (105.365496ms) to execute
2021-10-22 01:57:34.927998 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (204.805053ms) to execute
2021-10-22 01:57:34.929703 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.064056ms) to execute
2021-10-22 01:57:37.619696 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:38.120780 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.293190035s) to execute
2021-10-22 01:57:38.419093 I | auth: deleting token mtLhKOSLHRscCHcL.616 for user conductor
2021-10-22 01:57:38.419169 I | auth: deleting token gLFqzgbyDcnemlWj.617 for user conductor
2021-10-22 01:57:38.419189 I | auth: deleting token UhVKnqJShBxThETx.615 for user conductor
2021-10-22 01:57:38.419199 I | auth: deleting token TotlsVenJPUEpgBv.613 for user conductor
2021-10-22 01:57:38.419210 I | auth: deleting token oqVNcDwBPxCwiFQt.614 for user conductor
2021-10-22 01:57:41.419140 I | auth: deleting token cFRzQCieKcETvFaS.618 for user conductor
2021-10-22 01:57:41.419197 I | auth: deleting token YKkBMCWRxUiqqpWO.620 for user conductor
2021-10-22 01:57:41.419227 I | auth: deleting token FxPnpSdUIsElgusr.619 for user conductor
2021-10-22 01:57:42.419029 I | auth: deleting token TauSVAlFYtxGmOjz.621 for user conductor
2021-10-22 01:57:42.619910 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:43.419050 I | auth: deleting token ZLkwgLXebZekNCpK.622 for user conductor
2021-10-22 01:57:44.319529 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.198890149s) to execute
2021-10-22 01:57:45.419291 I | auth: deleting token tHFPIhrRzmriHezl.623 for user conductor
2021-10-22 01:57:46.419452 I | auth: deleting token auaOzjPlNthjHtte.624 for user conductor
2021-10-22 01:57:47.620327 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:49.421493 I | auth: deleting token lSngWOdSYtgOwIjN.627 for user conductor
2021-10-22 01:57:49.421565 I | auth: deleting token kXvqtOIpHjIzggDi.625 for user conductor
2021-10-22 01:57:49.421670 I | auth: deleting token gDxUAAVBzuSmjTTR.626 for user conductor
2021-10-22 01:57:51.419056 I | auth: deleting token yQrvYLYztGJihCzG.628 for user conductor
2021-10-22 01:57:51.419141 I | auth: deleting token hifOpInSZGccaAsN.629 for user conductor
2021-10-22 01:57:52.620656 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:53.120189 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (6.49663156s) to execute
2021-10-22 01:57:53.418983 I | auth: deleting token MRmtCqLmcmJVQIhU.631 for user conductor
2021-10-22 01:57:53.419052 I | auth: deleting token ColsJafCpkCrjgvf.630 for user conductor
2021-10-22 01:57:54.424664 I | auth: deleting token CeCuUidecUKVnhxG.632 for user conductor
2021-10-22 01:57:55.419063 I | auth: deleting token JFVdevGJNQnLgkPf.633 for user conductor
2021-10-22 01:57:56.519159 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.490801998s) to execute
2021-10-22 01:57:56.627834 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (102.551079ms) to execute
2021-10-22 01:57:57.419045 I | auth: deleting token UfHespkozdPZAMUT.634 for user conductor
2021-10-22 01:57:57.620936 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:57:58.123669 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (690.86924ms) to execute
2021-10-22 01:57:58.419162 I | auth: deleting token osZMTvoiKtadMzYn.635 for user conductor
2021-10-22 01:57:59.524598 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.196157166s) to execute
2021-10-22 01:58:00.418950 I | auth: deleting token lEwpCEcCmOLJSxrM.636 for user conductor
2021-10-22 01:58:01.322317 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.792279675s) to execute
2021-10-22 01:58:01.322378 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.688085079s) to execute
2021-10-22 01:58:02.421151 I | auth: deleting token yHsSrFDzhAdFAUzL.637 for user conductor
2021-10-22 01:58:02.621143 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:03.023938 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.602503687s) to execute
2021-10-22 01:58:03.418999 I | auth: deleting token wBEIVHKNBKncZthM.638 for user conductor
2021-10-22 01:58:04.626285 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.496177556s) to execute
2021-10-22 01:58:04.626612 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.308010405s) to execute
2021-10-22 01:58:05.419178 I | auth: deleting token QjgSFrGvYfjUPIjC.639 for user conductor
2021-10-22 01:58:06.120567 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.391428993s) to execute
2021-10-22 01:58:07.419085 I | auth: deleting token tBXwrLnoNAcrugSH.640 for user conductor
2021-10-22 01:58:07.718307 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:07.719116 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.595372021s) to execute
2021-10-22 01:58:07.720572 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.597038855s) to execute
2021-10-22 01:58:08.419265 I | auth: deleting token LpZcGheDOBlWUESa.641 for user conductor
2021-10-22 01:58:11.218980 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.390518647s) to execute
2021-10-22 01:58:12.418955 I | auth: deleting token HtFLQHIYBwswuOCn.646 for user conductor
2021-10-22 01:58:12.419045 I | auth: deleting token vgcLFrWhtPHrqVyv.643 for user conductor
2021-10-22 01:58:12.419062 I | auth: deleting token VaYuvCEqcByNchxP.645 for user conductor
2021-10-22 01:58:12.419079 I | auth: deleting token VhnCUSUQOBjArRcS.642 for user conductor
2021-10-22 01:58:12.419090 I | auth: deleting token sAPCGpYDkRMfQMgd.644 for user conductor
2021-10-22 01:58:12.718604 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:12.723277 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (691.765541ms) to execute
2021-10-22 01:58:15.419088 I | auth: deleting token nygVeLLghEKLuxCT.647 for user conductor
2021-10-22 01:58:15.419158 I | auth: deleting token PqQgBPqxDSVmiiti.648 for user conductor
2021-10-22 01:58:17.419089 I | auth: deleting token EKpeTMxtBbQeWVUI.650 for user conductor
2021-10-22 01:58:17.419201 I | auth: deleting token QwsRFxauwHCnbuyF.651 for user conductor
2021-10-22 01:58:17.419220 I | auth: deleting token oyTiRCrYUHpoEtRR.649 for user conductor
2021-10-22 01:58:17.718952 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:18.419943 I | auth: deleting token EWaAJxREbtGEzFBA.652 for user conductor
2021-10-22 01:58:20.019946 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.289610736s) to execute
2021-10-22 01:58:21.521981 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.303371607s) to execute
2021-10-22 01:58:21.522394 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.499491532s) to execute
2021-10-22 01:58:22.418982 I | auth: deleting token lYBkoroCeKMrNcRB.653 for user conductor
2021-10-22 01:58:22.419052 I | auth: deleting token ICDACDABcziogudn.657 for user conductor
2021-10-22 01:58:22.419070 I | auth: deleting token ceaWCaBAZJhrHPoi.654 for user conductor
2021-10-22 01:58:22.419081 I | auth: deleting token HfXUrqyVzRsPGiQP.655 for user conductor
2021-10-22 01:58:22.419090 I | auth: deleting token WeYytQKryRPmtXPQ.656 for user conductor
2021-10-22 01:58:22.719193 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:23.222739 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.592020018s) to execute
2021-10-22 01:58:24.722801 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.394800191s) to execute
2021-10-22 01:58:26.419180 I | auth: deleting token PjHJquBeGPLXtxks.661 for user conductor
2021-10-22 01:58:26.419302 I | auth: deleting token WmxePZImKjIMtblA.658 for user conductor
2021-10-22 01:58:26.424493 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.60596512s) to execute
2021-10-22 01:58:26.424641 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.700304465s) to execute
2021-10-22 01:58:27.418992 I | auth: deleting token fDfayCdxWpYmZjQd.663 for user conductor
2021-10-22 01:58:27.419048 I | auth: deleting token TWMIyOdyzPlXCwDq.664 for user conductor
2021-10-22 01:58:27.419057 I | auth: deleting token pqhQToYbebdIPqlM.659 for user conductor
2021-10-22 01:58:27.419067 I | auth: deleting token fnEPKETFMCFTZypU.662 for user conductor
2021-10-22 01:58:27.419075 I | auth: deleting token ZeYhdtQqwBxaBjzM.660 for user conductor
2021-10-22 01:58:27.719750 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:27.923739 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.497249123s) to execute
2021-10-22 01:58:27.923833 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.305382649s) to execute
2021-10-22 01:58:28.028734 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (101.563899ms) to execute
2021-10-22 01:58:29.418981 I | auth: deleting token mjUakSavxTaADfwp.665 for user conductor
2021-10-22 01:58:30.419080 I | auth: deleting token QQXvMvBfZpLPPioP.666 for user conductor
2021-10-22 01:58:32.218331 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.885756894s) to execute
2021-10-22 01:58:32.418986 I | auth: deleting token ymEkOcdJtrxnBbPB.667 for user conductor
2021-10-22 01:58:32.720003 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:33.419088 I | auth: deleting token iUdBNjRzwCBPKeBJ.668 for user conductor
2021-10-22 01:58:33.623167 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.399801648s) to execute
2021-10-22 01:58:33.623349 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.290056753s) to execute
2021-10-22 01:58:34.419186 I | auth: deleting token TLqJnrmJMTkCLjSf.671 for user conductor
2021-10-22 01:58:34.419234 I | auth: deleting token cifwvIJpbXFAONMR.670 for user conductor
2021-10-22 01:58:34.419261 I | auth: deleting token MCWCWshHvpkutPBD.669 for user conductor
2021-10-22 01:58:35.221368 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.499885877s) to execute
2021-10-22 01:58:36.518200 I | auth: deleting token LLXIASmxLKskLYrS.672 for user conductor
2021-10-22 01:58:36.518295 I | auth: deleting token nFptVslwCbUaYclu.673 for user conductor
2021-10-22 01:58:36.918888 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.500442712s) to execute
2021-10-22 01:58:37.720254 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:38.323098 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.303943437s) to execute
2021-10-22 01:58:38.323378 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.300046073s) to execute
2021-10-22 01:58:38.419236 I | auth: deleting token QfPzvqyNPHpkwOfv.675 for user conductor
2021-10-22 01:58:38.419313 I | auth: deleting token DHSFIcUtMHYJujhI.674 for user conductor
2021-10-22 01:58:40.419235 I | auth: deleting token oBeutJEDcWwiPQaq.677 for user conductor
2021-10-22 01:58:40.419296 I | auth: deleting token SuOqyrJNJbDwrwGc.676 for user conductor
2021-10-22 01:58:41.419512 I | auth: deleting token KuqYRxsFlCpSZWpc.678 for user conductor
2021-10-22 01:58:41.718491 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.990543585s) to execute
2021-10-22 01:58:42.720603 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:43.322361 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.494335102s) to execute
2021-10-22 01:58:43.322492 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.600939122s) to execute
2021-10-22 01:58:43.519024 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (177.748093ms) to execute
2021-10-22 01:58:44.419109 I | auth: deleting token ENjTqsetBTUGEsxp.679 for user conductor
2021-10-22 01:58:44.419177 I | auth: deleting token NAKdZSVnPNuyWhLA.680 for user conductor
2021-10-22 01:58:44.419194 I | auth: deleting token rpchggsAKeGUUhjb.682 for user conductor
2021-10-22 01:58:44.419218 I | auth: deleting token KKdcPyYJKKBKBtUm.681 for user conductor
2021-10-22 01:58:45.218736 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.700291047s) to execute
2021-10-22 01:58:46.822992 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.295131634s) to execute
2021-10-22 01:58:47.419063 I | auth: deleting token iEAlvoHXDhdjtzsH.685 for user conductor
2021-10-22 01:58:47.419126 I | auth: deleting token lOJGwZMODeQfZMdm.684 for user conductor
2021-10-22 01:58:47.419138 I | auth: deleting token fXAfypcUEJdsRutw.686 for user conductor
2021-10-22 01:58:47.419167 I | auth: deleting token OfxlDtWOEQJeTRBg.683 for user conductor
2021-10-22 01:58:47.720868 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:49.419092 I | auth: deleting token eRYCAfiaoMENzyWg.687 for user conductor
2021-10-22 01:58:49.927304 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.908807064s) to execute
2021-10-22 01:58:49.928020 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.009601518s) to execute
2021-10-22 01:58:50.419186 I | auth: deleting token LxleKmrIvEMEUsOr.688 for user conductor
2021-10-22 01:58:51.419156 I | auth: deleting token oCodlfGzUbwsGzKV.689 for user conductor
2021-10-22 01:58:51.419216 I | auth: deleting token xHJefGupmgWmQEmZ.690 for user conductor
2021-10-22 01:58:52.721118 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:53.925863 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.107248711s) to execute
2021-10-22 01:58:54.419255 I | auth: deleting token ooFTzmUvJoBXsesD.691 for user conductor
2021-10-22 01:58:55.521329 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (793.60665ms) to execute
2021-10-22 01:58:55.628963 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (101.423742ms) to execute
2021-10-22 01:58:57.122309 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (594.395952ms) to execute
2021-10-22 01:58:57.721393 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:58:58.427121 I | auth: deleting token dheLRzluKZKVtGmA.694 for user conductor
2021-10-22 01:58:58.427159 I | auth: deleting token MRNFwfsvldzvRmod.696 for user conductor
2021-10-22 01:58:58.427420 I | auth: deleting token HHDgjLUoqBzXBrzY.692 for user conductor
2021-10-22 01:58:58.427447 I | auth: deleting token EzgQAVRPijQGStHU.693 for user conductor
2021-10-22 01:58:58.427490 I | auth: deleting token iraBWbGvszzuTnuy.695 for user conductor
2021-10-22 01:59:00.419115 I | auth: deleting token eYorPsjSPCKRNVPX.698 for user conductor
2021-10-22 01:59:00.419175 I | auth: deleting token MyWIcfZhMarkUIZR.697 for user conductor
2021-10-22 01:59:00.419199 I | auth: deleting token kAGnLPnSJqCfehpb.699 for user conductor
2021-10-22 01:59:00.920905 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.400557661s) to execute
2021-10-22 01:59:02.518971 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.50049242s) to execute
2021-10-22 01:59:02.519203 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.595934084s) to execute
2021-10-22 01:59:02.628286 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (107.078532ms) to execute
2021-10-22 01:59:02.721660 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:03.419037 I | auth: deleting token EihLNIFlAZgaLXzK.701 for user conductor
2021-10-22 01:59:04.222586 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (994.734237ms) to execute
2021-10-22 01:59:04.419067 I | auth: deleting token SMhkiaLCyQfDbPZT.700 for user conductor
2021-10-22 01:59:05.419234 I | auth: deleting token cRBxlBqLjoeybzGC.702 for user conductor
2021-10-22 01:59:05.419288 I | auth: deleting token evEIaUweQsAmIhUp.703 for user conductor
2021-10-22 01:59:05.419299 I | auth: deleting token GGoxOKlBHoItwgeP.704 for user conductor
2021-10-22 01:59:06.419068 I | auth: deleting token jpgZRdStVFgprYDt.705 for user conductor
2021-10-22 01:59:06.419134 I | auth: deleting token HTtyPYlxOUywcvYb.706 for user conductor
2021-10-22 01:59:07.721976 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:08.419334 I | auth: deleting token NBbxQyJADKNCbdSx.707 for user conductor
2021-10-22 01:59:09.419177 I | auth: deleting token ktvJXaIAoZReaaDO.708 for user conductor
2021-10-22 01:59:09.419231 I | auth: deleting token cZogiXGxmtYfBxqM.709 for user conductor
2021-10-22 01:59:11.419112 I | auth: deleting token FUGhAeAFmgmAIpbd.710 for user conductor
2021-10-22 01:59:11.419153 I | auth: deleting token wLLshgrwFUGqXuSW.712 for user conductor
2021-10-22 01:59:11.419166 I | auth: deleting token IlkuLoawrOxjCooB.711 for user conductor
2021-10-22 01:59:12.723047 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:14.226231 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.098239539s) to execute
2021-10-22 01:59:14.418898 I | auth: deleting token PbftvPZYmbyTXCcj.713 for user conductor
2021-10-22 01:59:14.418963 I | auth: deleting token XZLpbUIETpdrgHPb.715 for user conductor
2021-10-22 01:59:14.419019 I | auth: deleting token yYETTzszyUKFXuzr.714 for user conductor
2021-10-22 01:59:15.432574 I | auth: deleting token GYfAKBclcGWkttYJ.716 for user conductor
2021-10-22 01:59:15.919276 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (791.003481ms) to execute
2021-10-22 01:59:16.231773 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (305.487905ms) to execute
2021-10-22 01:59:17.419385 I | auth: deleting token CjdcKuuKeduWJKeC.717 for user conductor
2021-10-22 01:59:17.723265 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:19.419026 I | auth: deleting token gVrgkWncTVwuRSiX.718 for user conductor
2021-10-22 01:59:20.419069 I | auth: deleting token FQDuZlyGjHNYRQvq.719 for user conductor
2021-10-22 01:59:20.422327 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.491491441s) to execute
2021-10-22 01:59:22.419044 I | auth: deleting token nWCuOvKEgWmUrSLL.720 for user conductor
2021-10-22 01:59:22.723514 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:23.320029 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.701493803s) to execute
2021-10-22 01:59:24.619537 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.299231785s) to execute
2021-10-22 01:59:24.619872 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.297986636s) to execute
2021-10-22 01:59:24.727848 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.40559443s) to execute
2021-10-22 01:59:24.729830 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (108.133099ms) to execute
2021-10-22 01:59:25.419064 I | auth: deleting token byfkUvSovUhltxQq.721 for user conductor
2021-10-22 01:59:25.419099 I | auth: deleting token RbiQUAFNDYZYpKJx.722 for user conductor
2021-10-22 01:59:27.220827 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (402.430532ms) to execute
2021-10-22 01:59:27.419092 I | auth: deleting token WcNEiarYdDToZkZd.725 for user conductor
2021-10-22 01:59:27.419153 I | auth: deleting token OXMaaxtDTIdafrfN.724 for user conductor
2021-10-22 01:59:27.419191 I | auth: deleting token ATWKiDCocfESsKQw.723 for user conductor
2021-10-22 01:59:27.723892 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:28.919093 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (583.841419ms) to execute
2021-10-22 01:59:30.419357 I | auth: deleting token UVWeUMVhyCTPugSu.728 for user conductor
2021-10-22 01:59:30.419417 I | auth: deleting token qjizxyllQvjgKgTx.727 for user conductor
2021-10-22 01:59:30.419433 I | auth: deleting token qDNyWbekoAHetnmw.726 for user conductor
2021-10-22 01:59:30.523901 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.593975404s) to execute
2021-10-22 01:59:30.729506 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (107.052185ms) to execute
2021-10-22 01:59:32.419169 I | auth: deleting token fktsTRFUJaPUByKI.729 for user conductor
2021-10-22 01:59:32.419264 I | auth: deleting token WdUUaLGAzXpjmtui.731 for user conductor
2021-10-22 01:59:32.419298 I | auth: deleting token rrjxOBRryEQPZRri.730 for user conductor
2021-10-22 01:59:32.520684 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (292.701964ms) to execute
2021-10-22 01:59:32.724380 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:34.021254 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (290.077163ms) to execute
2021-10-22 01:59:34.227971 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.547437ms) to execute
2021-10-22 01:59:35.419058 I | auth: deleting token utzUirdSRMgxotCB.733 for user conductor
2021-10-22 01:59:35.419118 I | auth: deleting token dCiTlqjVXJIHyWmK.734 for user conductor
2021-10-22 01:59:35.419145 I | auth: deleting token JAlmgXnthjHUODOX.732 for user conductor
2021-10-22 01:59:35.919603 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (282.190647ms) to execute
2021-10-22 01:59:37.419250 I | auth: deleting token oepDVVLrbOhkWYaf.735 for user conductor
2021-10-22 01:59:37.419318 I | auth: deleting token fWGLNcCPbGObiUFU.736 for user conductor
2021-10-22 01:59:37.724665 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:39.419198 I | auth: deleting token ApBbKHWTpQTdEaXg.737 for user conductor
2021-10-22 01:59:39.419272 I | auth: deleting token axYdjnuiQrUnqIdw.738 for user conductor
2021-10-22 01:59:42.724938 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:45.122954 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.704224157s) to execute
2021-10-22 01:59:45.419093 I | auth: deleting token ebPCTXwUzzniKrso.742 for user conductor
2021-10-22 01:59:45.419164 I | auth: deleting token cDRmBZYKKsiEBvHf.744 for user conductor
2021-10-22 01:59:45.419179 I | auth: deleting token oYAZIEAcCQIwsLDI.743 for user conductor
2021-10-22 01:59:45.419191 I | auth: deleting token MfbQmvTSCjYMJbYZ.740 for user conductor
2021-10-22 01:59:45.419198 I | auth: deleting token aBbjUqJHrSHkytOO.741 for user conductor
2021-10-22 01:59:45.419216 I | auth: deleting token djPkEcEIWvTJiuRY.739 for user conductor
2021-10-22 01:59:47.725200 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:48.419724 I | auth: deleting token EbTlgJzzEcPQpxdu.747 for user conductor
2021-10-22 01:59:48.419782 I | auth: deleting token ABRnNIglFCWzeBoH.745 for user conductor
2021-10-22 01:59:48.419796 I | auth: deleting token cjRkcrwAcQygrEIB.746 for user conductor
2021-10-22 01:59:48.419808 I | auth: deleting token qFKLMzyabNWqbStj.748 for user conductor
2021-10-22 01:59:50.124910 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.195264781s) to execute
2021-10-22 01:59:50.228886 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (102.139062ms) to execute
2021-10-22 01:59:50.328919 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (107.021864ms) to execute
2021-10-22 01:59:52.419240 I | auth: deleting token ICMnPApPaaXCUusB.751 for user conductor
2021-10-22 01:59:52.419309 I | auth: deleting token IEoINnJrkZMunBlU.749 for user conductor
2021-10-22 01:59:52.419431 I | auth: deleting token qByeccBtomQPMxPn.750 for user conductor
2021-10-22 01:59:52.818352 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 01:59:53.419020 I | auth: deleting token emTLSDNhoHtMFCHp.752 for user conductor
2021-10-22 01:59:55.119535 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.100942429s) to execute
2021-10-22 01:59:55.418996 I | auth: deleting token rLgnGsJdgrMXkELW.755 for user conductor
2021-10-22 01:59:55.419165 I | auth: deleting token cCmRaQddGWDDjqOp.754 for user conductor
2021-10-22 01:59:55.419178 I | auth: deleting token YBWBLOIFjPwOWfDn.753 for user conductor
2021-10-22 01:59:56.721236 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.598121942s) to execute
2021-10-22 01:59:56.721418 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.600057248s) to execute
2021-10-22 01:59:56.832753 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.711053423s) to execute
2021-10-22 01:59:56.928491 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (205.459409ms) to execute
2021-10-22 01:59:57.027587 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (189.324747ms) to execute
2021-10-22 01:59:57.419033 I | auth: deleting token gvxoswIuCORQgHWK.756 for user conductor
2021-10-22 01:59:57.818847 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:00:00.827546 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.099160219s) to execute
2021-10-22 02:00:02.419102 I | auth: deleting token HhSesKdTUXpmMRlr.757 for user conductor
2021-10-22 02:00:02.419163 I | auth: deleting token EPVtIVoXadECPQkc.758 for user conductor
2021-10-22 02:00:02.521226 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.09333723s) to execute
2021-10-22 02:00:02.819169 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:00:04.321462 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.002886461s) to execute
2021-10-22 02:00:04.419190 I | auth: deleting token lifHfAAKGTXRbUpR.759 for user conductor
2021-10-22 02:00:04.419304 I | auth: deleting token eObzJwKfkGDtqBjU.760 for user conductor
2021-10-22 02:00:04.419334 I | auth: deleting token bCjJSdyRMcaZUUKY.761 for user conductor
2021-10-22 02:00:06.120545 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.401981768s) to execute
2021-10-22 02:00:07.819417 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:00:08.419233 I | auth: deleting token lEUkMiGIWyoPRDiT.762 for user conductor
2021-10-22 02:00:09.225927 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.004882842s) to execute
2021-10-22 02:00:09.318318 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.099596692s) to execute
2021-10-22 02:00:10.419062 I | auth: deleting token UCFtMysSloaZzpTK.763 for user conductor
2021-10-22 02:00:10.419093 I | auth: deleting token KwNhqIGpCBmCbuTU.766 for user conductor
2021-10-22 02:00:10.419106 I | auth: deleting token mazEHgdXGlzDMDsA.765 for user conductor
2021-10-22 02:00:10.419115 I | auth: deleting token DtAtfJYRvFXjbAcq.764 for user conductor
2021-10-22 02:00:10.419126 I | auth: deleting token imFRdDeWtLPxUUen.767 for user conductor
2021-10-22 02:00:10.925626 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.593229735s) to execute
2021-10-22 02:00:11.421327 I | auth: deleting token PEJBYierODtNKTQE.768 for user conductor
2021-10-22 02:00:12.423552 I | auth: deleting token IoLdqaNwQiMctNAM.770 for user conductor
2021-10-22 02:00:12.423592 I | auth: deleting token ZuujnfNbkIFcEIzR.769 for user conductor
2021-10-22 02:00:12.626338 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.207938357s) to execute
2021-10-22 02:00:12.626505 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.5986818s) to execute
2021-10-22 02:00:12.819657 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:00:14.419045 I | auth: deleting token kaSzFrbhPDxkePqm.771 for user conductor
2021-10-22 02:00:14.419085 I | auth: deleting token UkxiJuDjsoMOwCmA.772 for user conductor
2021-10-22 02:00:15.922984 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.194539189s) to execute
2021-10-22 02:00:16.018838 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.300396904s) to execute
2021-10-22 02:00:17.419054 I | auth: deleting token fTdPbbZytRsuFNzP.773 for user conductor
2021-10-22 02:00:17.518575 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.497860396s) to execute
2021-10-22 02:00:17.518690 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.497186337s) to execute
2021-10-22 02:00:17.518871 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.497102736s) to execute
2021-10-22 02:00:17.819886 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:00:20.320986 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (993.08212ms) to execute
2021-10-22 02:00:20.727949 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (107.039038ms) to execute
2021-10-22 02:00:22.220934 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.19291094s) to execute
2021-10-22 02:00:22.820303 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:00:23.419108 I | auth: deleting token HbCEHAMrdBTZewkl.778 for user conductor
2021-10-22 02:00:23.419155 I | auth: deleting token OqgISDcqdcEXqqEw.774 for user conductor
2021-10-22 02:00:23.419169 I | auth: deleting token IOCCUBoayRJCfhod.775 for user conductor
2021-10-22 02:00:23.419175 I | auth: deleting token CLWQbJgqywcDmKoW.776 for user conductor
2021-10-22 02:00:23.419180 I | auth: deleting token EITYzYEXCMIlQHVQ.777 for user conductor
2021-10-22 02:00:24.819734 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (388.85965ms) to execute
2021-10-22 02:00:25.419065 I | auth: deleting token MFDcoveNDfUpximM.780 for user conductor
2021-10-22 02:00:25.419132 I | auth: deleting token yJmBkQSnUtYkpQiV.779 for user conductor
2021-10-22 02:00:26.121826 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.093845531s) to execute
2021-10-22 02:00:26.419071 I | auth: deleting token KDOpZSwygNqkOGCH.781 for user conductor
2021-10-22 02:00:26.419125 I | auth: deleting token pqdPwARtrmTiIUIc.782 for user conductor
2021-10-22 02:00:27.524046 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.296352414s) to execute
2021-10-22 02:00:27.820585 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:00:29.224411 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (3.005845589s) to execute
2021-10-22 02:00:29.224921 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.596525151s) to execute
2021-10-22 02:00:29.225185 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.606795651s) to execute
2021-10-22 02:00:29.419083 I | auth: deleting token jDmMOmCuJHNdwNAf.784 for user conductor
2021-10-22 02:00:31.419045 I | auth: deleting token ItzQmXJYFBmgirbu.783 for user conductor
2021-10-22 02:00:32.522450 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.191866351s) to execute
2021-10-22 02:00:32.820876 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:00:34.024235 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.395099531s) to execute
2021-10-22 02:00:34.419125 I | auth: deleting token KtHATGehwIYgqOxT.785 for user conductor
2021-10-22 02:00:34.419189 I | auth: deleting token UOrqvKIfdmLiVYOH.786 for user conductor
2021-10-22 02:00:34.419202 I | auth: deleting token RcVaohEXuGomZGAP.789 for user conductor
2021-10-22 02:00:34.419214 I | auth: deleting token mfjEUBezfpcYeIpE.788 for user conductor
2021-10-22 02:00:34.419224 I | auth: deleting token CBkUoPpOocduiKen.787 for user conductor
2021-10-22 02:00:35.725161 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.596861164s) to execute
2021-10-22 02:00:35.725312 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.606856566s) to execute
2021-10-22 02:00:37.418877 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.300404315s) to execute
2021-10-22 02:00:37.419320 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.400881711s) to execute
2021-10-22 02:00:37.419532 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.600835693s) to execute
2021-10-22 02:00:37.821082 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:00:39.419198 I | auth: deleting token CXqUBFqgZgOKFvHb.790 for user conductor
2021-10-22 02:00:40.921964 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.500299909s) to execute
2021-10-22 02:00:40.922214 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.481133907s) to execute
2021-10-22 02:00:40.922385 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.491715607s) to execute
2021-10-22 02:00:42.320408 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.301783138s) to execute
2021-10-22 02:00:42.418995 I | auth: deleting token QhMKsNKjLgVKcwTm.795 for user conductor
2021-10-22 02:00:42.419080 I | auth: deleting token jCXPqRLUyWReObLT.793 for user conductor
2021-10-22 02:00:42.419092 I | auth: deleting token ctHBRqqIAkJdgQrP.791 for user conductor
2021-10-22 02:00:42.419109 I | auth: deleting token DQKFOlIimVFpOqPq.792 for user conductor
2021-10-22 02:00:42.419119 I | auth: deleting token nZxlBGDQGtRaJsNG.794 for user conductor
2021-10-22 02:00:42.821338 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:00:45.319534 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.191239403s) to execute
2021-10-22 02:00:45.529308 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (207.161496ms) to execute
2021-10-22 02:00:46.419083 I | auth: deleting token WxiGgfJQoKDHQafa.797 for user conductor
2021-10-22 02:00:46.419144 I | auth: deleting token WWiciGQRIWhHoQal.798 for user conductor
2021-10-22 02:00:46.419157 I | auth: deleting token UtNSZRkvzLMhIhBe.799 for user conductor
2021-10-22 02:00:46.419176 I | auth: deleting token jKKfYnfusYzkJkZZ.796 for user conductor
2021-10-22 02:00:47.018783 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.588283061s) to execute
2021-10-22 02:00:47.918365 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:00:48.322847 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.494995197s) to execute
2021-10-22 02:00:48.419238 I | auth: deleting token PNNBWLJKDuTvJETn.800 for user conductor
2021-10-22 02:00:48.419287 I | auth: deleting token vGMpifmiQNpDVwAb.801 for user conductor
2021-10-22 02:00:49.419050 I | auth: deleting token kSDtOagMxhPQtkZX.802 for user conductor
2021-10-22 02:00:49.924343 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.096479992s) to execute
2021-10-22 02:00:52.423140 I | auth: deleting token oZkknRAXreMSjwpr.803 for user conductor
2021-10-22 02:00:52.423212 I | auth: deleting token TWdSMAXyLwEvFbdF.804 for user conductor
2021-10-22 02:00:52.918747 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:00:53.419550 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.186475074s) to execute
2021-10-22 02:00:54.419045 I | auth: deleting token odqMHimHqeEUqnbp.805 for user conductor
2021-10-22 02:00:54.919907 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (791.909326ms) to execute
2021-10-22 02:00:56.226532 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.205858904s) to execute
2021-10-22 02:00:57.624864 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.206557485s) to execute
2021-10-22 02:00:57.625286 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.204532887s) to execute
2021-10-22 02:00:57.919023 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:00:59.226700 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.207385391s) to execute
2021-10-22 02:01:00.419085 I | auth: deleting token yXlEhkvdzFhGuJKA.806 for user conductor
2021-10-22 02:01:00.419121 I | auth: deleting token nDEnnFlktQpSUnaT.809 for user conductor
2021-10-22 02:01:00.419134 I | auth: deleting token zgJWHxtSzRVRuBar.808 for user conductor
2021-10-22 02:01:00.419140 I | auth: deleting token UrlOsuxDezkZMvEK.807 for user conductor
2021-10-22 02:01:00.419146 I | auth: deleting token YcuRywPdiofIRshV.810 for user conductor
2021-10-22 02:01:02.319596 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.57512548s) to execute
2021-10-22 02:01:02.319746 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.992043871s) to execute
2021-10-22 02:01:02.429549 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (106.831415ms) to execute
2021-10-22 02:01:02.919333 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:03.419113 I | auth: deleting token vSsTypFihuNsFzBR.812 for user conductor
2021-10-22 02:01:03.419261 I | auth: deleting token JcgZzHfpzgILGIno.813 for user conductor
2021-10-22 02:01:03.419301 I | auth: deleting token JMSuxPPoqZindZtd.811 for user conductor
2021-10-22 02:01:03.819038 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.478713175s) to execute
2021-10-22 02:01:05.220360 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.101721235s) to execute
2021-10-22 02:01:06.419074 I | auth: deleting token fLAqaqKARAKVEFgb.815 for user conductor
2021-10-22 02:01:06.419114 I | auth: deleting token aOEJhyQaTjlvMVil.814 for user conductor
2021-10-22 02:01:06.419133 I | auth: deleting token wHpAkMvjbyrPfVNY.816 for user conductor
2021-10-22 02:01:07.419149 I | auth: deleting token HPHrdCjaFZLmOsLj.817 for user conductor
2021-10-22 02:01:07.919618 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:07.925887 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.702320504s) to execute
2021-10-22 02:01:07.926544 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.703675096s) to execute
2021-10-22 02:01:08.228213 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (209.581563ms) to execute
2021-10-22 02:01:08.332656 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (214.155428ms) to execute
2021-10-22 02:01:09.429605 I | auth: deleting token DGsZvOATWKcsNMAs.818 for user conductor
2021-10-22 02:01:09.622267 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (294.234733ms) to execute
2021-10-22 02:01:10.419165 I | auth: deleting token PLnIxykFxEtUPCWu.819 for user conductor
2021-10-22 02:01:11.422071 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (394.045231ms) to execute
2021-10-22 02:01:12.919833 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:13.020636 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (292.633352ms) to execute
2021-10-22 02:01:13.419103 I | auth: deleting token fHXLgctzgPdHXTdP.820 for user conductor
2021-10-22 02:01:14.418996 I | auth: deleting token wOgHARBVrWgsthEn.822 for user conductor
2021-10-22 02:01:16.419048 I | auth: deleting token pxKIqHkDNHRCtrTR.823 for user conductor
2021-10-22 02:01:16.419111 I | auth: deleting token bGqilQSdamXHwfPb.821 for user conductor
2021-10-22 02:01:16.419131 I | auth: deleting token sgbhtJqRoyUgMFPr.824 for user conductor
2021-10-22 02:01:17.724909 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.106434333s) to execute
2021-10-22 02:01:17.920259 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:19.318378 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (987.450617ms) to execute
2021-10-22 02:01:19.423134 I | auth: deleting token SJGMjufExUrgRIhL.826 for user conductor
2021-10-22 02:01:19.423183 I | auth: deleting token tvuvgYuzhLswOMVR.825 for user conductor
2021-10-22 02:01:19.423198 I | auth: deleting token exiaIjnoZUAlutYP.827 for user conductor
2021-10-22 02:01:21.419103 I | auth: deleting token sHVLPdIfqKCPHiUd.829 for user conductor
2021-10-22 02:01:21.419151 I | auth: deleting token gqpAGnLULJnnEqqS.828 for user conductor
2021-10-22 02:01:22.920458 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:24.419049 I | auth: deleting token yAaPUtsnsxcjAfXu.830 for user conductor
2021-10-22 02:01:24.419093 I | auth: deleting token cmycyikZoPKyZTkL.832 for user conductor
2021-10-22 02:01:27.319383 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.700861506s) to execute
2021-10-22 02:01:27.419054 I | auth: deleting token HdYElBdJDhOsrtMC.831 for user conductor
2021-10-22 02:01:27.419100 I | auth: deleting token ySZHmBvjDdMLuzxU.834 for user conductor
2021-10-22 02:01:27.920725 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:28.418945 I | auth: deleting token GxxHayfcAsKZoIdv.833 for user conductor
2021-10-22 02:01:28.418998 I | auth: deleting token yqxLNWctDMnGGVAk.835 for user conductor
2021-10-22 02:01:30.419083 I | auth: deleting token MJWrbAvcWxHwoqcl.837 for user conductor
2021-10-22 02:01:30.419160 I | auth: deleting token ubGFDEAkGooWoPtd.836 for user conductor
2021-10-22 02:01:30.419192 I | auth: deleting token abfmhbTRsyAvVWeZ.838 for user conductor
2021-10-22 02:01:31.821691 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.991397856s) to execute
2021-10-22 02:01:31.929551 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (105.486703ms) to execute
2021-10-22 02:01:32.920949 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:33.418971 I | auth: deleting token OkHzIYwReKEnZpff.839 for user conductor
2021-10-22 02:01:33.419036 I | auth: deleting token yjzQtJBTYUgbHjMr.840 for user conductor
2021-10-22 02:01:33.419046 I | auth: deleting token HXtGWGIwTtkUfbuh.841 for user conductor
2021-10-22 02:01:33.421088 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (502.214696ms) to execute
2021-10-22 02:01:34.720906 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102370088s) to execute
2021-10-22 02:01:36.220413 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.392580697s) to execute
2021-10-22 02:01:36.220773 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.4022663s) to execute
2021-10-22 02:01:36.419249 I | auth: deleting token FuxXpfsGkSQPvfPE.843 for user conductor
2021-10-22 02:01:37.419036 I | auth: deleting token mYZJUPIIIXKnArXk.842 for user conductor
2021-10-22 02:01:37.524862 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.297175413s) to execute
2021-10-22 02:01:37.525341 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.302506001s) to execute
2021-10-22 02:01:37.921238 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:38.419069 I | auth: deleting token FDzZDvRSjnLJTblW.845 for user conductor
2021-10-22 02:01:38.419119 I | auth: deleting token LGednZvGdABKkQRl.846 for user conductor
2021-10-22 02:01:38.419133 I | auth: deleting token WtvscWrFgCnakOeo.844 for user conductor
2021-10-22 02:01:39.318166 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.605522584s) to execute
2021-10-22 02:01:39.318342 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.699827363s) to execute
2021-10-22 02:01:40.419126 I | auth: deleting token XhyubbnRbixaTsGc.847 for user conductor
2021-10-22 02:01:40.419170 I | auth: deleting token CYHUPjTTaadSRvGa.848 for user conductor
2021-10-22 02:01:40.718682 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.389693737s) to execute
2021-10-22 02:01:40.718865 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.398051219s) to execute
2021-10-22 02:01:42.323618 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (605.07161ms) to execute
2021-10-22 02:01:42.419056 I | auth: deleting token LxWqSxpkMgNdKOsw.849 for user conductor
2021-10-22 02:01:42.921674 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:43.419091 I | auth: deleting token hvreAAcsLdkjJHhg.850 for user conductor
2021-10-22 02:01:43.921134 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.302607796s) to execute
2021-10-22 02:01:44.419068 I | auth: deleting token wnamvUbHAedFxFbB.852 for user conductor
2021-10-22 02:01:44.419126 I | auth: deleting token FdIvWRrJJjuHYHRN.851 for user conductor
2021-10-22 02:01:46.925911 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.398302396s) to execute
2021-10-22 02:01:47.129815 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (111.28753ms) to execute
2021-10-22 02:01:48.018331 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:48.619167 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (895.687457ms) to execute
2021-10-22 02:01:49.419090 I | auth: deleting token DOYXJdCCvYUqvDtU.853 for user conductor
2021-10-22 02:01:49.419128 I | auth: deleting token rErpOlpkPXgyQdus.856 for user conductor
2021-10-22 02:01:49.419150 I | auth: deleting token GxDuMJEBjLfdZFME.855 for user conductor
2021-10-22 02:01:49.419157 I | auth: deleting token PSxVJWPMNKdUzetz.857 for user conductor
2021-10-22 02:01:49.419167 I | auth: deleting token ednPsdfHaSbOUOYT.854 for user conductor
2021-10-22 02:01:50.222851 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.495027474s) to execute
2021-10-22 02:01:52.419165 I | auth: deleting token fIqgHsITbfXJuYqX.858 for user conductor
2021-10-22 02:01:52.419202 I | auth: deleting token RUCeodQTSpTZxTYr.860 for user conductor
2021-10-22 02:01:52.419223 I | auth: deleting token TggkyegcxGYOgSDg.859 for user conductor
2021-10-22 02:01:53.018975 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:53.419354 I | auth: deleting token bjrasXdprjJBcnMu.861 for user conductor
2021-10-22 02:01:54.421324 I | auth: deleting token eXYDGKATHxqTmsfM.862 for user conductor
2021-10-22 02:01:54.922877 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.604135975s) to execute
2021-10-22 02:01:54.923194 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.69668172s) to execute
2021-10-22 02:01:55.028079 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (103.171509ms) to execute
2021-10-22 02:01:55.030199 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (103.851695ms) to execute
2021-10-22 02:01:55.030414 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (105.153477ms) to execute
2021-10-22 02:01:56.419063 I | auth: deleting token QNWRSrdnYiiYpmnS.863 for user conductor
2021-10-22 02:01:56.419094 I | auth: deleting token MoPEbKBwWucDsVrO.864 for user conductor
2021-10-22 02:01:57.451516 I | auth: deleting token EPgFhAxPtXwvBJlt.866 for user conductor
2021-10-22 02:01:57.451565 I | auth: deleting token eUzkPDRxqnKyoyZR.865 for user conductor
2021-10-22 02:01:58.019808 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:01:58.318472 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (184.368263ms) to execute
2021-10-22 02:01:59.419076 I | auth: deleting token HnnwAiBymaktVVNN.867 for user conductor
2021-10-22 02:01:59.419137 I | auth: deleting token fvLgJKqLgIhzCiOE.868 for user conductor
2021-10-22 02:02:01.419109 I | auth: deleting token BeJhlHCRBAbAkmXh.869 for user conductor
2021-10-22 02:02:01.419204 I | auth: deleting token pIAndPhDCToPYHGO.870 for user conductor
2021-10-22 02:02:02.419167 I | auth: deleting token RrLJRkOcWTeLPpWB.871 for user conductor
2021-10-22 02:02:03.020227 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:03.419081 I | auth: deleting token EMwTqauPpuFZkYLz.872 for user conductor
2021-10-22 02:02:05.419197 I | auth: deleting token vDMFmZDTMZlhcMcR.873 for user conductor
2021-10-22 02:02:08.020544 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:09.419070 I | auth: deleting token WywCypbCtQehRYrv.874 for user conductor
2021-10-22 02:02:09.419115 I | auth: deleting token LmPWBtWcRXkcMiJz.876 for user conductor
2021-10-22 02:02:09.419130 I | auth: deleting token ASWcpogOHbxOehLT.875 for user conductor
2021-10-22 02:02:11.419086 I | auth: deleting token ohdeeVnhntGNaqBO.878 for user conductor
2021-10-22 02:02:11.419157 I | auth: deleting token ZJanapIDsPaxQHXz.877 for user conductor
2021-10-22 02:02:13.020894 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:14.419112 I | auth: deleting token OigCcnnBCWgUGGdX.881 for user conductor
2021-10-22 02:02:14.419179 I | auth: deleting token EBsBnUmEqXYBxJXB.879 for user conductor
2021-10-22 02:02:16.423290 I | auth: deleting token gXDkOMGWypiBRAtu.883 for user conductor
2021-10-22 02:02:16.423359 I | auth: deleting token oZaKaybiIjQkmIVK.880 for user conductor
2021-10-22 02:02:17.419229 I | auth: deleting token UVlUdvdYzrYRUgTs.882 for user conductor
2021-10-22 02:02:18.021190 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:19.419049 I | auth: deleting token UJRmoIwKJXDJRjKe.884 for user conductor
2021-10-22 02:02:20.418997 I | auth: deleting token zuePqItgQahoxFcN.885 for user conductor
2021-10-22 02:02:20.419060 I | auth: deleting token JHzWBCeUsVQRvwzG.887 for user conductor
2021-10-22 02:02:22.419114 I | auth: deleting token QPTnWTiEdJWiGSeh.886 for user conductor
2021-10-22 02:02:23.021459 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:23.419124 I | auth: deleting token BYcBUiOmBfeKTBRC.888 for user conductor
2021-10-22 02:02:23.419193 I | auth: deleting token ZDhjpHyPkfRdhRHL.889 for user conductor
2021-10-22 02:02:24.420422 I | auth: deleting token MCaPpKnahltaYREy.890 for user conductor
2021-10-22 02:02:24.422652 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.804014552s) to execute
2021-10-22 02:02:24.528517 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (104.213921ms) to execute
2021-10-22 02:02:24.532444 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (107.302357ms) to execute
2021-10-22 02:02:28.021694 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:28.418939 I | auth: deleting token BPYxVoZuTAjKZFWI.892 for user conductor
2021-10-22 02:02:28.418986 I | auth: deleting token mqmSbuPRFUePlwIQ.893 for user conductor
2021-10-22 02:02:28.419058 I | auth: deleting token YZOboxcFeaPGMEhH.891 for user conductor
2021-10-22 02:02:28.419072 I | auth: deleting token VhkKgJyrqixkfvJs.894 for user conductor
2021-10-22 02:02:29.023116 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.595107349s) to execute
2021-10-22 02:02:30.419069 I | auth: deleting token LyRXPoOSUfTOzPZK.896 for user conductor
2021-10-22 02:02:30.419131 I | auth: deleting token ueEnkkYqGZmQHshA.897 for user conductor
2021-10-22 02:02:30.419157 I | auth: deleting token VpdFnoofQzuxNMHO.895 for user conductor
2021-10-22 02:02:30.523677 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.392678821s) to execute
2021-10-22 02:02:30.524112 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.405788676s) to execute
2021-10-22 02:02:32.118620 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.189723071s) to execute
2021-10-22 02:02:32.118756 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.488760717s) to execute
2021-10-22 02:02:33.021899 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:33.824236 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (896.421724ms) to execute
2021-10-22 02:02:35.319518 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.391587263s) to execute
2021-10-22 02:02:35.419084 I | auth: deleting token uWiXsBZlxDaRNTaz.900 for user conductor
2021-10-22 02:02:35.419134 I | auth: deleting token gYLITrELxJbkAPcw.899 for user conductor
2021-10-22 02:02:35.419145 I | auth: deleting token axTqgHxFrlyRPvou.902 for user conductor
2021-10-22 02:02:35.419162 I | auth: deleting token WzkRxffJQQKTAKhT.901 for user conductor
2021-10-22 02:02:35.419170 I | auth: deleting token LJdSPbCDfPSjXXyf.898 for user conductor
2021-10-22 02:02:38.022117 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:38.418983 I | auth: deleting token JIcRTQCxySayoupA.905 for user conductor
2021-10-22 02:02:38.419052 I | auth: deleting token EoJvuSDRHGdmlIeR.903 for user conductor
2021-10-22 02:02:38.419084 I | auth: deleting token AYoqKbGpPieObtTf.906 for user conductor
2021-10-22 02:02:38.419093 I | auth: deleting token WziltcGFoDfTRgXP.904 for user conductor
2021-10-22 02:02:38.521205 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701615276s) to execute
2021-10-22 02:02:39.923418 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.400283309s) to execute
2021-10-22 02:02:39.923498 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.305058053s) to execute
2021-10-22 02:02:40.419349 I | auth: deleting token wNVxJCsAlvROvzhl.907 for user conductor
2021-10-22 02:02:41.419205 I | auth: deleting token UoXxdHDxsNDCCgLZ.908 for user conductor
2021-10-22 02:02:41.625558 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.603706983s) to execute
2021-10-22 02:02:43.022571 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:43.123116 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.395304656s) to execute
2021-10-22 02:02:43.419049 I | auth: deleting token ctuwgrUpaEDwYvxE.909 for user conductor
2021-10-22 02:02:44.418986 I | auth: deleting token rULcgwvnsDzFaKLa.910 for user conductor
2021-10-22 02:02:44.621478 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.494021349s) to execute
2021-10-22 02:02:44.621602 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.496742622s) to execute
2021-10-22 02:02:44.728116 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (104.684649ms) to execute
2021-10-22 02:02:45.419161 I | auth: deleting token AvXkuFsvrgUAUmnL.912 for user conductor
2021-10-22 02:02:45.419335 I | auth: deleting token iSAjDwLcKcNLGkwX.911 for user conductor
2021-10-22 02:02:48.022903 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:53.023134 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:53.419086 I | auth: deleting token gykGMCoQCrAbVmZZ.913 for user conductor
2021-10-22 02:02:53.419190 I | auth: deleting token qlBQhBcvgfgUgABG.915 for user conductor
2021-10-22 02:02:53.419207 I | auth: deleting token nCnUNKJehHlrFDtM.916 for user conductor
2021-10-22 02:02:53.419219 I | auth: deleting token qPJmdqDZpAYObeeN.917 for user conductor
2021-10-22 02:02:53.419241 I | auth: deleting token BzSTPZoRaEkeeDze.914 for user conductor
2021-10-22 02:02:55.620908 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (293.33024ms) to execute
2021-10-22 02:02:57.419103 I | auth: deleting token oYKDsPhlVWwLMSuZ.920 for user conductor
2021-10-22 02:02:57.419180 I | auth: deleting token IXDVwnsmUPxKcUVQ.918 for user conductor
2021-10-22 02:02:57.419199 I | auth: deleting token dDrcAPVVZoaNxXYP.919 for user conductor
2021-10-22 02:02:58.023338 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:02:58.419778 I | auth: deleting token zItzHsgmiVlKlckd.921 for user conductor
2021-10-22 02:02:59.624737 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (604.800475ms) to execute
2021-10-22 02:03:00.419116 I | auth: deleting token RuZNVANBesHmKuUI.922 for user conductor
2021-10-22 02:03:00.419163 I | auth: deleting token HtjqNPOuRWqORIMf.924 for user conductor
2021-10-22 02:03:00.419184 I | auth: deleting token kwrYSdIGnejZopFd.923 for user conductor
2021-10-22 02:03:02.419122 I | auth: deleting token ajvroqUjRYIxedzx.925 for user conductor
2021-10-22 02:03:02.419162 I | auth: deleting token qaUdzQJysIIHEzgX.926 for user conductor
2021-10-22 02:03:03.023653 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:03.418995 I | auth: deleting token hTMMyOoJRBklEvDo.927 for user conductor
2021-10-22 02:03:05.419203 I | auth: deleting token PwsoTWrZLYZAhPwF.928 for user conductor
2021-10-22 02:03:05.819692 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.190024536s) to execute
2021-10-22 02:03:06.419129 I | auth: deleting token HvIlggihANNfIDEp.930 for user conductor
2021-10-22 02:03:08.024011 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:08.419083 I | auth: deleting token LHmoApkEEAWwUPut.932 for user conductor
2021-10-22 02:03:08.419121 I | auth: deleting token xJHCvJgtmyFqRMAq.931 for user conductor
2021-10-22 02:03:08.419128 I | auth: deleting token nUtRjKjnQYQXVqTF.933 for user conductor
2021-10-22 02:03:08.419141 I | auth: deleting token ImjnHJYgAhTRgXrO.929 for user conductor
2021-10-22 02:03:10.419159 I | auth: deleting token BayMMIDNojDxqvbN.934 for user conductor
2021-10-22 02:03:11.423321 I | auth: deleting token xwXvYvuRqSkDqUyB.936 for user conductor
2021-10-22 02:03:11.423381 I | auth: deleting token IlcOACAFKJHbQqBZ.935 for user conductor
2021-10-22 02:03:13.027106 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:13.419462 I | auth: deleting token xlcVhnchkpteyYgX.937 for user conductor
2021-10-22 02:03:13.419521 I | auth: deleting token PLqTzRUwOrSRjocO.938 for user conductor
2021-10-22 02:03:14.419430 I | auth: deleting token gAJfGWCOiehgVtSy.939 for user conductor
2021-10-22 02:03:15.723732 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.701023797s) to execute
2021-10-22 02:03:15.828048 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.18702ms) to execute
2021-10-22 02:03:15.828255 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (102.278593ms) to execute
2021-10-22 02:03:16.028819 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (198.312495ms) to execute
2021-10-22 02:03:16.419088 I | auth: deleting token wjNKBGvGVNzXHkQH.940 for user conductor
2021-10-22 02:03:18.120014 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:20.419138 I | auth: deleting token meztAowvCvWZWMuM.941 for user conductor
2021-10-22 02:03:20.419208 I | auth: deleting token IKpGqKOlcSQeRGrz.943 for user conductor
2021-10-22 02:03:20.419234 I | auth: deleting token xDwllGLMeYeGNXwr.942 for user conductor
2021-10-22 02:03:20.421835 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.187684305s) to execute
2021-10-22 02:03:21.918909 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.478019501s) to execute
2021-10-22 02:03:21.919121 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.480345638s) to execute
2021-10-22 02:03:21.929770 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.488583375s) to execute
2021-10-22 02:03:22.027914 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (106.379397ms) to execute
2021-10-22 02:03:22.129484 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.089484ms) to execute
2021-10-22 02:03:22.419072 I | auth: deleting token tjnaYcpfIuzEJBqh.946 for user conductor
2021-10-22 02:03:22.419114 I | auth: deleting token beGKHZBnHbYyUPgB.945 for user conductor
2021-10-22 02:03:22.419136 I | auth: deleting token kWXEZsOqBYacJNTj.944 for user conductor
2021-10-22 02:03:23.120465 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:25.018580 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.086160652s) to execute
2021-10-22 02:03:25.127962 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (107.114728ms) to execute
2021-10-22 02:03:25.419194 I | auth: deleting token hIkZKgRcScsYYTkI.947 for user conductor
2021-10-22 02:03:25.419267 I | auth: deleting token RMSVXaKMaQZzrPgm.948 for user conductor
2021-10-22 02:03:27.418960 I | auth: deleting token WfSuvwYPVEmiBCHi.949 for user conductor
2021-10-22 02:03:27.419063 I | auth: deleting token oxFVWnYdmVLHwBbk.950 for user conductor
2021-10-22 02:03:27.719029 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (991.11406ms) to execute
2021-10-22 02:03:28.120766 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:28.419164 I | auth: deleting token ocKoIjFgmjLCnXBL.952 for user conductor
2021-10-22 02:03:28.419237 I | auth: deleting token PinNcZNNdmAtOgxG.953 for user conductor
2021-10-22 02:03:28.419269 I | auth: deleting token ftwbZmoXDUAGSjyN.951 for user conductor
2021-10-22 02:03:29.222745 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (791.860588ms) to execute
2021-10-22 02:03:32.419072 I | auth: deleting token lMNuZJqRYnnvyxBA.956 for user conductor
2021-10-22 02:03:32.419117 I | auth: deleting token xGeIFeJRejGSjRKE.954 for user conductor
2021-10-22 02:03:32.419128 I | auth: deleting token UrPYXYkFMifXvtlm.955 for user conductor
2021-10-22 02:03:33.120971 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:33.322287 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (803.921848ms) to execute
2021-10-22 02:03:34.419110 I | auth: deleting token CYCExVqdxdNdqCbm.957 for user conductor
2021-10-22 02:03:34.419206 I | auth: deleting token ueVcrLbRbcWvNVZv.958 for user conductor
2021-10-22 02:03:34.419232 I | auth: deleting token hMZPIXLtNNJrPfOL.959 for user conductor
2021-10-22 02:03:35.421599 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.391965777s) to execute
2021-10-22 02:03:37.021241 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.59158736s) to execute
2021-10-22 02:03:37.419069 I | auth: deleting token GMLEvhQohTmiYlNJ.961 for user conductor
2021-10-22 02:03:38.121594 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:38.419148 I | auth: deleting token oDOzIjzCgWuLBoHx.960 for user conductor
2021-10-22 02:03:39.420935 I | auth: deleting token JomEpuUppGeeZBkg.963 for user conductor
2021-10-22 02:03:39.420982 I | auth: deleting token cbIklrokZIsfviYg.962 for user conductor
2021-10-22 02:03:40.020989 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.900511389s) to execute
2021-10-22 02:03:40.021341 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.996523921s) to execute
2021-10-22 02:03:41.423535 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.302529377s) to execute
2021-10-22 02:03:41.518314 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.399735681s) to execute
2021-10-22 02:03:41.518727 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.495979444s) to execute
2021-10-22 02:03:41.527821 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.153011ms) to execute
2021-10-22 02:03:41.628021 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (107.280063ms) to execute
2021-10-22 02:03:42.418962 I | auth: deleting token CbvUkacGDkKrWHnO.964 for user conductor
2021-10-22 02:03:42.419042 I | auth: deleting token mHmfjEeIQHJFjCDu.966 for user conductor
2021-10-22 02:03:42.419061 I | auth: deleting token QRVjUmEmryIdShNJ.965 for user conductor
2021-10-22 02:03:43.121880 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:43.419034 I | auth: deleting token tOsIOGvrynumaScr.968 for user conductor
2021-10-22 02:03:44.418968 I | auth: deleting token AQMaCyQboLVRkyAm.969 for user conductor
2021-10-22 02:03:44.419041 I | auth: deleting token eclmuRoRPDpKAJzb.967 for user conductor
2021-10-22 02:03:45.823250 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.990276094s) to execute
2021-10-22 02:03:47.226021 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.297946999s) to execute
2021-10-22 02:03:47.226697 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.308197231s) to execute
2021-10-22 02:03:47.320132 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.398840634s) to execute
2021-10-22 02:03:47.418737 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (179.435872ms) to execute
2021-10-22 02:03:47.419155 I | auth: deleting token WmMMTBsiOXxgmrnl.970 for user conductor
2021-10-22 02:03:47.428621 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (106.697845ms) to execute
2021-10-22 02:03:48.122236 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:50.419119 I | auth: deleting token ZxLBLXKbhOdyUXHx.974 for user conductor
2021-10-22 02:03:50.419428 I | auth: deleting token LtwlaJwPdyiudxDB.971 for user conductor
2021-10-22 02:03:50.419627 I | auth: deleting token jHHACXDUxPnWMXvV.972 for user conductor
2021-10-22 02:03:50.419667 I | auth: deleting token byhJPQneTvBdSpwm.975 for user conductor
2021-10-22 02:03:50.419704 I | auth: deleting token zhOjEWDxVufWYhZg.973 for user conductor
2021-10-22 02:03:51.419216 I | auth: deleting token NvrfHWGyEGdPvZCy.976 for user conductor
2021-10-22 02:03:53.122729 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:54.418990 I | auth: deleting token QZPGZHtOGwpkhIBW.978 for user conductor
2021-10-22 02:03:54.419091 I | auth: deleting token GmzYZBXpnXEoYvfe.977 for user conductor
2021-10-22 02:03:56.419085 I | auth: deleting token LOYGzBgapecRVmSJ.979 for user conductor
2021-10-22 02:03:56.419143 I | auth: deleting token jBIeoSaqsHbKzurN.980 for user conductor
2021-10-22 02:03:57.419117 I | auth: deleting token LgTYOtDpvFTxriod.982 for user conductor
2021-10-22 02:03:57.419173 I | auth: deleting token bQaiIIAXfNELXVuF.981 for user conductor
2021-10-22 02:03:58.021194 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.291351674s) to execute
2021-10-22 02:03:58.123153 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:03:58.127948 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (104.472873ms) to execute
2021-10-22 02:04:01.020754 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.39237359s) to execute
2021-10-22 02:04:01.127965 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (104.987162ms) to execute
2021-10-22 02:04:01.418995 I | auth: deleting token McYvMbpJSGaEszRP.985 for user conductor
2021-10-22 02:04:01.419095 I | auth: deleting token bPHCPpqSIVmQCWoT.983 for user conductor
2021-10-22 02:04:03.127182 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:03.419041 I | auth: deleting token iNKndBmCbcydOdhe.986 for user conductor
2021-10-22 02:04:03.419097 I | auth: deleting token rixVlMFYSjsxMVte.987 for user conductor
2021-10-22 02:04:03.419106 I | auth: deleting token JtTWkVKeOlVvhsYR.984 for user conductor
2021-10-22 02:04:04.419067 I | auth: deleting token ZzPWTfkADjiRphHg.988 for user conductor
2021-10-22 02:04:05.419160 I | auth: deleting token sQFYoLUKmAwvUafR.990 for user conductor
2021-10-22 02:04:05.419272 I | auth: deleting token jFGdVHVEFzUHJDzG.989 for user conductor
2021-10-22 02:04:07.419062 I | auth: deleting token XrYizbRBvKOHFIpg.991 for user conductor
2021-10-22 02:04:08.127425 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:08.320941 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (402.414702ms) to execute
2021-10-22 02:04:09.419151 I | auth: deleting token VGXPPfJLCwIsQJMF.992 for user conductor
2021-10-22 02:04:09.819694 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.390811198s) to execute
2021-10-22 02:04:10.419059 I | auth: deleting token ZkHWLvqVCPnyZeZi.993 for user conductor
2021-10-22 02:04:11.324845 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.396886842s) to execute
2021-10-22 02:04:12.419060 I | auth: deleting token eEbrqGFPwEpxwmdJ.994 for user conductor
2021-10-22 02:04:12.925419 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.103153819s) to execute
2021-10-22 02:04:12.925781 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.406872256s) to execute
2021-10-22 02:04:12.926092 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.59975406s) to execute
2021-10-22 02:04:13.127929 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:13.128083 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (104.82989ms) to execute
2021-10-22 02:04:14.420461 I | auth: deleting token oPwGcSYUxuVDFYDo.995 for user conductor
2021-10-22 02:04:14.821447 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (802.810835ms) to execute
2021-10-22 02:04:15.419120 I | auth: deleting token rFDHJTVxYJSUyytv.996 for user conductor
2021-10-22 02:04:16.422486 I | auth: deleting token CShrAseHQvCKGAvp.997 for user conductor
2021-10-22 02:04:16.422528 I | auth: deleting token UQbpkuhTHCbWxwie.998 for user conductor
2021-10-22 02:04:17.419112 I | auth: deleting token nCfjwaGAcRdQiJDN.999 for user conductor
2021-10-22 02:04:18.128319 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:19.419180 I | auth: deleting token RspbeaFcNgqmELBD.1000 for user conductor
2021-10-22 02:04:19.419246 I | auth: deleting token eoyICjyOMyzLkzhy.1001 for user conductor
2021-10-22 02:04:22.022409 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (191.493703ms) to execute
2021-10-22 02:04:23.218319 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:23.419048 I | auth: deleting token ZzedSbvrAAoMrCoA.1003 for user conductor
2021-10-22 02:04:23.422181 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.392372962s) to execute
2021-10-22 02:04:23.628329 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (109.780567ms) to execute
2021-10-22 02:04:23.727791 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (197.277268ms) to execute
2021-10-22 02:04:25.418997 I | auth: deleting token azwSkGwOJifsoHsv.1005 for user conductor
2021-10-22 02:04:25.419121 I | auth: deleting token LazdNGpdFYDEYcSm.1006 for user conductor
2021-10-22 02:04:25.419134 I | auth: deleting token XtQGoVeulnPZNqYu.1007 for user conductor
2021-10-22 02:04:25.419142 I | auth: deleting token zImUkmxoXXdQvkVp.1002 for user conductor
2021-10-22 02:04:25.419151 I | auth: deleting token eMdRFmnCQHrvVkbp.1008 for user conductor
2021-10-22 02:04:25.419158 I | auth: deleting token htHVlIUeQbhgyeIS.1004 for user conductor
2021-10-22 02:04:26.522126 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.392237805s) to execute
2021-10-22 02:04:27.418945 I | auth: deleting token UGvtYIsOZlmISXnK.1010 for user conductor
2021-10-22 02:04:27.418992 I | auth: deleting token xchTRrqlvcXTRHUy.1009 for user conductor
2021-10-22 02:04:28.122964 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.503450334s) to execute
2021-10-22 02:04:28.123292 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.598418801s) to execute
2021-10-22 02:04:28.218572 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:28.328330 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (199.365765ms) to execute
2021-10-22 02:04:29.419060 I | auth: deleting token fijBFPXErcBBVndb.1011 for user conductor
2021-10-22 02:04:29.626567 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (608.005698ms) to execute
2021-10-22 02:04:31.225581 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.497928921s) to execute
2021-10-22 02:04:31.419049 I | auth: deleting token jYcBKxdgEIBHZdyV.1013 for user conductor
2021-10-22 02:04:31.419110 I | auth: deleting token zSjmiciPQfnNQogQ.1014 for user conductor
2021-10-22 02:04:31.419203 I | auth: deleting token doNheYorBKVcambH.1012 for user conductor
2021-10-22 02:04:31.428244 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (199.35565ms) to execute
2021-10-22 02:04:33.024535 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (505.897907ms) to execute
2021-10-22 02:04:33.218852 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:33.419113 I | auth: deleting token JQzmDFAABrOpGAAS.1016 for user conductor
2021-10-22 02:04:33.419173 I | auth: deleting token idLiaCwjXQciUTNZ.1015 for user conductor
2021-10-22 02:04:34.419055 I | auth: deleting token FbHSDePXehkvwtas.1018 for user conductor
2021-10-22 02:04:34.419098 I | auth: deleting token oLARWjcLGbzJjbrp.1017 for user conductor
2021-10-22 02:04:36.419187 I | auth: deleting token IlGlyuVjCOGWbeJH.1020 for user conductor
2021-10-22 02:04:36.419280 I | auth: deleting token AtWfxfzsnBPHEGnv.1019 for user conductor
2021-10-22 02:04:37.325682 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.274382729s) to execute
2021-10-22 02:04:37.527986 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (105.478591ms) to execute
2021-10-22 02:04:38.219170 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:38.419097 I | auth: deleting token DIUubJDgxRidtYjs.1021 for user conductor
2021-10-22 02:04:40.723605 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.393477715s) to execute
2021-10-22 02:04:40.928288 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (201.645296ms) to execute
2021-10-22 02:04:40.930407 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (112.051174ms) to execute
2021-10-22 02:04:42.420652 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (892.621173ms) to execute
2021-10-22 02:04:42.527965 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (100.509031ms) to execute
2021-10-22 02:04:43.219492 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:45.419075 I | auth: deleting token xIGXEKdcvhuvuhvz.1026 for user conductor
2021-10-22 02:04:45.419148 I | auth: deleting token mrHcVVcswldTgXag.1025 for user conductor
2021-10-22 02:04:45.419163 I | auth: deleting token OIyYRSojBVHFCkTv.1023 for user conductor
2021-10-22 02:04:45.419170 I | auth: deleting token XEUCKduvmNIrhVBP.1024 for user conductor
2021-10-22 02:04:45.419186 I | auth: deleting token cIwcvNaThIFKRkVI.1022 for user conductor
2021-10-22 02:04:46.420441 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.389890711s) to execute
2021-10-22 02:04:47.921925 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.394230072s) to execute
2021-10-22 02:04:48.219741 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:49.522513 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.500063002s) to execute
2021-10-22 02:04:50.418969 I | auth: deleting token kjtqCIYrLFHiAHuh.1028 for user conductor
2021-10-22 02:04:50.419066 I | auth: deleting token JjSdNrMTtmFrqkrI.1030 for user conductor
2021-10-22 02:04:50.419090 I | auth: deleting token oLttsNBpewmATYfU.1027 for user conductor
2021-10-22 02:04:50.419102 I | auth: deleting token NGPVRRwvhjgHWnzd.1029 for user conductor
2021-10-22 02:04:50.419123 I | auth: deleting token NaqGCbmPbsGPUIib.1031 for user conductor
2021-10-22 02:04:51.121002 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.102525602s) to execute
2021-10-22 02:04:51.121185 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.598565667s) to execute
2021-10-22 02:04:52.719747 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.195472211s) to execute
2021-10-22 02:04:52.720650 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.596156502s) to execute
2021-10-22 02:04:52.720924 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.596350812s) to execute
2021-10-22 02:04:53.219925 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:54.224411 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.40314255s) to execute
2021-10-22 02:04:54.318523 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.500108562s) to execute
2021-10-22 02:04:55.419668 I | auth: deleting token xQMZnELKEgtSercj.1034 for user conductor
2021-10-22 02:04:55.419805 I | auth: deleting token amhEBYcwtPRGZZRn.1032 for user conductor
2021-10-22 02:04:55.621365 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.300179337s) to execute
2021-10-22 02:04:55.621688 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.297966617s) to execute
2021-10-22 02:04:57.419064 I | auth: deleting token uacPfHZZjJcQvdQi.1035 for user conductor
2021-10-22 02:04:57.419165 I | auth: deleting token FgSloWcFGxXbPWye.1033 for user conductor
2021-10-22 02:04:57.419209 I | auth: deleting token lYfSaEWvRyBCVuzp.1037 for user conductor
2021-10-22 02:04:57.419254 I | auth: deleting token ZnjTZRluvbyhLEYI.1036 for user conductor
2021-10-22 02:04:58.220312 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:04:58.419080 I | auth: deleting token bdidajbXqrtjPubO.1038 for user conductor
2021-10-22 02:04:59.220510 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (300.823914ms) to execute
2021-10-22 02:05:00.922784 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (194.405275ms) to execute
2021-10-22 02:05:01.419031 I | auth: deleting token aWYctyTHBSaobpmM.1039 for user conductor
2021-10-22 02:05:01.419094 I | auth: deleting token rBZxRSJCwBiAzjSQ.1040 for user conductor
2021-10-22 02:05:03.220745 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:03.419061 I | auth: deleting token elhKpeIOSNgOUFGd.1042 for user conductor
2021-10-22 02:05:03.419104 I | auth: deleting token tzBiryofVuIdcXhP.1041 for user conductor
2021-10-22 02:05:04.418986 I | auth: deleting token ulWeQrPhMrwRBkan.1043 for user conductor
2021-10-22 02:05:05.318626 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.298726775s) to execute
2021-10-22 02:05:06.419067 I | auth: deleting token mEOnjJHJufBDFilu.1045 for user conductor
2021-10-22 02:05:06.626511 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.107976064s) to execute
2021-10-22 02:05:06.626636 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.306166951s) to execute
2021-10-22 02:05:08.024949 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.30644748s) to execute
2021-10-22 02:05:08.025513 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.396597783s) to execute
2021-10-22 02:05:08.220991 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:09.419168 I | auth: deleting token dzXxGUAHXkfodzrq.1044 for user conductor
2021-10-22 02:05:09.419238 I | auth: deleting token tHTPrYdMhJwraYkm.1048 for user conductor
2021-10-22 02:05:09.419285 I | auth: deleting token acsLKEORcqWuwqbv.1047 for user conductor
2021-10-22 02:05:09.519679 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.400878379s) to execute
2021-10-22 02:05:09.520450 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.396908394s) to execute
2021-10-22 02:05:10.419313 I | auth: deleting token tmjpLbZkObsBokOX.1046 for user conductor
2021-10-22 02:05:10.419368 I | auth: deleting token BDPlbFvqDpfsVMXc.1049 for user conductor
2021-10-22 02:05:11.221061 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.5908009s) to execute
2021-10-22 02:05:11.222042 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.10341993s) to execute
2021-10-22 02:05:13.122723 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.591453712s) to execute
2021-10-22 02:05:13.223324 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:13.418934 I | auth: deleting token UCdXQctUXcZiAgmu.1050 for user conductor
2021-10-22 02:05:14.618479 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.299785636s) to execute
2021-10-22 02:05:14.618635 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.394204691s) to execute
2021-10-22 02:05:16.419098 I | auth: deleting token MuDZJSRJcQjaDGSd.1053 for user conductor
2021-10-22 02:05:16.419157 I | auth: deleting token aMPgQAmMPmFNWoKl.1051 for user conductor
2021-10-22 02:05:16.419189 I | auth: deleting token ojAmHDiUeDhXHhsD.1052 for user conductor
2021-10-22 02:05:16.419204 I | auth: deleting token EiwpzpsnlAokBCWO.1054 for user conductor
2021-10-22 02:05:18.223685 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:18.419144 I | auth: deleting token WxoNOjWAsTaNrZZe.1055 for user conductor
2021-10-22 02:05:20.419140 I | auth: deleting token FdpLznVNtEjyAhCZ.1056 for user conductor
2021-10-22 02:05:21.419071 I | auth: deleting token PplbNMmAmLXkNXdm.1057 for user conductor
2021-10-22 02:05:22.419069 I | auth: deleting token FTtlyWhlwafZJqwp.1059 for user conductor
2021-10-22 02:05:22.419161 I | auth: deleting token xIXrwpMWDpBSGRkX.1058 for user conductor
2021-10-22 02:05:23.223973 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:23.419045 I | auth: deleting token ozuXsjjlfmFtGBkT.1060 for user conductor
2021-10-22 02:05:25.419073 I | auth: deleting token lrFMdrtZHOUizUMW.1061 for user conductor
2021-10-22 02:05:25.725350 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (997.52825ms) to execute
2021-10-22 02:05:26.419096 I | auth: deleting token PULrJzkAXflEHfyh.1062 for user conductor
2021-10-22 02:05:27.320854 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.592726577s) to execute
2021-10-22 02:05:28.224341 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:28.419104 I | auth: deleting token FDaKqeNyMEwUOdXp.1064 for user conductor
2021-10-22 02:05:29.419058 I | auth: deleting token htJlPQbcuMyvmRau.1065 for user conductor
2021-10-22 02:05:29.419110 I | auth: deleting token dUkBbXroMunKHIvK.1066 for user conductor
2021-10-22 02:05:29.419132 I | auth: deleting token FoHpFjrnWCAdCjUr.1063 for user conductor
2021-10-22 02:05:29.725392 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (891.757811ms) to execute
2021-10-22 02:05:30.419048 I | auth: deleting token XRbAbejFyPeVVKBj.1067 for user conductor
2021-10-22 02:05:31.222362 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.491800832s) to execute
2021-10-22 02:05:32.624661 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.400096482s) to execute
2021-10-22 02:05:32.718457 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.399591192s) to execute
2021-10-22 02:05:33.224541 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:34.419043 I | auth: deleting token wVtZrSnyOZQhFBOx.1068 for user conductor
2021-10-22 02:05:35.823212 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.395254024s) to execute
2021-10-22 02:05:36.419143 I | auth: deleting token PnpAglpZRcLnZOfe.1069 for user conductor
2021-10-22 02:05:36.419234 I | auth: deleting token yZYgeyBEkKFONOqz.1070 for user conductor
2021-10-22 02:05:38.224769 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:38.418992 I | auth: deleting token yGZTJrrhgPsbomiW.1071 for user conductor
2021-10-22 02:05:38.419064 I | auth: deleting token HrJnoludivUoBuNE.1072 for user conductor
2021-10-22 02:05:38.419083 I | auth: deleting token syRqFNhEGDzmtwYF.1073 for user conductor
2021-10-22 02:05:39.832270 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.207250193s) to execute
2021-10-22 02:05:41.419147 I | auth: deleting token oIRVASyXGjLUMvLw.1076 for user conductor
2021-10-22 02:05:41.419187 I | auth: deleting token czbcKGnLCTAXwPug.1075 for user conductor
2021-10-22 02:05:41.419204 I | auth: deleting token aXaVWGABicyCGxBt.1074 for user conductor
2021-10-22 02:05:42.825710 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.207224075s) to execute
2021-10-22 02:05:43.225074 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:44.426745 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.508146801s) to execute
2021-10-22 02:05:44.426974 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.598279052s) to execute
2021-10-22 02:05:45.419087 I | auth: deleting token gnsaZpckYpVYvybG.1080 for user conductor
2021-10-22 02:05:45.419144 I | auth: deleting token SxLwvaURMzafyEVe.1078 for user conductor
2021-10-22 02:05:45.419184 I | auth: deleting token JkcpecHVnMyqWRHA.1077 for user conductor
2021-10-22 02:05:46.031105 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (202.931953ms) to execute
2021-10-22 02:05:46.419098 I | auth: deleting token hIWejtIDmIXnSqrk.1081 for user conductor
2021-10-22 02:05:46.419161 I | auth: deleting token hEYhEjgscBjiYmFg.1079 for user conductor
2021-10-22 02:05:48.225407 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:48.419105 I | auth: deleting token FrvxVBPWlrVgijRy.1082 for user conductor
2021-10-22 02:05:49.419054 I | auth: deleting token YeANtRuLTojrSDke.1084 for user conductor
2021-10-22 02:05:49.419099 I | auth: deleting token jhzAFGzCNDkWdEIU.1083 for user conductor
2021-10-22 02:05:50.419200 I | auth: deleting token dFBXThkOrwUeXBHf.1085 for user conductor
2021-10-22 02:05:50.419246 I | auth: deleting token ploqTGbFzezbuseR.1086 for user conductor
2021-10-22 02:05:51.418956 I | auth: deleting token QbZuGJkiFWmzRyDP.1087 for user conductor
2021-10-22 02:05:52.023923 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (705.26772ms) to execute
2021-10-22 02:05:53.225920 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:54.419078 I | auth: deleting token ZjwvpfNGBbaKeWIP.1089 for user conductor
2021-10-22 02:05:54.419120 I | auth: deleting token ZheTfdUVCzaJJkpZ.1088 for user conductor
2021-10-22 02:05:54.920749 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.702400146s) to execute
2021-10-22 02:05:55.028047 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (105.189856ms) to execute
2021-10-22 02:05:55.419126 I | auth: deleting token bRPCvAuzXQBHOnCd.1090 for user conductor
2021-10-22 02:05:56.425885 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (707.360875ms) to execute
2021-10-22 02:05:58.318274 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:05:58.419046 I | auth: deleting token IWvkhNrzmafpcnzi.1093 for user conductor
2021-10-22 02:05:58.419089 I | auth: deleting token adIZEZWJUpNTZmaH.1091 for user conductor
2021-10-22 02:05:58.419098 I | auth: deleting token pqPxBrgOiUUAhRiT.1094 for user conductor
2021-10-22 02:05:58.419106 I | auth: deleting token KDnOYSsuKWkPelmW.1092 for user conductor
2021-10-22 02:05:59.325108 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.706705732s) to execute
2021-10-22 02:05:59.419049 I | auth: deleting token nebUmqIVHQBQWwyy.1095 for user conductor
2021-10-22 02:05:59.428662 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.184903ms) to execute
2021-10-22 02:05:59.528284 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (107.699288ms) to execute
2021-10-22 02:06:02.026855 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (899.040626ms) to execute
2021-10-22 02:06:02.418956 I | auth: deleting token HZYhLgGcjaJqvspr.1096 for user conductor
2021-10-22 02:06:02.518204 I | auth: deleting token QVEuqNYTejdkeLUA.1097 for user conductor
2021-10-22 02:06:03.318529 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:03.419164 I | auth: deleting token RcUBNOJHNUinJlZP.1098 for user conductor
2021-10-22 02:06:03.419225 I | auth: deleting token PKqrYMjDaQxHxVZw.1099 for user conductor
2021-10-22 02:06:03.820377 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (792.498176ms) to execute
2021-10-22 02:06:05.419114 I | auth: deleting token bogmTAaStfDPuqjY.1102 for user conductor
2021-10-22 02:06:05.419198 I | auth: deleting token TyOLIlUFBlniloyt.1100 for user conductor
2021-10-22 02:06:08.318860 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:08.451043 I | auth: deleting token dyODAtoXLHSzDLhC.1104 for user conductor
2021-10-22 02:06:08.451085 I | auth: deleting token jWlLWaXvskMRUJwC.1101 for user conductor
2021-10-22 02:06:08.451094 I | auth: deleting token devZjWHgHhOexiSN.1103 for user conductor
2021-10-22 02:06:08.451103 I | auth: deleting token qkfENwnvRqrkFeFr.1106 for user conductor
2021-10-22 02:06:08.451115 I | auth: deleting token abaqnwMGIoyffAdh.1105 for user conductor
2021-10-22 02:06:09.421668 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.892057528s) to execute
2021-10-22 02:06:09.618659 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (194.490367ms) to execute
2021-10-22 02:06:09.629937 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (111.498436ms) to execute
2021-10-22 02:06:10.419052 I | auth: deleting token WtNiujMDuCqoyTmw.1108 for user conductor
2021-10-22 02:06:10.419108 I | auth: deleting token lvngrStgsRRvKfXb.1107 for user conductor
2021-10-22 02:06:12.419277 I | auth: deleting token NnNVWBfHiLlqsgpS.1109 for user conductor
2021-10-22 02:06:12.419315 I | auth: deleting token EmsJUlOnkFDKvEgb.1110 for user conductor
2021-10-22 02:06:12.426473 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.898542093s) to execute
2021-10-22 02:06:13.319100 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:13.419198 I | auth: deleting token RKoWXlAfMHdCiknj.1112 for user conductor
2021-10-22 02:06:13.419257 I | auth: deleting token HJkoluhHHQTSQbFx.1111 for user conductor
2021-10-22 02:06:15.419178 I | auth: deleting token jvjAwvJMHmMjIwZy.1114 for user conductor
2021-10-22 02:06:15.419268 I | auth: deleting token hBstmVlVHsdsGZld.1113 for user conductor
2021-10-22 02:06:18.319357 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:18.419182 I | auth: deleting token ywePcEAwwqlMALvz.1117 for user conductor
2021-10-22 02:06:18.419236 I | auth: deleting token qGwTRdEjZyhPUUWl.1115 for user conductor
2021-10-22 02:06:18.419251 I | auth: deleting token wOLGiHOuRxmKJucY.1116 for user conductor
2021-10-22 02:06:19.419098 I | auth: deleting token tcuuuZoIiKboxGMH.1119 for user conductor
2021-10-22 02:06:19.419173 I | auth: deleting token HcdBQrLfRxuWWIXp.1118 for user conductor
2021-10-22 02:06:20.419064 I | auth: deleting token LthEVEJPHsKQGmoc.1120 for user conductor
2021-10-22 02:06:23.319553 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:24.618513 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.299709805s) to execute
2021-10-22 02:06:25.825592 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.202328353s) to execute
2021-10-22 02:06:25.825757 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.204471583s) to execute
2021-10-22 02:06:26.128702 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (299.53859ms) to execute
2021-10-22 02:06:27.419048 I | auth: deleting token fSRRLlbEuHVjMubK.1122 for user conductor
2021-10-22 02:06:27.419090 I | auth: deleting token jfZYiEkVVUDrXbSu.1121 for user conductor
2021-10-22 02:06:27.419119 I | auth: deleting token qqHdTmJBYiURzVhB.1123 for user conductor
2021-10-22 02:06:27.419143 I | auth: deleting token PNhMwlGqGKzmrQEF.1124 for user conductor
2021-10-22 02:06:28.319801 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:28.419047 I | auth: deleting token MeqWxBCEPymEgrZd.1125 for user conductor
2021-10-22 02:06:28.919583 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.485522633s) to execute
2021-10-22 02:06:32.419169 I | auth: deleting token fsjtrrfnOzHMwqMT.1130 for user conductor
2021-10-22 02:06:32.419231 I | auth: deleting token ULUzFEhZvAbPdIqi.1126 for user conductor
2021-10-22 02:06:32.419246 I | auth: deleting token kqGJzyPjHOnZgaUK.1127 for user conductor
2021-10-22 02:06:32.419260 I | auth: deleting token JVGgmYOGEkKMRfBH.1128 for user conductor
2021-10-22 02:06:32.419269 I | auth: deleting token hAUZFsRxpupsjQsV.1129 for user conductor
2021-10-22 02:06:33.320144 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:34.419108 I | auth: deleting token dKMTUarRwKyMIYhI.1131 for user conductor
2021-10-22 02:06:36.419146 I | auth: deleting token QfrwHWJevLXslvvB.1132 for user conductor
2021-10-22 02:06:36.419384 I | auth: deleting token GbrkytlAJZveVSgQ.1134 for user conductor
2021-10-22 02:06:38.320600 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:38.524234 I | auth: deleting token hXKfqVMPeNKUNTCK.1136 for user conductor
2021-10-22 02:06:38.524277 I | auth: deleting token eYhVhTIJFdSYMXoF.1133 for user conductor
2021-10-22 02:06:39.419017 I | auth: deleting token zfeyoKdUOTanvNXY.1135 for user conductor
2021-10-22 02:06:41.418963 I | auth: deleting token nuaadjBNEdKGzwqW.1140 for user conductor
2021-10-22 02:06:41.419063 I | auth: deleting token WVFFGTaElfSUhMlB.1139 for user conductor
2021-10-22 02:06:41.419077 I | auth: deleting token qwloBKDDCBMqLsSb.1137 for user conductor
2021-10-22 02:06:41.419087 I | auth: deleting token dJmOXxMqHEoFAlTl.1138 for user conductor
2021-10-22 02:06:41.818781 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.590239788s) to execute
2021-10-22 02:06:42.419048 I | auth: deleting token rTTbbCwkflQgxtgi.1141 for user conductor
2021-10-22 02:06:43.320798 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:44.419075 I | auth: deleting token oyisHmycTTkqtadd.1143 for user conductor
2021-10-22 02:06:44.419173 I | auth: deleting token CuBzsXKiNhUyRBEA.1144 for user conductor
2021-10-22 02:06:44.419207 I | auth: deleting token hcMQOtUpkCHjOSCy.1142 for user conductor
2021-10-22 02:06:44.923289 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.195465946s) to execute
2021-10-22 02:06:46.419249 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.391379989s) to execute
2021-10-22 02:06:47.419089 I | auth: deleting token OYHQRCVVQBHDrMil.1146 for user conductor
2021-10-22 02:06:47.419147 I | auth: deleting token PFESufjDwzqmSPLk.1145 for user conductor
2021-10-22 02:06:47.419163 I | auth: deleting token eTocMpTITuBMVTWW.1147 for user conductor
2021-10-22 02:06:47.821049 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.399255508s) to execute
2021-10-22 02:06:47.821271 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.09963601s) to execute
2021-10-22 02:06:48.321066 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:49.419545 I | auth: deleting token zNpAGzsPWkhFpdJX.1148 for user conductor
2021-10-22 02:06:49.527219 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.597334543s) to execute
2021-10-22 02:06:52.818495 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.188556923s) to execute
2021-10-22 02:06:53.418324 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:54.520860 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.702255846s) to execute
2021-10-22 02:06:54.521130 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.700270552s) to execute
2021-10-22 02:06:54.628133 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (104.776584ms) to execute
2021-10-22 02:06:54.631157 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (107.321547ms) to execute
2021-10-22 02:06:55.518227 I | auth: deleting token EvxUAEzrfgkEwwoX.1153 for user conductor
2021-10-22 02:06:55.518269 I | auth: deleting token AMLOSvzUoKtjHxGg.1149 for user conductor
2021-10-22 02:06:55.518295 I | auth: deleting token oNGdyIttDrykLOqz.1150 for user conductor
2021-10-22 02:06:55.518311 I | auth: deleting token hZblYcpAaQdkwRUQ.1151 for user conductor
2021-10-22 02:06:55.518319 I | auth: deleting token shAQVRXNvwOORGBi.1152 for user conductor
2021-10-22 02:06:57.419055 I | auth: deleting token zEkGoxeLHzoGNwJw.1155 for user conductor
2021-10-22 02:06:57.419099 I | auth: deleting token OxQcjfcKWWLBOznY.1154 for user conductor
2021-10-22 02:06:57.824362 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.396689512s) to execute
2021-10-22 02:06:58.418656 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:06:58.418986 I | auth: deleting token PgjoVYefaFpbqtyY.1156 for user conductor
2021-10-22 02:06:58.419049 I | auth: deleting token nINCOSGrhkUpDBjA.1157 for user conductor
2021-10-22 02:07:00.419087 I | auth: deleting token mkDutomYUOdxGWwr.1158 for user conductor
2021-10-22 02:07:00.827488 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.906517678s) to execute
2021-10-22 02:07:00.827946 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.909545885s) to execute
2021-10-22 02:07:02.419166 I | auth: deleting token vTKqXdjDbvneqlTI.1159 for user conductor
2021-10-22 02:07:02.422895 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.50434682s) to execute
2021-10-22 02:07:02.422979 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.504354916s) to execute
2021-10-22 02:07:02.423113 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.498250213s) to execute
2021-10-22 02:07:03.418985 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:07:03.823899 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.30543217s) to execute
2021-10-22 02:07:04.419071 I | auth: deleting token bjCoZacVuaUCTiZW.1160 for user conductor
2021-10-22 02:07:05.419073 I | auth: deleting token MAzicmsbRqxMBbwD.1161 for user conductor
2021-10-22 02:07:05.521733 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.603291694s) to execute
2021-10-22 02:07:06.918989 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.397159986s) to execute
2021-10-22 02:07:06.919082 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.092121923s) to execute
2021-10-22 02:07:06.919300 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.395874032s) to execute
2021-10-22 02:07:07.419164 I | auth: deleting token upHaAHmEtiRGMGmy.1162 for user conductor
2021-10-22 02:07:08.419231 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:07:08.422832 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.40206093s) to execute
2021-10-22 02:07:09.419067 I | auth: deleting token BkLasagDrznoOnKg.1163 for user conductor
2021-10-22 02:07:09.922121 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.194247389s) to execute
2021-10-22 02:07:11.419035 I | auth: deleting token HlwvRNPjxVMjkqjx.1164 for user conductor
2021-10-22 02:07:11.425781 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.405649037s) to execute
2021-10-22 02:07:11.425894 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.501674174s) to execute
2021-10-22 02:07:13.419226 I | auth: deleting token hCUsZwgLQYMrUwMb.1165 for user conductor
2021-10-22 02:07:13.419490 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:07:14.720596 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.202108419s) to execute
2021-10-22 02:07:14.720920 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.292175047s) to execute
2021-10-22 02:07:15.419045 I | auth: deleting token gTIeaeptvawYhCqO.1166 for user conductor
2021-10-22 02:07:16.318297 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.594172254s) to execute
2021-10-22 02:07:16.318466 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.595174885s) to execute
2021-10-22 02:07:16.318492 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.595170587s) to execute
2021-10-22 02:07:17.418939 I | auth: deleting token zVaazhXJHTOYuHdy.1167 for user conductor
2021-10-22 02:07:17.724837 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.404737282s) to execute
2021-10-22 02:07:17.725126 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.306214609s) to execute
2021-10-22 02:07:18.419074 I | auth: deleting token rXGxWFogxygcuUBJ.1168 for user conductor
2021-10-22 02:07:18.419696 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:07:19.318930 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.489005256s) to execute
2021-10-22 02:07:19.319277 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.08497356s) to execute
2021-10-22 02:07:20.419114 I | auth: deleting token pxFgnOOezUblwIEN.1169 for user conductor
2021-10-22 02:07:23.419844 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:07:23.520762 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.276591247s) to execute
2021-10-22 02:07:25.321337 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.693515159s) to execute
2021-10-22 02:07:25.419048 I | auth: deleting token gzJHBuuZMICIMRPz.1172 for user conductor
2021-10-22 02:07:25.419105 I | auth: deleting token EwsSOEBFmKKiXshh.1171 for user conductor
2021-10-22 02:07:25.419122 I | auth: deleting token EyJtZrVIhLGqjVkM.1174 for user conductor
2021-10-22 02:07:25.419130 I | auth: deleting token VkjGQMsqjQLFMtfM.1173 for user conductor
2021-10-22 02:07:25.419147 I | auth: deleting token geRYVyundwdRdRuT.1170 for user conductor
2021-10-22 02:07:27.025303 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.701935313s) to execute
2021-10-22 02:07:27.025662 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.59766076s) to execute
2021-10-22 02:07:28.425674 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:07:29.419179 I | auth: deleting token mnObzNgISytFKrhZ.1175 for user conductor
2021-10-22 02:07:29.419246 I | auth: deleting token vEGJHBFbkJJrhluT.1177 for user conductor
2021-10-22 02:07:29.419263 I | auth: deleting token FvxongGTYvEGMCOB.1176 for user conductor
2021-10-22 02:07:30.319112 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.090932266s) to execute
2021-10-22 02:07:31.419114 I | auth: deleting token HsmQOnswwlxbqcMV.1178 for user conductor
2021-10-22 02:07:31.419165 I | auth: deleting token xepgfaDoAJGJJtAp.1179 for user conductor
2021-10-22 02:07:31.419243 I | auth: deleting token GnZKDhJnnSgCzKjM.1180 for user conductor
2021-10-22 02:07:32.419092 I | auth: deleting token dcPRmaamQygZCGWp.1182 for user conductor
2021-10-22 02:07:32.419165 I | auth: deleting token BtjtgNbYTeVbGITZ.1181 for user conductor
2021-10-22 02:07:33.425922 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:07:33.524512 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.096140871s) to execute
2021-10-22 02:07:33.525032 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.202820499s) to execute
2021-10-22 02:07:33.735158 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (102.115887ms) to execute
2021-10-22 02:07:34.418992 I | auth: deleting token wlCFuvHqHNdMWSFf.1183 for user conductor
2021-10-22 02:07:35.224579 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (906.102253ms) to execute
2021-10-22 02:07:35.419075 I | auth: deleting token MxnWRvcMfRoWSDoh.1184 for user conductor
2021-10-22 02:07:35.419138 I | auth: deleting token MFUpNOXQklhXurVN.1185 for user conductor
2021-10-22 02:07:36.419139 I | auth: deleting token YKRCbYXePHpRoTkd.1186 for user conductor
2021-10-22 02:07:36.721197 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.400719919s) to execute
2021-10-22 02:07:38.518268 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:07:39.419171 I | auth: deleting token jCaxVGkXDZMNfktF.1187 for user conductor
2021-10-22 02:07:39.419222 I | auth: deleting token gALGSLOSXUnwwKty.1188 for user conductor
2021-10-22 02:07:40.020936 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.892953743s) to execute
2021-10-22 02:07:40.021159 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.272097547s) to execute
2021-10-22 02:07:40.129338 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (105.339309ms) to execute
2021-10-22 02:07:40.328667 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (198.057434ms) to execute
2021-10-22 02:07:40.419518 I | auth: deleting token FoXbPRgWRgyJmBGB.1189 for user conductor
2021-10-22 02:07:40.419564 I | auth: deleting token BDJLnBvDpeMaHKfW.1191 for user conductor
2021-10-22 02:07:40.419588 I | auth: deleting token lAkrGyjFBmNGyIAs.1190 for user conductor
2021-10-22 02:07:43.419127 I | auth: deleting token eMQpCPcADAJQlEfw.1192 for user conductor
2021-10-22 02:07:43.419184 I | auth: deleting token veHOTRYPoMyTYWUP.1194 for user conductor
2021-10-22 02:07:43.518627 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:07:45.419058 I | auth: deleting token IKPKlfaQiAqKXhly.1193 for user conductor
2021-10-22 02:07:45.419123 I | auth: deleting token hQPKFnnhnJzbKrXY.1195 for user conductor
2021-10-22 02:07:45.419138 I | auth: deleting token HwVdMWBXqGsZezhj.1197 for user conductor
2021-10-22 02:07:45.419146 I | auth: deleting token lJgCqwajroijlWJh.1196 for user conductor
2021-10-22 02:07:46.419153 I | auth: deleting token nonMHZxEWQVkajXP.1198 for user conductor
2021-10-22 02:07:48.419061 I | auth: deleting token VjRTgAHCEFfiQKLw.1199 for user conductor
2021-10-22 02:07:48.518975 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:07:50.421205 I | auth: deleting token dzKqtJgsHZnfretn.1200 for user conductor
2021-10-22 02:07:52.419064 I | auth: deleting token VchwZIFosRwlXnSw.1201 for user conductor
2021-10-22 02:07:53.419067 I | auth: deleting token THvMxSQMOJEOLXYZ.1202 for user conductor
2021-10-22 02:07:53.519399 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:07:53.822785 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.303978706s) to execute
2021-10-22 02:07:55.321074 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.400326629s) to execute
2021-10-22 02:07:56.419066 I | auth: deleting token KqpLpYqlllZNDSKX.1204 for user conductor
2021-10-22 02:07:56.419120 I | auth: deleting token yyPFfoWtnCxieXRK.1203 for user conductor
2021-10-22 02:07:56.919571 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (3.001183518s) to execute
2021-10-22 02:07:57.418990 I | auth: deleting token rqJjAOrBySdiWYqu.1206 for user conductor
2021-10-22 02:07:57.419077 I | auth: deleting token NYznCMGojBAVLBMh.1205 for user conductor
2021-10-22 02:07:58.422990 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.904454888s) to execute
2021-10-22 02:07:58.423411 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.905003888s) to execute
2021-10-22 02:07:58.520053 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:07:59.823777 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.294575844s) to execute
2021-10-22 02:07:59.823946 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.305379649s) to execute
2021-10-22 02:07:59.824382 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.305769226s) to execute
2021-10-22 02:08:00.419039 I | auth: deleting token YTPWBvzSPSMSclEF.1207 for user conductor
2021-10-22 02:08:00.419096 I | auth: deleting token HvHCCNACeNdkZCBt.1208 for user conductor
2021-10-22 02:08:01.322389 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.403899695s) to execute
2021-10-22 02:08:01.322598 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.30098919s) to execute
2021-10-22 02:08:01.418994 I | auth: deleting token yJiJwoXqlXIlJdao.1209 for user conductor
2021-10-22 02:08:01.429198 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (104.343162ms) to execute
2021-10-22 02:08:03.419044 I | auth: deleting token KdSrCrYbiLpBTBYw.1210 for user conductor
2021-10-22 02:08:03.520498 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:05.419115 I | auth: deleting token owJqKhPAjSWmOjoL.1211 for user conductor
2021-10-22 02:08:06.418992 I | auth: deleting token eqGoOIELtgVQkBcv.1212 for user conductor
2021-10-22 02:08:06.419057 I | auth: deleting token SRowaQmBXqWEzltO.1213 for user conductor
2021-10-22 02:08:07.419173 I | auth: deleting token mcueMcKvvyCJemBj.1214 for user conductor
2021-10-22 02:08:08.419350 I | auth: deleting token PNVdTRGpAovWROnw.1215 for user conductor
2021-10-22 02:08:08.520748 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:10.419137 I | auth: deleting token QPdZeTPHdnbPAnZE.1216 for user conductor
2021-10-22 02:08:12.418982 I | auth: deleting token CUjfsfnXfztEAneS.1217 for user conductor
2021-10-22 02:08:13.521061 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:14.121228 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.09351583s) to execute
2021-10-22 02:08:16.419086 I | auth: deleting token esbFunoXKtqQPhaG.1220 for user conductor
2021-10-22 02:08:16.419127 I | auth: deleting token OwFUwIGIkkECtDsT.1222 for user conductor
2021-10-22 02:08:16.419133 I | auth: deleting token TcjDnGSTxqTDLmPN.1219 for user conductor
2021-10-22 02:08:16.419142 I | auth: deleting token ryCAcSLUezCWWlgQ.1218 for user conductor
2021-10-22 02:08:16.419148 I | auth: deleting token qQfooJQQcEsFkzZa.1221 for user conductor
2021-10-22 02:08:17.419077 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.887393948s) to execute
2021-10-22 02:08:18.521414 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:21.419093 I | auth: deleting token irhzrtMUIWThyeGA.1223 for user conductor
2021-10-22 02:08:21.419147 I | auth: deleting token PxVHohHUJcnDflAo.1226 for user conductor
2021-10-22 02:08:22.419082 I | auth: deleting token ebFEpAZertrvKNrn.1224 for user conductor
2021-10-22 02:08:22.419134 I | auth: deleting token BIvUFcMBJsumNfoi.1228 for user conductor
2021-10-22 02:08:22.419175 I | auth: deleting token tBwwLxsjYDlAZUET.1227 for user conductor
2021-10-22 02:08:22.419192 I | auth: deleting token EmmzVqNmixmLhdUS.1225 for user conductor
2021-10-22 02:08:23.521747 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:23.721549 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.088290873s) to execute
2021-10-22 02:08:23.828093 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (104.630869ms) to execute
2021-10-22 02:08:23.831947 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (108.08369ms) to execute
2021-10-22 02:08:25.418946 I | auth: deleting token qBaobZsjCxuVnzlF.1229 for user conductor
2021-10-22 02:08:25.418993 I | auth: deleting token iqSVCOVNYvVAUfnM.1231 for user conductor
2021-10-22 02:08:25.419022 I | auth: deleting token nODjUKtLFiqkLonb.1230 for user conductor
2021-10-22 02:08:25.419067 I | auth: deleting token RLkZsfqvQwFhzbRa.1232 for user conductor
2021-10-22 02:08:27.023896 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.395914452s) to execute
2021-10-22 02:08:28.419115 I | auth: deleting token rgqojZTasXZQOhxO.1233 for user conductor
2021-10-22 02:08:28.419180 I | auth: deleting token AZSIzYxvqNOXjuZV.1234 for user conductor
2021-10-22 02:08:28.527288 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:29.418995 I | auth: deleting token gzUdpSEZyxqTuCpP.1236 for user conductor
2021-10-22 02:08:29.419083 I | auth: deleting token jekKSsleXiNsibRC.1235 for user conductor
2021-10-22 02:08:31.518629 I | auth: deleting token XuxoPXTjjGyEHpnD.1237 for user conductor
2021-10-22 02:08:32.224640 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.706047174s) to execute
2021-10-22 02:08:32.418969 I | auth: deleting token TzwMukNvsdFntFpn.1238 for user conductor
2021-10-22 02:08:32.528613 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.672955ms) to execute
2021-10-22 02:08:33.418975 I | auth: deleting token KDqQKfPIJneuqmoO.1239 for user conductor
2021-10-22 02:08:33.419071 I | auth: deleting token YXKIHvcBelxtymYn.1240 for user conductor
2021-10-22 02:08:33.582735 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:35.428726 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.410097418s) to execute
2021-10-22 02:08:36.419144 I | auth: deleting token ymikaMufnVpTDaMi.1241 for user conductor
2021-10-22 02:08:37.018633 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.498946083s) to execute
2021-10-22 02:08:37.419077 I | auth: deleting token XybvZjtqkOtrldZO.1243 for user conductor
2021-10-22 02:08:38.325876 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.807345373s) to execute
2021-10-22 02:08:38.326048 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.295915953s) to execute
2021-10-22 02:08:38.326444 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.305949619s) to execute
2021-10-22 02:08:38.582993 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:40.120028 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (401.425613ms) to execute
2021-10-22 02:08:40.419034 I | auth: deleting token WANvcXdOqQKicBiS.1242 for user conductor
2021-10-22 02:08:41.620111 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.392070979s) to execute
2021-10-22 02:08:41.727821 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (104.974256ms) to execute
2021-10-22 02:08:42.518403 I | auth: deleting token XXUHnmtGMeOQbfan.1244 for user conductor
2021-10-22 02:08:42.518478 I | auth: deleting token HHQUjyGOrehRVDLB.1247 for user conductor
2021-10-22 02:08:42.518495 I | auth: deleting token LfYmEunosCsmhwRo.1245 for user conductor
2021-10-22 02:08:42.518510 I | auth: deleting token EDlfDaHgtZELYHGH.1246 for user conductor
2021-10-22 02:08:43.583262 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:45.022704 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.504113321s) to execute
2021-10-22 02:08:45.128289 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (102.321289ms) to execute
2021-10-22 02:08:46.419268 I | auth: deleting token kcLrGikcdhePcyaN.1248 for user conductor
2021-10-22 02:08:47.419098 I | auth: deleting token NUJDwkIeicVbetZN.1252 for user conductor
2021-10-22 02:08:47.419168 I | auth: deleting token GsOpNUrYTTgvJUon.1249 for user conductor
2021-10-22 02:08:47.419201 I | auth: deleting token qiveuqSziGlmqltl.1251 for user conductor
2021-10-22 02:08:47.419218 I | auth: deleting token oDguDuWwrSPVyCoF.1250 for user conductor
2021-10-22 02:08:48.419226 I | auth: deleting token KSFkAKWUfMyyjozq.1254 for user conductor
2021-10-22 02:08:48.419290 I | auth: deleting token jdCZVXKZyeaDtciI.1253 for user conductor
2021-10-22 02:08:48.618307 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:48.718538 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (890.430091ms) to execute
2021-10-22 02:08:50.419041 I | auth: deleting token bWyGcRWdGzdlYMBq.1255 for user conductor
2021-10-22 02:08:50.521386 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (802.767434ms) to execute
2021-10-22 02:08:52.419126 I | auth: deleting token VUpllaHnkOTfNWav.1256 for user conductor
2021-10-22 02:08:52.519335 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (900.677414ms) to execute
2021-10-22 02:08:53.718244 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:08:53.925688 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.207019761s) to execute
2021-10-22 02:08:54.418959 I | auth: deleting token ZsKYhyabYjWJThii.1257 for user conductor
2021-10-22 02:08:55.419063 I | auth: deleting token tizgtqiMKCxOyCxv.1258 for user conductor
2021-10-22 02:08:55.618499 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.490159099s) to execute
2021-10-22 02:08:55.618620 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.500241644s) to execute
2021-10-22 02:08:55.829834 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (208.984625ms) to execute
2021-10-22 02:08:58.418967 I | auth: deleting token XoPYlFTxONAAViKk.1259 for user conductor
2021-10-22 02:08:58.419072 I | auth: deleting token vvvJqGxyvLePsDAd.1260 for user conductor
2021-10-22 02:08:58.419094 I | auth: deleting token xlgoYOWJrQpoAUJV.1261 for user conductor
2021-10-22 02:08:58.718614 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:00.630434 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.200459335s) to execute
2021-10-22 02:09:01.518311 I | auth: deleting token rfuxZItKKMGvaqho.1263 for user conductor
2021-10-22 02:09:01.518353 I | auth: deleting token ahfnGNdiPYTUtiiZ.1264 for user conductor
2021-10-22 02:09:01.518367 I | auth: deleting token JFnlqjKTvsQSnwQu.1262 for user conductor
2021-10-22 02:09:01.518382 I | auth: deleting token sCUNYLfShFrjSSlh.1265 for user conductor
2021-10-22 02:09:02.419069 I | auth: deleting token HFHALMxCgEauezqg.1266 for user conductor
2021-10-22 02:09:03.718867 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:04.419116 I | auth: deleting token wwrglHtYFlPRHJJo.1267 for user conductor
2021-10-22 02:09:05.720818 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.391681893s) to execute
2021-10-22 02:09:06.419111 I | auth: deleting token XziITXGCmddEBAyr.1268 for user conductor
2021-10-22 02:09:08.419100 I | auth: deleting token TPDVmYBfuEjcZLkz.1269 for user conductor
2021-10-22 02:09:08.777993 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:10.419087 I | auth: deleting token bggpYKwfgamQSHRV.1271 for user conductor
2021-10-22 02:09:10.521415 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.701355743s) to execute
2021-10-22 02:09:10.522025 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.798649561s) to execute
2021-10-22 02:09:10.628949 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (104.549599ms) to execute
2021-10-22 02:09:10.629170 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (105.395085ms) to execute
2021-10-22 02:09:10.727676 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (109.133635ms) to execute
2021-10-22 02:09:11.421223 I | auth: deleting token LCyUxcjKhLKfdSMd.1270 for user conductor
2021-10-22 02:09:12.419264 I | auth: deleting token umUawAeKlwTDaGtO.1272 for user conductor
2021-10-22 02:09:13.418997 I | auth: deleting token PYPgqsnsydtGqlYQ.1274 for user conductor
2021-10-22 02:09:13.419079 I | auth: deleting token UDIlVnbPCkvKRdfF.1273 for user conductor
2021-10-22 02:09:13.419107 I | auth: deleting token ufmRfYqDaImPIkkB.1275 for user conductor
2021-10-22 02:09:13.778280 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:15.518250 I | auth: deleting token XlceCBCyveeEcWhW.1276 for user conductor
2021-10-22 02:09:15.518331 I | auth: deleting token owVFnjxzzDodKYxo.1277 for user conductor
2021-10-22 02:09:16.419182 I | auth: deleting token VKwaLuHaNQOMcHfT.1278 for user conductor
2021-10-22 02:09:18.143977 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.910673337s) to execute
2021-10-22 02:09:18.419056 I | auth: deleting token weUsFtpiDzwdXMjQ.1279 for user conductor
2021-10-22 02:09:18.818317 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:20.419232 I | auth: deleting token FpRbfEojyFVdRUhI.1280 for user conductor
2021-10-22 02:09:21.623326 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.304691053s) to execute
2021-10-22 02:09:22.419206 I | auth: deleting token FDPIkNubdmgDTBpn.1281 for user conductor
2021-10-22 02:09:23.325891 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.405778252s) to execute
2021-10-22 02:09:23.818649 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:24.419080 I | auth: deleting token YwmNItvQwnjJyLUT.1282 for user conductor
2021-10-22 02:09:24.419153 I | auth: deleting token JOQkKAKtXURKtRIt.1283 for user conductor
2021-10-22 02:09:24.419171 I | auth: deleting token QhymWkZIOlOkjCth.1284 for user conductor
2021-10-22 02:09:24.926325 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.407452761s) to execute
2021-10-22 02:09:25.128014 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (109.257427ms) to execute
2021-10-22 02:09:27.419075 I | auth: deleting token mVyNwNZmyCvSAAmt.1286 for user conductor
2021-10-22 02:09:28.419084 I | auth: deleting token HcjeclcYLKHOOJQr.1285 for user conductor
2021-10-22 02:09:28.419137 I | auth: deleting token uIAwsncPGmdeYUhQ.1289 for user conductor
2021-10-22 02:09:28.419158 I | auth: deleting token jUvvlPajGaQsAUmw.1287 for user conductor
2021-10-22 02:09:28.419181 I | auth: deleting token teOEStzgqxSXnRqL.1288 for user conductor
2021-10-22 02:09:28.819085 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:30.419182 I | auth: deleting token XADJEFpvRxvTMfnM.1290 for user conductor
2021-10-22 02:09:31.419217 I | auth: deleting token TIlfSZvnnLDFLMSt.1292 for user conductor
2021-10-22 02:09:32.419188 I | auth: deleting token OsjJpvXRzFnVJBmg.1291 for user conductor
2021-10-22 02:09:32.419251 I | auth: deleting token oCFvrgDwbCJKhPyK.1293 for user conductor
2021-10-22 02:09:33.419095 I | auth: deleting token FanUDPbmsgxQYRNZ.1295 for user conductor
2021-10-22 02:09:33.419169 I | auth: deleting token RzxRWngMPdkaAYAx.1294 for user conductor
2021-10-22 02:09:33.819391 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:34.419098 I | auth: deleting token lDXzyeunGEcXXKlZ.1296 for user conductor
2021-10-22 02:09:36.419016 I | auth: deleting token ZiQdRQpesnDWtPVA.1297 for user conductor
2021-10-22 02:09:37.419039 I | auth: deleting token aWsUSqTLxnnxOpzQ.1298 for user conductor
2021-10-22 02:09:38.321456 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (902.888143ms) to execute
2021-10-22 02:09:38.419079 I | auth: deleting token HNdyyJEYzGJdLaTL.1299 for user conductor
2021-10-22 02:09:38.419156 I | auth: deleting token fFihHORvgXvVQXKo.1300 for user conductor
2021-10-22 02:09:38.819715 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:40.219417 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.09151421s) to execute
2021-10-22 02:09:41.419039 I | auth: deleting token IEaRncgBunhUFABw.1302 for user conductor
2021-10-22 02:09:41.419086 I | auth: deleting token mcLcyWLosDMsTMLX.1301 for user conductor
2021-10-22 02:09:41.419099 I | auth: deleting token UTzinNNLisHqVOmy.1303 for user conductor
2021-10-22 02:09:42.019284 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.000705246s) to execute
2021-10-22 02:09:43.418998 I | auth: deleting token BLUvfjCiUapRmJvz.1304 for user conductor
2021-10-22 02:09:43.419098 I | auth: deleting token HTAELuSShekZHGpI.1306 for user conductor
2021-10-22 02:09:43.419119 I | auth: deleting token srUJVCDgQYamChpl.1305 for user conductor
2021-10-22 02:09:43.718579 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.687689183s) to execute
2021-10-22 02:09:43.820142 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:45.323373 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.601643982s) to execute
2021-10-22 02:09:45.323485 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.495389118s) to execute
2021-10-22 02:09:45.419058 I | auth: deleting token gkEjGjStsXBsukED.1308 for user conductor
2021-10-22 02:09:45.419132 I | auth: deleting token FCDmQKpPlcVYgrNZ.1307 for user conductor
2021-10-22 02:09:45.428423 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (102.53976ms) to execute
2021-10-22 02:09:48.423237 I | auth: deleting token EYvXysqqjZyszcdI.1310 for user conductor
2021-10-22 02:09:48.622803 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.392535959s) to execute
2021-10-22 02:09:48.820476 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:48.828825 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (107.346119ms) to execute
2021-10-22 02:09:50.418979 I | auth: deleting token bKzVWIehyWPysMJg.1309 for user conductor
2021-10-22 02:09:50.426555 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.198531682s) to execute
2021-10-22 02:09:51.419092 I | auth: deleting token VqOYtFlRLVBFvxbz.1312 for user conductor
2021-10-22 02:09:51.419148 I | auth: deleting token kBDbgERiyobYUnTU.1311 for user conductor
2021-10-22 02:09:53.419039 I | auth: deleting token VELMpTeVVXZbXzkR.1313 for user conductor
2021-10-22 02:09:53.820806 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:54.419025 I | auth: deleting token uqjEOeaNVwXTpWag.1314 for user conductor
2021-10-22 02:09:54.419086 I | auth: deleting token mqyPoDcnkzFwGVbm.1316 for user conductor
2021-10-22 02:09:54.419105 I | auth: deleting token LgiDxZybiOviKGFm.1315 for user conductor
2021-10-22 02:09:54.822477 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.592343518s) to execute
2021-10-22 02:09:56.231358 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.212944497s) to execute
2021-10-22 02:09:56.231581 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.311028386s) to execute
2021-10-22 02:09:56.419343 I | auth: deleting token MeCikkBiDzxCqjGN.1317 for user conductor
2021-10-22 02:09:56.419406 I | auth: deleting token wvMIgChCXpLyHSse.1318 for user conductor
2021-10-22 02:09:57.922121 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.58854112s) to execute
2021-10-22 02:09:58.419393 I | auth: deleting token nccThAOiWBWuSfEt.1320 for user conductor
2021-10-22 02:09:58.419440 I | auth: deleting token byrxfFanKbIdHfXX.1319 for user conductor
2021-10-22 02:09:58.821052 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:09:59.326344 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.807842114s) to execute
2021-10-22 02:09:59.419051 I | auth: deleting token bAokqWtZuZkNiMfz.1321 for user conductor
2021-10-22 02:09:59.419103 I | auth: deleting token yIPwqCunxgWlWHEl.1322 for user conductor
2021-10-22 02:10:00.919239 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.49835499s) to execute
2021-10-22 02:10:00.919409 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.500948043s) to execute
2021-10-22 02:10:01.419127 I | auth: deleting token nrXBCQYhwSoQijrv.1324 for user conductor
2021-10-22 02:10:01.419215 I | auth: deleting token vPqzmcIFWXWkbMVv.1323 for user conductor
2021-10-22 02:10:02.719302 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (891.185507ms) to execute
2021-10-22 02:10:03.419072 I | auth: deleting token vaXIaclVzFncAWoT.1326 for user conductor
2021-10-22 02:10:03.419141 I | auth: deleting token mjsdeMKFDaMcfhsC.1325 for user conductor
2021-10-22 02:10:03.821271 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:04.120993 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.390494995s) to execute
2021-10-22 02:10:05.419065 I | auth: deleting token oodEqYhCDDYjwYNi.1328 for user conductor
2021-10-22 02:10:06.121800 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (303.287433ms) to execute
2021-10-22 02:10:06.419077 I | auth: deleting token suhTznWphxUoTEkF.1327 for user conductor
2021-10-22 02:10:07.419033 I | auth: deleting token EsyujLdphfboeLlQ.1330 for user conductor
2021-10-22 02:10:07.725376 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.504327735s) to execute
2021-10-22 02:10:08.518331 I | auth: deleting token dYFKiMlCDHHzwLqO.1329 for user conductor
2021-10-22 02:10:08.518395 I | auth: deleting token yYDxIDrYEGhNeQra.1331 for user conductor
2021-10-22 02:10:08.518422 I | auth: deleting token LeVhsjeBIrGKzrDp.1332 for user conductor
2021-10-22 02:10:08.821557 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:09.630080 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.023077ms) to execute
2021-10-22 02:10:10.418977 I | auth: deleting token dbyggrxioupJskDM.1333 for user conductor
2021-10-22 02:10:11.420833 I | auth: deleting token oLjhMzWzntoQkzWd.1334 for user conductor
2021-10-22 02:10:12.719872 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.592080441s) to execute
2021-10-22 02:10:12.929686 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (206.841937ms) to execute
2021-10-22 02:10:13.130414 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (199.53274ms) to execute
2021-10-22 02:10:13.419075 I | auth: deleting token omfbzwSxfdbwCBZZ.1336 for user conductor
2021-10-22 02:10:13.821876 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:14.620410 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (200.568166ms) to execute
2021-10-22 02:10:15.419070 I | auth: deleting token XzkuUISfUeNRiMWP.1335 for user conductor
2021-10-22 02:10:15.419136 I | auth: deleting token AbSmuRIBatjMduRS.1337 for user conductor
2021-10-22 02:10:15.419146 I | auth: deleting token NTNhYwehCTQeAFOn.1339 for user conductor
2021-10-22 02:10:15.419156 I | auth: deleting token EmFGSWiXUqecgkWT.1338 for user conductor
2021-10-22 02:10:16.419124 I | auth: deleting token tlLPmdsshvUTPVGj.1340 for user conductor
2021-10-22 02:10:16.419187 I | auth: deleting token cIPRokiqKqWTMbjU.1341 for user conductor
2021-10-22 02:10:18.419681 I | auth: deleting token fTvMzggjKPosROTs.1342 for user conductor
2021-10-22 02:10:18.822179 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:19.419053 I | auth: deleting token RDzEJThkbjhYvVVH.1343 for user conductor
2021-10-22 02:10:21.418987 I | auth: deleting token NGnpQTYBVBWuLDud.1344 for user conductor
2021-10-22 02:10:22.518612 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (679.891704ms) to execute
2021-10-22 02:10:23.419150 I | auth: deleting token XQpiGuEdzXCuNVmj.1345 for user conductor
2021-10-22 02:10:23.822479 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:24.418999 I | auth: deleting token oadpIIKaGLhwTsXG.1346 for user conductor
2021-10-22 02:10:26.419175 I | auth: deleting token BMEfitPynnGjYTqX.1347 for user conductor
2021-10-22 02:10:27.220764 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.502140635s) to execute
2021-10-22 02:10:27.330119 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (107.598575ms) to execute
2021-10-22 02:10:27.419060 I | auth: deleting token txtxlFHczZWcTZJR.1349 for user conductor
2021-10-22 02:10:27.419119 I | auth: deleting token XKjsoJeaGXnqfJPN.1348 for user conductor
2021-10-22 02:10:27.429655 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (205.505392ms) to execute
2021-10-22 02:10:27.429922 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (205.957081ms) to execute
2021-10-22 02:10:27.528569 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (198.414308ms) to execute
2021-10-22 02:10:28.419097 I | auth: deleting token KGGxJkgwvoyzYPmB.1350 for user conductor
2021-10-22 02:10:28.822708 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:28.825515 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (406.943623ms) to execute
2021-10-22 02:10:30.322857 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.492800651s) to execute
2021-10-22 02:10:30.419132 I | auth: deleting token eCtkcJdwfjvnkDdX.1351 for user conductor
2021-10-22 02:10:31.419119 I | auth: deleting token DxoQicYijcvgeZUT.1353 for user conductor
2021-10-22 02:10:31.419200 I | auth: deleting token zzhDsbzARZWAkbZu.1352 for user conductor
2021-10-22 02:10:33.419157 I | auth: deleting token MmnkBORdZFvwCRBX.1354 for user conductor
2021-10-22 02:10:33.419216 I | auth: deleting token PwUUErvHKzhscxyv.1355 for user conductor
2021-10-22 02:10:33.419228 I | auth: deleting token tfYxgWdOXAqYVSIx.1356 for user conductor
2021-10-22 02:10:33.421231 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.702533368s) to execute
2021-10-22 02:10:33.527927 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (105.035999ms) to execute
2021-10-22 02:10:33.822955 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:36.419116 I | auth: deleting token iKilnqXDtCvlqher.1358 for user conductor
2021-10-22 02:10:36.419175 I | auth: deleting token gEaBYEMCDvAiKsfN.1360 for user conductor
2021-10-22 02:10:36.419192 I | auth: deleting token uYIYzWJMjGDKEbHA.1359 for user conductor
2021-10-22 02:10:36.419205 I | auth: deleting token VLwHPZVcAPbKFQMa.1357 for user conductor
2021-10-22 02:10:38.823261 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:40.419145 I | auth: deleting token cvOXnkaexPhYQokr.1364 for user conductor
2021-10-22 02:10:40.419254 I | auth: deleting token BSdIsNSaVhQbwJNM.1362 for user conductor
2021-10-22 02:10:40.419286 I | auth: deleting token LftwbbuyfIaQmNKS.1363 for user conductor
2021-10-22 02:10:40.419299 I | auth: deleting token AHssfXGOrbLBbCvD.1361 for user conductor
2021-10-22 02:10:43.419375 I | auth: deleting token HQcJyVBugRfqlnmo.1366 for user conductor
2021-10-22 02:10:43.823441 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:45.419045 I | auth: deleting token QYkXycSKkZGYhtPv.1365 for user conductor
2021-10-22 02:10:45.419135 I | auth: deleting token lULBLApoEdhIOafJ.1369 for user conductor
2021-10-22 02:10:45.419155 I | auth: deleting token qIWvxvunCUmqrXzw.1368 for user conductor
2021-10-22 02:10:45.419177 I | auth: deleting token SWwQAuRJhGxRwwYx.1367 for user conductor
2021-10-22 02:10:46.419070 I | auth: deleting token xAsOQRspNAFsmuAR.1371 for user conductor
2021-10-22 02:10:46.419121 I | auth: deleting token QpTMUxyFbUkHZjCt.1370 for user conductor
2021-10-22 02:10:47.123425 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.695198329s) to execute
2021-10-22 02:10:48.419024 I | auth: deleting token XEHOsJQdOXoGhRvG.1372 for user conductor
2021-10-22 02:10:48.719948 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.401275322s) to execute
2021-10-22 02:10:48.720532 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.502013943s) to execute
2021-10-22 02:10:48.720843 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.502352261s) to execute
2021-10-22 02:10:48.729244 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.51071201s) to execute
2021-10-22 02:10:48.823698 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:50.419094 I | auth: deleting token XIquDuWVpNjdLZHB.1373 for user conductor
2021-10-22 02:10:52.018662 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.28703481s) to execute
2021-10-22 02:10:52.419103 I | auth: deleting token YczHXIjGsXKBruvO.1374 for user conductor
2021-10-22 02:10:53.625560 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (807.053497ms) to execute
2021-10-22 02:10:53.823985 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:55.419066 I | auth: deleting token iXKymNFaxMIIYEKJ.1377 for user conductor
2021-10-22 02:10:55.419116 I | auth: deleting token dpIbJCCZDwiLDTOo.1375 for user conductor
2021-10-22 02:10:55.419150 I | auth: deleting token zjMJkZAopJUfGGHd.1378 for user conductor
2021-10-22 02:10:55.419163 I | auth: deleting token JTgkShKaUHggqNHL.1376 for user conductor
2021-10-22 02:10:57.422618 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.104041461s) to execute
2021-10-22 02:10:57.423145 I | auth: deleting token XvKUJWyHgVqyQhEd.1379 for user conductor
2021-10-22 02:10:57.630384 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.363575ms) to execute
2021-10-22 02:10:58.824395 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:10:59.222585 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (994.774553ms) to execute
2021-10-22 02:10:59.419160 I | auth: deleting token GsgBopGKaWzZuClF.1381 for user conductor
2021-10-22 02:11:00.419029 I | auth: deleting token tkoNaJgUgavMVWDS.1382 for user conductor
2021-10-22 02:11:00.419069 I | auth: deleting token pJEEGMjkRiDplQIV.1383 for user conductor
2021-10-22 02:11:00.419085 I | auth: deleting token yGqKvSokZiyWSwKz.1380 for user conductor
2021-10-22 02:11:00.419091 I | auth: deleting token qyMUPfRYFdqPLcyb.1384 for user conductor
2021-10-22 02:11:00.925261 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (797.237019ms) to execute
2021-10-22 02:11:02.419171 I | auth: deleting token wRyiXJFMAdgqDCsa.1385 for user conductor
2021-10-22 02:11:02.419239 I | auth: deleting token jadjInDqAomnxJas.1386 for user conductor
2021-10-22 02:11:03.824865 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:04.419075 I | auth: deleting token sXZWMumHBpnNUQTe.1387 for user conductor
2021-10-22 02:11:04.419136 I | auth: deleting token dpHRLyLgNjnLIjWQ.1388 for user conductor
2021-10-22 02:11:05.419113 I | auth: deleting token wJRwMKBysRQKLzuq.1389 for user conductor
2021-10-22 02:11:08.825155 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:09.422504 I | auth: deleting token IAWgRSibmneATnnC.1391 for user conductor
2021-10-22 02:11:09.422593 I | auth: deleting token BClcGmNanPCEoxMa.1393 for user conductor
2021-10-22 02:11:10.419057 I | auth: deleting token ghPGJAQjUQcGFExO.1392 for user conductor
2021-10-22 02:11:10.419100 I | auth: deleting token jIZxSQKRXGVqiTmF.1390 for user conductor
2021-10-22 02:11:10.419120 I | auth: deleting token ILAIArIpeXVfHSFH.1394 for user conductor
2021-10-22 02:11:10.725817 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.298057485s) to execute
2021-10-22 02:11:10.928766 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (110.120686ms) to execute
2021-10-22 02:11:12.325684 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.407223847s) to execute
2021-10-22 02:11:13.419109 I | auth: deleting token KVZkuxXqWNBkIlEj.1397 for user conductor
2021-10-22 02:11:13.419187 I | auth: deleting token ieWbtkPoUsanLbXW.1396 for user conductor
2021-10-22 02:11:13.419277 I | auth: deleting token bKxsdqDEKNuPuYSL.1398 for user conductor
2021-10-22 02:11:13.419344 I | auth: deleting token MIEOWlOZbjxwHruu.1395 for user conductor
2021-10-22 02:11:13.825439 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:13.931417 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.011432041s) to execute
2021-10-22 02:11:14.419028 I | auth: deleting token aqfqxiUDCkieQDCK.1399 for user conductor
2021-10-22 02:11:15.422676 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.304132677s) to execute
2021-10-22 02:11:15.422897 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.194850202s) to execute
2021-10-22 02:11:15.528054 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.436819ms) to execute
2021-10-22 02:11:16.419067 I | auth: deleting token mNTEDmDCnySOdDat.1400 for user conductor
2021-10-22 02:11:17.023898 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (996.133468ms) to execute
2021-10-22 02:11:18.419386 I | auth: deleting token kPjWTHAITKSALzdK.1401 for user conductor
2021-10-22 02:11:18.522595 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.404138897s) to execute
2021-10-22 02:11:18.825724 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:20.419176 I | auth: deleting token YzEsOvwtEopUaZaW.1402 for user conductor
2021-10-22 02:11:22.419126 I | auth: deleting token QMYPpihRDNbcgvSV.1403 for user conductor
2021-10-22 02:11:23.826089 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:25.419206 I | auth: deleting token KJdPpIJqOXYBTmxW.1405 for user conductor
2021-10-22 02:11:26.419111 I | auth: deleting token zeylaFQqFMQClAit.1407 for user conductor
2021-10-22 02:11:26.419249 I | auth: deleting token EHDBgyKGCUWktBWl.1408 for user conductor
2021-10-22 02:11:26.419262 I | auth: deleting token NodAAlZSnzIAFvQG.1406 for user conductor
2021-10-22 02:11:26.419284 I | auth: deleting token xYhPjbLjvUPIeEOQ.1404 for user conductor
2021-10-22 02:11:28.826450 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:29.419230 I | auth: deleting token QGeDziwAoKRyiQCN.1410 for user conductor
2021-10-22 02:11:29.419382 I | auth: deleting token fYXqqvUNodgJTMAv.1411 for user conductor
2021-10-22 02:11:29.419422 I | auth: deleting token iTMgmYdjKeakdXej.1409 for user conductor
2021-10-22 02:11:30.419132 I | auth: deleting token wHEtNawRFzRIHKnF.1412 for user conductor
2021-10-22 02:11:31.419253 I | auth: deleting token NJnBORoTqtBLbUWA.1413 for user conductor
2021-10-22 02:11:33.419092 I | auth: deleting token aiAdIQYaCPlGVhRP.1414 for user conductor
2021-10-22 02:11:33.826849 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:35.419068 I | auth: deleting token cxBioYgRLuPZHgAA.1415 for user conductor
2021-10-22 02:11:37.419063 I | auth: deleting token IFrgRQEPzxeRYuft.1416 for user conductor
2021-10-22 02:11:38.419206 I | auth: deleting token txvrmWKHSRnNBcVl.1417 for user conductor
2021-10-22 02:11:38.419258 I | auth: deleting token MdFZvnRfTpObFTyP.1418 for user conductor
2021-10-22 02:11:38.827194 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-10-22 02:11:39.320721 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.589043076s) to execute
2021-10-22 02:11:41.123296 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.402553984s) to execute
2021-10-22 02:11:42.419097 I | auth: deleting token PXbrLJecqBtCflrS.1420 for user conductor
2021-10-22 02:11:42.419377 I | auth: deleting token zVaTNDBNsTfpzqIO.1422 for user conductor
2021-10-22 02:11:42.419387 I | auth: deleting token bSNniZcAdAGKuWPJ.1419 for user conductor
2021-10-22 02:11:42.419394 I | auth: deleting token WjDjitFOiMjbCMjU.1421 for user conductor
2021-10-22 02:11:42.618690 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.493113079s) to execute
2021-10-22 02:11:42.618827 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.300325721s) to execute
2021-10-22 02:11:43.827431 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:44.320491 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.599425527s) to execute
2021-10-22 02:11:44.419054 I | auth: deleting token xsnIQRwabevrEtWa.1423 for user conductor
2021-10-22 02:11:45.418985 I | auth: deleting token EIDTtRhNuGDZaBap.1424 for user conductor
2021-10-22 02:11:45.826058 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.394882596s) to execute
2021-10-22 02:11:47.419180 I | auth: deleting token cHZQuQnqWRBtAMvx.1426 for user conductor
2021-10-22 02:11:47.419246 I | auth: deleting token hsTJoUBHSReBxUqH.1425 for user conductor
2021-10-22 02:11:48.419083 I | auth: deleting token FSiuhMpgfotQNGzc.1428 for user conductor
2021-10-22 02:11:48.419127 I | auth: deleting token NaISQbtiECiOXiEf.1427 for user conductor
2021-10-22 02:11:48.419158 I | auth: deleting token cWSFJkJSJPXBsziZ.1429 for user conductor
2021-10-22 02:11:48.827719 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:52.721834 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (393.689737ms) to execute
2021-10-22 02:11:53.827968 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:55.419217 I | auth: deleting token YIWeDDaRMIOXmyxR.1434 for user conductor
2021-10-22 02:11:55.419259 I | auth: deleting token QIgxUuCmkFByWRvs.1431 for user conductor
2021-10-22 02:11:55.419280 I | auth: deleting token kcGRexLfcdEoausD.1433 for user conductor
2021-10-22 02:11:55.419302 I | auth: deleting token yjHCqMvWqFqqgteB.1435 for user conductor
2021-10-22 02:11:55.419314 I | auth: deleting token aYcddKISosgXluFa.1430 for user conductor
2021-10-22 02:11:55.419338 I | auth: deleting token eVVOCRvhoQlmdiTO.1432 for user conductor
2021-10-22 02:11:56.220537 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.102027583s) to execute
2021-10-22 02:11:57.729705 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.49959922s) to execute
2021-10-22 02:11:57.729827 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.507303839s) to execute
2021-10-22 02:11:57.729851 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.507358535s) to execute
2021-10-22 02:11:57.918622 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (185.92601ms) to execute
2021-10-22 02:11:58.420547 I | auth: deleting token NvCCxZDOEdqchgBy.1436 for user conductor
2021-10-22 02:11:58.420598 I | auth: deleting token KVGuUQCnpiIyhGRL.1438 for user conductor
2021-10-22 02:11:58.828186 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:11:59.524574 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.703057507s) to execute
2021-10-22 02:12:01.220456 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.502065991s) to execute
2021-10-22 02:12:01.419189 I | auth: deleting token CtRmdMUAofGmcNNf.1441 for user conductor
2021-10-22 02:12:01.419258 I | auth: deleting token fiiJiQNiXfJhUkCj.1437 for user conductor
2021-10-22 02:12:01.419277 I | auth: deleting token zmCgkNilmZTOqpaM.1439 for user conductor
2021-10-22 02:12:01.419291 I | auth: deleting token NuxoDLVcZVhLHjey.1440 for user conductor
2021-10-22 02:12:01.419340 I | auth: deleting token lCXcnVxHIDpqAxlM.1442 for user conductor
2021-10-22 02:12:02.721454 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.489969165s) to execute
2021-10-22 02:12:02.721834 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.499181249s) to execute
2021-10-22 02:12:02.828946 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (105.399914ms) to execute
2021-10-22 02:12:03.118922 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (200.143165ms) to execute
2021-10-22 02:12:03.886878 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:12:06.419050 I | auth: deleting token SQSiKacUYpQNBNit.1443 for user conductor
2021-10-22 02:12:07.419065 I | auth: deleting token PDbslnUoPvKLRZSh.1446 for user conductor
2021-10-22 02:12:07.419109 I | auth: deleting token afLYdynLRwPdfQwa.1444 for user conductor
2021-10-22 02:12:07.419140 I | auth: deleting token DgcsXRLRKoTdJPPN.1448 for user conductor
2021-10-22 02:12:07.419152 I | auth: deleting token YnGovtwdvPQdweev.1447 for user conductor
2021-10-22 02:12:07.419174 I | auth: deleting token TAprUuvmNRdJfqsJ.1445 for user conductor
2021-10-22 02:12:08.324147 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.304208472s) to execute
2021-10-22 02:12:08.887171 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:12:10.124379 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.702378259s) to execute
2021-10-22 02:12:10.124574 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.798101255s) to execute
2021-10-22 02:12:10.419061 I | auth: deleting token tMKkfeKNatfpUmtE.1449 for user conductor
2021-10-22 02:12:11.620146 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.293387505s) to execute
2021-10-22 02:12:11.620605 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.391170944s) to execute
2021-10-22 02:12:11.620858 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.494289228s) to execute
2021-10-22 02:12:12.420034 I | auth: deleting token kdgGdEjnugnCgqKe.1450 for user conductor
2021-10-22 02:12:13.621137 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.402701185s) to execute
2021-10-22 02:12:13.918240 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:12:15.318240 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.403161025s) to execute
2021-10-22 02:12:15.419083 I | auth: deleting token BUdgGshSPugWqbOR.1451 for user conductor
2021-10-22 02:12:16.419029 I | auth: deleting token dpPFHDmpAPTnHHdq.1453 for user conductor
2021-10-22 02:12:16.419086 I | auth: deleting token yHwhwTeWTJXlIbXm.1452 for user conductor
2021-10-22 02:12:16.822968 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (494.997091ms) to execute
2021-10-22 02:12:17.419339 I | auth: deleting token yPQpBQsdFHhFCaGt.1454 for user conductor
2021-10-22 02:12:17.419415 I | auth: deleting token XpjgAtoMiWwgvRdW.1455 for user conductor
2021-10-22 02:12:18.419106 I | auth: deleting token NUubwaKLcNQmuUad.1456 for user conductor
2021-10-22 02:12:18.918678 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:12:19.419141 I | auth: deleting token pVsDWhWisUSlyQOj.1457 for user conductor
2021-10-22 02:12:20.419089 I | auth: deleting token QZUGctfWOCqsYvwj.1458 for user conductor
2021-10-22 02:12:20.419155 I | auth: deleting token nwtEHCeQZAmzyCMS.1459 for user conductor
2021-10-22 02:12:22.419153 I | auth: deleting token XlXghuTzRrGoGfVZ.1460 for user conductor
2021-10-22 02:12:23.918939 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:12:24.419092 I | auth: deleting token vJcWFudSIthyyhRo.1461 for user conductor
2021-10-22 02:12:25.419159 I | auth: deleting token lcIZxGZzEImHOOXq.1463 for user conductor
2021-10-22 02:12:26.419127 I | auth: deleting token GMVmFIpUtSEGeMBl.1462 for user conductor
2021-10-22 02:12:27.419151 I | auth: deleting token ogiamTeygXrceANf.1464 for user conductor
2021-10-22 02:12:27.419220 I | auth: deleting token dUNIwmwjsTGxBbcV.1465 for user conductor
2021-10-22 02:12:27.419260 I | auth: deleting token zoocIzgaMKNHNiMO.1466 for user conductor
2021-10-22 02:12:28.919276 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:12:30.519264 I | auth: deleting token aIhyEpvERrqCYdPc.1467 for user conductor
2021-10-22 02:12:30.519308 I | auth: deleting token OuwdqTZkYsKxVBlF.1469 for user conductor
2021-10-22 02:12:32.419613 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.301047739s) to execute
2021-10-22 02:12:32.528801 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (101.361797ms) to execute
2021-10-22 02:12:33.919537 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:12:34.518858 I | auth: deleting token POskKnCrEIkUnjfW.1470 for user conductor
2021-10-22 02:12:34.518906 I | auth: deleting token XnmHRppeCnsgczJf.1472 for user conductor
2021-10-22 02:12:34.518939 I | auth: deleting token DkrMueAklBvkCsDi.1473 for user conductor
2021-10-22 02:12:34.518948 I | auth: deleting token XduEoyrZStYixyVl.1471 for user conductor
2021-10-22 02:12:34.518978 I | auth: deleting token uxgDbXRAfpeTaQvp.1468 for user conductor
2021-10-22 02:12:34.519077 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.291346154s) to execute
2021-10-22 02:12:35.419056 I | auth: deleting token zKtXRkzclzoZyBCG.1474 for user conductor
2021-10-22 02:12:37.419081 I | auth: deleting token okcETTXiLocWutlq.1475 for user conductor
2021-10-22 02:12:38.818784 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.100211141s) to execute
2021-10-22 02:12:38.919842 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:12:38.929399 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (107.475711ms) to execute
2021-10-22 02:12:38.929583 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (107.797385ms) to execute
2021-10-22 02:12:40.419265 I | auth: deleting token oTryBkZJWUmSePJN.1477 for user conductor
2021-10-22 02:12:40.419310 I | auth: deleting token fDFUCMJAftktTion.1476 for user conductor
2021-10-22 02:12:40.419319 I | auth: deleting token rFoAfTbMXeFLZEZT.1479 for user conductor
2021-10-22 02:12:40.419327 I | auth: deleting token UKVBABXIgUKQtYph.1480 for user conductor
2021-10-22 02:12:40.419333 I | auth: deleting token ADrgaLGLPrCRRvBe.1478 for user conductor
2021-10-22 02:12:40.524174 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.690667696s) to execute
2021-10-22 02:12:42.419078 I | auth: deleting token cBUkupLFygsdhZmR.1482 for user conductor
2021-10-22 02:12:42.419386 I | auth: deleting token rUiWzlydrHmALIdh.1481 for user conductor
2021-10-22 02:12:43.021300 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (401.810646ms) to execute
2021-10-22 02:12:43.920170 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:12:44.419056 I | auth: deleting token XlvbRLsHbeaTEMrm.1483 for user conductor
2021-10-22 02:12:46.419148 I | auth: deleting token rDugIcoikyaufUyM.1484 for user conductor
2021-10-22 02:12:47.318612 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (585.738578ms) to execute
2021-10-22 02:12:48.419054 I | auth: deleting token WYyZNcApZigmWaHf.1485 for user conductor
2021-10-22 02:12:48.920491 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:12:50.226985 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.80622899s) to execute
2021-10-22 02:12:50.419052 I | auth: deleting token afqEHKwJrAKalfkA.1486 for user conductor
2021-10-22 02:12:50.419117 I | auth: deleting token OqYWCiCbyXdWBetB.1487 for user conductor
2021-10-22 02:12:50.429182 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (107.106001ms) to execute
2021-10-22 02:12:50.429329 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (107.742335ms) to execute
2021-10-22 02:12:53.921200 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:12:54.419034 I | auth: deleting token XITCtgwdFFdrmozn.1490 for user conductor
2021-10-22 02:12:54.419071 I | auth: deleting token bvTsZBnRvdJCyltO.1488 for user conductor
2021-10-22 02:12:54.821558 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.690172973s) to execute
2021-10-22 02:12:54.930914 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (106.857669ms) to execute
2021-10-22 02:12:55.029387 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (204.843764ms) to execute
2021-10-22 02:12:55.129096 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.798151ms) to execute
2021-10-22 02:12:55.419161 I | auth: deleting token DXhjiETzPxtNXPsb.1489 for user conductor
2021-10-22 02:12:57.619158 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.191129838s) to execute
2021-10-22 02:12:58.921400 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:12:59.219319 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.000805232s) to execute
2021-10-22 02:12:59.419082 I | auth: deleting token ZdNEGZLIhOXfeDJP.1491 for user conductor
2021-10-22 02:13:00.419061 I | auth: deleting token NuJsxmBvyrzmSpFr.1493 for user conductor
2021-10-22 02:13:00.419132 I | auth: deleting token IwrZZHhohuDSPUwv.1492 for user conductor
2021-10-22 02:13:00.419176 I | auth: deleting token OxMGaQDrNBtkfHhS.1494 for user conductor
2021-10-22 02:13:01.723344 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (291.169377ms) to execute
2021-10-22 02:13:02.419131 I | auth: deleting token WBSSaeSuGFLAUUBS.1496 for user conductor
2021-10-22 02:13:02.419240 I | auth: deleting token BRdRsrxsEsHSQNEK.1495 for user conductor
2021-10-22 02:13:03.618422 I | auth: deleting token ehzBhxRzUfnocJsM.1498 for user conductor
2021-10-22 02:13:03.618470 I | auth: deleting token IewCUUcBQFgKVmLs.1497 for user conductor
2021-10-22 02:13:03.921729 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:05.419184 I | auth: deleting token HfreXHMBmgJqUBox.1499 for user conductor
2021-10-22 02:13:06.720430 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.501912071s) to execute
2021-10-22 02:13:06.828109 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (104.363077ms) to execute
2021-10-22 02:13:07.419161 I | auth: deleting token OFsjOhsvgmKKIHFN.1500 for user conductor
2021-10-22 02:13:08.922004 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:09.419076 I | auth: deleting token sQrfqcNATnzqFuzF.1501 for user conductor
2021-10-22 02:13:09.826588 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.605831103s) to execute
2021-10-22 02:13:11.418944 I | auth: deleting token EArzXeNygNBXhtUj.1502 for user conductor
2021-10-22 02:13:12.821269 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.991988266s) to execute
2021-10-22 02:13:12.821667 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.793726613s) to execute
2021-10-22 02:13:12.821988 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.903465576s) to execute
2021-10-22 02:13:13.922184 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:14.419046 I | auth: deleting token MYxKsbjPspEFcWfm.1504 for user conductor
2021-10-22 02:13:14.419097 I | auth: deleting token PCfNENccRXzKzfUl.1505 for user conductor
2021-10-22 02:13:14.419119 I | auth: deleting token AUrGKCHfQEbrdZVR.1503 for user conductor
2021-10-22 02:13:14.419522 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.489275486s) to execute
2021-10-22 02:13:16.220930 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.200071623s) to execute
2021-10-22 02:13:17.419215 I | auth: deleting token xEDTQfHdnvUgcMqq.1506 for user conductor
2021-10-22 02:13:18.419050 I | auth: deleting token pjRWRQgGSUxGgGWR.1507 for user conductor
2021-10-22 02:13:18.419085 I | auth: deleting token mZwstHknHceWjUdG.1508 for user conductor
2021-10-22 02:13:18.419096 I | auth: deleting token NyucDAwCrhqbIoqp.1509 for user conductor
2021-10-22 02:13:18.922496 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:22.626915 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.196276279s) to execute
2021-10-22 02:13:23.922741 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:24.322997 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.601857095s) to execute
2021-10-22 02:13:24.323188 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.693803167s) to execute
2021-10-22 02:13:24.419203 I | auth: deleting token XbkBKTbekUgWGrca.1515 for user conductor
2021-10-22 02:13:24.419426 I | auth: deleting token xmAzywboWEELFYmH.1514 for user conductor
2021-10-22 02:13:24.419471 I | auth: deleting token BJJumKpEvieUecZs.1511 for user conductor
2021-10-22 02:13:24.419541 I | auth: deleting token UFTpobAvYQoDjxrV.1513 for user conductor
2021-10-22 02:13:24.419713 I | auth: deleting token nNMkwCuPcoaXPHrh.1512 for user conductor
2021-10-22 02:13:24.419795 I | auth: deleting token UuykSsObxHMQbOyc.1510 for user conductor
2021-10-22 02:13:25.820161 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.494795932s) to execute
2021-10-22 02:13:25.820379 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.401899143s) to execute
2021-10-22 02:13:27.419180 I | auth: deleting token nXoxIDcAQwHMyTQx.1516 for user conductor
2021-10-22 02:13:27.419242 I | auth: deleting token CicvYraFgNbNNphd.1517 for user conductor
2021-10-22 02:13:27.419252 I | auth: deleting token JAxSRlaokQgUejlT.1518 for user conductor
2021-10-22 02:13:27.419264 I | auth: deleting token UlKucCBLJYMjahFU.1519 for user conductor
2021-10-22 02:13:27.719483 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.58843573s) to execute
2021-10-22 02:13:28.419065 I | auth: deleting token meUUprKHkZrJCZgs.1520 for user conductor
2021-10-22 02:13:28.923437 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:29.126950 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.308203776s) to execute
2021-10-22 02:13:29.218443 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.496279891s) to execute
2021-10-22 02:13:31.020757 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.800579581s) to execute
2021-10-22 02:13:32.325949 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.307443617s) to execute
2021-10-22 02:13:32.419052 I | auth: deleting token HeJkJVkaZqcjBqre.1521 for user conductor
2021-10-22 02:13:32.419099 I | auth: deleting token uYkvPdrPwtsnGdpA.1522 for user conductor
2021-10-22 02:13:32.428502 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (100.953499ms) to execute
2021-10-22 02:13:33.419113 I | auth: deleting token WerFYRZgxdYoXWMf.1523 for user conductor
2021-10-22 02:13:33.419183 I | auth: deleting token EAxlWAseBubHswxL.1524 for user conductor
2021-10-22 02:13:33.923715 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:36.419038 I | auth: deleting token MNNoZewSRiLVHJhq.1526 for user conductor
2021-10-22 02:13:37.419092 I | auth: deleting token TpPfhfoNtKdBVHtG.1525 for user conductor
2021-10-22 02:13:38.419202 I | auth: deleting token aTTVEDqMthmDDceV.1527 for user conductor
2021-10-22 02:13:38.419245 I | auth: deleting token qpeOTnEeWBEiiwtM.1529 for user conductor
2021-10-22 02:13:38.923956 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:39.419579 I | auth: deleting token YLHgaWCCpJtjHlsL.1530 for user conductor
2021-10-22 02:13:39.419626 I | auth: deleting token piFvMcRDvvxnItkI.1528 for user conductor
2021-10-22 02:13:40.419166 I | auth: deleting token AoEVhkRnagFLUqDV.1531 for user conductor
2021-10-22 02:13:42.419043 I | auth: deleting token fIcvwkSRNJyZjQyl.1534 for user conductor
2021-10-22 02:13:42.419122 I | auth: deleting token TBQIMpiJYSqYvCVM.1532 for user conductor
2021-10-22 02:13:42.419137 I | auth: deleting token HoelUDmnkUAFRPGD.1533 for user conductor
2021-10-22 02:13:43.924358 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:45.418939 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.290902204s) to execute
2021-10-22 02:13:45.419126 I | auth: deleting token NecVosYdFjVlSpqh.1537 for user conductor
2021-10-22 02:13:45.419359 I | auth: deleting token XWuLxAoRfdHTPATT.1536 for user conductor
2021-10-22 02:13:45.420328 I | auth: deleting token XuZmjkHIjqGrGxJt.1535 for user conductor
2021-10-22 02:13:46.419163 I | auth: deleting token nnMtkAgOJEkVQyvz.1538 for user conductor
2021-10-22 02:13:48.522992 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.889445809s) to execute
2021-10-22 02:13:48.727791 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (103.965366ms) to execute
2021-10-22 02:13:48.924641 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:49.427368 I | auth: deleting token jUKPvXLurginwNYF.1539 for user conductor
2021-10-22 02:13:49.427430 I | auth: deleting token qcypbszaWsxpDqZN.1540 for user conductor
2021-10-22 02:13:51.419072 I | auth: deleting token XXCrSXDERDqSIxXE.1542 for user conductor
2021-10-22 02:13:51.419128 I | auth: deleting token uBkQFvvZMBmnZebP.1541 for user conductor
2021-10-22 02:13:53.225247 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.805621757s) to execute
2021-10-22 02:13:53.328097 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.071313ms) to execute
2021-10-22 02:13:53.418956 I | auth: deleting token KBsqQuERIbJfjpnS.1543 for user conductor
2021-10-22 02:13:53.924797 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:54.418960 I | auth: deleting token rzigSyOhykBWaTHr.1544 for user conductor
2021-10-22 02:13:54.419037 I | auth: deleting token AVLZFSUuqIywYwdf.1545 for user conductor
2021-10-22 02:13:56.219360 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.091333807s) to execute
2021-10-22 02:13:56.419077 I | auth: deleting token VyTEyThNmHUxsswA.1548 for user conductor
2021-10-22 02:13:56.419119 I | auth: deleting token DtcarMSrAwqOSqZl.1546 for user conductor
2021-10-22 02:13:56.419142 I | auth: deleting token DTmikhcXxnxQDFqt.1547 for user conductor
2021-10-22 02:13:57.725534 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.307032247s) to execute
2021-10-22 02:13:58.418948 I | auth: deleting token meJrMgkmdEATbJvU.1549 for user conductor
2021-10-22 02:13:58.419051 I | auth: deleting token PGbRcEvcBhmFbCWa.1550 for user conductor
2021-10-22 02:13:59.018337 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:13:59.226385 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.004645104s) to execute
2021-10-22 02:13:59.227861 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.409615582s) to execute
2021-10-22 02:13:59.228458 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.501006613s) to execute
2021-10-22 02:13:59.419219 I | auth: deleting token fftGbkSzDWBwdggs.1551 for user conductor
2021-10-22 02:13:59.419858 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (133.33785ms) to execute
2021-10-22 02:14:01.418950 I | auth: deleting token zzERTOZPuGTkXhwc.1552 for user conductor
2021-10-22 02:14:01.419036 I | auth: deleting token nzQzhdzPkfsSIUEn.1553 for user conductor
2021-10-22 02:14:02.419075 I | auth: deleting token kulSMCJGWWfPqxrD.1554 for user conductor
2021-10-22 02:14:04.018618 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:05.818956 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.6896072s) to execute
2021-10-22 02:14:06.419112 I | auth: deleting token NGQCMeyTnlUTyODo.1555 for user conductor
2021-10-22 02:14:07.425219 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (596.715218ms) to execute
2021-10-22 02:14:09.018857 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:09.026797 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (107.062061ms) to execute
2021-10-22 02:14:11.419085 I | auth: deleting token ZfxeDLngEvEYYGPg.1560 for user conductor
2021-10-22 02:14:11.419161 I | auth: deleting token kGogmhNCYVMWApqq.1558 for user conductor
2021-10-22 02:14:11.419177 I | auth: deleting token EbVLfgXIdXryMaNm.1559 for user conductor
2021-10-22 02:14:11.419192 I | auth: deleting token AhBRSFhWpsQYURwP.1556 for user conductor
2021-10-22 02:14:11.419219 I | auth: deleting token ghKhnRrpLFsUoQLQ.1557 for user conductor
2021-10-22 02:14:12.719562 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (591.637946ms) to execute
2021-10-22 02:14:14.019106 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:14.521073 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (302.573334ms) to execute
2021-10-22 02:14:16.431930 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.369243ms) to execute
2021-10-22 02:14:18.419172 I | auth: deleting token yXpAGaKrVgxpXVOp.1561 for user conductor
2021-10-22 02:14:18.419232 I | auth: deleting token QWAFxZRCELUStyfE.1564 for user conductor
2021-10-22 02:14:18.419269 I | auth: deleting token SyujnVRLcdZuopty.1563 for user conductor
2021-10-22 02:14:18.419279 I | auth: deleting token DllIYMDQmNOyuLnn.1562 for user conductor
2021-10-22 02:14:18.419291 I | auth: deleting token pApUUblIRFEGcVuo.1565 for user conductor
2021-10-22 02:14:19.019425 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:22.419173 I | auth: deleting token WfKroDhXgKsYQvQj.1567 for user conductor
2021-10-22 02:14:22.419230 I | auth: deleting token WiBAxnohLBpHBRVe.1566 for user conductor
2021-10-22 02:14:22.419240 I | auth: deleting token wupxorBZCxHOhUZm.1568 for user conductor
2021-10-22 02:14:23.319949 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.590363696s) to execute
2021-10-22 02:14:23.419034 I | auth: deleting token lCuqMvtfnGinxEYS.1569 for user conductor
2021-10-22 02:14:24.019651 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:25.419169 I | auth: deleting token KfQEdMJVnAWjVndx.1570 for user conductor
2021-10-22 02:14:25.419247 I | auth: deleting token uqJdvUgajnBaklxm.1571 for user conductor
2021-10-22 02:14:25.419268 I | auth: deleting token fxhqPjgQNRuwnAWz.1572 for user conductor
2021-10-22 02:14:26.419106 I | auth: deleting token WwcpikkweOchxrVt.1573 for user conductor
2021-10-22 02:14:26.521143 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.802607605s) to execute
2021-10-22 02:14:26.628290 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (104.749469ms) to execute
2021-10-22 02:14:27.419026 I | auth: deleting token GtUngUijiyHJKXZg.1574 for user conductor
2021-10-22 02:14:28.023632 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (705.121349ms) to execute
2021-10-22 02:14:29.019827 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:29.418933 I | auth: deleting token nLiRCXUedklxbZPO.1575 for user conductor
2021-10-22 02:14:29.725795 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (686.965875ms) to execute
2021-10-22 02:14:31.419226 I | auth: deleting token aOPvJqhYbVfvYCwZ.1576 for user conductor
2021-10-22 02:14:33.419081 I | auth: deleting token hLSCTMjBsVCBcJTX.1577 for user conductor
2021-10-22 02:14:34.020208 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:35.419072 I | auth: deleting token xTZzkzCzwksWGlNb.1578 for user conductor
2021-10-22 02:14:37.418960 I | auth: deleting token XBsIExgwdGuojvHg.1579 for user conductor
2021-10-22 02:14:37.425929 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (907.470408ms) to execute
2021-10-22 02:14:38.718303 I | auth: deleting token XqmVKSwQToTTTvMa.1580 for user conductor
2021-10-22 02:14:38.718358 I | auth: deleting token hBQhjJRjGcrGrJdJ.1581 for user conductor
2021-10-22 02:14:39.020596 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:39.120517 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.60211962s) to execute
2021-10-22 02:14:40.419081 I | auth: deleting token YfogHTBdSxLxNJUN.1582 for user conductor
2021-10-22 02:14:41.518277 I | auth: deleting token DTRFjGBpeaaJJrRC.1583 for user conductor
2021-10-22 02:14:42.419148 I | auth: deleting token lsXxqsqgOwNIzNDt.1584 for user conductor
2021-10-22 02:14:44.020990 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:44.419070 I | auth: deleting token kIoEZctlNnUAEVKh.1585 for user conductor
2021-10-22 02:14:44.419147 I | auth: deleting token QtwLSYHLxLQaUaOM.1586 for user conductor
2021-10-22 02:14:45.419058 I | auth: deleting token roLeBbOedOEzBdnW.1588 for user conductor
2021-10-22 02:14:46.419092 I | auth: deleting token BivXfrzfXGYUFWDr.1589 for user conductor
2021-10-22 02:14:46.419140 I | auth: deleting token pRvZOESEEUkEQBgn.1587 for user conductor
2021-10-22 02:14:47.020867 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.392009304s) to execute
2021-10-22 02:14:48.520891 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.49171363s) to execute
2021-10-22 02:14:49.021300 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:49.419089 I | auth: deleting token AVbhJOXfRAuXDyff.1590 for user conductor
2021-10-22 02:14:49.419140 I | auth: deleting token GFjNWYsytHpyPQzt.1591 for user conductor
2021-10-22 02:14:49.419153 I | auth: deleting token byWIlxXMzEvKeMer.1592 for user conductor
2021-10-22 02:14:50.118298 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.396163638s) to execute
2021-10-22 02:14:50.118596 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.59550614s) to execute
2021-10-22 02:14:50.228527 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (108.586014ms) to execute
2021-10-22 02:14:50.230730 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.208586ms) to execute
2021-10-22 02:14:51.418940 I | auth: deleting token jUVhAPqLpdbXORUC.1594 for user conductor
2021-10-22 02:14:51.418985 I | auth: deleting token QBVljERzGbgghyJh.1593 for user conductor
2021-10-22 02:14:52.419134 I | auth: deleting token mQdrTRvygSEMkeUT.1595 for user conductor
2021-10-22 02:14:54.021646 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:55.419079 I | auth: deleting token vbbtzDdzxfWhXiea.1597 for user conductor
2021-10-22 02:14:56.419128 I | auth: deleting token zVJPwFmYYrBjQloA.1598 for user conductor
2021-10-22 02:14:56.419186 I | auth: deleting token rYDsvfCNauXVCSFy.1599 for user conductor
2021-10-22 02:14:56.419208 I | auth: deleting token dITcVggtRxecarlP.1596 for user conductor
2021-10-22 02:14:57.419057 I | auth: deleting token nfYkMEzYopVawxbl.1600 for user conductor
2021-10-22 02:14:59.022009 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:14:59.420377 I | auth: deleting token LKHvgYIOLrkyMbnu.1601 for user conductor
2021-10-22 02:15:00.823143 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (391.3009ms) to execute
2021-10-22 02:15:01.419045 I | auth: deleting token lGzGtifdUSbkjtrq.1605 for user conductor
2021-10-22 02:15:01.419090 I | auth: deleting token oepYJagNBHuiwhsy.1604 for user conductor
2021-10-22 02:15:01.419099 I | auth: deleting token DFBQOzvtGPqssBmX.1603 for user conductor
2021-10-22 02:15:01.419107 I | auth: deleting token qvANtLIEqEwCCfIg.1602 for user conductor
2021-10-22 02:15:02.326879 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (198.567551ms) to execute
2021-10-22 02:15:03.419107 I | auth: deleting token eXQCCtAuUjIHNOqD.1606 for user conductor
2021-10-22 02:15:04.022292 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:04.419049 I | auth: deleting token oLGibdgLzLKEDFEm.1607 for user conductor
2021-10-22 02:15:04.419105 I | auth: deleting token RKSAcaHMEvcmHsMA.1608 for user conductor
2021-10-22 02:15:04.419123 I | auth: deleting token NRudPzGlHHpRyIoR.1609 for user conductor
2021-10-22 02:15:05.119174 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.191495217s) to execute
2021-10-22 02:15:06.419069 I | auth: deleting token tvlsvgoGQUqOcxGB.1610 for user conductor
2021-10-22 02:15:06.419114 I | auth: deleting token sGOyfAnhqsHISxOq.1611 for user conductor
2021-10-22 02:15:07.024682 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.305992053s) to execute
2021-10-22 02:15:08.419108 I | auth: deleting token qFbJFfVdLATJSEWv.1612 for user conductor
2021-10-22 02:15:08.419165 I | auth: deleting token BvXWuXKKbVzeEvXy.1613 for user conductor
2021-10-22 02:15:09.022600 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:09.819738 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (691.84597ms) to execute
2021-10-22 02:15:10.419100 I | auth: deleting token fKDdcbAboYRqWSNK.1614 for user conductor
2021-10-22 02:15:13.419400 I | auth: deleting token VkRLYYKuoFQUlZuq.1616 for user conductor
2021-10-22 02:15:13.419481 I | auth: deleting token NhyoerbJykukmqZu.1618 for user conductor
2021-10-22 02:15:13.419523 I | auth: deleting token MjFyukvuJPrTANSQ.1617 for user conductor
2021-10-22 02:15:13.419533 I | auth: deleting token JBMWCslpkomnnTHv.1615 for user conductor
2021-10-22 02:15:14.023120 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:15.419151 I | auth: deleting token YaMEziOxhBdiFWVj.1620 for user conductor
2021-10-22 02:15:15.419234 I | auth: deleting token PQBqFCundRQnnmVj.1619 for user conductor
2021-10-22 02:15:16.419067 I | auth: deleting token XwgiBKvoilPeOazG.1621 for user conductor
2021-10-22 02:15:18.419245 I | auth: deleting token EPJXPVjtgTvGTrER.1622 for user conductor
2021-10-22 02:15:19.023477 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:20.419232 I | auth: deleting token DsEzYwcnVjIrjCZN.1624 for user conductor
2021-10-22 02:15:20.419297 I | auth: deleting token ccfADKzUvMscWnVS.1623 for user conductor
2021-10-22 02:15:23.419051 I | auth: deleting token KDZBElvBFWbxsgmZ.1625 for user conductor
2021-10-22 02:15:24.023762 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:25.518667 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.688777342s) to execute
2021-10-22 02:15:27.024909 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.396812103s) to execute
2021-10-22 02:15:27.419028 I | auth: deleting token QKikqwXxcgUDcWZE.1627 for user conductor
2021-10-22 02:15:27.419099 I | auth: deleting token bDKrAxqFlwmvYjRn.1630 for user conductor
2021-10-22 02:15:27.419150 I | auth: deleting token qvxRihAmHQNWmXxu.1629 for user conductor
2021-10-22 02:15:28.419087 I | auth: deleting token oxqBfiRfAmmrqwQX.1631 for user conductor
2021-10-22 02:15:28.419255 I | auth: deleting token fQECaMPGCVnwbwcq.1628 for user conductor
2021-10-22 02:15:28.419270 I | auth: deleting token uJlAbwdZPJSANyRC.1626 for user conductor
2021-10-22 02:15:28.420691 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.299504861s) to execute
2021-10-22 02:15:28.420857 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.301737932s) to execute
2021-10-22 02:15:29.118300 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:29.419112 I | auth: deleting token KWZkubiddgJrJqbG.1632 for user conductor
2021-10-22 02:15:29.920770 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (589.067569ms) to execute
2021-10-22 02:15:30.419093 I | auth: deleting token ZIxZTJxexIwXtolN.1633 for user conductor
2021-10-22 02:15:30.419246 I | auth: deleting token rXfJzCqSZbYxDFmL.1634 for user conductor
2021-10-22 02:15:31.419334 I | auth: deleting token IksXXRivmcUklbrJ.1635 for user conductor
2021-10-22 02:15:32.526625 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.108130704s) to execute
2021-10-22 02:15:33.924217 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (805.313852ms) to execute
2021-10-22 02:15:34.118760 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:34.419066 I | auth: deleting token TAcWkgVkKTQLGrgC.1637 for user conductor
2021-10-22 02:15:34.419133 I | auth: deleting token nNbLlxyqOZhpZWis.1638 for user conductor
2021-10-22 02:15:34.419158 I | auth: deleting token gHuzRyvLDykgkTfe.1636 for user conductor
2021-10-22 02:15:34.419168 I | auth: deleting token BHLjWHVqkHYnedtj.1639 for user conductor
2021-10-22 02:15:36.418944 I | auth: deleting token bCIPlIKwrwjuKfdi.1640 for user conductor
2021-10-22 02:15:37.419132 I | auth: deleting token xAGSuJQqJZkftvsK.1641 for user conductor
2021-10-22 02:15:39.119088 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:39.122726 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.702801882s) to execute
2021-10-22 02:15:39.228495 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (103.358543ms) to execute
2021-10-22 02:15:39.329834 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (106.509104ms) to execute
2021-10-22 02:15:39.422089 I | auth: deleting token DkzMJMLCOkUqfQyo.1642 for user conductor
2021-10-22 02:15:41.121025 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (493.234053ms) to execute
2021-10-22 02:15:41.419064 I | auth: deleting token VITszZDSmTcqrIiE.1643 for user conductor
2021-10-22 02:15:44.119542 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:49.119796 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:49.419170 I | auth: deleting token zyUrTgZjgfPowvIs.1644 for user conductor
2021-10-22 02:15:49.419241 I | auth: deleting token PPgRdxpXzGHdXYUs.1645 for user conductor
2021-10-22 02:15:49.419254 I | auth: deleting token BkeTAukoIgbatSTk.1646 for user conductor
2021-10-22 02:15:49.419277 I | auth: deleting token UhPjzSncbizokbZC.1648 for user conductor
2021-10-22 02:15:49.419286 I | auth: deleting token oUXIAPRyzzCjEyYp.1647 for user conductor
2021-10-22 02:15:50.518425 I | auth: deleting token UXyeiJawAZEgnUxE.1649 for user conductor
2021-10-22 02:15:51.322482 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.193237829s) to execute
2021-10-22 02:15:52.418972 I | auth: deleting token PinFNwzkpajeOock.1650 for user conductor
2021-10-22 02:15:52.419051 I | auth: deleting token JWfBEmvnUWCeQRiG.1651 for user conductor
2021-10-22 02:15:52.921368 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.50108253s) to execute
2021-10-22 02:15:54.120153 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:54.419090 I | auth: deleting token zcaftDRVEFrWrYXw.1653 for user conductor
2021-10-22 02:15:54.419170 I | auth: deleting token hZYYrTdtpBXCtFBg.1652 for user conductor
2021-10-22 02:15:54.425113 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.803532761s) to execute
2021-10-22 02:15:55.419013 I | auth: deleting token vUgEHjubSeHviymD.1654 for user conductor
2021-10-22 02:15:56.120674 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.491861206s) to execute
2021-10-22 02:15:56.121019 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.691366935s) to execute
2021-10-22 02:15:56.121451 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.689030254s) to execute
2021-10-22 02:15:57.526514 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.402747447s) to execute
2021-10-22 02:15:57.526695 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.304939589s) to execute
2021-10-22 02:15:58.419043 I | auth: deleting token fEDqUMNPLxBsGnEX.1656 for user conductor
2021-10-22 02:15:58.419167 I | auth: deleting token aSRzjNdMlSAiHyvs.1655 for user conductor
2021-10-22 02:15:59.023406 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.402013806s) to execute
2021-10-22 02:15:59.023726 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.403570269s) to execute
2021-10-22 02:15:59.120366 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:15:59.420183 I | auth: deleting token NmBnmGAaylvQKlfy.1658 for user conductor
2021-10-22 02:15:59.420289 I | auth: deleting token MbDapSRTAmjFYtPP.1657 for user conductor
2021-10-22 02:16:01.419151 I | auth: deleting token KfDdeLLWRAamvVMW.1660 for user conductor
2021-10-22 02:16:01.419290 I | auth: deleting token mapneQoIvdgTylsU.1659 for user conductor
2021-10-22 02:16:02.625847 I | auth: deleting token ZbkFNCZUsFfPVvCG.1661 for user conductor
2021-10-22 02:16:03.619644 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.593481899s) to execute
2021-10-22 02:16:03.620077 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.990769566s) to execute
2021-10-22 02:16:03.620429 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (4.496552061s) to execute
2021-10-22 02:16:04.120638 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:04.419069 I | auth: deleting token lnByWTdUkzsNhraS.1662 for user conductor
2021-10-22 02:16:05.221363 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.502912897s) to execute
2021-10-22 02:16:06.419115 I | auth: deleting token mEFLqkxRjGhkjitE.1663 for user conductor
2021-10-22 02:16:06.723207 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.49269565s) to execute
2021-10-22 02:16:06.829141 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (104.146272ms) to execute
2021-10-22 02:16:08.418284 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (799.842416ms) to execute
2021-10-22 02:16:09.120881 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:09.821777 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203087906s) to execute
2021-10-22 02:16:09.928973 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (105.193289ms) to execute
2021-10-22 02:16:11.419103 I | auth: deleting token pMTvZujVNxmHlkhB.1668 for user conductor
2021-10-22 02:16:11.419245 I | auth: deleting token mgfCzOdolanYbcBz.1666 for user conductor
2021-10-22 02:16:11.419278 I | auth: deleting token CFKlMbjofhfAOeZi.1665 for user conductor
2021-10-22 02:16:11.419317 I | auth: deleting token ibNLzOJGwuxqyhpp.1667 for user conductor
2021-10-22 02:16:11.419342 I | auth: deleting token YaBEnsHhnXFknpcr.1664 for user conductor
2021-10-22 02:16:14.121238 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:14.419058 I | auth: deleting token jKtRFUqIGWGMEhjm.1669 for user conductor
2021-10-22 02:16:14.419198 I | auth: deleting token aELIKPravFbHUxGQ.1670 for user conductor
2021-10-22 02:16:14.419243 I | auth: deleting token ouFGMgeFdgGiIDdt.1671 for user conductor
2021-10-22 02:16:16.419115 I | auth: deleting token onWPFhDjQjrBkQSU.1673 for user conductor
2021-10-22 02:16:16.419163 I | auth: deleting token fpFqjTxzYSnyTSHi.1672 for user conductor
2021-10-22 02:16:17.419059 I | auth: deleting token SoiodwItMpSQrPGh.1674 for user conductor
2021-10-22 02:16:19.121702 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:19.419062 I | auth: deleting token wbCKgWenqzyeCrHH.1675 for user conductor
2021-10-22 02:16:19.419104 I | auth: deleting token TnACJxMIuebWkLEx.1676 for user conductor
2021-10-22 02:16:19.419120 I | auth: deleting token pwzGxcmcYdufJhTe.1677 for user conductor
2021-10-22 02:16:20.419057 I | auth: deleting token HipUmHIITBtSdOFU.1678 for user conductor
2021-10-22 02:16:21.124113 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (404.321315ms) to execute
2021-10-22 02:16:22.419144 I | auth: deleting token DRLuRzFDrIfbPqVf.1679 for user conductor
2021-10-22 02:16:22.723307 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (395.07574ms) to execute
2021-10-22 02:16:24.121929 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:24.419161 I | auth: deleting token UiXndpkdIHrUdfEc.1680 for user conductor
2021-10-22 02:16:25.221039 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.089784574s) to execute
2021-10-22 02:16:25.419082 I | auth: deleting token MzeeQrlcUZhmDdyS.1681 for user conductor
2021-10-22 02:16:26.824566 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (496.337672ms) to execute
2021-10-22 02:16:27.418958 I | auth: deleting token qiuKPPlSYFAfsrAT.1682 for user conductor
2021-10-22 02:16:29.122202 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:30.221559 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.300513424s) to execute
2021-10-22 02:16:30.524471 I | auth: deleting token XsKJUDMMpVCzpBIR.1683 for user conductor
2021-10-22 02:16:31.620687 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.099104148s) to execute
2021-10-22 02:16:31.621052 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.302577454s) to execute
2021-10-22 02:16:32.418997 I | auth: deleting token npuVJDZIOnFweHtw.1684 for user conductor
2021-10-22 02:16:33.024762 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.706136036s) to execute
2021-10-22 02:16:33.025027 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.303866223s) to execute
2021-10-22 02:16:33.025168 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.304457659s) to execute
2021-10-22 02:16:34.122464 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:34.419089 I | auth: deleting token uWTBnWjwThuVoFOa.1685 for user conductor
2021-10-22 02:16:34.720198 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.58939836s) to execute
2021-10-22 02:16:36.518366 I | auth: deleting token jAheXWumoxRgkRmf.1686 for user conductor
2021-10-22 02:16:38.220681 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.888551557s) to execute
2021-10-22 02:16:38.419029 I | auth: deleting token bAjcLiExehSDrXuP.1687 for user conductor
2021-10-22 02:16:38.428204 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (104.070451ms) to execute
2021-10-22 02:16:39.122797 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:41.419118 I | auth: deleting token dPiEAFAomOdzCNXg.1690 for user conductor
2021-10-22 02:16:41.419198 I | auth: deleting token gupgkYuazDwakKiH.1689 for user conductor
2021-10-22 02:16:41.624023 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.396266483s) to execute
2021-10-22 02:16:41.727950 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.447439ms) to execute
2021-10-22 02:16:43.419053 I | auth: deleting token iFMzEWuilhbyzrWt.1691 for user conductor
2021-10-22 02:16:43.419220 I | auth: deleting token TttPKOdafcJFLQAc.1692 for user conductor
2021-10-22 02:16:43.419361 I | auth: deleting token FSrQqEXKZpqhxUhn.1693 for user conductor
2021-10-22 02:16:43.422661 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.403694396s) to execute
2021-10-22 02:16:44.123023 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:44.418929 I | auth: deleting token BHibisHEIwkTILGl.1694 for user conductor
2021-10-22 02:16:45.419061 I | auth: deleting token YiuaHDliuVOnmWWV.1695 for user conductor
2021-10-22 02:16:46.419339 I | auth: deleting token IeKcLrsiNFsSFDLm.1697 for user conductor
2021-10-22 02:16:46.419394 I | auth: deleting token tCiBhyMDllOfrShZ.1696 for user conductor
2021-10-22 02:16:48.419948 I | auth: deleting token BctUvnTpbYmWWdgT.1698 for user conductor
2021-10-22 02:16:49.124766 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:49.720893 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.392384162s) to execute
2021-10-22 02:16:50.418911 I | auth: deleting token AzAwrWefWcHxYFGH.1699 for user conductor
2021-10-22 02:16:51.123917 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.305111112s) to execute
2021-10-22 02:16:51.124248 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.39903201s) to execute
2021-10-22 02:16:51.218741 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.492719839s) to execute
2021-10-22 02:16:51.219226 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.492237296s) to execute
2021-10-22 02:16:53.419042 I | auth: deleting token FvpVWHVMeAQxbkKD.1700 for user conductor
2021-10-22 02:16:54.125059 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:16:55.621827 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.975610201s) to execute
2021-10-22 02:16:56.419090 I | auth: deleting token bJcWnFstoaHgLzQY.1701 for user conductor
2021-10-22 02:16:56.419161 I | auth: deleting token SERrhxjgjoDGnVar.1703 for user conductor
2021-10-22 02:16:57.019184 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.388698504s) to execute
2021-10-22 02:16:57.019366 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.39526655s) to execute
2021-10-22 02:16:57.019435 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.394814504s) to execute
2021-10-22 02:16:58.419066 I | auth: deleting token furOrKhkIuqGMRee.1705 for user conductor
2021-10-22 02:16:58.419109 I | auth: deleting token zTPVZEMXzFHyNUOw.1704 for user conductor
2021-10-22 02:16:58.419127 I | auth: deleting token oZdMXoTwbkSIVDJF.1702 for user conductor
2021-10-22 02:16:58.419137 I | auth: deleting token nfipAGeQwIAEiLxA.1706 for user conductor
2021-10-22 02:16:59.218276 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:00.118811 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.690556723s) to execute
2021-10-22 02:17:01.418940 I | auth: deleting token ZhYKhmhDsJYYIZpH.1707 for user conductor
2021-10-22 02:17:01.418993 I | auth: deleting token yOZLPDZcSSMRRfie.1708 for user conductor
2021-10-22 02:17:02.920874 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.790662199s) to execute
2021-10-22 02:17:02.921138 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.800809048s) to execute
2021-10-22 02:17:03.127963 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (109.115169ms) to execute
2021-10-22 02:17:03.419098 I | auth: deleting token NJISjyBDlNwnxUOD.1711 for user conductor
2021-10-22 02:17:03.419173 I | auth: deleting token LYzWibYOKBiKsAsf.1710 for user conductor
2021-10-22 02:17:03.419237 I | auth: deleting token mEAANybOhkWuDNRr.1709 for user conductor
2021-10-22 02:17:04.218596 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:08.419138 I | auth: deleting token GQSPiFVcBiGKgrYR.1712 for user conductor
2021-10-22 02:17:08.419215 I | auth: deleting token wCkFUmphlFKHMqmG.1714 for user conductor
2021-10-22 02:17:09.219059 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:10.419151 I | auth: deleting token fIpiyACQZJFKdQDB.1715 for user conductor
2021-10-22 02:17:10.419221 I | auth: deleting token LoMOoUTaJabLayac.1713 for user conductor
2021-10-22 02:17:12.419088 I | auth: deleting token rFbXZDULdWHoQqSg.1716 for user conductor
2021-10-22 02:17:12.419141 I | auth: deleting token lqwKvqEVhAwGFmVA.1717 for user conductor
2021-10-22 02:17:12.419179 I | auth: deleting token TXAMVIFcgugRhrGg.1718 for user conductor
2021-10-22 02:17:14.219465 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:14.419188 I | auth: deleting token JlxQCnZZKojJPqGU.1719 for user conductor
2021-10-22 02:17:15.419092 I | auth: deleting token DfpoFgUJkgcvsVDo.1720 for user conductor
2021-10-22 02:17:15.419164 I | auth: deleting token njIndgpqzkxLfPbR.1722 for user conductor
2021-10-22 02:17:15.419216 I | auth: deleting token QKqOCqOihKbabzvj.1721 for user conductor
2021-10-22 02:17:17.419122 I | auth: deleting token JvmkJcdGXEXtPhnn.1724 for user conductor
2021-10-22 02:17:17.419175 I | auth: deleting token dSPcSHriuuUFJqrq.1723 for user conductor
2021-10-22 02:17:19.220004 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:19.419132 I | auth: deleting token EQegpdvMaUQkPOjK.1725 for user conductor
2021-10-22 02:17:20.419095 I | auth: deleting token lKtDtwLYucJVdLYp.1726 for user conductor
2021-10-22 02:17:22.419171 I | auth: deleting token YsFfFKsKEVpsiIeB.1727 for user conductor
2021-10-22 02:17:24.220412 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:24.419063 I | auth: deleting token tarNGwJFLlWdalhe.1728 for user conductor
2021-10-22 02:17:25.018632 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.900176598s) to execute
2021-10-22 02:17:25.228477 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (108.36329ms) to execute
2021-10-22 02:17:26.419057 I | auth: deleting token TOkWmFYperogtDtN.1729 for user conductor
2021-10-22 02:17:28.024640 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.506218138s) to execute
2021-10-22 02:17:28.128195 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (101.840305ms) to execute
2021-10-22 02:17:28.420578 I | auth: deleting token ZhLzoAnnmgmEPLoF.1730 for user conductor
2021-10-22 02:17:29.220688 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:30.419197 I | auth: deleting token SOlHrvOlGpCVzAOA.1731 for user conductor
2021-10-22 02:17:32.021797 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (193.20526ms) to execute
2021-10-22 02:17:33.419052 I | auth: deleting token meEDcUNunRFjaHSW.1732 for user conductor
2021-10-22 02:17:33.419095 I | auth: deleting token gCNWKezugMIBAghR.1733 for user conductor
2021-10-22 02:17:33.419109 I | auth: deleting token xPxSnsFpSXaVcalC.1734 for user conductor
2021-10-22 02:17:34.221040 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:35.419183 I | auth: deleting token uCFwtrwqsWuOFzLD.1735 for user conductor
2021-10-22 02:17:39.221404 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:39.419070 I | auth: deleting token rCWWxWiRKjHVfFwn.1737 for user conductor
2021-10-22 02:17:39.419116 I | auth: deleting token FKNWuOzzUCUEwqrl.1738 for user conductor
2021-10-22 02:17:39.419125 I | auth: deleting token IuznvMRuYRORsstV.1736 for user conductor
2021-10-22 02:17:39.419143 I | auth: deleting token MUmTPQzITrblCQIm.1740 for user conductor
2021-10-22 02:17:39.419159 I | auth: deleting token LgHLZnIyLdOdeKXS.1739 for user conductor
2021-10-22 02:17:39.419168 I | auth: deleting token exJUfwGwiVGHZzot.1741 for user conductor
2021-10-22 02:17:41.419047 I | auth: deleting token kUNhHkcBOZhtFNay.1743 for user conductor
2021-10-22 02:17:41.419117 I | auth: deleting token TXFQymYICLBtqxGr.1742 for user conductor
2021-10-22 02:17:43.419059 I | auth: deleting token xMMnzxPNFGgthfNg.1745 for user conductor
2021-10-22 02:17:43.419112 I | auth: deleting token TjzWsrnGQiBsjAOc.1744 for user conductor
2021-10-22 02:17:43.726449 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.207983222s) to execute
2021-10-22 02:17:43.829334 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.226532ms) to execute
2021-10-22 02:17:44.221657 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:45.419170 I | auth: deleting token KfbpDTiOOHYtXkth.1747 for user conductor
2021-10-22 02:17:45.419220 I | auth: deleting token JAwvtUMRcvtJMZCL.1746 for user conductor
2021-10-22 02:17:47.019095 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.891074119s) to execute
2021-10-22 02:17:47.419374 I | auth: deleting token DmErNLEbERXajPFJ.1748 for user conductor
2021-10-22 02:17:49.222192 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:50.225337 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.104357184s) to execute
2021-10-22 02:17:50.225570 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.103796918s) to execute
2021-10-22 02:17:50.225900 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.397726689s) to execute
2021-10-22 02:17:50.418961 I | auth: deleting token nLzDzEiNAuPCKeQB.1751 for user conductor
2021-10-22 02:17:50.419039 I | auth: deleting token uqqAcgXYNZhTUBZu.1749 for user conductor
2021-10-22 02:17:51.419202 I | auth: deleting token uGHjBXKwUuPCHnBv.1753 for user conductor
2021-10-22 02:17:51.419288 I | auth: deleting token lnqjzpaqHCDQFJzh.1752 for user conductor
2021-10-22 02:17:51.419299 I | auth: deleting token fHFzNssIHxTGNXqb.1750 for user conductor
2021-10-22 02:17:51.823599 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.502872914s) to execute
2021-10-22 02:17:51.823918 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.505366105s) to execute
2021-10-22 02:17:53.418567 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.591840642s) to execute
2021-10-22 02:17:53.418746 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.497840701s) to execute
2021-10-22 02:17:53.418833 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (682.565686ms) to execute
2021-10-22 02:17:54.222465 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:55.419089 I | auth: deleting token YqSRsxbJBUjnmQyy.1756 for user conductor
2021-10-22 02:17:55.419156 I | auth: deleting token TfqkMAQlhTifKFqX.1754 for user conductor
2021-10-22 02:17:55.419168 I | auth: deleting token csLQLtaqdxKQtywD.1757 for user conductor
2021-10-22 02:17:55.419176 I | auth: deleting token JaCkJATdYFRODLjP.1758 for user conductor
2021-10-22 02:17:55.419190 I | auth: deleting token YxTUNckCzkTaykAN.1755 for user conductor
2021-10-22 02:17:58.419175 I | auth: deleting token yPtZNMCPubkpIzsN.1759 for user conductor
2021-10-22 02:17:58.419230 I | auth: deleting token RnnwobiXuZgtxZlb.1760 for user conductor
2021-10-22 02:17:59.223156 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:17:59.419110 I | auth: deleting token gPLJWKogEwuoybru.1762 for user conductor
2021-10-22 02:17:59.419165 I | auth: deleting token UevqEnPFqzKmPRev.1761 for user conductor
2021-10-22 02:18:00.419364 I | auth: deleting token udVMerZDqNGcQnnD.1763 for user conductor
2021-10-22 02:18:02.419098 I | auth: deleting token COtSzOMFsxPWHRAh.1764 for user conductor
2021-10-22 02:18:02.419266 I | auth: deleting token whAlhRyOUjSbVoSM.1765 for user conductor
2021-10-22 02:18:04.223452 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:04.419274 I | auth: deleting token TQfZFRpBxNOaoAjj.1766 for user conductor
2021-10-22 02:18:05.219336 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (791.364059ms) to execute
2021-10-22 02:18:07.419057 I | auth: deleting token dnAKJIhIhRhoPhcI.1767 for user conductor
2021-10-22 02:18:07.419111 I | auth: deleting token rwUePvhEkQGtXINa.1768 for user conductor
2021-10-22 02:18:07.419136 I | auth: deleting token SVSJmVLhDJzXOpww.1769 for user conductor
2021-10-22 02:18:08.118728 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.890721072s) to execute
2021-10-22 02:18:08.228195 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (106.812842ms) to execute
2021-10-22 02:18:09.223899 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:10.419039 I | auth: deleting token iasctscqXjZttrAw.1770 for user conductor
2021-10-22 02:18:10.419079 I | auth: deleting token MBccLmZTbGxzqQIL.1771 for user conductor
2021-10-22 02:18:13.025301 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.293763598s) to execute
2021-10-22 02:18:13.228673 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (110.063107ms) to execute
2021-10-22 02:18:13.419153 I | auth: deleting token ZpsamOdRlRrPNlkD.1775 for user conductor
2021-10-22 02:18:13.419189 I | auth: deleting token jJlCnpveHGGeLhCo.1774 for user conductor
2021-10-22 02:18:13.419213 I | auth: deleting token bfUYQWuzrLIIgRXZ.1773 for user conductor
2021-10-22 02:18:13.419228 I | auth: deleting token SnebYBBUmhPilDLF.1772 for user conductor
2021-10-22 02:18:13.419251 I | auth: deleting token YZpmocwzTFITDsdB.1776 for user conductor
2021-10-22 02:18:14.318582 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:15.419076 I | auth: deleting token SYsgPwVcUVOTxHAQ.1777 for user conductor
2021-10-22 02:18:16.418946 I | auth: deleting token dJiKKHctaRSDRFrh.1779 for user conductor
2021-10-22 02:18:16.419056 I | auth: deleting token zOlipeMmXQukqaEc.1778 for user conductor
2021-10-22 02:18:16.526946 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.497223223s) to execute
2021-10-22 02:18:16.728254 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (107.490595ms) to execute
2021-10-22 02:18:16.735608 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (113.650132ms) to execute
2021-10-22 02:18:17.419065 I | auth: deleting token iqLcuoVPYNovUxeM.1780 for user conductor
2021-10-22 02:18:18.419147 I | auth: deleting token fidwjGGVAnjAxQED.1781 for user conductor
2021-10-22 02:18:19.319048 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:19.920223 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.600509953s) to execute
2021-10-22 02:18:20.028277 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (105.33982ms) to execute
2021-10-22 02:18:20.419211 I | auth: deleting token ugnifrhozkgZUhqK.1782 for user conductor
2021-10-22 02:18:23.419066 I | auth: deleting token TdYhdPCVfROCxIgz.1783 for user conductor
2021-10-22 02:18:23.419154 I | auth: deleting token ZesJODzIqwweOQnu.1785 for user conductor
2021-10-22 02:18:23.619849 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (591.566481ms) to execute
2021-10-22 02:18:23.829528 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (196.407352ms) to execute
2021-10-22 02:18:24.319306 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:24.419091 I | auth: deleting token JEgATYMYIJQJdRHD.1784 for user conductor
2021-10-22 02:18:25.418747 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (590.571416ms) to execute
2021-10-22 02:18:25.418986 I | auth: deleting token SFliqRlAZvZsfwcK.1787 for user conductor
2021-10-22 02:18:25.419080 I | auth: deleting token GGlqmmUkBRVhQjUh.1786 for user conductor
2021-10-22 02:18:26.825539 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (297.514418ms) to execute
2021-10-22 02:18:28.223425 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.10480858s) to execute
2021-10-22 02:18:28.328138 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.227166ms) to execute
2021-10-22 02:18:28.419083 I | auth: deleting token MMvuWbmQUDSJYpWX.1788 for user conductor
2021-10-22 02:18:28.419129 I | auth: deleting token AmbsKXaLzvkOkBDW.1790 for user conductor
2021-10-22 02:18:29.319566 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:29.419045 I | auth: deleting token yVQDCbeWZewJyrwC.1791 for user conductor
2021-10-22 02:18:29.419120 I | auth: deleting token lYzepGHdJxNTiHSg.1789 for user conductor
2021-10-22 02:18:30.419167 I | auth: deleting token yrUJvsNASAkmQFVJ.1792 for user conductor
2021-10-22 02:18:31.319670 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (901.240616ms) to execute
2021-10-22 02:18:31.519597 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (175.124248ms) to execute
2021-10-22 02:18:32.419469 I | auth: deleting token vlHbDgJZHrbtyBvz.1793 for user conductor
2021-10-22 02:18:32.419517 I | auth: deleting token DCHpTasJgnndEzpu.1795 for user conductor
2021-10-22 02:18:33.419068 I | auth: deleting token bSROpiezQgUlLgIo.1796 for user conductor
2021-10-22 02:18:33.419108 I | auth: deleting token DJoNKiOOATUpSGXJ.1794 for user conductor
2021-10-22 02:18:34.319957 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:34.419091 I | auth: deleting token PzAfIOmvckIadVkJ.1797 for user conductor
2021-10-22 02:18:36.120457 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (200.363922ms) to execute
2021-10-22 02:18:36.419090 I | auth: deleting token ASaJOpaXLjZVmZQB.1798 for user conductor
2021-10-22 02:18:37.419126 I | auth: deleting token gJYntqBtzgtlujGh.1799 for user conductor
2021-10-22 02:18:37.822537 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (194.265844ms) to execute
2021-10-22 02:18:38.133964 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (102.7671ms) to execute
2021-10-22 02:18:39.444109 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:39.444551 I | auth: deleting token mvcEOBqNFhHDssfr.1800 for user conductor
2021-10-22 02:18:40.723207 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.194577646s) to execute
2021-10-22 02:18:41.419028 I | auth: deleting token nHseyLzTtOAuBKxr.1801 for user conductor
2021-10-22 02:18:42.026790 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.19845359s) to execute
2021-10-22 02:18:43.418975 I | auth: deleting token aFmfqbOBGSsqKmAN.1802 for user conductor
2021-10-22 02:18:43.625089 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (796.986873ms) to execute
2021-10-22 02:18:44.444441 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:45.123928 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (495.858484ms) to execute
2021-10-22 02:18:46.419080 I | auth: deleting token rZuLcacevleKoUNw.1805 for user conductor
2021-10-22 02:18:46.419145 I | auth: deleting token TFJjaJqOgavswhhE.1803 for user conductor
2021-10-22 02:18:46.419165 I | auth: deleting token cZUfHYkAuKclBqro.1804 for user conductor
2021-10-22 02:18:46.521513 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.394308687s) to execute
2021-10-22 02:18:46.628235 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (103.583746ms) to execute
2021-10-22 02:18:48.121334 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (691.172015ms) to execute
2021-10-22 02:18:49.419030 I | auth: deleting token UqiSRTcePmGKmWOB.1809 for user conductor
2021-10-22 02:18:49.419092 I | auth: deleting token tISIOHVqOzeeIegp.1808 for user conductor
2021-10-22 02:18:49.419107 I | auth: deleting token mGovgpCkhdVbuRTH.1806 for user conductor
2021-10-22 02:18:49.419135 I | auth: deleting token DQWpjWdAEQHoJedb.1807 for user conductor
2021-10-22 02:18:49.444665 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:53.419057 I | auth: deleting token PNDtUZlNafwBHXSf.1813 for user conductor
2021-10-22 02:18:53.419103 I | auth: deleting token hONHpBtwPDISvxqd.1812 for user conductor
2021-10-22 02:18:53.419119 I | auth: deleting token qoRMDoBUhRulELmK.1810 for user conductor
2021-10-22 02:18:53.419136 I | auth: deleting token QGnQLlYaZcpdiykV.1811 for user conductor
2021-10-22 02:18:54.419065 I | auth: deleting token YWVFmsOAHqScFpnG.1814 for user conductor
2021-10-22 02:18:54.444918 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:18:56.418955 I | auth: deleting token rQaifrflLXkMWowo.1815 for user conductor
2021-10-22 02:18:58.418951 I | auth: deleting token dSPdyRJaxEkeQDTs.1816 for user conductor
2021-10-22 02:18:59.418955 I | auth: deleting token eDABqYfSGDMQLeUF.1819 for user conductor
2021-10-22 02:18:59.419025 I | auth: deleting token eUetSWfLgOhHItiO.1820 for user conductor
2021-10-22 02:18:59.419052 I | auth: deleting token uGyNVhfUfcmHRcWl.1818 for user conductor
2021-10-22 02:18:59.419068 I | auth: deleting token vCUsYiQQHuHttLmY.1817 for user conductor
2021-10-22 02:18:59.518537 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:19:00.419076 I | auth: deleting token ayVBjrwRWaCmwzMO.1821 for user conductor
2021-10-22 02:19:00.419766 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.597450126s) to execute
2021-10-22 02:19:04.518799 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:19:04.622358 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.903859003s) to execute
2021-10-22 02:19:06.124744 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.405173906s) to execute
2021-10-22 02:19:06.419091 I | auth: deleting token tNEGtOIQKoRDTtqW.1822 for user conductor
2021-10-22 02:19:06.419134 I | auth: deleting token UryRkpbAZHnqCVor.1823 for user conductor
2021-10-22 02:19:06.419151 I | auth: deleting token NMZSYqeBNacMPefs.1824 for user conductor
2021-10-22 02:19:06.419164 I | auth: deleting token GLozSAKKUXYtVnry.1827 for user conductor
2021-10-22 02:19:06.419173 I | auth: deleting token nKUTgdznXGTnUgvg.1826 for user conductor
2021-10-22 02:19:06.419203 I | auth: deleting token DoGhviRZiBouvfrs.1825 for user conductor
2021-10-22 02:19:07.518303 I | auth: deleting token KJtLhbmzqyAKsvVL.1828 for user conductor
2021-10-22 02:19:07.521132 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.802717046s) to execute
2021-10-22 02:19:07.521259 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.802827397s) to execute
2021-10-22 02:19:07.521385 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.301326163s) to execute
2021-10-22 02:19:07.521512 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.302863313s) to execute
2021-10-22 02:19:07.728127 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (204.566678ms) to execute
2021-10-22 02:19:08.418987 I | auth: deleting token VoBwKZiudSXuUjmU.1829 for user conductor
2021-10-22 02:19:09.323906 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.602937567s) to execute
2021-10-22 02:19:09.419357 I | auth: deleting token iDQgRMbZREiLxpjK.1830 for user conductor
2021-10-22 02:19:09.419406 I | auth: deleting token TEhyXHNjkRuLoFHY.1831 for user conductor
2021-10-22 02:19:09.453302 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (110.823637ms) to execute
2021-10-22 02:19:09.519084 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:19:11.419179 I | auth: deleting token PZbcHEWUatOvigBf.1832 for user conductor
2021-10-22 02:19:13.419319 I | auth: deleting token wBZnEGfsMlWJoVvf.1833 for user conductor
2021-10-22 02:19:13.419369 I | auth: deleting token SesvquUpePqOYcvC.1834 for user conductor
2021-10-22 02:19:14.520173 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:19:14.620261 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (192.599933ms) to execute
2021-10-22 02:19:15.419042 I | auth: deleting token hGeyXPYqHfEOJoie.1836 for user conductor
2021-10-22 02:19:15.419089 I | auth: deleting token jUDoBqTnBqriRlPV.1835 for user conductor
2021-10-22 02:19:16.419259 I | auth: deleting token RLskhNThOtSzTSLz.1837 for user conductor
2021-10-22 02:19:17.419053 I | auth: deleting token JzLqhWAdHkNFQITx.1838 for user conductor
2021-10-22 02:19:17.820174 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.191650276s) to execute
2021-10-22 02:19:18.419171 I | auth: deleting token tXjYwmVAlkeYWopR.1840 for user conductor
2021-10-22 02:19:18.419219 I | auth: deleting token wlMcuosMeGCeFOZY.1839 for user conductor
2021-10-22 02:19:19.519081 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (891.018779ms) to execute
2021-10-22 02:19:19.520430 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:19:19.828161 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (194.874351ms) to execute
2021-10-22 02:19:20.419123 I | auth: deleting token YiTGJhsxhhCODeCb.1841 for user conductor
2021-10-22 02:19:23.419177 I | auth: deleting token hsCPAAaGHGXCfXpJ.1843 for user conductor
2021-10-22 02:19:23.419242 I | auth: deleting token WqOolKhJYkBxkwys.1844 for user conductor
2021-10-22 02:19:23.419282 I | auth: deleting token AawErYgFshTMmIbC.1842 for user conductor
2021-10-22 02:19:24.520695 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.70.202:2380: getsockopt: connection refused
2021-10-22 02:19:26.619147 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.190929883s) to execute
2021-10-22 02:19:27.419061 I | auth: deleting token NhTfEnvYYyRsBsPr.1847 for user conductor
2021-10-22 02:19:27.419154 I | auth: deleting token XxSUUZJvDyRNuTMx.1845 for user conductor
2021-10-22 02:19:27.419185 I | auth: deleting token zkiWVjhscPQEiKFQ.1848 for user conductor
2021-10-22 02:19:27.419227 I | auth: deleting token ueBMOODYXORYEqsa.1846 for user conductor
2021-10-22 02:19:27.925753 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.303710832s) to execute
2021-10-22 02:19:27.925963 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.207477472s) to execute
2021-10-22 02:19:28.127971 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (109.481528ms) to execute
2021-10-22 02:19:28.419800 I | auth: deleting token HYeRSGYCZIqLaphD.1849 for user conductor
2021-10-22 02:19:28.419949 I | auth: deleting token ZnFbGzUYIpdWlCZN.1850 for user conductor
2021-10-22 02:19:29.618273 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:19:29.926084 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.903767918s) to execute
2021-10-22 02:19:30.419071 I | auth: deleting token cStZoljFRREmlJIZ.1851 for user conductor
2021-10-22 02:19:30.419128 I | auth: deleting token boFGtEKEcPdpsKhJ.1852 for user conductor
2021-10-22 02:19:31.419042 I | auth: deleting token wWpfsfcfcaTNLFac.1853 for user conductor
2021-10-22 02:19:31.420900 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.002148571s) to execute
2021-10-22 02:19:33.419046 I | auth: deleting token FRuEIZCWSDDkAjpq.1854 for user conductor
2021-10-22 02:19:34.419136 I | auth: deleting token KfCIjmZZgbLKZnJU.1855 for user conductor
2021-10-22 02:19:34.618555 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:19:34.619816 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.090522638s) to execute
2021-10-22 02:19:34.620149 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.195075063s) to execute
2021-10-22 02:19:35.419108 I | auth: deleting token kUnQyFpPVKhzbpKq.1856 for user conductor
2021-10-22 02:19:36.318846 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.678732228s) to execute
2021-10-22 02:19:36.319360 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.697732257s) to execute
2021-10-22 02:19:36.320352 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.697976364s) to execute
2021-10-22 02:19:36.419054 I | auth: deleting token OtCiLqTFoDaeYkhv.1857 for user conductor
2021-10-22 02:19:37.919177 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.568674038s) to execute
2021-10-22 02:19:37.919431 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.598301864s) to execute
2021-10-22 02:19:38.419108 I | auth: deleting token uKeonPRGwTREsAgy.1858 for user conductor
2021-10-22 02:19:39.419056 I | auth: deleting token yIXoMEAAOgLiGyGr.1861 for user conductor
2021-10-22 02:19:39.419107 I | auth: deleting token UoArZlQTBPSxxFGc.1860 for user conductor
2021-10-22 02:19:39.419123 I | auth: deleting token tSSlbobbZEvoUygD.1859 for user conductor
2021-10-22 02:19:39.523868 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.505048528s) to execute
2021-10-22 02:19:39.524017 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.491544346s) to execute
2021-10-22 02:19:39.619128 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:19:40.419082 I | auth: deleting token YOszUEGiGKESBJaR.1862 for user conductor
2021-10-22 02:19:40.921194 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.302694765s) to execute
2021-10-22 02:19:42.419058 I | auth: deleting token tlLKqTvqDNzdszbl.1864 for user conductor
2021-10-22 02:19:42.419132 I | auth: deleting token DyQPHIcaSjRgiUre.1863 for user conductor
2021-10-22 02:19:43.924956 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.806309592s) to execute
2021-10-22 02:19:44.028266 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (101.852235ms) to execute
2021-10-22 02:19:44.418986 I | auth: deleting token dxERtHSfoceefEHA.1865 for user conductor
2021-10-22 02:19:44.619355 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:19:46.419037 I | auth: deleting token CdPhanvglpzEBfWg.1866 for user conductor
2021-10-22 02:19:47.020967 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.292940159s) to execute
2021-10-22 02:19:47.419038 I | auth: deleting token yXHVuWdVgECJZFZB.1867 for user conductor
2021-10-22 02:19:48.424562 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.284298631s) to execute
2021-10-22 02:19:48.424738 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.401636187s) to execute
2021-10-22 02:19:49.419062 I | auth: deleting token PRmQrKZRxOEBUJQI.1868 for user conductor
2021-10-22 02:19:49.419114 I | auth: deleting token YZUHzFgGGiiHUQxy.1869 for user conductor
2021-10-22 02:19:49.619547 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:19:49.922663 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.39652997s) to execute
2021-10-22 02:19:50.419319 I | auth: deleting token sRyyqwGZcySQgclP.1872 for user conductor
2021-10-22 02:19:50.419360 I | auth: deleting token lcrYXDfhIbpbvnzx.1871 for user conductor
2021-10-22 02:19:50.419382 I | auth: deleting token ESypdXYKqKLsgCFJ.1870 for user conductor
2021-10-22 02:19:51.420824 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.799129793s) to execute
2021-10-22 02:19:51.420943 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.299680781s) to execute
2021-10-22 02:19:52.419073 I | auth: deleting token fJZmWCXpoSeYlrSX.1874 for user conductor
2021-10-22 02:19:52.419123 I | auth: deleting token MySTXfDbQvjiZeKh.1873 for user conductor
2021-10-22 02:19:52.921187 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.485922011s) to execute
2021-10-22 02:19:52.921577 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.49863738s) to execute
2021-10-22 02:19:54.419473 I | auth: deleting token udDLRlbGHCsjQiiB.1876 for user conductor
2021-10-22 02:19:54.419537 I | auth: deleting token sBmUxGMQJxapNNSj.1875 for user conductor
2021-10-22 02:19:54.422588 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.392461636s) to execute
2021-10-22 02:19:54.619909 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:19:55.820261 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.59269772s) to execute
2021-10-22 02:19:56.027962 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.188982ms) to execute
2021-10-22 02:19:56.419126 I | auth: deleting token zoTKyEdGWXKMQUCy.1877 for user conductor
2021-10-22 02:19:57.518508 I | auth: deleting token dsIsiGysqcloIlEi.1878 for user conductor
2021-10-22 02:19:59.419025 I | auth: deleting token ratOwugsNwaZtbdl.1879 for user conductor
2021-10-22 02:19:59.419092 I | auth: deleting token IrMpsseGkQJLnVKg.1880 for user conductor
2021-10-22 02:19:59.419284 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.191139897s) to execute
2021-10-22 02:19:59.620155 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:20:01.418924 I | auth: deleting token bpDYGvOCEaPbLNJD.1881 for user conductor
2021-10-22 02:20:01.419034 I | auth: deleting token CVqQuHTTGeHYmMRE.1882 for user conductor
2021-10-22 02:20:02.319869 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.501342123s) to execute
2021-10-22 02:20:02.419062 I | auth: deleting token VBSneudzbzvDLuyF.1883 for user conductor
2021-10-22 02:20:03.419067 I | auth: deleting token DKgaLVNAsEIEaNsK.1884 for user conductor
2021-10-22 02:20:04.620438 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:20:05.419158 I | auth: deleting token flsDbdTYjUlImJcx.1885 for user conductor
2021-10-22 02:20:05.419224 I | auth: deleting token jDDseuuZIOiMTSQN.1886 for user conductor
2021-10-22 02:20:05.623188 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.994542988s) to execute
2021-10-22 02:20:05.623903 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.301491133s) to execute
2021-10-22 02:20:07.419174 I | auth: deleting token AVkWnlOWxpFkZAgM.1888 for user conductor
2021-10-22 02:20:07.419221 I | auth: deleting token hzRkCyakPlfLcBLx.1887 for user conductor
2021-10-22 02:20:07.419237 I | auth: deleting token LFWLqqkjGqFVIdTL.1889 for user conductor
2021-10-22 02:20:07.520591 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.598946573s) to execute
2021-10-22 02:20:07.520988 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.800990781s) to execute
2021-10-22 02:20:07.521070 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.801306896s) to execute
2021-10-22 02:20:09.020070 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.399057121s) to execute
2021-10-22 02:20:09.020553 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.402009757s) to execute
2021-10-22 02:20:09.620683 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:20:10.419035 I | auth: deleting token DlDBzbupFHauFslJ.1891 for user conductor
2021-10-22 02:20:10.419108 I | auth: deleting token WOySHbTiDFQIhREm.1890 for user conductor
2021-10-22 02:20:10.725720 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.60700238s) to execute
2021-10-22 02:20:11.419046 I | auth: deleting token lPsJJwVtYOLalnEp.1892 for user conductor
2021-10-22 02:20:12.240473 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.721935149s) to execute
2021-10-22 02:20:12.318390 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.99992863s) to execute
2021-10-22 02:20:12.499091 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (254.615057ms) to execute
2021-10-22 02:20:12.635542 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (203.345536ms) to execute
2021-10-22 02:20:13.419068 I | auth: deleting token RHPpOwzAKrFZmlyg.1893 for user conductor
2021-10-22 02:20:14.621205 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:20:15.419058 I | auth: deleting token MMlbhPPjcgrYKqKM.1894 for user conductor
2021-10-22 02:20:16.123069 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.201032746s) to execute
2021-10-22 02:20:16.229556 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (103.418374ms) to execute
2021-10-22 02:20:16.419264 I | auth: deleting token IYBFThzylPQudYPG.1895 for user conductor
2021-10-22 02:20:18.419081 I | auth: deleting token MtiAqORYPLaDpCgM.1896 for user conductor
2021-10-22 02:20:18.830478 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (102.373837ms) to execute
2021-10-22 02:20:19.621490 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:20:20.419090 I | auth: deleting token VygYrfQPofkphiSN.1897 for user conductor
2021-10-22 02:20:21.419123 I | auth: deleting token bufVcvAqDcqrvvqB.1898 for user conductor
2021-10-22 02:20:23.419255 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.09099584s) to execute
2021-10-22 02:20:24.621756 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:20:26.419074 I | auth: deleting token APpyBAEPaztNIsYy.1900 for user conductor
2021-10-22 02:20:26.419111 I | auth: deleting token hYVBjoxgqsOrGKFt.1899 for user conductor
2021-10-22 02:20:26.419132 I | auth: deleting token vvSJcvWMfDQmfhqN.1902 for user conductor
2021-10-22 02:20:26.419141 I | auth: deleting token FgzxTLisXzxXemaG.1901 for user conductor
2021-10-22 02:20:29.219473 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.39129379s) to execute
2021-10-22 02:20:29.419412 I | auth: deleting token ZitOSTsoBHFmPFEF.1903 for user conductor
2021-10-22 02:20:29.419466 I | auth: deleting token UDLmKivqctghnMBS.1905 for user conductor
2021-10-22 02:20:29.419475 I | auth: deleting token MWqxTaZtYYDKCufF.1904 for user conductor
2021-10-22 02:20:29.622072 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-22 02:20:30.419211 I | auth: deleting token BdWjSPzUJKsjTJMz.1907 for user conductor
2021-10-22 02:20:30.419260 I | auth: deleting token CNxvTIIGPCPKoOmG.1906 for user conductor
2021-10-22 02:20:30.722410 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.403803698s) to execute
2021-10-22 02:20:30.722580 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203801528s) to execute
2021-10-22 02:20:33.419050 I | auth: deleting token gERIMIQIeZrzdqZL.1909 for user conductor
2021-10-22 02:20:33.419114 I | auth: deleting token PKfsBtieTDmOBkfT.1908 for user conductor
2021-10-22 02:20:34.022157 W | etcdserver: read-only range request "key: