Results

By type

          Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Skipping self-checking
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
2021-10-31 01:40:19.208858 I | etcdmain: etcd Version: 3.2.24
2021-10-31 01:40:19.208957 I | etcdmain: Git SHA: 420a45226
2021-10-31 01:40:19.208962 I | etcdmain: Go Version: go1.8.7
2021-10-31 01:40:19.208966 I | etcdmain: Go OS/Arch: linux/amd64
2021-10-31 01:40:19.208970 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-10-31 01:40:19.209091 I | embed: listening for peers on http://0.0.0.0:2380
2021-10-31 01:40:19.209146 I | embed: listening for client requests on 0.0.0.0:2379
2021-10-31 01:40:19.317071 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.68.16:2380
2021-10-31 01:40:19.404929 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.68.16:2380
2021-10-31 01:40:19.408106 I | etcdserver: name = onap-oof-has-etcd-1
2021-10-31 01:40:19.408126 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-10-31 01:40:19.408133 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-10-31 01:40:19.408137 I | etcdserver: heartbeat = 100ms
2021-10-31 01:40:19.408141 I | etcdserver: election = 1000ms
2021-10-31 01:40:19.408145 I | etcdserver: snapshot count = 100000
2021-10-31 01:40:19.408167 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2379
2021-10-31 01:40:19.408173 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2380
2021-10-31 01:40:19.408188 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-10-31 01:40:19.418376 I | etcdserver: starting member 72b38cc930a2fa6f in cluster e8b03869cbf54258
2021-10-31 01:40:19.418433 I | raft: 72b38cc930a2fa6f became follower at term 0
2021-10-31 01:40:19.418444 I | raft: newRaft 72b38cc930a2fa6f [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-10-31 01:40:19.418449 I | raft: 72b38cc930a2fa6f became follower at term 1
2021-10-31 01:40:19.423909 W | auth: simple token is not cryptographically signed
2021-10-31 01:40:19.426632 I | rafthttp: starting peer 2d249ba41c7e44fa...
2021-10-31 01:40:19.426735 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa
2021-10-31 01:40:19.505101 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-10-31 01:40:19.505422 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-10-31 01:40:19.506786 I | rafthttp: started peer 2d249ba41c7e44fa
2021-10-31 01:40:19.506919 I | rafthttp: added peer 2d249ba41c7e44fa
2021-10-31 01:40:19.506967 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-10-31 01:40:19.507008 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader)
2021-10-31 01:40:19.507146 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-10-31 01:40:19.507345 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-10-31 01:40:19.507901 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-31 01:40:19.606410 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-31 01:40:19.606777 I | rafthttp: started peer 8aae4c350a2413a5
2021-10-31 01:40:19.606823 I | rafthttp: added peer 8aae4c350a2413a5
2021-10-31 01:40:19.606878 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-10-31 01:40:19.607071 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-10-31 01:40:19.607561 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-10-31 01:40:19.609312 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-31 01:40:19.704931 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-31 01:40:19.705510 I | rafthttp: peer 8aae4c350a2413a5 became active
2021-10-31 01:40:19.705536 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message writer)
2021-10-31 01:40:19.705642 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 writer)
2021-10-31 01:40:19.707317 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-10-31 01:40:19.805905 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-31 01:40:19.806003 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message reader)
2021-10-31 01:40:19.948724 I | raft: 72b38cc930a2fa6f [term: 1] received a MsgVote message with higher term from 8aae4c350a2413a5 [term: 265]
2021-10-31 01:40:19.948775 I | raft: 72b38cc930a2fa6f became follower at term 265
2021-10-31 01:40:19.948797 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3, vote: 0] cast MsgVote for 8aae4c350a2413a5 [logterm: 1, index: 3] at term 265
2021-10-31 01:40:19.950561 I | raft: raft.node: 72b38cc930a2fa6f elected leader 8aae4c350a2413a5 at term 265
2021-10-31 01:40:19.953934 I | etcdserver: published {Name:onap-oof-has-etcd-1 ClientURLs:[http://onap-oof-has-etcd-1.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-10-31 01:40:19.953960 I | embed: ready to serve client requests
2021-10-31 01:40:19.954289 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-10-31 01:40:20.037902 N | etcdserver/membership: set the initial cluster version to 3.0
2021-10-31 01:40:20.038092 I | etcdserver/api: enabled capabilities for version 3.0
2021-10-31 01:40:24.507147 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:40:29.507334 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:40:34.507564 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:40:39.510106 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:40:44.510343 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:40:47.907729 N | auth: added a new user: root
2021-10-31 01:40:47.908161 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.147059459s) to execute
2021-10-31 01:40:49.510550 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:40:49.606619 N | auth: added a new user: conductor
2021-10-31 01:40:49.606695 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.138116982s) to execute
2021-10-31 01:40:50.262746 N | auth: Role conductor is created
2021-10-31 01:40:50.668514 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-10-31 01:40:51.161879 N | auth: granted role conductor to user conductor
2021-10-31 01:40:51.561554 N | auth: Role root is created
2021-10-31 01:40:51.564219 N | auth: granted role root to user root
2021-10-31 01:40:51.566482 N | auth: Authentication enabled
2021-10-31 01:40:54.512176 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:40:59.512354 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:04.512551 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:09.512731 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:14.512943 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:19.513135 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:24.513352 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:29.513568 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:34.513786 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:39.513974 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:44.514239 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:49.514462 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:54.514726 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:59.514990 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:04.515117 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:09.515409 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:14.515637 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-10-31 01:42:17.107325 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:14" took too long (1.069006106s) to execute
2021-10-31 01:42:18.606620 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (999.45133ms) to execute
2021-10-31 01:42:19.515918 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:21.508062 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (403.02155ms) to execute
2021-10-31 01:42:24.516108 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:29.516375 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:32.813290 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (408.301187ms) to execute
2021-10-31 01:42:34.516591 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:38.439239 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (298.579797ms) to execute
2021-10-31 01:42:39.516789 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:42.912832 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.307814741s) to execute
2021-10-31 01:42:44.516974 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:45.606291 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.167779599s) to execute
2021-10-31 01:42:48.214185 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.973822931s) to execute
2021-10-31 01:42:49.517253 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:50.909048 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.298237843s) to execute
2021-10-31 01:42:52.212265 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.274041312s) to execute
2021-10-31 01:42:52.212387 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.301856087s) to execute
2021-10-31 01:42:52.538245 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (233.188266ms) to execute
2021-10-31 01:42:54.517462 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:59.604852 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:02.712213 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.207093902s) to execute
2021-10-31 01:43:04.605081 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:05.505523 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.267336796s) to execute
2021-10-31 01:43:08.207953 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.169837021s) to execute
2021-10-31 01:43:09.505691 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (300.029418ms) to execute
2021-10-31 01:43:09.605335 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:12.107373 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102349602s) to execute
2021-10-31 01:43:13.408295 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (801.496147ms) to execute
2021-10-31 01:43:14.605525 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:15.906225 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.466309552s) to execute
2021-10-31 01:43:16.038200 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (129.95832ms) to execute
2021-10-31 01:43:16.044938 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:587" took too long (135.861308ms) to execute
2021-10-31 01:43:19.605744 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:20.008382 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.601352279s) to execute
2021-10-31 01:43:23.506404 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (961.741729ms) to execute
2021-10-31 01:43:24.605996 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:24.808103 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (666.451663ms) to execute
2021-10-31 01:43:26.310246 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (665.828516ms) to execute
2021-10-31 01:43:27.706632 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (668.489945ms) to execute
2021-10-31 01:43:29.606214 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:31.006481 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (768.347591ms) to execute
2021-10-31 01:43:32.405875 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (597.413176ms) to execute
2021-10-31 01:43:33.810232 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (305.254355ms) to execute
2021-10-31 01:43:34.606448 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:35.438260 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (197.757856ms) to execute
2021-10-31 01:43:36.910403 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (472.223952ms) to execute
2021-10-31 01:43:39.606626 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:39.609722 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.604668596s) to execute
2021-10-31 01:43:42.215355 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (910.304523ms) to execute
2021-10-31 01:43:44.606770 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:45.009156 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.566416546s) to execute
2021-10-31 01:43:45.238352 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (208.709943ms) to execute
2021-10-31 01:43:46.407825 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (867.88371ms) to execute
2021-10-31 01:43:49.606989 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:54.607190 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:56.606229 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (701.184806ms) to execute
2021-10-31 01:43:57.906828 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.001868121s) to execute
2021-10-31 01:43:59.207689 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.300735546s) to execute
2021-10-31 01:43:59.607664 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:00.510936 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.303142006s) to execute
2021-10-31 01:44:00.511530 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.603191388s) to execute
2021-10-31 01:44:01.906869 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.301856197s) to execute
2021-10-31 01:44:01.907034 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.394209273s) to execute
2021-10-31 01:44:01.907122 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.300037491s) to execute
2021-10-31 01:44:02.138961 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.512785ms) to execute
2021-10-31 01:44:03.607027 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (201.324045ms) to execute
2021-10-31 01:44:04.607877 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:06.108689 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.30363432s) to execute
2021-10-31 01:44:06.239308 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.778219ms) to execute
2021-10-31 01:44:09.105478 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.26443928s) to execute
2021-10-31 01:44:09.608067 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:10.808095 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (103.004025ms) to execute
2021-10-31 01:44:14.308987 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (670.976957ms) to execute
2021-10-31 01:44:14.608328 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:15.806126 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (368.07363ms) to execute
2021-10-31 01:44:17.209527 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (204.415588ms) to execute
2021-10-31 01:44:18.414696 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.174934223s) to execute
2021-10-31 01:44:19.608527 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:21.005468 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.500433325s) to execute
2021-10-31 01:44:21.005694 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.584834697s) to execute
2021-10-31 01:44:21.138472 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (131.526087ms) to execute
2021-10-31 01:44:21.239080 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (232.103895ms) to execute
2021-10-31 01:44:22.610407 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.370150241s) to execute
2021-10-31 01:44:23.809744 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.004716124s) to execute
2021-10-31 01:44:24.608655 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:25.110354 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.272505292s) to execute
2021-10-31 01:44:25.110511 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.299204723s) to execute
2021-10-31 01:44:26.415506 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.175165461s) to execute
2021-10-31 01:44:27.708026 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.169949755s) to execute
2021-10-31 01:44:27.840098 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (130.634882ms) to execute
2021-10-31 01:44:29.205697 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.164150278s) to execute
2021-10-31 01:44:29.608812 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:30.409216 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (904.18293ms) to execute
2021-10-31 01:44:31.710101 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.171880209s) to execute
2021-10-31 01:44:31.710242 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.205039072s) to execute
2021-10-31 01:44:32.038066 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (326.689189ms) to execute
2021-10-31 01:44:33.211105 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (371.401685ms) to execute
2021-10-31 01:44:34.607439 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (168.806124ms) to execute
2021-10-31 01:44:34.608979 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:39.609150 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:40.809953 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (270.870957ms) to execute
2021-10-31 01:44:41.138171 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.951762ms) to execute
2021-10-31 01:44:42.409352 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (371.100568ms) to execute
2021-10-31 01:44:44.609316 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:45.105246 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.599417829s) to execute
2021-10-31 01:44:46.307537 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.200070936s) to execute
2021-10-31 01:44:46.307626 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (969.182779ms) to execute
2021-10-31 01:44:46.307735 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.19997611s) to execute
2021-10-31 01:44:47.708392 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.301496579s) to execute
2021-10-31 01:44:49.009384 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.298107407s) to execute
2021-10-31 01:44:49.609500 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:51.707664 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.269593221s) to execute
2021-10-31 01:44:51.839626 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (129.613119ms) to execute
2021-10-31 01:44:54.609674 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:56.407270 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.164785817s) to execute
2021-10-31 01:44:57.707475 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.297611118s) to execute
2021-10-31 01:44:57.707651 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.298021898s) to execute
2021-10-31 01:44:59.009407 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.20431218s) to execute
2021-10-31 01:44:59.609878 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:00.412064 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.270751216s) to execute
2021-10-31 01:45:01.805806 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.366823833s) to execute
2021-10-31 01:45:04.511413 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.573029788s) to execute
2021-10-31 01:45:04.511638 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.70430899s) to execute
2021-10-31 01:45:04.610063 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:04.738903 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (129.61782ms) to execute
2021-10-31 01:45:08.508131 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.470024293s) to execute
2021-10-31 01:45:09.651731 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:09.809831 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.299743557s) to execute
2021-10-31 01:45:09.809963 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103603793s) to execute
2021-10-31 01:45:10.038172 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (133.033992ms) to execute
2021-10-31 01:45:10.039895 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.171748ms) to execute
2021-10-31 01:45:14.652007 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:19.704814 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:22.108551 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.670276049s) to execute
2021-10-31 01:45:22.239999 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (129.080059ms) to execute
2021-10-31 01:45:22.240125 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.515589ms) to execute
2021-10-31 01:45:22.538048 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (329.148322ms) to execute
2021-10-31 01:45:23.805801 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.066644949s) to execute
2021-10-31 01:45:24.704990 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:25.008847 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (970.615601ms) to execute
2021-10-31 01:45:25.138238 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (127.82809ms) to execute
2021-10-31 01:45:26.405537 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (963.143801ms) to execute
2021-10-31 01:45:27.706332 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.298060448s) to execute
2021-10-31 01:45:29.705255 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:30.406950 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.568664633s) to execute
2021-10-31 01:45:30.407109 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.698560865s) to execute
2021-10-31 01:45:33.207642 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.069620567s) to execute
2021-10-31 01:45:34.612230 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (672.313852ms) to execute
2021-10-31 01:45:34.705488 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:38.115327 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (209.350934ms) to execute
2021-10-31 01:45:39.705707 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:44.705906 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:46.005943 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.496127489s) to execute
2021-10-31 01:45:47.307948 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.299585943s) to execute
2021-10-31 01:45:48.607973 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.600500872s) to execute
2021-10-31 01:45:48.608043 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.600531418s) to execute
2021-10-31 01:45:48.608199 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203331094s) to execute
2021-10-31 01:45:48.608342 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.298552637s) to execute
2021-10-31 01:45:49.706110 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:52.304990 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.365904573s) to execute
2021-10-31 01:45:54.706333 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:45:54.712550 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.507568387s) to execute
2021-10-31 01:45:56.139098 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (134.176596ms) to execute
2021-10-31 01:45:59.308206 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (666.678329ms) to execute
2021-10-31 01:45:59.706538 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:00.605619 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (467.518771ms) to execute
2021-10-31 01:46:02.108936 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (603.914228ms) to execute
2021-10-31 01:46:03.607783 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (766.665498ms) to execute
2021-10-31 01:46:04.706752 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:04.809355 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.071223629s) to execute
2021-10-31 01:46:06.105516 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.293832861s) to execute
2021-10-31 01:46:06.105666 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.200598891s) to execute
2021-10-31 01:46:08.507125 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.167156507s) to execute
2021-10-31 01:46:08.638444 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.007006ms) to execute
2021-10-31 01:46:09.706964 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:11.911812 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.105129181s) to execute
2021-10-31 01:46:14.206634 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (501.674507ms) to execute
2021-10-31 01:46:14.707221 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:15.411123 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.169600895s) to execute
2021-10-31 01:46:15.411334 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (473.021631ms) to execute
2021-10-31 01:46:16.805837 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (462.568904ms) to execute
2021-10-31 01:46:18.211632 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (373.177381ms) to execute
2021-10-31 01:46:19.707421 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:22.809009 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (470.704194ms) to execute
2021-10-31 01:46:23.138172 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.624046ms) to execute
2021-10-31 01:46:24.505153 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (962.541111ms) to execute
2021-10-31 01:46:24.707617 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:25.711821 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.172288764s) to execute
2021-10-31 01:46:28.211176 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.497094895s) to execute
2021-10-31 01:46:28.211484 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.497780459s) to execute
2021-10-31 01:46:29.505415 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.292113821s) to execute
2021-10-31 01:46:29.505563 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.29227685s) to execute
2021-10-31 01:46:29.505669 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.285534997s) to execute
2021-10-31 01:46:29.707827 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:32.105625 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.267700584s) to execute
2021-10-31 01:46:32.239382 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (132.035293ms) to execute
2021-10-31 01:46:34.605127 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.157380111s) to execute
2021-10-31 01:46:34.708047 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:34.738327 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.370115ms) to execute
2021-10-31 01:46:36.010646 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (772.482338ms) to execute
2021-10-31 01:46:38.410202 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.271996889s) to execute
2021-10-31 01:46:39.708302 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:40.910795 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.405682215s) to execute
2021-10-31 01:46:40.911307 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.499618266s) to execute
2021-10-31 01:46:41.006018 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.50076159s) to execute
2021-10-31 01:46:43.412337 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.172745542s) to execute
2021-10-31 01:46:44.708541 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:46.810322 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (372.109098ms) to execute
2021-10-31 01:46:48.010616 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.104222801s) to execute
2021-10-31 01:46:48.438544 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (333.465397ms) to execute
2021-10-31 01:46:48.439828 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.729217ms) to execute
2021-10-31 01:46:49.708754 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:50.808817 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.402907278s) to execute
2021-10-31 01:46:50.938053 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (126.62421ms) to execute
2021-10-31 01:46:53.409669 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203090515s) to execute
2021-10-31 01:46:54.609046 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.195904887s) to execute
2021-10-31 01:46:54.609308 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.196495621s) to execute
2021-10-31 01:46:54.708933 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:54.839366 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (210.861672ms) to execute
2021-10-31 01:46:56.008192 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.168232311s) to execute
2021-10-31 01:46:57.209224 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.870992185s) to execute
2021-10-31 01:46:58.410443 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103650568s) to execute
2021-10-31 01:46:58.410627 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.198896725s) to execute
2021-10-31 01:46:58.638889 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (226.395852ms) to execute
2021-10-31 01:46:59.709118 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:02.009692 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.169331932s) to execute
2021-10-31 01:47:02.239253 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (227.896688ms) to execute
2021-10-31 01:47:04.612945 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.173362089s) to execute
2021-10-31 01:47:04.709306 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:05.911865 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (870.093574ms) to execute
2021-10-31 01:47:06.566871 I | auth: deleting token TTYLxwNRdTLBbvXt.17 for user conductor
2021-10-31 01:47:07.566893 I | auth: deleting token lPOJKvdwYPctWxaR.19 for user conductor
2021-10-31 01:47:08.207927 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (269.828753ms) to execute
2021-10-31 01:47:09.604869 I | auth: deleting token whJBfyprnFvabxLg.21 for user conductor
2021-10-31 01:47:09.705780 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (367.645706ms) to execute
2021-10-31 01:47:09.709546 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:10.566833 I | auth: deleting token lTyhWTfUtPCBfqlo.23 for user conductor
2021-10-31 01:47:11.106187 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (367.766195ms) to execute
2021-10-31 01:47:11.566891 I | auth: deleting token AFcNxCcxLdIXKnyA.25 for user conductor
2021-10-31 01:47:12.406064 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.199180735s) to execute
2021-10-31 01:47:13.566868 I | auth: deleting token jybAAwEAjiqocgit.27 for user conductor
2021-10-31 01:47:13.610347 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201989776s) to execute
2021-10-31 01:47:13.610497 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.202537426s) to execute
2021-10-31 01:47:13.739396 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (127.550869ms) to execute
2021-10-31 01:47:14.566845 I | auth: deleting token vNHTpJGXPXbuPyta.29 for user conductor
2021-10-31 01:47:14.709756 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:15.007643 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (600.815632ms) to execute
2021-10-31 01:47:16.211331 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.171805779s) to execute
2021-10-31 01:47:16.438599 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (225.423025ms) to execute
2021-10-31 01:47:16.566823 I | auth: deleting token vadHAoaZyzauwyXW.31 for user conductor
2021-10-31 01:47:17.566845 I | auth: deleting token jRFssHWDkyizKzQo.33 for user conductor
2021-10-31 01:47:17.612408 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (373.199944ms) to execute
2021-10-31 01:47:19.566843 I | auth: deleting token AWrdKZGCYqZVMtDO.37 for user conductor
2021-10-31 01:47:19.566965 I | auth: deleting token RGDXRVLoVeNQuPky.35 for user conductor
2021-10-31 01:47:19.709939 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:20.010290 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.303406598s) to execute
2021-10-31 01:47:20.138101 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (125.70249ms) to execute
2021-10-31 01:47:20.139525 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.13665ms) to execute
2021-10-31 01:47:20.566876 I | auth: deleting token ekCQYQyqyuPmRLJX.39 for user conductor
2021-10-31 01:47:21.566834 I | auth: deleting token uISdngLmacFcyoBt.41 for user conductor
2021-10-31 01:47:22.509168 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.204180106s) to execute
2021-10-31 01:47:22.566794 I | auth: deleting token CTmabimTDTSHpMoU.42 for user conductor
2021-10-31 01:47:22.566827 I | auth: deleting token ujaZCtPrAskGwucc.44 for user conductor
2021-10-31 01:47:23.712340 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.20082663s) to execute
2021-10-31 01:47:24.566838 I | auth: deleting token OzBsWdpZVkcJDtiP.45 for user conductor
2021-10-31 01:47:24.710129 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:24.908140 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.397025699s) to execute
2021-10-31 01:47:24.908266 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.193414371s) to execute
2021-10-31 01:47:24.908395 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.194378694s) to execute
2021-10-31 01:47:26.206285 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.197952094s) to execute
2021-10-31 01:47:26.566829 I | auth: deleting token WURivlJdXjDYBwiZ.47 for user conductor
2021-10-31 01:47:27.604874 I | auth: deleting token EaTnhJWCyJbSEhJg.48 for user conductor
2021-10-31 01:47:28.608266 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.069917931s) to execute
2021-10-31 01:47:29.604874 I | auth: deleting token UfhUAefqqPfdsuRD.49 for user conductor
2021-10-31 01:47:29.710345 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:30.566827 I | auth: deleting token sFKRWmhUrlMWAfGp.50 for user conductor
2021-10-31 01:47:31.205836 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.765303377s) to execute
2021-10-31 01:47:31.604834 I | auth: deleting token poLFFhOrvuLcjyMr.51 for user conductor
2021-10-31 01:47:32.312184 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.074016068s) to execute
2021-10-31 01:47:32.312403 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.104518973s) to execute
2021-10-31 01:47:33.566824 I | auth: deleting token MKdQpQUBRqXhOZdy.52 for user conductor
2021-10-31 01:47:33.566867 I | auth: deleting token oiMFLjczeyMEYgWS.53 for user conductor
2021-10-31 01:47:33.812411 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.497560053s) to execute
2021-10-31 01:47:33.812581 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.006356142s) to execute
2021-10-31 01:47:34.604880 I | auth: deleting token sDgKehcHfSxISNyF.54 for user conductor
2021-10-31 01:47:34.710496 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:35.604919 I | auth: deleting token FxxSMjjPvCexWgmO.55 for user conductor
2021-10-31 01:47:36.213449 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.308426469s) to execute
2021-10-31 01:47:36.213618 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.39932185s) to execute
2021-10-31 01:47:37.506173 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.101140931s) to execute
2021-10-31 01:47:37.506419 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.20117547s) to execute
2021-10-31 01:47:37.506615 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.201421773s) to execute
2021-10-31 01:47:37.566887 I | auth: deleting token UZnILedVhrDaNwCF.56 for user conductor
2021-10-31 01:47:38.566899 I | auth: deleting token UTBdTTVihLxHXWbI.57 for user conductor
2021-10-31 01:47:38.566954 I | auth: deleting token JDUwkPAugFDyxCqX.58 for user conductor
2021-10-31 01:47:38.706532 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.198307199s) to execute
2021-10-31 01:47:38.706717 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.19548702s) to execute
2021-10-31 01:47:39.710703 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:40.604856 I | auth: deleting token OGHtznpyihAbkDeb.59 for user conductor
2021-10-31 01:47:42.408599 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.270443715s) to execute
2021-10-31 01:47:43.566814 I | auth: deleting token sFVKymgPpwYdehRY.62 for user conductor
2021-10-31 01:47:43.566858 I | auth: deleting token KGgOMZFtubtGPLbQ.60 for user conductor
2021-10-31 01:47:43.566867 I | auth: deleting token IxWUiYyYSFYKzRqW.61 for user conductor
2021-10-31 01:47:43.706713 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (200.094801ms) to execute
2021-10-31 01:47:44.710871 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:46.110670 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.304925887s) to execute
2021-10-31 01:47:46.566889 I | auth: deleting token MIZeKMOErzgtANZu.64 for user conductor
2021-10-31 01:47:46.566930 I | auth: deleting token jQzcvmTVllamOPxV.65 for user conductor
2021-10-31 01:47:46.566939 I | auth: deleting token TVmdSzmFvkGgHrcQ.66 for user conductor
2021-10-31 01:47:47.309905 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.07164761s) to execute
2021-10-31 01:47:47.310032 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.197776736s) to execute
2021-10-31 01:47:47.310261 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.198014941s) to execute
2021-10-31 01:47:48.566851 I | auth: deleting token XheRgtPYxHodDSuJ.70 for user conductor
2021-10-31 01:47:48.566915 I | auth: deleting token fYNsGxAqlozSWkCF.68 for user conductor
2021-10-31 01:47:48.566936 I | auth: deleting token knUXAcJiZxcnblGu.69 for user conductor
2021-10-31 01:47:48.566951 I | auth: deleting token iUIGGeUSHVKSDakz.71 for user conductor
2021-10-31 01:47:48.615341 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.174620344s) to execute
2021-10-31 01:47:48.615657 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (609.555163ms) to execute
2021-10-31 01:47:49.804821 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:49.911358 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.203602285s) to execute
2021-10-31 01:47:49.911850 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (506.93567ms) to execute
2021-10-31 01:47:52.566842 I | auth: deleting token DfLuMPrJTPFxaSIx.73 for user conductor
2021-10-31 01:47:52.566891 I | auth: deleting token eRUEfgoBEiJdorxQ.75 for user conductor
2021-10-31 01:47:52.566915 I | auth: deleting token gdRHsXLLIfiaYtiu.74 for user conductor
2021-10-31 01:47:54.566833 I | auth: deleting token yNBaQZaDMGQyKPlw.76 for user conductor
2021-10-31 01:47:54.566885 I | auth: deleting token KEWUfKrPJtlwhAcK.77 for user conductor
2021-10-31 01:47:54.805026 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:55.566807 I | auth: deleting token DGGZkrVSPJqlFGvl.78 for user conductor
2021-10-31 01:47:55.566874 I | auth: deleting token xYCDmfcQgOnJbQPC.79 for user conductor
2021-10-31 01:47:57.566837 I | auth: deleting token ARDqtNiUYToxbZkx.81 for user conductor
2021-10-31 01:47:57.566911 I | auth: deleting token JKFeRzlBsyHCJgRC.82 for user conductor
2021-10-31 01:47:58.566844 I | auth: deleting token RBjuriHcTbaclrlQ.84 for user conductor
2021-10-31 01:47:59.805282 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:00.006809 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.166190591s) to execute
2021-10-31 01:48:00.566900 I | auth: deleting token SLIemVPkBoHxVwrG.87 for user conductor
2021-10-31 01:48:00.566949 I | auth: deleting token ZxStGRdAFOpqJaQA.85 for user conductor
2021-10-31 01:48:03.566850 I | auth: deleting token JcFYxzXglGdvKhDw.92 for user conductor
2021-10-31 01:48:03.566887 I | auth: deleting token vvQEdliOigUgEIWf.88 for user conductor
2021-10-31 01:48:03.566897 I | auth: deleting token KMVmkzMGHcSOHoLU.89 for user conductor
2021-10-31 01:48:03.566911 I | auth: deleting token QLTtFaCOqYWlsOdp.90 for user conductor
2021-10-31 01:48:04.890316 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:05.009194 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (770.911049ms) to execute
2021-10-31 01:48:05.566862 I | auth: deleting token CXavJhrHEGBnCoaT.94 for user conductor
2021-10-31 01:48:05.566907 I | auth: deleting token rtOgshXrcKJwJTff.93 for user conductor
2021-10-31 01:48:06.207368 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (664.133995ms) to execute
2021-10-31 01:48:06.566879 I | auth: deleting token RbIeyPTOIXHCbKDy.95 for user conductor
2021-10-31 01:48:08.505670 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (164.631412ms) to execute
2021-10-31 01:48:08.566874 I | auth: deleting token oStxMhMHPtUDzbhY.98 for user conductor
2021-10-31 01:48:08.566918 I | auth: deleting token TIcCOTwoSOyIghjW.99 for user conductor
2021-10-31 01:48:08.566924 I | auth: deleting token cPmnhjuXvxQdLkCL.97 for user conductor
2021-10-31 01:48:08.566932 I | auth: deleting token qBOGNGvDkWwPbIpO.100 for user conductor
2021-10-31 01:48:09.566810 I | auth: deleting token oSYMkKHFgZPcDjtq.103 for user conductor
2021-10-31 01:48:09.566846 I | auth: deleting token EioaWNoIXZlCTUDT.102 for user conductor
2021-10-31 01:48:09.890515 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:11.009015 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.170848112s) to execute
2021-10-31 01:48:12.309657 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.271694493s) to execute
2021-10-31 01:48:12.309821 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.298453383s) to execute
2021-10-31 01:48:12.438403 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.329922ms) to execute
2021-10-31 01:48:12.566802 I | auth: deleting token JWKeKrKlItOXHcfg.105 for user conductor
2021-10-31 01:48:12.566841 I | auth: deleting token pkhbmonmaxkiEDdv.107 for user conductor
2021-10-31 01:48:12.566855 I | auth: deleting token ifcbXMvccjpmVQfd.106 for user conductor
2021-10-31 01:48:13.604919 I | auth: deleting token ekYhsaacDEHLmrRp.109 for user conductor
2021-10-31 01:48:13.607859 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (769.797029ms) to execute
2021-10-31 01:48:14.904940 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:16.014094 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.275639947s) to execute
2021-10-31 01:48:16.566809 I | auth: deleting token gzHohUBGQFgmILqg.112 for user conductor
2021-10-31 01:48:16.566847 I | auth: deleting token gkKuaGOtlFxHXyhO.111 for user conductor
2021-10-31 01:48:16.566857 I | auth: deleting token IJIvvrHWPSaGepRp.115 for user conductor
2021-10-31 01:48:16.566863 I | auth: deleting token UuJntcxAHIeStqXm.114 for user conductor
2021-10-31 01:48:17.307136 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201319145s) to execute
2021-10-31 01:48:17.307414 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.29147959s) to execute
2021-10-31 01:48:17.309175 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.2042591s) to execute
2021-10-31 01:48:19.905173 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:19.905934 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.396363814s) to execute
2021-10-31 01:48:20.038214 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (130.1161ms) to execute
2021-10-31 01:48:20.566881 I | auth: deleting token ghXNqpjrYjFGQrIt.113 for user conductor
2021-10-31 01:48:20.567043 I | auth: deleting token tOQTqyJdCsTfSwJd.119 for user conductor
2021-10-31 01:48:20.604852 I | auth: deleting token CWkgAVCHwHEbKGuu.118 for user conductor
2021-10-31 01:48:20.604905 I | auth: deleting token wrerRRyvmIledyIe.116 for user conductor
2021-10-31 01:48:20.605005 I | auth: deleting token pkhNlyYVVmZWbncM.117 for user conductor
2021-10-31 01:48:21.206280 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (999.512155ms) to execute
2021-10-31 01:48:21.566842 I | auth: deleting token gtmFSkjQhzXExLnH.121 for user conductor
2021-10-31 01:48:22.412085 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.073613345s) to execute
2021-10-31 01:48:23.566855 I | auth: deleting token UgIjoVihODbFabhR.123 for user conductor
2021-10-31 01:48:23.566909 I | auth: deleting token bFuSzxhLDjIMalBj.122 for user conductor
2021-10-31 01:48:24.905390 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:24.911704 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.905064537s) to execute
2021-10-31 01:48:25.566843 I | auth: deleting token AmBveFzFAjbhsdys.124 for user conductor
2021-10-31 01:48:25.566893 I | auth: deleting token ERYVTMfwUjeStoYv.125 for user conductor
2021-10-31 01:48:26.207879 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.169548566s) to execute
2021-10-31 01:48:26.208232 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.203095218s) to execute
2021-10-31 01:48:26.604800 I | auth: deleting token EkHYVDRHnLEfehFR.127 for user conductor
2021-10-31 01:48:26.604839 I | auth: deleting token IRqphzYxtbxdGSCh.126 for user conductor
2021-10-31 01:48:27.406351 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.196640418s) to execute
2021-10-31 01:48:27.406455 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.101265773s) to execute
2021-10-31 01:48:28.604850 I | auth: deleting token EFkjQkCpNElgoWIA.128 for user conductor
2021-10-31 01:48:28.604996 I | auth: deleting token HKJSfBmJiNyrbSSD.129 for user conductor
2021-10-31 01:48:29.566928 I | auth: deleting token bUbgWtfBrXjXWGxx.130 for user conductor
2021-10-31 01:48:29.809200 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.269543466s) to execute
2021-10-31 01:48:29.809312 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.070000814s) to execute
2021-10-31 01:48:29.905660 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:31.566852 I | auth: deleting token elakBIkQFQIgfebz.131 for user conductor
2021-10-31 01:48:31.566905 I | auth: deleting token DbpzgiZnhPIMTwEp.132 for user conductor
2021-10-31 01:48:32.566840 I | auth: deleting token AejuzLyjOAchWPXX.133 for user conductor
2021-10-31 01:48:32.566893 I | auth: deleting token fPEFsvWNSCQnKJAu.134 for user conductor
2021-10-31 01:48:34.566840 I | auth: deleting token qjTRnRuLPUIpvnlr.136 for user conductor
2021-10-31 01:48:34.566898 I | auth: deleting token JFiqoNRNZCHqzhgh.135 for user conductor
2021-10-31 01:48:34.905924 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:35.566876 I | auth: deleting token osSSPRzBUAqCnabT.137 for user conductor
2021-10-31 01:48:35.566934 I | auth: deleting token XYevcbwgKMVpATiv.138 for user conductor
2021-10-31 01:48:37.566845 I | auth: deleting token XnCXhDAmYefkGfDE.140 for user conductor
2021-10-31 01:48:37.566924 I | auth: deleting token UBpIwMkqVJcVFmeo.139 for user conductor
2021-10-31 01:48:39.906174 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:40.604844 I | auth: deleting token SfDDMhKQidmmeyFu.142 for user conductor
2021-10-31 01:48:40.604906 I | auth: deleting token PEUvxemrsXkomzKf.144 for user conductor
2021-10-31 01:48:40.604916 I | auth: deleting token KcSCZtQmeYKYmKHv.146 for user conductor
2021-10-31 01:48:40.604926 I | auth: deleting token nyUeWYnHpylhkjUt.143 for user conductor
2021-10-31 01:48:41.843641 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (103.507191ms) to execute
2021-10-31 01:48:42.566908 I | auth: deleting token ZlTlYVQgozEQGAmw.149 for user conductor
2021-10-31 01:48:42.566969 I | auth: deleting token HpfZvXHOUZMMyqMC.147 for user conductor
2021-10-31 01:48:42.566991 I | auth: deleting token dMTEJiannMGryiKE.148 for user conductor
2021-10-31 01:48:44.906453 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:45.509179 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.404271491s) to execute
2021-10-31 01:48:45.566895 I | auth: deleting token YIGvtmPfYpiPrlhx.153 for user conductor
2021-10-31 01:48:45.566944 I | auth: deleting token LETlgWkKzObZYmJQ.152 for user conductor
2021-10-31 01:48:45.566952 I | auth: deleting token QKzkkJIqUXgOXZGU.151 for user conductor
2021-10-31 01:48:45.566968 I | auth: deleting token kkvdIcALbOyFCHXP.150 for user conductor
2021-10-31 01:48:46.604860 I | auth: deleting token oFMYyIKlsNbcNbwV.154 for user conductor
2021-10-31 01:48:46.604915 I | auth: deleting token ioUoaqcOOjLsYvYx.155 for user conductor
2021-10-31 01:48:46.905576 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (667.665844ms) to execute
2021-10-31 01:48:47.566892 I | auth: deleting token zzgZptmnbkHzcQfz.156 for user conductor
2021-10-31 01:48:48.604881 I | auth: deleting token cfBhKwcnNosspQlG.157 for user conductor
2021-10-31 01:48:49.310651 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.402781529s) to execute
2021-10-31 01:48:49.906641 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:50.566916 I | auth: deleting token ngimXJqgTmsJzRkd.158 for user conductor
2021-10-31 01:48:50.566952 I | auth: deleting token IuBREnVysNdvhkbk.159 for user conductor
2021-10-31 01:48:51.566856 I | auth: deleting token nKPEudolxyaxuArV.161 for user conductor
2021-10-31 01:48:51.566899 I | auth: deleting token EawBLifwXNcjOyJW.160 for user conductor
2021-10-31 01:48:53.566893 I | auth: deleting token SdtdgjnBnBgYpZWI.162 for user conductor
2021-10-31 01:48:54.311752 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.604313078s) to execute
2021-10-31 01:48:54.566880 I | auth: deleting token IqyDearveTNbZHfv.163 for user conductor
2021-10-31 01:48:54.906918 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:48:57.566868 I | auth: deleting token SozvVprOSexKyBss.164 for user conductor
2021-10-31 01:48:58.007195 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.702276125s) to execute
2021-10-31 01:48:59.604828 I | auth: deleting token aTFoNIzillzHXznv.166 for user conductor
2021-10-31 01:48:59.907134 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:00.604792 I | auth: deleting token IfpnzjMzxIXWDRDM.165 for user conductor
2021-10-31 01:49:00.605545 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.267340397s) to execute
2021-10-31 01:49:01.606085 I | auth: deleting token jKdFWERyhsYTidWX.168 for user conductor
2021-10-31 01:49:01.606129 I | auth: deleting token fXPqKFceIMcGsigx.167 for user conductor
2021-10-31 01:49:01.606140 I | auth: deleting token ACsEBNHfqZUCecYF.169 for user conductor
2021-10-31 01:49:01.805949 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.198990373s) to execute
2021-10-31 01:49:01.806058 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.166221271s) to execute
2021-10-31 01:49:02.604848 I | auth: deleting token avJhmbSLzejXBHkb.171 for user conductor
2021-10-31 01:49:02.604895 I | auth: deleting token bfFMttiXoQQhEOas.170 for user conductor
2021-10-31 01:49:02.909159 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.09999053s) to execute
2021-10-31 01:49:02.909305 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.101463582s) to execute
2021-10-31 01:49:03.038449 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (127.918729ms) to execute
2021-10-31 01:49:04.206446 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.19972541s) to execute
2021-10-31 01:49:04.206501 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (265.924544ms) to execute
2021-10-31 01:49:04.566910 I | auth: deleting token wnjwsUInThxzYjWD.172 for user conductor
2021-10-31 01:49:04.566981 I | auth: deleting token WVmNmutlNDOVKzht.173 for user conductor
2021-10-31 01:49:04.907320 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:05.610447 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.270288989s) to execute
2021-10-31 01:49:05.610534 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (172.379369ms) to execute
2021-10-31 01:49:06.566858 I | auth: deleting token SCiCyrUbitlpNUcQ.176 for user conductor
2021-10-31 01:49:06.566910 I | auth: deleting token CInAmjfIDKeNQTcF.175 for user conductor
2021-10-31 01:49:06.566923 I | auth: deleting token hhLhqshQnpeOfvSX.177 for user conductor
2021-10-31 01:49:06.566947 I | auth: deleting token WxTsSRcVdSBNWaso.174 for user conductor
2021-10-31 01:49:08.566823 I | auth: deleting token iYZKzcwbdXPLgzZn.178 for user conductor
2021-10-31 01:49:09.410632 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (904.508427ms) to execute
2021-10-31 01:49:09.566885 I | auth: deleting token HtuvzNCoNLgbYJHe.179 for user conductor
2021-10-31 01:49:09.566953 I | auth: deleting token XteBHYcgiVYNqwON.180 for user conductor
2021-10-31 01:49:09.566968 I | auth: deleting token QUFMVmjVtGpEYyGy.181 for user conductor
2021-10-31 01:49:09.907565 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:11.566811 I | auth: deleting token BKmUFuWsVeUBXGHk.183 for user conductor
2021-10-31 01:49:11.566873 I | auth: deleting token xhvpMBsoIZHuaSly.182 for user conductor
2021-10-31 01:49:11.611136 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (269.519619ms) to execute
2021-10-31 01:49:12.604931 I | auth: deleting token pQzoiCIcWjkTusDW.184 for user conductor
2021-10-31 01:49:13.114168 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (175.87572ms) to execute
2021-10-31 01:49:14.307888 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102132063s) to execute
2021-10-31 01:49:14.566926 I | auth: deleting token nCURcuVesQfXAMFN.185 for user conductor
2021-10-31 01:49:14.907809 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:15.566841 I | auth: deleting token tNuMTxYdsZAIjmoD.186 for user conductor
2021-10-31 01:49:16.604853 I | auth: deleting token pSKYMEsjqYDyIPQj.187 for user conductor
2021-10-31 01:49:16.604916 I | auth: deleting token HQpDDfjlSUveywUK.188 for user conductor
2021-10-31 01:49:17.566845 I | auth: deleting token rHlEIJmWyqFcKvRM.189 for user conductor
2021-10-31 01:49:17.810012 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.970656237s) to execute
2021-10-31 01:49:19.014473 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.202744543s) to execute
2021-10-31 01:49:19.014598 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.174938379s) to execute
2021-10-31 01:49:19.908055 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:20.314904 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.107776162s) to execute
2021-10-31 01:49:21.566823 I | auth: deleting token RitOjnwCUhOlWcCe.195 for user conductor
2021-10-31 01:49:21.566864 I | auth: deleting token sDmWronbgnCkumVn.191 for user conductor
2021-10-31 01:49:21.566875 I | auth: deleting token NxJHcyuVKTrWsQSO.194 for user conductor
2021-10-31 01:49:21.566882 I | auth: deleting token LRnEJfYZrYsbQiBh.192 for user conductor
2021-10-31 01:49:21.566891 I | auth: deleting token pjpmrjaLiQiYakbB.196 for user conductor
2021-10-31 01:49:21.566899 I | auth: deleting token mUivlBeIlQhutFat.193 for user conductor
2021-10-31 01:49:21.566907 I | auth: deleting token nbVJLyKozwROJtAi.190 for user conductor
2021-10-31 01:49:21.608893 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.503761528s) to execute
2021-10-31 01:49:21.608935 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.202085257s) to execute
2021-10-31 01:49:21.609031 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.20395144s) to execute
2021-10-31 01:49:24.604886 I | auth: deleting token IznObYyTOQqqShGB.198 for user conductor
2021-10-31 01:49:24.908238 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:25.604824 I | auth: deleting token WjROkbsoiYgwTJmH.197 for user conductor
2021-10-31 01:49:25.604863 I | auth: deleting token XiowMSiryhTikXBS.201 for user conductor
2021-10-31 01:49:25.604871 I | auth: deleting token PwgLFUvBfVqkEjpn.200 for user conductor
2021-10-31 01:49:25.604882 I | auth: deleting token fswSuqTFBroVIRKw.199 for user conductor
2021-10-31 01:49:26.609958 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.404821033s) to execute
2021-10-31 01:49:26.738908 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (126.70685ms) to execute
2021-10-31 01:49:26.739698 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (127.05459ms) to execute
2021-10-31 01:49:26.739817 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (127.76759ms) to execute
2021-10-31 01:49:28.566867 I | auth: deleting token VkbaFtXfuHSaQIrB.203 for user conductor
2021-10-31 01:49:28.567029 I | auth: deleting token JrcwMnJLQRvQJdnw.204 for user conductor
2021-10-31 01:49:28.567084 I | auth: deleting token ZuaZUTIsNKQVpbUA.202 for user conductor
2021-10-31 01:49:29.604899 I | auth: deleting token NswKSeeIwHQvRBtd.205 for user conductor
2021-10-31 01:49:29.908461 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:30.505147 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.000108255s) to execute
2021-10-31 01:49:30.566829 I | auth: deleting token CCrIcTbHlArtVRjM.207 for user conductor
2021-10-31 01:49:32.594512 I | auth: deleting token xclCYCgIXdukxQTr.208 for user conductor
2021-10-31 01:49:32.594568 I | auth: deleting token AHfwkHDHKDuveJht.209 for user conductor
2021-10-31 01:49:32.594576 I | auth: deleting token TEZaMsxKyOdxaJGG.210 for user conductor
2021-10-31 01:49:32.594587 I | auth: deleting token pznOCnQnKEMBUCzq.206 for user conductor
2021-10-31 01:49:32.708244 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (503.2627ms) to execute
2021-10-31 01:49:33.566878 I | auth: deleting token QygqlBjBFdKflXDK.212 for user conductor
2021-10-31 01:49:33.566928 I | auth: deleting token EDwrEDinZHwSRUMb.211 for user conductor
2021-10-31 01:49:34.908639 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:35.215899 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (277.584555ms) to execute
2021-10-31 01:49:35.566867 I | auth: deleting token vRRgvmwEuElRBTri.213 for user conductor
2021-10-31 01:49:35.566949 I | auth: deleting token WoNSaSGvaIqipRlc.214 for user conductor
2021-10-31 01:49:36.513063 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (207.319997ms) to execute
2021-10-31 01:49:36.604849 I | auth: deleting token oLJAlkYouVyqidGB.215 for user conductor
2021-10-31 01:49:36.839246 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (199.157512ms) to execute
2021-10-31 01:49:37.604919 I | auth: deleting token solrpQazuQBWvvfD.216 for user conductor
2021-10-31 01:49:38.566865 I | auth: deleting token eNbQiXIGcGDcRjfF.217 for user conductor
2021-10-31 01:49:39.566814 I | auth: deleting token GJXEqNykWuTYHbxn.218 for user conductor
2021-10-31 01:49:40.004834 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:40.415862 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.277859127s) to execute
2021-10-31 01:49:41.589924 I | auth: deleting token kUQnglIegvAcvhCN.219 for user conductor
2021-10-31 01:49:41.589977 I | auth: deleting token sRnzUpyFxtNMkFAp.220 for user conductor
2021-10-31 01:49:41.706757 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.168633953s) to execute
2021-10-31 01:49:41.706866 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.201696517s) to execute
2021-10-31 01:49:41.706975 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.201817774s) to execute
2021-10-31 01:49:42.566826 I | auth: deleting token PUxkhOocmVJmDYwZ.221 for user conductor
2021-10-31 01:49:45.005070 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:45.566827 I | auth: deleting token NxbnvWVVKKqZVeLF.224 for user conductor
2021-10-31 01:49:45.566867 I | auth: deleting token mJBbQjXKLyIJAaIh.223 for user conductor
2021-10-31 01:49:46.604837 I | auth: deleting token JkIxnhRoLPLGPPEx.226 for user conductor
2021-10-31 01:49:46.604875 I | auth: deleting token ADJMnnBxtElnLLlX.222 for user conductor
2021-10-31 01:49:46.604893 I | auth: deleting token GudQlqgAPgHJMXNT.225 for user conductor
2021-10-31 01:49:46.613271 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.573557911s) to execute
2021-10-31 01:49:47.566833 I | auth: deleting token abjqTnoOBVblSzgw.227 for user conductor
2021-10-31 01:49:49.408304 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.403367641s) to execute
2021-10-31 01:49:49.566834 I | auth: deleting token uBjXyWuzLPpUHJVt.230 for user conductor
2021-10-31 01:49:49.566886 I | auth: deleting token LqjLWCYLSPnjmtKm.229 for user conductor
2021-10-31 01:49:49.566909 I | auth: deleting token otlqtOCJbSUnuXcI.228 for user conductor
2021-10-31 01:49:50.005258 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:52.007412 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.369092288s) to execute
2021-10-31 01:49:52.604826 I | auth: deleting token idXAtDPrBPQkWkib.233 for user conductor
2021-10-31 01:49:52.604872 I | auth: deleting token XsIVinXteUYQujLe.234 for user conductor
2021-10-31 01:49:52.604884 I | auth: deleting token BvADejlSKKiImWTy.231 for user conductor
2021-10-31 01:49:52.604889 I | auth: deleting token bnOrXbjZQQkdFkON.235 for user conductor
2021-10-31 01:49:52.604896 I | auth: deleting token sXucSDrUkYeQckrL.232 for user conductor
2021-10-31 01:49:53.206800 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.196975594s) to execute
2021-10-31 01:49:53.207024 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.0685985s) to execute
2021-10-31 01:49:53.338964 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (130.094365ms) to execute
2021-10-31 01:49:54.513061 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.172402624s) to execute
2021-10-31 01:49:55.005460 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:49:56.566833 I | auth: deleting token MTCYluBllggwqdtX.238 for user conductor
2021-10-31 01:49:56.566890 I | auth: deleting token QKIhcXlWRLHgDdYH.236 for user conductor
2021-10-31 01:49:56.910797 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.272769857s) to execute
2021-10-31 01:49:58.566853 I | auth: deleting token emqiHYoVbOMZhnSJ.241 for user conductor
2021-10-31 01:49:58.566906 I | auth: deleting token SWLXBYGOkwsLjLXX.237 for user conductor
2021-10-31 01:49:58.566922 I | auth: deleting token cpxrRGeNYGiChgtC.240 for user conductor
2021-10-31 01:49:58.566933 I | auth: deleting token CmVQPItSuykOFEtA.239 for user conductor
2021-10-31 01:49:59.406753 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.493198323s) to execute
2021-10-31 01:49:59.407053 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.494525738s) to execute
2021-10-31 01:49:59.409466 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.496316713s) to execute
2021-10-31 01:49:59.566921 I | auth: deleting token WBKjBcwkJjvDjdwC.243 for user conductor
2021-10-31 01:49:59.566968 I | auth: deleting token TOuVQcppTarAdvAu.242 for user conductor
2021-10-31 01:50:00.005685 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:02.566830 I | auth: deleting token GbNyiqeUhwkvuGop.244 for user conductor
2021-10-31 01:50:02.713360 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.975256037s) to execute
2021-10-31 01:50:03.912026 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.195532921s) to execute
2021-10-31 01:50:03.912431 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.074043015s) to execute
2021-10-31 01:50:04.604898 I | auth: deleting token afHUWQDOnmmnAllw.247 for user conductor
2021-10-31 01:50:04.605069 I | auth: deleting token jLbvgxYelOJwvnUt.249 for user conductor
2021-10-31 01:50:04.605122 I | auth: deleting token XmwqPEgrQbcTnywa.245 for user conductor
2021-10-31 01:50:05.005919 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:05.308411 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.168619446s) to execute
2021-10-31 01:50:05.308588 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.302094357s) to execute
2021-10-31 01:50:05.308674 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.2681772s) to execute
2021-10-31 01:50:05.604819 I | auth: deleting token RBQhuYVciTxPgggb.250 for user conductor
2021-10-31 01:50:05.604863 I | auth: deleting token PKVKSAAejjMwNLob.246 for user conductor
2021-10-31 01:50:05.604872 I | auth: deleting token pANobsJxybQzyIDG.248 for user conductor
2021-10-31 01:50:07.808522 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.40235702s) to execute
2021-10-31 01:50:07.808661 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.103617984s) to execute
2021-10-31 01:50:08.566844 I | auth: deleting token TUZZVTNSpHQqAsQU.255 for user conductor
2021-10-31 01:50:08.566891 I | auth: deleting token BezzomSDSoasgfWh.252 for user conductor
2021-10-31 01:50:08.566902 I | auth: deleting token oDfwYKpyGZGbFBOE.254 for user conductor
2021-10-31 01:50:09.105728 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.294421895s) to execute
2021-10-31 01:50:09.105926 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.295563214s) to execute
2021-10-31 01:50:09.566850 I | auth: deleting token MoFfsfhGixBPniEG.253 for user conductor
2021-10-31 01:50:10.006259 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:10.405290 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.297511744s) to execute
2021-10-31 01:50:10.405450 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.165155539s) to execute
2021-10-31 01:50:10.405578 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (267.376068ms) to execute
2021-10-31 01:50:10.566833 I | auth: deleting token OJWMrgHORswvrcIE.259 for user conductor
2021-10-31 01:50:10.566871 I | auth: deleting token tDWaWUaQNSXUSMwE.260 for user conductor
2021-10-31 01:50:10.566887 I | auth: deleting token CTCCPewoxAHEmfoo.258 for user conductor
2021-10-31 01:50:10.566895 I | auth: deleting token jNEXVLrDidDwuXYX.256 for user conductor
2021-10-31 01:50:11.604757 I | auth: deleting token NUXcuJuSxktYQguW.261 for user conductor
2021-10-31 01:50:12.604870 I | auth: deleting token psXmyQfZfacpOsGH.262 for user conductor
2021-10-31 01:50:12.808138 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.300902407s) to execute
2021-10-31 01:50:12.808226 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.369700443s) to execute
2021-10-31 01:50:14.111085 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.171005784s) to execute
2021-10-31 01:50:14.566869 I | auth: deleting token lQpvXfnTdHkhicPI.263 for user conductor
2021-10-31 01:50:15.006464 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:15.566822 I | auth: deleting token kvOEYbFeFxQkkFFt.264 for user conductor
2021-10-31 01:50:17.566841 I | auth: deleting token TYcCkoMKnhtixunV.265 for user conductor
2021-10-31 01:50:18.710831 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.072290328s) to execute
2021-10-31 01:50:18.938279 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.068494ms) to execute
2021-10-31 01:50:20.006701 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:22.566816 I | auth: deleting token QyuhROqfwHeJlayo.270 for user conductor
2021-10-31 01:50:22.566864 I | auth: deleting token ysdLdHIyfDHlbvTi.266 for user conductor
2021-10-31 01:50:22.566873 I | auth: deleting token XgTmZXYCHIeiGYHv.271 for user conductor
2021-10-31 01:50:22.566878 I | auth: deleting token vkMbMUdVlACToTpn.268 for user conductor
2021-10-31 01:50:22.566884 I | auth: deleting token nToGCItEHoOHQANo.269 for user conductor
2021-10-31 01:50:22.566896 I | auth: deleting token lDAQCgmYfXlXAhFR.267 for user conductor
2021-10-31 01:50:24.566841 I | auth: deleting token ujSujkFiyHFrLYCb.272 for user conductor
2021-10-31 01:50:25.006963 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:25.208470 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.67034214s) to execute
2021-10-31 01:50:25.566911 I | auth: deleting token uIOsebHQkmMbXenT.273 for user conductor
2021-10-31 01:50:25.566963 I | auth: deleting token XONwzzQpeGLpBxru.275 for user conductor
2021-10-31 01:50:25.566971 I | auth: deleting token ohlVwWVItapsYQfW.274 for user conductor
2021-10-31 01:50:26.604905 I | auth: deleting token msugIEftMojoxzsZ.276 for user conductor
2021-10-31 01:50:29.005990 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.200967645s) to execute
2021-10-31 01:50:29.140356 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (132.481556ms) to execute
2021-10-31 01:50:29.140452 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (132.481575ms) to execute
2021-10-31 01:50:30.007235 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:30.405641 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (300.653065ms) to execute
2021-10-31 01:50:30.538099 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (126.91729ms) to execute
2021-10-31 01:50:30.566847 I | auth: deleting token DUSZClLexISUGTCU.281 for user conductor
2021-10-31 01:50:30.566884 I | auth: deleting token vfOtOLdIWkZjQYEq.277 for user conductor
2021-10-31 01:50:30.566893 I | auth: deleting token DkxlFvxrnKWnXwqX.279 for user conductor
2021-10-31 01:50:30.566901 I | auth: deleting token sDnQrCBofNvJekDK.280 for user conductor
2021-10-31 01:50:30.566909 I | auth: deleting token BZmpctGWgtSnFSjz.282 for user conductor
2021-10-31 01:50:30.566919 I | auth: deleting token HuVFIoVzQLFfcRZs.278 for user conductor
2021-10-31 01:50:32.311410 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (970.307897ms) to execute
2021-10-31 01:50:32.566835 I | auth: deleting token CYVVtjnOCgUJgjIm.283 for user conductor
2021-10-31 01:50:33.604836 I | auth: deleting token kmRYILFTSmrKHyIj.284 for user conductor
2021-10-31 01:50:33.604893 I | auth: deleting token ZZnilMpyAopouJhT.285 for user conductor
2021-10-31 01:50:33.805520 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.067346505s) to execute
2021-10-31 01:50:35.007441 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:35.109325 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.00435776s) to execute
2021-10-31 01:50:35.566840 I | auth: deleting token EnFxUoQSnqJWDiLv.286 for user conductor
2021-10-31 01:50:35.566883 I | auth: deleting token PAonkTsrXCakBtPL.287 for user conductor
2021-10-31 01:50:35.566895 I | auth: deleting token zSoWZCFgoCZsohas.288 for user conductor
2021-10-31 01:50:36.407390 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (602.366917ms) to execute
2021-10-31 01:50:36.566830 I | auth: deleting token rBELLzJWtNFrRkpH.289 for user conductor
2021-10-31 01:50:38.566843 I | auth: deleting token CrAADnWJSBRLmyyN.291 for user conductor
2021-10-31 01:50:38.566887 I | auth: deleting token pMQPkFZyodxqAnBN.290 for user conductor
2021-10-31 01:50:38.910626 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (304.705744ms) to execute
2021-10-31 01:50:39.566868 I | auth: deleting token MJHDddiMeiQgImuQ.292 for user conductor
2021-10-31 01:50:40.007742 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:40.406578 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (501.585634ms) to execute
2021-10-31 01:50:40.566796 I | auth: deleting token RDroSdulONmyajiE.293 for user conductor
2021-10-31 01:50:41.566842 I | auth: deleting token joWPfoFjyIQyqsKp.294 for user conductor
2021-10-31 01:50:41.566887 I | auth: deleting token WyVCwmlHAqXoRpVS.295 for user conductor
2021-10-31 01:50:41.606402 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.168365566s) to execute
2021-10-31 01:50:41.738967 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (128.609287ms) to execute
2021-10-31 01:50:42.566831 I | auth: deleting token yFzYMkTJRnqOdpek.297 for user conductor
2021-10-31 01:50:42.566877 I | auth: deleting token zDqvwaAUWziqENEO.296 for user conductor
2021-10-31 01:50:44.106257 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201218205s) to execute
2021-10-31 01:50:45.007948 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:45.305381 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.167287808s) to execute
2021-10-31 01:50:45.305548 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.196125087s) to execute
2021-10-31 01:50:45.438686 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (131.662753ms) to execute
2021-10-31 01:50:46.607861 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.167639976s) to execute
2021-10-31 01:50:47.566876 I | auth: deleting token newdLsaEoSDpzDRK.298 for user conductor
2021-10-31 01:50:47.566925 I | auth: deleting token nzLbBHlHLSkweweB.299 for user conductor
2021-10-31 01:50:47.807972 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.102954671s) to execute
2021-10-31 01:50:49.107842 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.297049422s) to execute
2021-10-31 01:50:49.108080 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.297918762s) to execute
2021-10-31 01:50:49.566823 I | auth: deleting token kdtqQWEFMEixkmWM.300 for user conductor
2021-10-31 01:50:49.566857 I | auth: deleting token OqssEBYUHcCCVNPz.301 for user conductor
2021-10-31 01:50:49.566882 I | auth: deleting token jrPemNMcLIhIUuBw.302 for user conductor
2021-10-31 01:50:50.008176 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:50.309221 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.199813767s) to execute
2021-10-31 01:50:50.309299 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.1042162s) to execute
2021-10-31 01:50:52.651653 I | auth: deleting token lPSnSLvEXbGrkOdf.303 for user conductor
2021-10-31 01:50:52.651685 I | auth: deleting token MdXmAlURSrvoTlXW.305 for user conductor
2021-10-31 01:50:52.651693 I | auth: deleting token vPSsPkZMrJbrfiBZ.306 for user conductor
2021-10-31 01:50:52.651701 I | auth: deleting token LKDgQaFsfzhkoqbH.307 for user conductor
2021-10-31 01:50:52.651708 I | auth: deleting token jDsKIQEYKPZMbKpU.304 for user conductor
2021-10-31 01:50:55.008357 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:50:55.206190 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.668303332s) to execute
2021-10-31 01:50:55.438085 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (230.135749ms) to execute
2021-10-31 01:50:55.439494 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (231.455761ms) to execute
2021-10-31 01:50:55.439562 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (231.19389ms) to execute
2021-10-31 01:50:55.604760 I | auth: deleting token VCogKASBHdNDSowE.311 for user conductor
2021-10-31 01:50:55.604807 I | auth: deleting token kSPdaVsKBYQTVjAl.308 for user conductor
2021-10-31 01:50:55.604826 I | auth: deleting token WSxtuyDwOEAuJKDU.309 for user conductor
2021-10-31 01:50:55.604838 I | auth: deleting token WeOEORyJYRjBhtqk.310 for user conductor
2021-10-31 01:50:56.604839 I | auth: deleting token TGrKDaDziVtVtnXE.313 for user conductor
2021-10-31 01:50:56.604880 I | auth: deleting token sEqXmOfRpnshQVnp.312 for user conductor
2021-10-31 01:50:57.566838 I | auth: deleting token PHTIkbyEsWmBXGwS.314 for user conductor
2021-10-31 01:50:59.006645 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.965093241s) to execute
2021-10-31 01:50:59.566833 I | auth: deleting token IRWLWNtGXqjZDADe.316 for user conductor
2021-10-31 01:50:59.566886 I | auth: deleting token FcLzgilSxQvLPbgR.315 for user conductor
2021-10-31 01:51:00.008594 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:00.207588 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.200623195s) to execute
2021-10-31 01:51:01.407855 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.39897571s) to execute
2021-10-31 01:51:01.407940 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.101810886s) to execute
2021-10-31 01:51:01.408089 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.187690115s) to execute
2021-10-31 01:51:01.408113 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.187660227s) to execute
2021-10-31 01:51:01.566817 I | auth: deleting token xQINqcsJgNfLfraS.318 for user conductor
2021-10-31 01:51:01.566855 I | auth: deleting token ftKczFcIKtowOnvM.317 for user conductor
2021-10-31 01:51:02.566839 I | auth: deleting token JnUhVzIUSfoqUmHk.319 for user conductor
2021-10-31 01:51:02.566879 I | auth: deleting token zPBFiSRMphMerZPk.320 for user conductor
2021-10-31 01:51:04.005693 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.160167396s) to execute
2021-10-31 01:51:04.604848 I | auth: deleting token vmxkcdKcYtsXQGCf.321 for user conductor
2021-10-31 01:51:05.008796 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:05.208605 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (703.631578ms) to execute
2021-10-31 01:51:05.566853 I | auth: deleting token pDvyBqbNQwGnmmpc.323 for user conductor
2021-10-31 01:51:06.512690 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.27469299s) to execute
2021-10-31 01:51:06.566816 I | auth: deleting token xFMXmqAKuYMEdGEa.325 for user conductor
2021-10-31 01:51:06.566866 I | auth: deleting token hdXOgeZMSBLVRwyZ.324 for user conductor
2021-10-31 01:51:06.566883 I | auth: deleting token FDQGxPfXSdVJMEPa.326 for user conductor
2021-10-31 01:51:06.566891 I | auth: deleting token rCQPOqyTKNCOTOyf.322 for user conductor
2021-10-31 01:51:06.638154 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (117.986684ms) to execute
2021-10-31 01:51:07.809618 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.164914556s) to execute
2021-10-31 01:51:07.809740 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (564.976732ms) to execute
2021-10-31 01:51:08.566860 I | auth: deleting token twpjQKwSNdjTCZcz.328 for user conductor
2021-10-31 01:51:09.012514 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.074164124s) to execute
2021-10-31 01:51:09.238301 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (129.84395ms) to execute
2021-10-31 01:51:09.566849 I | auth: deleting token soyRTLroAfgGVibb.327 for user conductor
2021-10-31 01:51:09.566901 I | auth: deleting token lzSTFlTZBtUjWyRW.329 for user conductor
2021-10-31 01:51:09.566910 I | auth: deleting token JMWREsqQslqoXyYq.330 for user conductor
2021-10-31 01:51:10.009030 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:11.566837 I | auth: deleting token DHfOyJgxLIttMmDw.331 for user conductor
2021-10-31 01:51:12.604840 I | auth: deleting token LbiJsvjOeYEOtoYl.334 for user conductor
2021-10-31 01:51:12.604878 I | auth: deleting token YUnJPUrvzneOFyxm.333 for user conductor
2021-10-31 01:51:12.604891 I | auth: deleting token lBsSuNhOONnmILYY.332 for user conductor
2021-10-31 01:51:13.415060 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.30674497s) to execute
2021-10-31 01:51:14.566832 I | auth: deleting token QnAPQIbalrukkXqO.336 for user conductor
2021-10-31 01:51:14.566890 I | auth: deleting token zwTKfHUfVhnjGcrA.335 for user conductor
2021-10-31 01:51:14.609889 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103351968s) to execute
2021-10-31 01:51:14.610257 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.105300762s) to execute
2021-10-31 01:51:14.610400 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.105447326s) to execute
2021-10-31 01:51:14.840180 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (135.206271ms) to execute
2021-10-31 01:51:15.009242 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:15.566856 I | auth: deleting token tWATzWQuSCTUzEdd.338 for user conductor
2021-10-31 01:51:15.566888 I | auth: deleting token vhSZkCFdZxzolJCg.337 for user conductor
2021-10-31 01:51:17.214228 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.373772935s) to execute
2021-10-31 01:51:17.566850 I | auth: deleting token usjXhMYmSdFOSxCU.340 for user conductor
2021-10-31 01:51:17.566907 I | auth: deleting token BdYWrIFNlSNuirnX.339 for user conductor
2021-10-31 01:51:18.510854 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.39916253s) to execute
2021-10-31 01:51:18.604834 I | auth: deleting token BomcSDrdOAViTcvU.342 for user conductor
2021-10-31 01:51:18.604961 I | auth: deleting token UNmJKcIbPgWjDiqA.341 for user conductor
2021-10-31 01:51:19.566831 I | auth: deleting token jYCjSmVlFOVRzCEn.343 for user conductor
2021-10-31 01:51:19.710655 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.197210162s) to execute
2021-10-31 01:51:19.710878 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.1984053s) to execute
2021-10-31 01:51:19.713184 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.200526416s) to execute
2021-10-31 01:51:20.009458 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:20.566853 I | auth: deleting token oebVvCCLgKogaTwY.344 for user conductor
2021-10-31 01:51:21.804937 I | auth: deleting token rKUroNyFRykMwdxH.345 for user conductor
2021-10-31 01:51:22.505991 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201004995s) to execute
2021-10-31 01:51:23.566848 I | auth: deleting token tSfYgqKpMkPkEKPv.346 for user conductor
2021-10-31 01:51:23.566912 I | auth: deleting token GgGUvQSFRjdUQINS.347 for user conductor
2021-10-31 01:51:23.809211 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (370.882715ms) to execute
2021-10-31 01:51:24.566898 I | auth: deleting token MfBogsYwFzBdsQTT.348 for user conductor
2021-10-31 01:51:25.009763 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:25.014820 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (276.635301ms) to execute
2021-10-31 01:51:26.566860 I | auth: deleting token IBBhYJZQyCzFLwRV.350 for user conductor
2021-10-31 01:51:28.413447 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.108508627s) to execute
2021-10-31 01:51:28.566814 I | auth: deleting token QJiZbpiLIFbWTXas.352 for user conductor
2021-10-31 01:51:28.566852 I | auth: deleting token KhggipezcdGSEcgM.349 for user conductor
2021-10-31 01:51:28.566872 I | auth: deleting token hIAtCAqZTyNPByPP.353 for user conductor
2021-10-31 01:51:28.566893 I | auth: deleting token XQVAqRoOqExVukWh.351 for user conductor
2021-10-31 01:51:29.608639 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103645056s) to execute
2021-10-31 01:51:29.608746 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.186391853s) to execute
2021-10-31 01:51:30.009959 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:30.566861 I | auth: deleting token mBXVMNUUYTuZOKee.355 for user conductor
2021-10-31 01:51:30.566911 I | auth: deleting token qNVMsDxXrHRoEvwD.354 for user conductor
2021-10-31 01:51:30.907855 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.168427292s) to execute
2021-10-31 01:51:32.009926 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.271785773s) to execute
2021-10-31 01:51:32.566819 I | auth: deleting token gZVIXItjikLoWxnp.357 for user conductor
2021-10-31 01:51:32.566862 I | auth: deleting token shMMokZhLPLSjhGd.356 for user conductor
2021-10-31 01:51:32.566869 I | auth: deleting token nQyCfpsqxxvYpCXx.358 for user conductor
2021-10-31 01:51:33.209712 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.071554003s) to execute
2021-10-31 01:51:33.209890 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.198588869s) to execute
2021-10-31 01:51:34.506541 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.168221722s) to execute
2021-10-31 01:51:34.506690 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.29518631s) to execute
2021-10-31 01:51:35.010148 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:35.604812 I | auth: deleting token gdjKCqNOBwKXhSbv.362 for user conductor
2021-10-31 01:51:35.604919 I | auth: deleting token dclNAuxEkItSeirJ.361 for user conductor
2021-10-31 01:51:35.604988 I | auth: deleting token hhBAnsgJqYLdOjwN.359 for user conductor
2021-10-31 01:51:35.605070 I | auth: deleting token jyWYhzyOjBGPALPM.360 for user conductor
2021-10-31 01:51:35.612769 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.006661176s) to execute
2021-10-31 01:51:35.612919 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.104878519s) to execute
2021-10-31 01:51:36.604789 I | auth: deleting token FurGiEIWljGKTIxu.363 for user conductor
2021-10-31 01:51:37.006365 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.298354909s) to execute
2021-10-31 01:51:38.210521 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.604629624s) to execute
2021-10-31 01:51:38.566866 I | auth: deleting token llrLrfoYcKanHnqB.365 for user conductor
2021-10-31 01:51:40.010409 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:41.566835 I | auth: deleting token CDPUEpQSqvIsutLY.369 for user conductor
2021-10-31 01:51:41.566950 I | auth: deleting token toWEeLGFjJIenspq.368 for user conductor
2021-10-31 01:51:41.566978 I | auth: deleting token kTZTyJNbNDKgEXMo.366 for user conductor
2021-10-31 01:51:41.566998 I | auth: deleting token dlihahkyBJXKvDvf.364 for user conductor
2021-10-31 01:51:41.567053 I | auth: deleting token eZobIPFUyQskhYNI.367 for user conductor
2021-10-31 01:51:43.566846 I | auth: deleting token wTHggeKQwrVsGSCh.371 for user conductor
2021-10-31 01:51:43.566892 I | auth: deleting token eYbNjCyoJYhWCigd.372 for user conductor
2021-10-31 01:51:43.566900 I | auth: deleting token PicdxXPreAPmSPLn.370 for user conductor
2021-10-31 01:51:44.566869 I | auth: deleting token xvskmRyOLUBzUTAT.373 for user conductor
2021-10-31 01:51:45.010588 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:45.566929 I | auth: deleting token MiKOEVuLcexdjEjL.374 for user conductor
2021-10-31 01:51:46.408190 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (270.182772ms) to execute
2021-10-31 01:51:47.566817 I | auth: deleting token HPTcRwyCfgKmVdBb.375 for user conductor
2021-10-31 01:51:48.566838 I | auth: deleting token nchAEepfZUTygjko.378 for user conductor
2021-10-31 01:51:48.566878 I | auth: deleting token FsjoLSjYHiWzvYsB.377 for user conductor
2021-10-31 01:51:48.566887 I | auth: deleting token asQBxdksrDPdyRHU.376 for user conductor
2021-10-31 01:51:50.023497 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:51.566858 I | auth: deleting token pYytdowSVSiASsjx.380 for user conductor
2021-10-31 01:51:51.567125 I | auth: deleting token tPdNDsEjQKLbXFUe.382 for user conductor
2021-10-31 01:51:51.567196 I | auth: deleting token lrPwjTLqIyHmlYaw.379 for user conductor
2021-10-31 01:51:51.567316 I | auth: deleting token ZtZQYUSRaoSZOxKr.381 for user conductor
2021-10-31 01:51:52.606645 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.301537339s) to execute
2021-10-31 01:51:53.566856 I | auth: deleting token bKUMaEATeyQdxYeR.383 for user conductor
2021-10-31 01:51:53.809183 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.198721996s) to execute
2021-10-31 01:51:53.809329 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.103124238s) to execute
2021-10-31 01:51:53.809428 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.103198825s) to execute
2021-10-31 01:51:53.809573 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (667.288746ms) to execute
2021-10-31 01:51:55.104816 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:51:55.604839 I | auth: deleting token DsenANUjadZmpyOR.384 for user conductor
2021-10-31 01:51:55.604880 I | auth: deleting token jrPVIJtHmCASqPiv.386 for user conductor
2021-10-31 01:51:55.604888 I | auth: deleting token uvONYatkSYJosRak.385 for user conductor
2021-10-31 01:51:55.604905 I | auth: deleting token JzOdQgJLdjcvhfps.387 for user conductor
2021-10-31 01:51:56.311882 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.402919382s) to execute
2021-10-31 01:51:56.312005 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.172391222s) to execute
2021-10-31 01:51:57.510901 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.197485405s) to execute
2021-10-31 01:51:57.510981 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.10594854s) to execute
2021-10-31 01:51:57.566832 I | auth: deleting token qlkqzdjdUbXROGmi.389 for user conductor
2021-10-31 01:51:57.566870 I | auth: deleting token NIkjDkJLDUDtvZjT.388 for user conductor
2021-10-31 01:51:57.566883 I | auth: deleting token QCqetObkQObyVYtv.390 for user conductor
2021-10-31 01:51:58.566824 I | auth: deleting token epzvPloJLceiaAdz.392 for user conductor
2021-10-31 01:51:58.705719 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.19159047s) to execute
2021-10-31 01:51:58.705879 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.193561607s) to execute
2021-10-31 01:51:58.838684 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (130.919023ms) to execute
2021-10-31 01:51:59.604842 I | auth: deleting token eoHBDwHhevENebiZ.394 for user conductor
2021-10-31 01:51:59.604958 I | auth: deleting token sNxDSHhArfGEWbqm.391 for user conductor
2021-10-31 01:51:59.604992 I | auth: deleting token MdvNUyDVqJagThAp.393 for user conductor
2021-10-31 01:52:00.006924 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (464.511288ms) to execute
2021-10-31 01:52:00.105024 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:52:01.305530 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (365.451015ms) to execute
2021-10-31 01:52:02.566826 I | auth: deleting token OoVpbjhZrmaKZnez.398 for user conductor
2021-10-31 01:52:02.566880 I | auth: deleting token zBmkziTXqNFgEsJy.396 for user conductor
2021-10-31 01:52:02.566903 I | auth: deleting token kkOwLuWLifTwfrGn.395 for user conductor
2021-10-31 01:52:02.566917 I | auth: deleting token DMQgGJQNSybxDwph.397 for user conductor
2021-10-31 01:52:02.710069 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.20301974s) to execute
2021-10-31 01:52:05.105385 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:52:05.208282 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.367078804s) to execute
2021-10-31 01:52:05.339877 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (129.689736ms) to execute
2021-10-31 01:52:05.566861 I | auth: deleting token YsQoEccmpXrQHjFW.401 for user conductor
2021-10-31 01:52:05.566897 I | auth: deleting token qOdDVbVrYqzMzBeE.399 for user conductor
2021-10-31 01:52:05.566910 I | auth: deleting token ViISptYHYqRmGEec.400 for user conductor
2021-10-31 01:52:06.566871 I | auth: deleting token aecUakFtNWavvulR.404 for user conductor
2021-10-31 01:52:06.566899 I | auth: deleting token nuxWeOFozydLLcDa.402 for user conductor
2021-10-31 01:52:06.566907 I | auth: deleting token tUojXqkLvaMLpZdm.403 for user conductor
2021-10-31 01:52:08.566860 I | auth: deleting token GikfYCmUhZirKWjJ.405 for user conductor
2021-10-31 01:52:08.566905 I | auth: deleting token VKrtEdfPdpVZFTrH.406 for user conductor
2021-10-31 01:52:08.606647 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (468.673947ms) to execute
2021-10-31 01:52:08.838189 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.939727ms) to execute
2021-10-31 01:52:10.105711 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:52:10.566835 I | auth: deleting token kuVcKwqeLSNwCApT.408 for user conductor
2021-10-31 01:52:10.566885 I | auth: deleting token XXdksLduxHpJWBBQ.407 for user conductor
2021-10-31 01:52:11.566832 I | auth: deleting token zgbrREQEnOlwNmkM.409 for user conductor
2021-10-31 01:52:12.566871 I | auth: deleting token cdbZysAobwCtixbG.411 for user conductor
2021-10-31 01:52:14.604791 I | auth: deleting token zxHMyAuptszrYLtC.412 for user conductor
2021-10-31 01:52:14.604833 I | auth: deleting token yEeninLgekHiafmE.410 for user conductor
2021-10-31 01:52:14.604843 I | auth: deleting token ZxJJAFTYmhifEgts.413 for user conductor
2021-10-31 01:52:15.105974 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:52:15.604812 I | auth: deleting token fHlOvsCkUGjOlWWD.414 for user conductor
2021-10-31 01:52:16.605047 I | auth: deleting token ZvwnOgEThATvCkzb.417 for user conductor
2021-10-31 01:52:16.605080 I | auth: deleting token lZqMEVsRMxHPXYXX.416 for user conductor
2021-10-31 01:52:16.605088 I | auth: deleting token WNwBjvOFiMsbQDcM.415 for user conductor
2021-10-31 01:52:18.411774 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.173424031s) to execute
2021-10-31 01:52:18.566808 I | auth: deleting token aZrxEpPGhCoBGmOH.418 for user conductor
2021-10-31 01:52:18.638642 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (130.297022ms) to execute
2021-10-31 01:52:20.106124 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:52:20.566840 I | auth: deleting token UncQlHXMwTpQgqll.419 for user conductor
2021-10-31 01:52:20.566908 I | auth: deleting token wDodUBZbUcgrbPyP.421 for user conductor
2021-10-31 01:52:20.566922 I | auth: deleting token PoEbAWVkpGpdfNzN.420 for user conductor
2021-10-31 01:52:20.566930 I | auth: deleting token oprqCpKAdXzCFpsT.422 for user conductor
2021-10-31 01:52:21.004801 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103233717s) to execute
2021-10-31 01:52:22.566851 I | auth: deleting token SkvUXMonTgIKSfFo.423 for user conductor
2021-10-31 01:52:22.566901 I | auth: deleting token fRcUXyDokHeGOjEt.425 for user conductor
2021-10-31 01:52:24.566868 I | auth: deleting token QUwPFfSUUhaqDfJv.424 for user conductor
2021-10-31 01:52:25.106357 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:52:25.566826 I | auth: deleting token AdAYayQUAJlOryPI.427 for user conductor
2021-10-31 01:52:25.566947 I | auth: deleting token xiXupwdzVMHzyyVh.426 for user conductor
2021-10-31 01:52:25.604744 I | auth: deleting token gqCqZGjJWgFsuaQP.428 for user conductor
2021-10-31 01:52:25.604819 I | auth: deleting token EtANeSAJgGQOagFl.429 for user conductor
2021-10-31 01:52:26.507719 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (702.730876ms) to execute
2021-10-31 01:52:28.010926 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (769.86976ms) to execute
2021-10-31 01:52:29.308108 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.003076911s) to execute
2021-10-31 01:52:29.566821 I | auth: deleting token QDxvAegXGwnRvdLi.431 for user conductor
2021-10-31 01:52:29.566865 I | auth: deleting token dOHsRoxIEkiXecOv.434 for user conductor
2021-10-31 01:52:29.566875 I | auth: deleting token VvhOWESyktXlgylr.432 for user conductor
2021-10-31 01:52:29.566882 I | auth: deleting token qKEBiXKgyOstfARJ.433 for user conductor
2021-10-31 01:52:29.566895 I | auth: deleting token bCmNlyLwaFIfUoVg.430 for user conductor
2021-10-31 01:52:30.106565 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:52:30.510867 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103740955s) to execute
2021-10-31 01:52:30.511067 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.106016306s) to execute
2021-10-31 01:52:30.738015 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (225.654208ms) to execute
2021-10-31 01:52:30.739501 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.012402ms) to execute
2021-10-31 01:52:31.566846 I | auth: deleting token URjKAATzyNMaRhmz.437 for user conductor
2021-10-31 01:52:31.566897 I | auth: deleting token utFWANITdQFUJion.435 for user conductor
2021-10-31 01:52:32.566809 I | auth: deleting token QSprnTihPAyQvocU.438 for user conductor
2021-10-31 01:52:32.566864 I | auth: deleting token jRjNmIZAqjBAzdTa.436 for user conductor
2021-10-31 01:52:32.566875 I | auth: deleting token LQKEfMASDELohzDv.439 for user conductor
2021-10-31 01:52:34.211207 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.373080178s) to execute
2021-10-31 01:52:35.106800 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:52:35.506497 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.292607324s) to execute
2021-10-31 01:52:35.506639 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.29400354s) to execute
2021-10-31 01:52:35.506698 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.294061898s) to execute
2021-10-31 01:52:35.638245 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (129.604719ms) to execute
2021-10-31 01:52:36.566781 I | auth: deleting token PWyYRUtJIMLeWahH.440 for user conductor
2021-10-31 01:52:37.604846 I | auth: deleting token MlIFUycytCmfdxSM.442 for user conductor
2021-10-31 01:52:37.604888 I | auth: deleting token qGdfrWhMyrtZtdFj.444 for user conductor
2021-10-31 01:52:37.604898 I | auth: deleting token RPTbOYBIiOJdypWG.441 for user conductor
2021-10-31 01:52:37.604906 I | auth: deleting token ygutQfVFIYtGxJrl.443 for user conductor
2021-10-31 01:52:39.411601 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.606568031s) to execute
2021-10-31 01:52:39.566822 I | auth: deleting token QukIjYORNdVVaNmW.445 for user conductor
2021-10-31 01:52:40.107027 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:52:40.612011 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.10627573s) to execute
2021-10-31 01:52:40.612137 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.107188762s) to execute
2021-10-31 01:52:41.807325 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.302331026s) to execute
2021-10-31 01:52:41.807441 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.192712721s) to execute
2021-10-31 01:52:41.807564 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.194208834s) to execute
2021-10-31 01:52:42.566868 I | auth: deleting token YEvNcNYPpbYGEmTY.448 for user conductor
2021-10-31 01:52:42.566913 I | auth: deleting token PyhXuOeuhOKPiJcF.450 for user conductor
2021-10-31 01:52:42.566923 I | auth: deleting token ZKjJmMdvHyJpOIkj.449 for user conductor
2021-10-31 01:52:42.566931 I | auth: deleting token zJwuTssvikdiPVfs.447 for user conductor
2021-10-31 01:52:42.566940 I | auth: deleting token IaZODuOfsuVxWDWd.446 for user conductor
2021-10-31 01:52:44.566879 I | auth: deleting token cTzxmDhgphoQbcBM.451 for user conductor
2021-10-31 01:52:45.107241 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:52:45.510533 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.504629261s) to execute
2021-10-31 01:52:45.739020 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (134.066701ms) to execute
2021-10-31 01:52:45.740220 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (135.153402ms) to execute
2021-10-31 01:52:46.566856 I | auth: deleting token frdiPgyMDYOPBNsk.452 for user conductor
2021-10-31 01:52:46.566916 I | auth: deleting token gwHDrKwRnPVOrrns.454 for user conductor
2021-10-31 01:52:46.566970 I | auth: deleting token hjklkuBMezYxaNwP.453 for user conductor
2021-10-31 01:52:47.106544 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (568.295617ms) to execute
2021-10-31 01:52:47.566830 I | auth: deleting token AaNzLjjHhHlaaejN.457 for user conductor
2021-10-31 01:52:47.566867 I | auth: deleting token LNsZyElxjFKuJapb.456 for user conductor
2021-10-31 01:52:47.566874 I | auth: deleting token ziibxFTePSIKOsUw.455 for user conductor
2021-10-31 01:52:48.413516 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.108473525s) to execute
2021-10-31 01:52:48.738303 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (198.984912ms) to execute
2021-10-31 01:52:49.566895 I | auth: deleting token ZEYtXctJHTBmXgND.459 for user conductor
2021-10-31 01:52:49.566947 I | auth: deleting token qDQRrDAVVOyNdBvz.458 for user conductor
2021-10-31 01:52:50.107431 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:52:50.566842 I | auth: deleting token mcXwbmsZlvvFWnaR.461 for user conductor
2021-10-31 01:52:50.566905 I | auth: deleting token nWUeqcxzttWgeLhI.460 for user conductor
2021-10-31 01:52:51.566811 I | auth: deleting token DNOarhpepqSVnaIN.462 for user conductor
2021-10-31 01:52:52.566799 I | auth: deleting token ujHVdUeHLbsbdAWb.463 for user conductor
2021-10-31 01:52:53.566862 I | auth: deleting token CvpYuinDXEkDxiEv.464 for user conductor
2021-10-31 01:52:55.107635 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:52:55.566821 I | auth: deleting token KfXaDSJdNairAEgz.465 for user conductor
2021-10-31 01:52:56.566805 I | auth: deleting token ydGZGpCsCXZsbdFs.466 for user conductor
2021-10-31 01:52:57.506991 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (500.190796ms) to execute
2021-10-31 01:52:57.566817 I | auth: deleting token yoVjkXyxxNbeIhIn.467 for user conductor
2021-10-31 01:52:59.566913 I | auth: deleting token mocqgNAqZgXSfbAA.468 for user conductor
2021-10-31 01:53:00.010797 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.272464379s) to execute
2021-10-31 01:53:00.107843 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:00.139023 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (126.472005ms) to execute
2021-10-31 01:53:00.566811 I | auth: deleting token aRebrdExeZfjwigu.469 for user conductor
2021-10-31 01:53:00.566856 I | auth: deleting token cHVeYGyMtNcCIinG.471 for user conductor
2021-10-31 01:53:00.566867 I | auth: deleting token FVqrrTFHiyDsqXPK.470 for user conductor
2021-10-31 01:53:01.566836 I | auth: deleting token fbCbYdlCRvgYDOJo.473 for user conductor
2021-10-31 01:53:01.566882 I | auth: deleting token BHThTnbahVCEnJhQ.472 for user conductor
2021-10-31 01:53:03.566823 I | auth: deleting token JYqcMbeBEyVljuDu.474 for user conductor
2021-10-31 01:53:03.811825 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.273743933s) to execute
2021-10-31 01:53:04.038256 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (224.701326ms) to execute
2021-10-31 01:53:05.108044 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:05.210777 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.202739905s) to execute
2021-10-31 01:53:05.210848 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (605.699553ms) to execute
2021-10-31 01:53:05.566922 I | auth: deleting token zdpKkGtcyZHgJOcN.475 for user conductor
2021-10-31 01:53:05.566967 I | auth: deleting token opLbjUAQVeGEVGmF.476 for user conductor
2021-10-31 01:53:06.512844 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.174427963s) to execute
2021-10-31 01:53:06.566818 I | auth: deleting token KtgOMFraEJHgPMJv.478 for user conductor
2021-10-31 01:53:06.566864 I | auth: deleting token dFFOYxTllphnoMck.477 for user conductor
2021-10-31 01:53:07.605021 I | auth: deleting token AKQOQwfwCdyzMwJw.479 for user conductor
2021-10-31 01:53:08.566838 I | auth: deleting token TmQfLTXDgjvkZmEr.480 for user conductor
2021-10-31 01:53:08.566899 I | auth: deleting token cvmGXGUgvNWVeauh.481 for user conductor
2021-10-31 01:53:10.108262 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:10.309484 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.304467776s) to execute
2021-10-31 01:53:11.604790 I | auth: deleting token LZOxuWhkHzednLyx.482 for user conductor
2021-10-31 01:53:11.604860 I | auth: deleting token eQgHqUMphtknWTyI.483 for user conductor
2021-10-31 01:53:12.566860 I | auth: deleting token DLIlmetVgaRuskka.484 for user conductor
2021-10-31 01:53:12.566906 I | auth: deleting token FODKptFyJDMrIUFD.485 for user conductor
2021-10-31 01:53:12.566925 I | auth: deleting token wGfaCQyHvpGpNyZe.486 for user conductor
2021-10-31 01:53:12.905303 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.498324695s) to execute
2021-10-31 01:53:12.905594 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.57780943s) to execute
2021-10-31 01:53:12.907704 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.578167616s) to execute
2021-10-31 01:53:13.105127 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.012064ms) to execute
2021-10-31 01:53:13.105953 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (199.144044ms) to execute
2021-10-31 01:53:13.206031 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (200.961089ms) to execute
2021-10-31 01:53:13.651641 I | auth: deleting token LggXpTjtZyfvSEPA.487 for user conductor
2021-10-31 01:53:15.108454 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:16.566834 I | auth: deleting token YntIBanNyLjRuIRM.491 for user conductor
2021-10-31 01:53:16.566884 I | auth: deleting token VGqSvZbrLiatijqA.489 for user conductor
2021-10-31 01:53:17.566841 I | auth: deleting token dpznHXEsXIUNYqIX.488 for user conductor
2021-10-31 01:53:17.566884 I | auth: deleting token RDYjzZEkxomvCHPm.492 for user conductor
2021-10-31 01:53:17.566896 I | auth: deleting token pNYcNGjdfXGYkGxQ.493 for user conductor
2021-10-31 01:53:17.566911 I | auth: deleting token OcfQVrCgfcsCJsHe.490 for user conductor
2021-10-31 01:53:19.414449 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.9053668s) to execute
2021-10-31 01:53:20.108635 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:20.566813 I | auth: deleting token ubKlJSebbCDmZYZc.495 for user conductor
2021-10-31 01:53:20.566856 I | auth: deleting token jWeuTBBNIGQBMwtW.494 for user conductor
2021-10-31 01:53:20.566868 I | auth: deleting token dEMLywHLhLCkFjPk.496 for user conductor
2021-10-31 01:53:21.566838 I | auth: deleting token JvrLsCtTCttwwvJN.497 for user conductor
2021-10-31 01:53:22.566862 I | auth: deleting token DmWhGHFJAVSFgqcf.499 for user conductor
2021-10-31 01:53:22.566904 I | auth: deleting token LjdIUGyQKLjFyYBL.500 for user conductor
2021-10-31 01:53:22.566926 I | auth: deleting token MjVaMRjeNOuVwxyb.498 for user conductor
2021-10-31 01:53:24.613729 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.608774311s) to execute
2021-10-31 01:53:25.108810 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:25.566904 I | auth: deleting token YcfBcYhXLBNdBcDZ.503 for user conductor
2021-10-31 01:53:25.566941 I | auth: deleting token XkRCjSGiOrBitFmh.501 for user conductor
2021-10-31 01:53:26.589989 I | auth: deleting token ZAuUIzxsKNyqYQVV.504 for user conductor
2021-10-31 01:53:26.590033 I | auth: deleting token rbmBocKpsgqWyCtI.506 for user conductor
2021-10-31 01:53:26.590043 I | auth: deleting token UMsFaqjPNvDcgFix.505 for user conductor
2021-10-31 01:53:26.590050 I | auth: deleting token drDhpIRSiRmDpDPQ.502 for user conductor
2021-10-31 01:53:27.566839 I | auth: deleting token sJkxGnlbTePPYuIc.507 for user conductor
2021-10-31 01:53:27.566887 I | auth: deleting token qqpbRuyLckmVFDkQ.508 for user conductor
2021-10-31 01:53:29.809283 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.669738223s) to execute
2021-10-31 01:53:30.038353 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (227.526644ms) to execute
2021-10-31 01:53:30.109031 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:30.138950 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (327.477539ms) to execute
2021-10-31 01:53:30.139086 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (328.104613ms) to execute
2021-10-31 01:53:30.140306 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.407019ms) to execute
2021-10-31 01:53:30.566835 I | auth: deleting token euhwCaOMkJlHbpph.512 for user conductor
2021-10-31 01:53:30.566879 I | auth: deleting token ImvYfVYQqXpnWzLW.509 for user conductor
2021-10-31 01:53:30.566894 I | auth: deleting token IoVPSRvyrzyGZQDT.511 for user conductor
2021-10-31 01:53:30.566909 I | auth: deleting token vqsPzDqXRjtooDvA.510 for user conductor
2021-10-31 01:53:31.405667 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (200.616347ms) to execute
2021-10-31 01:53:32.605100 I | auth: deleting token cczVZPfFhtQrbChz.513 for user conductor
2021-10-31 01:53:33.566849 I | auth: deleting token NmPLqbJWpZSiDZRe.514 for user conductor
2021-10-31 01:53:33.608011 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.002957555s) to execute
2021-10-31 01:53:34.566854 I | auth: deleting token FKATqVwJbjQaWLUT.515 for user conductor
2021-10-31 01:53:34.906218 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (668.005536ms) to execute
2021-10-31 01:53:35.109268 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:36.566829 I | auth: deleting token swjIMAsJtEBRGDwN.516 for user conductor
2021-10-31 01:53:37.604841 I | auth: deleting token mNbPGnOKXeclHxFR.518 for user conductor
2021-10-31 01:53:37.604889 I | auth: deleting token UZHBEidFYxoQYzSo.517 for user conductor
2021-10-31 01:53:39.505699 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.565771659s) to execute
2021-10-31 01:53:39.604814 I | auth: deleting token jHIGFxlLQOCAAUqC.519 for user conductor
2021-10-31 01:53:40.109542 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:40.604927 I | auth: deleting token MUmdUwvhbzQQxXhq.521 for user conductor
2021-10-31 01:53:40.604990 I | auth: deleting token vtRbZEJxkuEYrQfy.520 for user conductor
2021-10-31 01:53:42.566818 I | auth: deleting token ULPDDZEuKjJpVFrx.523 for user conductor
2021-10-31 01:53:42.566876 I | auth: deleting token ZMwDngzQBZDisrhT.522 for user conductor
2021-10-31 01:53:43.610227 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.205182892s) to execute
2021-10-31 01:53:45.109768 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:45.566827 I | auth: deleting token igOebLEcFBhtpReA.527 for user conductor
2021-10-31 01:53:45.566866 I | auth: deleting token IrjHMZLXhGBpPbjS.525 for user conductor
2021-10-31 01:53:46.307183 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102182118s) to execute
2021-10-31 01:53:46.440032 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (131.027637ms) to execute
2021-10-31 01:53:46.566815 I | auth: deleting token HRkHjEYTNrQYXKJc.528 for user conductor
2021-10-31 01:53:46.566852 I | auth: deleting token NByhPHnrtUBpjDRE.524 for user conductor
2021-10-31 01:53:46.566859 I | auth: deleting token XvMrLojddNDQVtdm.526 for user conductor
2021-10-31 01:53:47.566868 I | auth: deleting token oPlSHcaJwjfmySui.529 for user conductor
2021-10-31 01:53:47.711750 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (973.608842ms) to execute
2021-10-31 01:53:49.013706 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.273815142s) to execute
2021-10-31 01:53:49.604868 I | auth: deleting token MoLzPtFfwvcOrTbM.532 for user conductor
2021-10-31 01:53:49.604911 I | auth: deleting token tMibcSWyIAoSacgQ.531 for user conductor
2021-10-31 01:53:49.604933 I | auth: deleting token uNVQuYkDGyDyJfEI.530 for user conductor
2021-10-31 01:53:49.604940 I | auth: deleting token BZVjFirPieWFLecB.533 for user conductor
2021-10-31 01:53:50.109945 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:50.307807 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (402.794966ms) to execute
2021-10-31 01:53:51.604910 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.263268497s) to execute
2021-10-31 01:53:54.208934 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.702394434s) to execute
2021-10-31 01:53:54.590072 I | auth: deleting token fptuCKnYwoszEwDv.540 for user conductor
2021-10-31 01:53:54.590290 I | auth: deleting token mNHYoFvoIlLCXLyB.535 for user conductor
2021-10-31 01:53:54.590359 I | auth: deleting token obkJyRvZTpElAEzD.534 for user conductor
2021-10-31 01:53:54.590432 I | auth: deleting token uqtBEuQGvATPwogS.537 for user conductor
2021-10-31 01:53:54.590515 I | auth: deleting token vgLPCOTRvXTbLwrq.539 for user conductor
2021-10-31 01:53:54.590572 I | auth: deleting token QcZWoxFxhRIqvhcb.538 for user conductor
2021-10-31 01:53:54.590608 I | auth: deleting token YRbLPifNjJiFlJtr.536 for user conductor
2021-10-31 01:53:55.110147 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:53:56.806505 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.367962663s) to execute
2021-10-31 01:53:56.806807 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.596190293s) to execute
2021-10-31 01:53:56.938058 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (126.121314ms) to execute
2021-10-31 01:53:56.938190 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (129.378012ms) to execute
2021-10-31 01:53:58.566836 I | auth: deleting token vwnKwIPvuOqhSgSk.544 for user conductor
2021-10-31 01:53:58.566884 I | auth: deleting token qaYXWgoIjTuIyGqd.545 for user conductor
2021-10-31 01:53:58.566904 I | auth: deleting token AsoNsNFvseueEdFO.541 for user conductor
2021-10-31 01:53:58.566916 I | auth: deleting token PsaTsEnMYnCTDKPK.543 for user conductor
2021-10-31 01:53:58.566927 I | auth: deleting token NOhRcRDvSbWuGEyr.542 for user conductor
2021-10-31 01:54:00.110380 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:01.566856 I | auth: deleting token znxnRocqcfckRpyC.548 for user conductor
2021-10-31 01:54:01.566912 I | auth: deleting token GzTXAvCEcYZsrbmH.546 for user conductor
2021-10-31 01:54:01.566921 I | auth: deleting token fYgNESzYjvXZQdOt.547 for user conductor
2021-10-31 01:54:02.566843 I | auth: deleting token uDpwqbfLlcBkTKrQ.550 for user conductor
2021-10-31 01:54:03.214059 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.907385519s) to execute
2021-10-31 01:54:03.566877 I | auth: deleting token ikJbfMZGqxvvkxDn.552 for user conductor
2021-10-31 01:54:03.566909 I | auth: deleting token GZQRANdjbZRggsCQ.551 for user conductor
2021-10-31 01:54:03.566935 I | auth: deleting token oSIwlVkNsSHxaBHR.549 for user conductor
2021-10-31 01:54:03.566942 I | auth: deleting token oHvjemfKgMGdPBMd.553 for user conductor
2021-10-31 01:54:04.566956 I | auth: deleting token XrLJfpcoyQWzdSTK.555 for user conductor
2021-10-31 01:54:04.567024 I | auth: deleting token dYzaLMUMTyqccEgk.554 for user conductor
2021-10-31 01:54:05.204833 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:05.907831 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.168208112s) to execute
2021-10-31 01:54:06.566836 I | auth: deleting token RctZxifzZLiMlHCU.556 for user conductor
2021-10-31 01:54:06.566873 I | auth: deleting token FnnAMQooWnVTGaHS.557 for user conductor
2021-10-31 01:54:07.210699 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (805.738093ms) to execute
2021-10-31 01:54:07.566864 I | auth: deleting token OGHRSQAxlklDWsoz.558 for user conductor
2021-10-31 01:54:08.508069 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102948044s) to execute
2021-10-31 01:54:08.566831 I | auth: deleting token hoTxiassZtVsMVcg.559 for user conductor
2021-10-31 01:54:09.566797 I | auth: deleting token AZSjhLevyzJiBkdF.560 for user conductor
2021-10-31 01:54:09.566862 I | auth: deleting token oIjxDrfzvHxwzyZV.561 for user conductor
2021-10-31 01:54:10.105348 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (664.339774ms) to execute
2021-10-31 01:54:10.205068 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:10.566825 I | auth: deleting token IKoeKCKvMxHUbmdr.562 for user conductor
2021-10-31 01:54:12.566842 I | auth: deleting token sAeGnEXtkvSHYVjR.563 for user conductor
2021-10-31 01:54:12.566917 I | auth: deleting token vnQyQwhBFbqQYBhA.564 for user conductor
2021-10-31 01:54:13.566879 I | auth: deleting token OyGRECIibrxrciAj.565 for user conductor
2021-10-31 01:54:14.566827 I | auth: deleting token tcHiMqSSYCAgZoTK.568 for user conductor
2021-10-31 01:54:14.566867 I | auth: deleting token pxTfORjHdBGpPmhk.566 for user conductor
2021-10-31 01:54:14.566886 I | auth: deleting token dhHxWwzXNqaWktbC.567 for user conductor
2021-10-31 01:54:15.205290 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:17.505594 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (167.341788ms) to execute
2021-10-31 01:54:18.566807 I | auth: deleting token xpHlCpxNnMfxQtgV.571 for user conductor
2021-10-31 01:54:18.566856 I | auth: deleting token nBacRQSFasjYzPVd.570 for user conductor
2021-10-31 01:54:18.566869 I | auth: deleting token hbNhJOaovtPjpnxw.569 for user conductor
2021-10-31 01:54:19.566848 I | auth: deleting token RPDEQxsqGlcmgpue.573 for user conductor
2021-10-31 01:54:19.566897 I | auth: deleting token ttDPotawGjOZcLOS.572 for user conductor
2021-10-31 01:54:20.205495 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:20.309171 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (171.017642ms) to execute
2021-10-31 01:54:20.566833 I | auth: deleting token vWDdGdQOYbgcRhoF.575 for user conductor
2021-10-31 01:54:22.566850 I | auth: deleting token WWNQlPXGmaQdKigY.577 for user conductor
2021-10-31 01:54:22.566889 I | auth: deleting token fqXyCZYSXDLKncfR.574 for user conductor
2021-10-31 01:54:22.566904 I | auth: deleting token dWCulwxiSscwwkiO.576 for user conductor
2021-10-31 01:54:24.906673 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (268.509678ms) to execute
2021-10-31 01:54:25.205759 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:25.338315 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.508635ms) to execute
2021-10-31 01:54:26.608058 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (569.944874ms) to execute
2021-10-31 01:54:27.566833 I | auth: deleting token pWeabBVwuPSskMeN.583 for user conductor
2021-10-31 01:54:27.566890 I | auth: deleting token RMwexIfYRXqphjAj.584 for user conductor
2021-10-31 01:54:27.566905 I | auth: deleting token VLTVcOouxZZEGoHa.582 for user conductor
2021-10-31 01:54:27.566925 I | auth: deleting token bTsBVenWVnunMcme.580 for user conductor
2021-10-31 01:54:27.566938 I | auth: deleting token oRkqiPBEwnGQxcSu.578 for user conductor
2021-10-31 01:54:27.566948 I | auth: deleting token WNecKpznwNgnFngN.579 for user conductor
2021-10-31 01:54:27.566956 I | auth: deleting token qvwVDOyEjjDiEyRl.581 for user conductor
2021-10-31 01:54:28.006638 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (401.63428ms) to execute
2021-10-31 01:54:28.604836 I | auth: deleting token YMPctfHFAxuDsYIF.586 for user conductor
2021-10-31 01:54:28.604878 I | auth: deleting token sxxPNpiuqHhElkzl.585 for user conductor
2021-10-31 01:54:29.406443 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.300517176s) to execute
2021-10-31 01:54:29.566908 I | auth: deleting token lihVDQytRooSWPuX.587 for user conductor
2021-10-31 01:54:30.205924 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:30.566867 I | auth: deleting token OjmEWLARyIsrCIlV.588 for user conductor
2021-10-31 01:54:30.566916 I | auth: deleting token lOwkVfKNighCnDnk.589 for user conductor
2021-10-31 01:54:31.566903 I | auth: deleting token DKvuWeQyzrfiWlkI.590 for user conductor
2021-10-31 01:54:31.910392 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.405382615s) to execute
2021-10-31 01:54:31.910872 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.502378558s) to execute
2021-10-31 01:54:32.138377 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (133.3898ms) to execute
2021-10-31 01:54:32.138538 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (133.410664ms) to execute
2021-10-31 01:54:32.239224 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (198.890974ms) to execute
2021-10-31 01:54:33.566831 I | auth: deleting token lprojOJBOWomwVXK.592 for user conductor
2021-10-31 01:54:33.566875 I | auth: deleting token mqpbyRHBUUcMQaEc.591 for user conductor
2021-10-31 01:54:34.566861 I | auth: deleting token kqMPVnwpWeQvVsmR.593 for user conductor
2021-10-31 01:54:35.206162 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:35.604940 I | auth: deleting token ieVUygUVJcnWFMfN.595 for user conductor
2021-10-31 01:54:35.704833 I | auth: deleting token JsgivoCItPBnnOxx.594 for user conductor
2021-10-31 01:54:36.209973 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.767830091s) to execute
2021-10-31 01:54:36.591255 I | auth: deleting token UjbchhqeDokVsdmv.596 for user conductor
2021-10-31 01:54:37.505137 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.100086242s) to execute
2021-10-31 01:54:37.505295 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.200296213s) to execute
2021-10-31 01:54:37.505344 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.200340505s) to execute
2021-10-31 01:54:37.566783 I | auth: deleting token TxcFmCNULigNsIlZ.597 for user conductor
2021-10-31 01:54:37.639854 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (132.358363ms) to execute
2021-10-31 01:54:38.604887 I | auth: deleting token YdKAjzUfmdpeCQRP.598 for user conductor
2021-10-31 01:54:40.107029 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.001951055s) to execute
2021-10-31 01:54:40.206341 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:40.566839 I | auth: deleting token kpTJZuBgBccBrLWO.601 for user conductor
2021-10-31 01:54:40.566888 I | auth: deleting token WuyKyBsCtkgsvuHt.599 for user conductor
2021-10-31 01:54:40.566895 I | auth: deleting token unjKXbJFqhMgDAPw.600 for user conductor
2021-10-31 01:54:41.315244 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.010224959s) to execute
2021-10-31 01:54:41.315592 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.206701661s) to execute
2021-10-31 01:54:42.566937 I | auth: deleting token cAIXYRAWuEEovIUI.604 for user conductor
2021-10-31 01:54:42.567002 I | auth: deleting token gFCSsBQMsXZOgsgU.602 for user conductor
2021-10-31 01:54:42.567027 I | auth: deleting token bPTcTOUzjdiTRKFZ.603 for user conductor
2021-10-31 01:54:44.007075 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.401275583s) to execute
2021-10-31 01:54:45.206520 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:46.611238 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.204392823s) to execute
2021-10-31 01:54:47.604846 I | auth: deleting token JkddjEofpQJwumYK.605 for user conductor
2021-10-31 01:54:47.604897 I | auth: deleting token mMRcbWeTpseoAcQM.606 for user conductor
2021-10-31 01:54:47.604914 I | auth: deleting token AmUwFLrjdftrhNdZ.610 for user conductor
2021-10-31 01:54:47.604926 I | auth: deleting token QwxqcuHEUWTzHMWp.607 for user conductor
2021-10-31 01:54:47.604940 I | auth: deleting token tjVvEDWfOqJCYNkH.608 for user conductor
2021-10-31 01:54:47.604951 I | auth: deleting token wvwaoayXayIQjjHX.609 for user conductor
2021-10-31 01:54:49.310387 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.003752816s) to execute
2021-10-31 01:54:49.538128 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (226.354342ms) to execute
2021-10-31 01:54:49.566848 I | auth: deleting token AnTQJRMDfNIivvIh.614 for user conductor
2021-10-31 01:54:49.566902 I | auth: deleting token jpJAFPQiUhGpEivO.611 for user conductor
2021-10-31 01:54:49.566910 I | auth: deleting token MXEYvyBemCYXZzBo.612 for user conductor
2021-10-31 01:54:49.566918 I | auth: deleting token vIpOrxvRcRoKRWIc.613 for user conductor
2021-10-31 01:54:50.206720 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:50.810652 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (667.810842ms) to execute
2021-10-31 01:54:52.206539 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.268413243s) to execute
2021-10-31 01:54:52.566861 I | auth: deleting token nZyeROGckaOyKlPP.615 for user conductor
2021-10-31 01:54:52.566914 I | auth: deleting token DkqCVxjNvGDyJKEI.616 for user conductor
2021-10-31 01:54:53.410600 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203978664s) to execute
2021-10-31 01:54:53.411009 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.203048695s) to execute
2021-10-31 01:54:53.566855 I | auth: deleting token boskcUlodLYqTFDO.619 for user conductor
2021-10-31 01:54:53.566909 I | auth: deleting token WdiKPBvxvLoKtzEE.617 for user conductor
2021-10-31 01:54:53.566922 I | auth: deleting token lXjDMPmRJkoETyhC.618 for user conductor
2021-10-31 01:54:53.566940 I | auth: deleting token XFQihRRxWeoLSzdn.620 for user conductor
2021-10-31 01:54:54.709136 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.296442303s) to execute
2021-10-31 01:54:54.709243 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.202885019s) to execute
2021-10-31 01:54:54.709445 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (866.383947ms) to execute
2021-10-31 01:54:55.206907 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:54:57.307111 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.402075268s) to execute
2021-10-31 01:54:57.566845 I | auth: deleting token pDJdwHKObkOvrinq.622 for user conductor
2021-10-31 01:54:59.604824 I | auth: deleting token GCJEXhcenKkwtNKq.621 for user conductor
2021-10-31 01:54:59.604867 I | auth: deleting token mPBkOSzhenBewuDX.623 for user conductor
2021-10-31 01:54:59.604876 I | auth: deleting token NhPELsvetuqkBkJJ.624 for user conductor
2021-10-31 01:54:59.604900 I | auth: deleting token bdWYhEVZvDbrfhCj.625 for user conductor
2021-10-31 01:54:59.604909 I | auth: deleting token jaykFKoFFdtzuHSS.626 for user conductor
2021-10-31 01:55:00.207128 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:01.307391 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.500854244s) to execute
2021-10-31 01:55:02.605164 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.066743503s) to execute
2021-10-31 01:55:03.566818 I | auth: deleting token MuuOGTJPLdkqhypF.627 for user conductor
2021-10-31 01:55:03.566859 I | auth: deleting token xzvWABiIiGTjeVRX.628 for user conductor
2021-10-31 01:55:03.911097 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.304267922s) to execute
2021-10-31 01:55:03.911368 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.173141689s) to execute
2021-10-31 01:55:04.566876 I | auth: deleting token QWIMWSVwNHTfxaMy.630 for user conductor
2021-10-31 01:55:05.207324 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:05.410214 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.369470811s) to execute
2021-10-31 01:55:05.604848 I | auth: deleting token OponSiXUWCtPtxli.629 for user conductor
2021-10-31 01:55:05.604895 I | auth: deleting token IsxVsgBYxwzmfqVp.631 for user conductor
2021-10-31 01:55:05.604911 I | auth: deleting token kAKlsRxDOtfUhubT.633 for user conductor
2021-10-31 01:55:05.604931 I | auth: deleting token EvjCctKcsybmLYCg.632 for user conductor
2021-10-31 01:55:06.708297 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.762310461s) to execute
2021-10-31 01:55:07.911596 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.106648624s) to execute
2021-10-31 01:55:07.911740 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.202021888s) to execute
2021-10-31 01:55:08.038351 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (125.3226ms) to execute
2021-10-31 01:55:08.566858 I | auth: deleting token lhdLCuMkKxyMevkz.634 for user conductor
2021-10-31 01:55:08.566913 I | auth: deleting token DakdEjfLxfQcHZuo.636 for user conductor
2021-10-31 01:55:09.566891 I | auth: deleting token BeFZdlDKdXNnvXBi.638 for user conductor
2021-10-31 01:55:09.566957 I | auth: deleting token bALdFyCefUMXbyHO.635 for user conductor
2021-10-31 01:55:09.566972 I | auth: deleting token hDWMazPRslyjmwRd.637 for user conductor
2021-10-31 01:55:10.207525 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:10.604826 I | auth: deleting token rXCxNFTCzmdDbpuF.640 for user conductor
2021-10-31 01:55:10.604879 I | auth: deleting token vFBDIyfhgKGoyOyC.639 for user conductor
2021-10-31 01:55:11.107868 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.169671421s) to execute
2021-10-31 01:55:11.239353 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.71593ms) to execute
2021-10-31 01:55:11.439244 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (197.46765ms) to execute
2021-10-31 01:55:13.593255 I | auth: deleting token wOFacQfRYjesCBwq.643 for user conductor
2021-10-31 01:55:13.593315 I | auth: deleting token jpYlmtshKMYnFKpX.642 for user conductor
2021-10-31 01:55:13.593326 I | auth: deleting token GnAJjYmlJiDplXlU.644 for user conductor
2021-10-31 01:55:13.593332 I | auth: deleting token ZHoLMWzSKYUCvhGG.641 for user conductor
2021-10-31 01:55:13.911444 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.205784642s) to execute
2021-10-31 01:55:14.566907 I | auth: deleting token wlWtAbnucsjKatxf.645 for user conductor
2021-10-31 01:55:14.566946 I | auth: deleting token sbqUinYwaeJfaesC.646 for user conductor
2021-10-31 01:55:15.208298 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.20337871s) to execute
2021-10-31 01:55:15.208455 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.295173889s) to execute
2021-10-31 01:55:15.290688 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:15.339061 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (128.972566ms) to execute
2021-10-31 01:55:15.566831 I | auth: deleting token bZqShqNxQkvLcqeU.647 for user conductor
2021-10-31 01:55:16.566880 I | auth: deleting token OuKEZRBFxpJvAFuT.648 for user conductor
2021-10-31 01:55:18.715192 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.175575528s) to execute
2021-10-31 01:55:18.938244 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.881503ms) to execute
2021-10-31 01:55:19.604785 I | auth: deleting token CcEfubzfuCyGdHHP.651 for user conductor
2021-10-31 01:55:19.604850 I | auth: deleting token dQyRHlZCWqneYykW.649 for user conductor
2021-10-31 01:55:19.604870 I | auth: deleting token MkqOhGrgCZHsDBvO.650 for user conductor
2021-10-31 01:55:20.290974 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:20.566874 I | auth: deleting token WhwiFWugipsxdyUP.652 for user conductor
2021-10-31 01:55:20.566928 I | auth: deleting token INtyEyoILOkgQLEI.653 for user conductor
2021-10-31 01:55:25.305022 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:25.566872 I | auth: deleting token QRPdocAcOZbgxOAO.657 for user conductor
2021-10-31 01:55:25.566923 I | auth: deleting token SfgkBvOXBkVdkaSp.658 for user conductor
2021-10-31 01:55:25.566933 I | auth: deleting token ndrWuFbUyXIXEtHJ.659 for user conductor
2021-10-31 01:55:25.566945 I | auth: deleting token bTdRiVnagrIyeqLq.655 for user conductor
2021-10-31 01:55:25.566955 I | auth: deleting token UNtaebnjnccytJzD.656 for user conductor
2021-10-31 01:55:25.566967 I | auth: deleting token yYSmdxZqFzDxCIqr.654 for user conductor
2021-10-31 01:55:25.566974 I | auth: deleting token ZREODEJADWATKbDY.660 for user conductor
2021-10-31 01:55:26.005597 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.26572401s) to execute
2021-10-31 01:55:26.139069 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (131.183537ms) to execute
2021-10-31 01:55:27.314697 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (876.163488ms) to execute
2021-10-31 01:55:28.705204 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.298551569s) to execute
2021-10-31 01:55:29.566832 I | auth: deleting token HTuuMILAiDNtuQBL.662 for user conductor
2021-10-31 01:55:29.566946 I | auth: deleting token NXtpAmhGrtZmcFqo.661 for user conductor
2021-10-31 01:55:29.566974 I | auth: deleting token zioQYgkbphcYbSHE.664 for user conductor
2021-10-31 01:55:29.566998 I | auth: deleting token jdINtElfCASMpQOq.665 for user conductor
2021-10-31 01:55:29.567016 I | auth: deleting token oSENsdQRwHlKWIzR.663 for user conductor
2021-10-31 01:55:30.305359 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:30.566905 I | auth: deleting token QaOiNcXhzBOFaafI.666 for user conductor
2021-10-31 01:55:30.566950 I | auth: deleting token RgWJrewtOxPyQWXJ.667 for user conductor
2021-10-31 01:55:32.566847 I | auth: deleting token zvAlOlRQRAGPuDjK.668 for user conductor
2021-10-31 01:55:32.566885 I | auth: deleting token TbFpnrnubhqFJieh.669 for user conductor
2021-10-31 01:55:32.707383 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.999555899s) to execute
2021-10-31 01:55:32.707620 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.00055369s) to execute
2021-10-31 01:55:34.566915 I | auth: deleting token xJHAslBOJKYwPScA.671 for user conductor
2021-10-31 01:55:34.567059 I | auth: deleting token SffEHxoFpwWuOEiJ.670 for user conductor
2021-10-31 01:55:35.305755 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:35.566817 I | auth: deleting token VEOZZSJYwMyURMDj.672 for user conductor
2021-10-31 01:55:35.566850 I | auth: deleting token SMTXhlVDhfsGxobk.673 for user conductor
2021-10-31 01:55:36.513038 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.374010695s) to execute
2021-10-31 01:55:36.566804 I | auth: deleting token BWpEGmAqTgrFAnPT.674 for user conductor
2021-10-31 01:55:36.566846 I | auth: deleting token ueVgJbnGxyjMaPkQ.675 for user conductor
2021-10-31 01:55:37.566889 I | auth: deleting token IJRRYFHPfHbVjKqo.676 for user conductor
2021-10-31 01:55:39.604950 I | auth: deleting token klHfnmQnOWJGKZHA.677 for user conductor
2021-10-31 01:55:39.604994 I | auth: deleting token RqWgZAtwlMQOJSuB.678 for user conductor
2021-10-31 01:55:40.305968 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:40.508954 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.370830539s) to execute
2021-10-31 01:55:40.566857 I | auth: deleting token qXaWblkLBGZfRqWy.679 for user conductor
2021-10-31 01:55:40.738572 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (227.657441ms) to execute
2021-10-31 01:55:41.906800 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.266425188s) to execute
2021-10-31 01:55:41.906884 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (368.752244ms) to execute
2021-10-31 01:55:42.566845 I | auth: deleting token IcNGIruKjzHCvVCR.681 for user conductor
2021-10-31 01:55:42.566883 I | auth: deleting token WxqRkPGIlxkosysV.682 for user conductor
2021-10-31 01:55:42.566900 I | auth: deleting token gSbIUzrrdTcvvdRE.680 for user conductor
2021-10-31 01:55:43.211318 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.271538498s) to execute
2021-10-31 01:55:44.506531 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.292922072s) to execute
2021-10-31 01:55:44.566899 I | auth: deleting token QBJyBXfqLcEGPFPE.683 for user conductor
2021-10-31 01:55:45.306206 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:45.566814 I | auth: deleting token YvxtpyiDTwjWPvsH.684 for user conductor
2021-10-31 01:55:45.566850 I | auth: deleting token ofRnswVaKxGGWGGJ.686 for user conductor
2021-10-31 01:55:45.566862 I | auth: deleting token UNQaqlTdiiojVimW.687 for user conductor
2021-10-31 01:55:45.566883 I | auth: deleting token QJjcYMteaSgbIxTX.685 for user conductor
2021-10-31 01:55:45.805063 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.592037817s) to execute
2021-10-31 01:55:45.805167 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.297077643s) to execute
2021-10-31 01:55:45.805288 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.265621161s) to execute
2021-10-31 01:55:48.604885 I | auth: deleting token EyZLWXEPzcgcYcOw.690 for user conductor
2021-10-31 01:55:48.604971 I | auth: deleting token oZoHnPhPOoNpcYVQ.688 for user conductor
2021-10-31 01:55:49.604846 I | auth: deleting token PbuQzSNvsVdCPJMn.691 for user conductor
2021-10-31 01:55:49.604900 I | auth: deleting token iOEbZOyWBEnLxcnM.692 for user conductor
2021-10-31 01:55:49.604911 I | auth: deleting token KoxjpOUOPZzbFoBm.693 for user conductor
2021-10-31 01:55:49.604921 I | auth: deleting token NTowtuiSHsIDRwJp.689 for user conductor
2021-10-31 01:55:49.706740 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.663761668s) to execute
2021-10-31 01:55:50.306392 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:50.566909 I | auth: deleting token rRQcoHwNoDgHjBoP.694 for user conductor
2021-10-31 01:55:51.006976 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.297791389s) to execute
2021-10-31 01:55:51.007206 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.298519891s) to execute
2021-10-31 01:55:51.138473 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.429504518s) to execute
2021-10-31 01:55:51.139638 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.104431ms) to execute
2021-10-31 01:55:51.139705 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (100.292572ms) to execute
2021-10-31 01:55:52.508455 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.063493473s) to execute
2021-10-31 01:55:53.806855 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.199672909s) to execute
2021-10-31 01:55:55.306656 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:55:55.566829 I | auth: deleting token sZnqJPWTyZEzrgAd.700 for user conductor
2021-10-31 01:55:55.566882 I | auth: deleting token hpcgxjCUSbHrZyuD.698 for user conductor
2021-10-31 01:55:55.566912 I | auth: deleting token LgddIpakokeDpWKZ.697 for user conductor
2021-10-31 01:55:55.566925 I | auth: deleting token qJfiOtvOdVlXPyvJ.696 for user conductor
2021-10-31 01:55:55.566939 I | auth: deleting token tmokytfDDbhBKDci.699 for user conductor
2021-10-31 01:55:55.566949 I | auth: deleting token XYfZSVoTZJiBhAsC.701 for user conductor
2021-10-31 01:55:55.566959 I | auth: deleting token bGwHLSGyosQfYKTB.695 for user conductor
2021-10-31 01:55:56.407084 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.669032536s) to execute
2021-10-31 01:55:56.638377 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (229.717917ms) to execute
2021-10-31 01:55:56.639749 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (100.090911ms) to execute
2021-10-31 01:55:58.206654 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (563.799063ms) to execute
2021-10-31 01:55:58.439249 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (198.410827ms) to execute
2021-10-31 01:55:59.566890 I | auth: deleting token mqumrQRxDtYKNXeg.702 for user conductor
2021-10-31 01:56:00.306860 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:00.566841 I | auth: deleting token MZZmPdKftDFJEAFI.703 for user conductor
2021-10-31 01:56:01.007346 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (365.597478ms) to execute
2021-10-31 01:56:01.566857 I | auth: deleting token hihaKZQCCyLnOzLP.707 for user conductor
2021-10-31 01:56:01.566931 I | auth: deleting token qxVIYSCfCWrMckZL.706 for user conductor
2021-10-31 01:56:01.566950 I | auth: deleting token UNiIuGxDwXmbMyvQ.705 for user conductor
2021-10-31 01:56:01.566961 I | auth: deleting token kZDmakfhqduYzmon.704 for user conductor
2021-10-31 01:56:02.406937 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (101.855523ms) to execute
2021-10-31 01:56:03.909804 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (169.679776ms) to execute
2021-10-31 01:56:04.566852 I | auth: deleting token ppiQDlkqjDunRHYd.708 for user conductor
2021-10-31 01:56:04.566893 I | auth: deleting token lytVzPPeZvDFXQjm.709 for user conductor
2021-10-31 01:56:04.566903 I | auth: deleting token KxHmKiooKCInXqDc.710 for user conductor
2021-10-31 01:56:05.206211 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.293974592s) to execute
2021-10-31 01:56:05.307011 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:05.566874 I | auth: deleting token lmMcbQylDCwipuRL.711 for user conductor
2021-10-31 01:56:06.566858 I | auth: deleting token EBlydvzdFWmYBqKV.713 for user conductor
2021-10-31 01:56:07.566825 I | auth: deleting token oVkoWEtrBXLgxAhg.714 for user conductor
2021-10-31 01:56:07.566886 I | auth: deleting token HJsIfosRUVZRygVB.712 for user conductor
2021-10-31 01:56:08.651641 I | auth: deleting token PCUbogvZiwbfLwKM.715 for user conductor
2021-10-31 01:56:09.007817 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.798888743s) to execute
2021-10-31 01:56:09.008189 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.800085451s) to execute
2021-10-31 01:56:09.138450 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (118.188133ms) to execute
2021-10-31 01:56:09.604781 I | auth: deleting token FtJejwZnLAUNQmKB.717 for user conductor
2021-10-31 01:56:09.604843 I | auth: deleting token EmWrFRnaHcHYkQTL.716 for user conductor
2021-10-31 01:56:09.604859 I | auth: deleting token FUmUxqPPYvwxbmje.718 for user conductor
2021-10-31 01:56:10.390652 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:10.566882 I | auth: deleting token eKCQRjyqhrqeEjvY.719 for user conductor
2021-10-31 01:56:13.566824 I | auth: deleting token kXLCRShCwxMWCQEW.722 for user conductor
2021-10-31 01:56:14.407644 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.967378287s) to execute
2021-10-31 01:56:15.404858 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:15.566815 I | auth: deleting token KUYupnrwijbDaZTe.723 for user conductor
2021-10-31 01:56:15.566885 I | auth: deleting token gEqxoGGUdXcHtZhL.725 for user conductor
2021-10-31 01:56:15.566897 I | auth: deleting token YYpUHWFcRQOOXEOH.721 for user conductor
2021-10-31 01:56:15.566905 I | auth: deleting token hjKpelZOYYTNHyrp.724 for user conductor
2021-10-31 01:56:15.566912 I | auth: deleting token upZUawEmZDpViaJb.720 for user conductor
2021-10-31 01:56:15.614400 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.109413262s) to execute
2021-10-31 01:56:15.614767 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.20536071s) to execute
2021-10-31 01:56:15.738389 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.328640647s) to execute
2021-10-31 01:56:15.738472 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.328703352s) to execute
2021-10-31 01:56:18.308420 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (962.135945ms) to execute
2021-10-31 01:56:18.566819 I | auth: deleting token uOUURSReGVpyYZNO.729 for user conductor
2021-10-31 01:56:18.566864 I | auth: deleting token QPVBDKyaXxZUtqXd.727 for user conductor
2021-10-31 01:56:20.405095 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:20.566865 I | auth: deleting token RfGGxGJfCgtahePm.731 for user conductor
2021-10-31 01:56:20.566929 I | auth: deleting token qWJVgygDXBIqnvxj.726 for user conductor
2021-10-31 01:56:20.566945 I | auth: deleting token bZWDpuGffMJwtVTR.728 for user conductor
2021-10-31 01:56:20.566952 I | auth: deleting token ZPFjfuRxIoqyQNWB.730 for user conductor
2021-10-31 01:56:22.604853 I | auth: deleting token reGopDuaSMNTteZV.734 for user conductor
2021-10-31 01:56:22.604904 I | auth: deleting token ecOctpAJvnEFuXPO.733 for user conductor
2021-10-31 01:56:22.604928 I | auth: deleting token lEoqVMkwWUmwuvbu.732 for user conductor
2021-10-31 01:56:24.566820 I | auth: deleting token uHDOfXNESrVMBpMd.735 for user conductor
2021-10-31 01:56:24.566876 I | auth: deleting token JMbkneEpxDYSmGiM.736 for user conductor
2021-10-31 01:56:24.938577 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.237567ms) to execute
2021-10-31 01:56:25.405343 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:25.604841 I | auth: deleting token wyUsYwpadEkVXsuc.738 for user conductor
2021-10-31 01:56:25.604899 I | auth: deleting token SQbpjYyLNZsqRfbJ.737 for user conductor
2021-10-31 01:56:26.566878 I | auth: deleting token VVdkDshUFQwVBwAH.739 for user conductor
2021-10-31 01:56:28.605346 I | auth: deleting token xXZwmclMnVclhsqt.741 for user conductor
2021-10-31 01:56:30.405572 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:30.616240 I | auth: deleting token wEsHBAXLTbNcniTt.743 for user conductor
2021-10-31 01:56:30.616296 I | auth: deleting token oYVqWNxonQQpZetM.742 for user conductor
2021-10-31 01:56:30.616309 I | auth: deleting token McYIuzAHjukOYLyv.740 for user conductor
2021-10-31 01:56:30.807010 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.101987464s) to execute
2021-10-31 01:56:32.566916 I | auth: deleting token wQRpVSMGgQfNWlgj.744 for user conductor
2021-10-31 01:56:33.509134 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.370953291s) to execute
2021-10-31 01:56:33.566795 I | auth: deleting token QISOzRcEBRtAtLcm.747 for user conductor
2021-10-31 01:56:33.566846 I | auth: deleting token wBdMDKhhZhDbBXwz.745 for user conductor
2021-10-31 01:56:33.638932 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (127.321706ms) to execute
2021-10-31 01:56:34.566863 I | auth: deleting token eAkTMoBztOOQjUCu.749 for user conductor
2021-10-31 01:56:34.567017 I | auth: deleting token VrZLLKtiXamQvmdH.746 for user conductor
2021-10-31 01:56:35.005225 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (767.014856ms) to execute
2021-10-31 01:56:35.138293 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (127.991219ms) to execute
2021-10-31 01:56:35.405792 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:36.407568 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (800.821516ms) to execute
2021-10-31 01:56:36.604831 I | auth: deleting token BFMYZFATpYeYXJRd.751 for user conductor
2021-10-31 01:56:36.604885 I | auth: deleting token ZyzqLyBPyPdGXyKn.750 for user conductor
2021-10-31 01:56:36.604898 I | auth: deleting token CUsiMARzKcnICeER.748 for user conductor
2021-10-31 01:56:36.604907 I | auth: deleting token MKChdGFxDjPcNkha.752 for user conductor
2021-10-31 01:56:38.604952 I | auth: deleting token yGwVKAHTGuTqkkGQ.754 for user conductor
2021-10-31 01:56:38.604988 I | auth: deleting token NauIciQKHmggSnzl.753 for user conductor
2021-10-31 01:56:38.604995 I | auth: deleting token GkDuRSdVeAsHpBcR.756 for user conductor
2021-10-31 01:56:38.605003 I | auth: deleting token NiibAovYfABXVYpe.755 for user conductor
2021-10-31 01:56:38.908468 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.270168045s) to execute
2021-10-31 01:56:39.038982 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.479976ms) to execute
2021-10-31 01:56:39.566883 I | auth: deleting token uMljQkzGXBZvkDNM.757 for user conductor
2021-10-31 01:56:40.405988 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:41.305744 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (800.619569ms) to execute
2021-10-31 01:56:41.566887 I | auth: deleting token icDqgocTswLDShnA.758 for user conductor
2021-10-31 01:56:42.566870 I | auth: deleting token jbDVXYlXeXQvZVZM.759 for user conductor
2021-10-31 01:56:43.566863 I | auth: deleting token pwKMYJDWJqdUCFXo.760 for user conductor
2021-10-31 01:56:45.406277 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:45.566826 I | auth: deleting token XzNoiKSizRUjBWBx.761 for user conductor
2021-10-31 01:56:46.566849 I | auth: deleting token qGfVzFLnHxSKeTmQ.763 for user conductor
2021-10-31 01:56:46.566962 I | auth: deleting token jgXMWqYpVnYljyLo.762 for user conductor
2021-10-31 01:56:48.566879 I | auth: deleting token PnSLhyUQlBXEPnPW.765 for user conductor
2021-10-31 01:56:48.566920 I | auth: deleting token ARoFdPoHLTixaLNH.764 for user conductor
2021-10-31 01:56:49.566941 I | auth: deleting token mVivFbYRZoUFhLmr.766 for user conductor
2021-10-31 01:56:49.566988 I | auth: deleting token ETXmjthqVokEIdQV.767 for user conductor
2021-10-31 01:56:50.406462 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:51.109612 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.604657322s) to execute
2021-10-31 01:56:53.604790 I | auth: deleting token EGFJMWAtWYpSrIVE.768 for user conductor
2021-10-31 01:56:53.604936 I | auth: deleting token PpHhPcxywLRNSwlr.769 for user conductor
2021-10-31 01:56:53.605019 I | auth: deleting token gbFDznCLyPmKVfsx.771 for user conductor
2021-10-31 01:56:53.605066 I | auth: deleting token XsarZFQpyKYpZZdI.772 for user conductor
2021-10-31 01:56:53.605122 I | auth: deleting token UmQuFHyhGkIskmwu.770 for user conductor
2021-10-31 01:56:54.566869 I | auth: deleting token UstcgsZzJCiqiMas.773 for user conductor
2021-10-31 01:56:54.567010 I | auth: deleting token rwIrXHfWdFbPGooD.774 for user conductor
2021-10-31 01:56:55.406733 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:56:56.566832 I | auth: deleting token hqiiWdeeriJIeReM.776 for user conductor
2021-10-31 01:56:56.567129 I | auth: deleting token QeTrLWxAwdTkyLAH.775 for user conductor
2021-10-31 01:56:57.566841 I | auth: deleting token EfNRlkJlWXskeyRJ.778 for user conductor
2021-10-31 01:56:59.566806 I | auth: deleting token rfnXcsVxnSJifofF.777 for user conductor
2021-10-31 01:56:59.566860 I | auth: deleting token esmPHNseWKFZVKTp.779 for user conductor
2021-10-31 01:56:59.566872 I | auth: deleting token aTUdOsehohEzrZPa.780 for user conductor
2021-10-31 01:57:00.406911 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:00.566785 I | auth: deleting token nOnwXpulWJDbAbEh.782 for user conductor
2021-10-31 01:57:00.566831 I | auth: deleting token cdpJzUMBrINxcglf.781 for user conductor
2021-10-31 01:57:01.505410 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.067243494s) to execute
2021-10-31 01:57:01.605011 I | auth: deleting token irrhRJDSFCuitqSL.783 for user conductor
2021-10-31 01:57:02.710827 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.071054575s) to execute
2021-10-31 01:57:02.711140 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.203780123s) to execute
2021-10-31 01:57:02.839035 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (123.772641ms) to execute
2021-10-31 01:57:03.566885 I | auth: deleting token KYnsObGYZydjfnvm.786 for user conductor
2021-10-31 01:57:03.566933 I | auth: deleting token sKfjUgJDogLRajIN.784 for user conductor
2021-10-31 01:57:03.566945 I | auth: deleting token epDCqpKzrAwzamcS.785 for user conductor
2021-10-31 01:57:05.407210 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:05.505300 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.967101512s) to execute
2021-10-31 01:57:05.566836 I | auth: deleting token XNdRAIrwftzWyhgD.790 for user conductor
2021-10-31 01:57:05.566876 I | auth: deleting token WJmUIBrFxNxDjfQB.787 for user conductor
2021-10-31 01:57:05.566898 I | auth: deleting token BbKMGsjqcvUneuKD.788 for user conductor
2021-10-31 01:57:05.566905 I | auth: deleting token YWksZpmUsiqbVnLw.789 for user conductor
2021-10-31 01:57:06.566833 I | auth: deleting token AXBIXphfiwkKKhpT.791 for user conductor
2021-10-31 01:57:06.811720 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.304489564s) to execute
2021-10-31 01:57:06.811954 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.105876886s) to execute
2021-10-31 01:57:06.938746 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (124.319157ms) to execute
2021-10-31 01:57:07.566880 I | auth: deleting token UkRctriJWfRVqrop.792 for user conductor
2021-10-31 01:57:09.566862 I | auth: deleting token AxtXuFdDjaUHVepP.795 for user conductor
2021-10-31 01:57:09.566914 I | auth: deleting token skmurqeJgdHnyqNh.793 for user conductor
2021-10-31 01:57:09.566924 I | auth: deleting token YMmyXWxJiLVXlwjm.794 for user conductor
2021-10-31 01:57:10.407498 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:11.566864 I | auth: deleting token NQPUqrnBAPZJRKcv.796 for user conductor
2021-10-31 01:57:12.566863 I | auth: deleting token znTvvGtITopLIbjV.797 for user conductor
2021-10-31 01:57:13.566877 I | auth: deleting token uFwbSCVkkgLwcilr.798 for user conductor
2021-10-31 01:57:15.407713 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:15.566820 I | auth: deleting token ItOuqfiMKqElGLes.800 for user conductor
2021-10-31 01:57:15.566871 I | auth: deleting token iIonUIBPqlpusObs.799 for user conductor
2021-10-31 01:57:18.566870 I | auth: deleting token CHiuAKFWeemfMJoY.802 for user conductor
2021-10-31 01:57:18.566925 I | auth: deleting token HszkLrAbMyJsGXSP.803 for user conductor
2021-10-31 01:57:18.566941 I | auth: deleting token IdhZcZNOeqhDrsoO.801 for user conductor
2021-10-31 01:57:19.566888 I | auth: deleting token qsUMYveLDlqTIPKx.804 for user conductor
2021-10-31 01:57:19.566983 I | auth: deleting token qyIdwIDpJEBHbyjE.805 for user conductor
2021-10-31 01:57:20.407896 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:21.566893 I | auth: deleting token pVlwDrXoIjiZPxQQ.808 for user conductor
2021-10-31 01:57:21.567021 I | auth: deleting token BERydbwfhXsaZaLI.807 for user conductor
2021-10-31 01:57:21.567047 I | auth: deleting token FIKTfSUCLVyiUbRK.809 for user conductor
2021-10-31 01:57:21.567073 I | auth: deleting token KCuhatbNjGjfWidA.806 for user conductor
2021-10-31 01:57:23.566839 I | auth: deleting token xzoDjkKVtiJYfDoS.810 for user conductor
2021-10-31 01:57:24.010241 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (768.494212ms) to execute
2021-10-31 01:57:24.566851 I | auth: deleting token jIgYtyJMmmsFbXLO.811 for user conductor
2021-10-31 01:57:25.408752 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.103711378s) to execute
2021-10-31 01:57:25.409260 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:25.552645 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (141.556025ms) to execute
2021-10-31 01:57:26.566814 I | auth: deleting token OKzxClRxxDHVrDKL.812 for user conductor
2021-10-31 01:57:27.590210 I | auth: deleting token PuiBSDTOUmftxNJp.813 for user conductor
2021-10-31 01:57:28.108344 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.670222517s) to execute
2021-10-31 01:57:28.566859 I | auth: deleting token gvVUHyaTUfzLqCGU.814 for user conductor
2021-10-31 01:57:29.311528 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.173097941s) to execute
2021-10-31 01:57:29.404902 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.294528361s) to execute
2021-10-31 01:57:29.566838 I | auth: deleting token oxhugwBvRXNoNrLj.816 for user conductor
2021-10-31 01:57:30.409435 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:30.566832 I | auth: deleting token olYBEhmDdQZnGXsA.815 for user conductor
2021-10-31 01:57:30.566880 I | auth: deleting token uctJpiCHzfCTjsFF.818 for user conductor
2021-10-31 01:57:31.566870 I | auth: deleting token ktwWxkgwKlQhBNFF.817 for user conductor
2021-10-31 01:57:31.566931 I | auth: deleting token uVZTEUWFqpQnXHxW.819 for user conductor
2021-10-31 01:57:31.910757 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.27230323s) to execute
2021-10-31 01:57:34.566907 I | auth: deleting token QbvthRvikVxCctua.823 for user conductor
2021-10-31 01:57:34.566972 I | auth: deleting token lcHVISNOlJxPZpVu.820 for user conductor
2021-10-31 01:57:35.409622 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:35.566828 I | auth: deleting token dJRYRDOYQbpTxEkw.821 for user conductor
2021-10-31 01:57:35.566875 I | auth: deleting token kvIZBnWUAMGcdOIx.822 for user conductor
2021-10-31 01:57:35.709119 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.70277125s) to execute
2021-10-31 01:57:35.709436 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.704516371s) to execute
2021-10-31 01:57:36.566854 I | auth: deleting token eLerKHNXItFAriux.825 for user conductor
2021-10-31 01:57:36.566900 I | auth: deleting token CLiUuilBmwiPksAa.824 for user conductor
2021-10-31 01:57:37.008691 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.201921406s) to execute
2021-10-31 01:57:39.604873 I | auth: deleting token lXLttRpFAJtNgHPT.828 for user conductor
2021-10-31 01:57:39.604906 I | auth: deleting token QAFNMNtMicXuqPlz.826 for user conductor
2021-10-31 01:57:40.405181 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (498.458926ms) to execute
2021-10-31 01:57:40.409754 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:41.566824 I | auth: deleting token XZeXMGmQPTWNkpHy.827 for user conductor
2021-10-31 01:57:41.566890 I | auth: deleting token DZAmWxmdxFNfXvhV.829 for user conductor
2021-10-31 01:57:41.911964 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (173.738282ms) to execute
2021-10-31 01:57:42.566822 I | auth: deleting token cSYolIqDYHemdbUq.830 for user conductor
2021-10-31 01:57:42.566874 I | auth: deleting token IYtTLKjEfGyHvfQr.832 for user conductor
2021-10-31 01:57:42.566893 I | auth: deleting token PjGeSXaHMZCfDGpx.831 for user conductor
2021-10-31 01:57:43.915287 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (510.278329ms) to execute
2021-10-31 01:57:45.307657 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (400.755154ms) to execute
2021-10-31 01:57:45.409950 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:45.566865 I | auth: deleting token qjpnDAyIstqLpViG.837 for user conductor
2021-10-31 01:57:45.566918 I | auth: deleting token GZduExEOVYEfyJFT.833 for user conductor
2021-10-31 01:57:45.566932 I | auth: deleting token RbvXmrklBftxubSz.835 for user conductor
2021-10-31 01:57:46.566839 I | auth: deleting token SjqoRxOVbOCnJGZn.834 for user conductor
2021-10-31 01:57:46.566869 I | auth: deleting token JsZqHCVZDuTVuNLc.838 for user conductor
2021-10-31 01:57:46.566900 I | auth: deleting token xHFGJeXeysvVRQze.836 for user conductor
2021-10-31 01:57:47.604837 I | auth: deleting token ZnPksZeuloWRvpfA.839 for user conductor
2021-10-31 01:57:48.010700 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (369.337603ms) to execute
2021-10-31 01:57:48.566813 I | auth: deleting token lQkMYBNosbvdkIpM.840 for user conductor
2021-10-31 01:57:48.566872 I | auth: deleting token GiAddXigIogmmJlv.841 for user conductor
2021-10-31 01:57:49.307440 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.067786659s) to execute
2021-10-31 01:57:49.566843 I | auth: deleting token XMAKCWzdmZeTORhP.843 for user conductor
2021-10-31 01:57:49.566884 I | auth: deleting token HlJpCkvwylGhZOzf.842 for user conductor
2021-10-31 01:57:50.410216 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:51.604901 I | auth: deleting token KvvVPHfLpLztFkWW.844 for user conductor
2021-10-31 01:57:51.908472 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.598942969s) to execute
2021-10-31 01:57:51.908618 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.470176383s) to execute
2021-10-31 01:57:52.566852 I | auth: deleting token thQlyrMNZrjjWVJJ.845 for user conductor
2021-10-31 01:57:53.208817 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.298469896s) to execute
2021-10-31 01:57:53.208974 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.201093389s) to execute
2021-10-31 01:57:54.566867 I | auth: deleting token RMpRhhquwSnSTgRz.846 for user conductor
2021-10-31 01:57:55.410397 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:57:55.604893 I | auth: deleting token sDFQapwxOfSZRsZf.847 for user conductor
2021-10-31 01:57:55.605832 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (700.873358ms) to execute
2021-10-31 01:57:56.905770 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.067588162s) to execute
2021-10-31 01:57:57.566805 I | auth: deleting token wMzNksSaCbjMLCSc.848 for user conductor
2021-10-31 01:57:58.206672 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.268479676s) to execute
2021-10-31 01:57:58.206810 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.298823797s) to execute
2021-10-31 01:58:00.410588 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:58:00.566879 I | auth: deleting token ktdzbSLYcQTsuzhz.849 for user conductor
2021-10-31 01:58:00.566929 I | auth: deleting token acRVPHFszsdITRAX.853 for user conductor
2021-10-31 01:58:00.566937 I | auth: deleting token JggDfyLkihbNfyGc.851 for user conductor
2021-10-31 01:58:00.566960 I | auth: deleting token VSdBdXbFpSQMAndT.852 for user conductor
2021-10-31 01:58:00.566965 I | auth: deleting token GAoNogBBPxVLwNzh.850 for user conductor
2021-10-31 01:58:00.811301 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.773076984s) to execute
2021-10-31 01:58:03.310076 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.371769293s) to execute
2021-10-31 01:58:04.566882 I | auth: deleting token uPtttkrJIFKloAgR.856 for user conductor
2021-10-31 01:58:04.566998 I | auth: deleting token OEzQLOipsDusjyjl.854 for user conductor
2021-10-31 01:58:04.567041 I | auth: deleting token tfIJqxKPkczbxbQF.857 for user conductor
2021-10-31 01:58:04.567062 I | auth: deleting token lIOlrAisvEnJzZwK.855 for user conductor
2021-10-31 01:58:04.567085 I | auth: deleting token RVpdYpukiLAnTYDd.858 for user conductor
2021-10-31 01:58:05.410807 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:05.566929 I | auth: deleting token cRZhabTdpqVlxkNR.859 for user conductor
2021-10-31 01:58:06.566872 I | auth: deleting token wJicmSTHkpELMyKI.861 for user conductor
2021-10-31 01:58:07.566847 I | auth: deleting token srODGgzrgxUxuSMR.862 for user conductor
2021-10-31 01:58:07.566902 I | auth: deleting token kCjAKHJxSfVendZx.860 for user conductor
2021-10-31 01:58:10.411051 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:10.566864 I | auth: deleting token MFsHXNYGHYLScoMi.864 for user conductor
2021-10-31 01:58:11.209974 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.063462427s) to execute
2021-10-31 01:58:12.510028 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (805.014688ms) to execute
2021-10-31 01:58:12.638049 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (122.853546ms) to execute
2021-10-31 01:58:13.566870 I | auth: deleting token zozfikOuHyCmnTwA.865 for user conductor
2021-10-31 01:58:13.566936 I | auth: deleting token MlXThqpRBjWJDLjb.867 for user conductor
2021-10-31 01:58:13.566960 I | auth: deleting token jmKtezimWPtCiRSA.863 for user conductor
2021-10-31 01:58:13.566970 I | auth: deleting token YZRbJYvGTVDfONKK.866 for user conductor
2021-10-31 01:58:13.566981 I | auth: deleting token nGJKmGnNLoKhdOnN.868 for user conductor
2021-10-31 01:58:14.906190 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (168.061446ms) to execute
2021-10-31 01:58:15.038196 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (127.161472ms) to execute
2021-10-31 01:58:15.411342 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:16.205274 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (263.321464ms) to execute
2021-10-31 01:58:19.590431 I | auth: deleting token ltTPUpRxqCTAPJiO.870 for user conductor
2021-10-31 01:58:19.590466 I | auth: deleting token lZIJMvjcrVfuQOVl.869 for user conductor
2021-10-31 01:58:19.590481 I | auth: deleting token nFhiGCykuIOvvVrP.872 for user conductor
2021-10-31 01:58:19.590494 I | auth: deleting token fuYWVofWZMDDpfKa.871 for user conductor
2021-10-31 01:58:20.411507 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:20.566827 I | auth: deleting token tnjFWxPWwzAXUTEQ.873 for user conductor
2021-10-31 01:58:22.604982 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.163108525s) to execute
2021-10-31 01:58:23.908873 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (970.717019ms) to execute
2021-10-31 01:58:25.108757 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.168903657s) to execute
2021-10-31 01:58:25.238297 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (124.437105ms) to execute
2021-10-31 01:58:25.411771 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:25.566888 I | auth: deleting token FtYFrLIHUVuLNDAC.874 for user conductor
2021-10-31 01:58:25.566930 I | auth: deleting token hevPloRfmrEeUpev.875 for user conductor
2021-10-31 01:58:25.566941 I | auth: deleting token tPPrRTEGUVqAvrpO.877 for user conductor
2021-10-31 01:58:25.566949 I | auth: deleting token yrymrFFDYzkxLqoq.879 for user conductor
2021-10-31 01:58:25.566958 I | auth: deleting token yjZkLheWIxvrfZib.878 for user conductor
2021-10-31 01:58:25.566967 I | auth: deleting token JbSHYEQZZVjCzyhH.876 for user conductor
2021-10-31 01:58:27.309266 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (266.653116ms) to execute
2021-10-31 01:58:29.909904 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.202173846s) to execute
2021-10-31 01:58:30.412017 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:30.566830 I | auth: deleting token SwQvDJqbazACGObf.881 for user conductor
2021-10-31 01:58:30.566870 I | auth: deleting token IGzAoNLQsdeZiWOE.880 for user conductor
2021-10-31 01:58:30.566887 I | auth: deleting token oyHjCHhVSApJlxqc.882 for user conductor
2021-10-31 01:58:30.566895 I | auth: deleting token xBlBTsQgjPmdtCkb.884 for user conductor
2021-10-31 01:58:30.566903 I | auth: deleting token EVSLjaIYHeDWYjCw.885 for user conductor
2021-10-31 01:58:30.566916 I | auth: deleting token eTvVgMHXkcdMhfjl.883 for user conductor
2021-10-31 01:58:31.208710 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.203719127s) to execute
2021-10-31 01:58:31.208922 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.203942895s) to execute
2021-10-31 01:58:31.566884 I | auth: deleting token SItcEqsRGqhrKhDI.886 for user conductor
2021-10-31 01:58:31.566954 I | auth: deleting token lFMOxjEVHhdvmHkK.887 for user conductor
2021-10-31 01:58:32.410912 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.20050143s) to execute
2021-10-31 01:58:32.410994 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.198623182s) to execute
2021-10-31 01:58:32.411116 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (506.038727ms) to execute
2021-10-31 01:58:33.705006 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.165430616s) to execute
2021-10-31 01:58:34.704889 I | auth: deleting token fVrIJHeqYDEAtECz.889 for user conductor
2021-10-31 01:58:34.704940 I | auth: deleting token BsSomHODLTcgPael.888 for user conductor
2021-10-31 01:58:35.504875 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:35.566817 I | auth: deleting token yduGzWXUPHCEQCZj.890 for user conductor
2021-10-31 01:58:35.566863 I | auth: deleting token bhpzlLWjwusBZHoe.891 for user conductor
2021-10-31 01:58:36.107753 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.369319893s) to execute
2021-10-31 01:58:36.108159 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.400472064s) to execute
2021-10-31 01:58:36.566870 I | auth: deleting token tojxjzVzMAYxcgsM.892 for user conductor
2021-10-31 01:58:37.407454 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.202271522s) to execute
2021-10-31 01:58:37.407543 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.167776962s) to execute
2021-10-31 01:58:38.609389 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.198684648s) to execute
2021-10-31 01:58:39.566818 I | auth: deleting token DHwBDylgwtIKJhMK.894 for user conductor
2021-10-31 01:58:39.566861 I | auth: deleting token PeSwgGWTwSyZLxcr.895 for user conductor
2021-10-31 01:58:39.566880 I | auth: deleting token FhixwcPaklYqSrik.896 for user conductor
2021-10-31 01:58:39.566906 I | auth: deleting token OswMWxDcOKMVaYSC.893 for user conductor
2021-10-31 01:58:40.505113 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:40.604841 I | auth: deleting token ZgQEhpSXUYphgXno.897 for user conductor
2021-10-31 01:58:42.208819 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.504011558s) to execute
2021-10-31 01:58:42.209078 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.597099439s) to execute
2021-10-31 01:58:44.566886 I | auth: deleting token oIjAtXNEcroevKrA.902 for user conductor
2021-10-31 01:58:44.566945 I | auth: deleting token VWiaAoGuQZFxPEcD.898 for user conductor
2021-10-31 01:58:44.566959 I | auth: deleting token ZtcVidCGQMgYaDNW.901 for user conductor
2021-10-31 01:58:44.566964 I | auth: deleting token zRKdnbAVCetVHnQv.900 for user conductor
2021-10-31 01:58:44.566971 I | auth: deleting token hTaEDeJgrQfpLTbW.899 for user conductor
2021-10-31 01:58:45.505349 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:46.604884 I | auth: deleting token KmCQmINagzzqzQBu.905 for user conductor
2021-10-31 01:58:46.604926 I | auth: deleting token DFyyhiMaqqeucClO.903 for user conductor
2021-10-31 01:58:46.604976 I | auth: deleting token UCpArwRyJnxEUiCF.904 for user conductor
2021-10-31 01:58:47.111298 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.506268057s) to execute
2021-10-31 01:58:47.238234 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (124.963203ms) to execute
2021-10-31 01:58:47.238391 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (124.9739ms) to execute
2021-10-31 01:58:47.239725 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (125.964064ms) to execute
2021-10-31 01:58:48.604825 I | auth: deleting token wvsglYmKsFAbmBgf.906 for user conductor
2021-10-31 01:58:49.604837 I | auth: deleting token jyrnPFQipIcacZmE.907 for user conductor
2021-10-31 01:58:49.604906 I | auth: deleting token SaIsjyaUSVwPOqnG.909 for user conductor
2021-10-31 01:58:49.604938 I | auth: deleting token OktaZkSZoAhpQAHH.908 for user conductor
2021-10-31 01:58:50.505581 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:50.566847 I | auth: deleting token zOfRMuAUwMobDIjt.910 for user conductor
2021-10-31 01:58:50.812201 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.397210291s) to execute
2021-10-31 01:58:52.604886 I | auth: deleting token PXyGYzZxvvDHkhwk.912 for user conductor
2021-10-31 01:58:52.604929 I | auth: deleting token qVpQIGwQwliMVVER.911 for user conductor
2021-10-31 01:58:52.604940 I | auth: deleting token lVLrRWkaglrloYJk.913 for user conductor
2021-10-31 01:58:53.411846 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.966878213s) to execute
2021-10-31 01:58:54.566824 I | auth: deleting token dfvexRrhnMUAuLlL.916 for user conductor
2021-10-31 01:58:54.566881 I | auth: deleting token FSTfZyFMiGtkRylu.914 for user conductor
2021-10-31 01:58:54.611924 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.197471233s) to execute
2021-10-31 01:58:54.620381 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.206740849s) to execute
2021-10-31 01:58:55.505844 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:58:56.010563 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.301272005s) to execute
2021-10-31 01:58:57.211013 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.965987249s) to execute
2021-10-31 01:58:57.566847 I | auth: deleting token yfCygNpZWUVBZXQV.917 for user conductor
2021-10-31 01:58:57.566897 I | auth: deleting token wfOYYSDqEbToiwfa.918 for user conductor
2021-10-31 01:58:57.566911 I | auth: deleting token GngwfzwJSgtSxPad.919 for user conductor
2021-10-31 01:58:57.566922 I | auth: deleting token qJZipPjoaQAxPDiL.915 for user conductor
2021-10-31 01:58:57.566936 I | auth: deleting token LdLEPpJzTczNWfVj.920 for user conductor
2021-10-31 01:59:00.506030 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:00.910294 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.69677995s) to execute
2021-10-31 01:59:00.910591 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.697915336s) to execute
2021-10-31 01:59:03.566836 I | auth: deleting token eVDUVIibMuWgCYhK.924 for user conductor
2021-10-31 01:59:03.566874 I | auth: deleting token WTjMDzMvmzrpxclz.925 for user conductor
2021-10-31 01:59:03.566884 I | auth: deleting token sysLKXLLBdwYGiLo.923 for user conductor
2021-10-31 01:59:03.566892 I | auth: deleting token uireTGaljyYqREfs.921 for user conductor
2021-10-31 01:59:03.566901 I | auth: deleting token CgUEDLflLALuutcZ.922 for user conductor
2021-10-31 01:59:04.805012 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.299754052s) to execute
2021-10-31 01:59:05.506304 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:06.566856 I | auth: deleting token PBCznjVioJODHwVr.926 for user conductor
2021-10-31 01:59:06.566920 I | auth: deleting token BCIhoSSzwhHxEOyl.928 for user conductor
2021-10-31 01:59:06.566938 I | auth: deleting token QCGjNRLaKihfnwkM.927 for user conductor
2021-10-31 01:59:07.210196 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.072111051s) to execute
2021-10-31 01:59:07.566891 I | auth: deleting token BKNglJlknjSdZFep.929 for user conductor
2021-10-31 01:59:08.566845 I | auth: deleting token yGjUcZglUdlhyIws.930 for user conductor
2021-10-31 01:59:08.566895 I | auth: deleting token qWGTTzDEbhGLsPhM.931 for user conductor
2021-10-31 01:59:08.706380 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.493637299s) to execute
2021-10-31 01:59:09.566852 I | auth: deleting token VyvarXaPnuawjXbR.932 for user conductor
2021-10-31 01:59:09.812102 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.599722883s) to execute
2021-10-31 01:59:09.812193 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.10300416s) to execute
2021-10-31 01:59:09.812297 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.103103658s) to execute
2021-10-31 01:59:10.506553 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:10.604866 I | auth: deleting token OIMoNGVZfXbqJbwz.933 for user conductor
2021-10-31 01:59:10.604924 I | auth: deleting token ETHwRgggEtloPzgs.934 for user conductor
2021-10-31 01:59:11.107468 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200471834s) to execute
2021-10-31 01:59:11.107675 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.293837229s) to execute
2021-10-31 01:59:11.604830 I | auth: deleting token JjaeeknmkmFVHUdo.935 for user conductor
2021-10-31 01:59:12.407003 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.297577367s) to execute
2021-10-31 01:59:12.407244 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.29568816s) to execute
2021-10-31 01:59:12.566849 I | auth: deleting token LMalNjebIALYancc.936 for user conductor
2021-10-31 01:59:14.566900 I | auth: deleting token vOXLeESqBfsDRCAx.937 for user conductor
2021-10-31 01:59:14.812222 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.402410041s) to execute
2021-10-31 01:59:15.506828 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:15.566882 I | auth: deleting token ejLgITBfhGhIsmco.938 for user conductor
2021-10-31 01:59:17.407473 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.401499766s) to execute
2021-10-31 01:59:17.407685 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.502716134s) to execute
2021-10-31 01:59:17.407764 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.502784449s) to execute
2021-10-31 01:59:17.566809 I | auth: deleting token JXZCzNkLcTGHUIoE.939 for user conductor
2021-10-31 01:59:17.566850 I | auth: deleting token tYWURBbPIHdNFNbt.940 for user conductor
2021-10-31 01:59:19.605084 I | auth: deleting token sWFzjQQucvieRDfq.942 for user conductor
2021-10-31 01:59:19.605131 I | auth: deleting token kFaNOKBrBdBIzsRt.941 for user conductor
2021-10-31 01:59:20.507004 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:20.566890 I | auth: deleting token czZjpsWwZfHHnhAr.944 for user conductor
2021-10-31 01:59:20.566935 I | auth: deleting token NbRcLbIOdTXIRzyh.943 for user conductor
2021-10-31 01:59:22.310904 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.571111765s) to execute
2021-10-31 01:59:22.438353 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (124.892419ms) to execute
2021-10-31 01:59:22.439956 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (126.497536ms) to execute
2021-10-31 01:59:22.440057 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (126.46228ms) to execute
2021-10-31 01:59:22.651635 I | auth: deleting token BjopWwsOOowesivn.946 for user conductor
2021-10-31 01:59:22.651670 I | auth: deleting token ejRuHYjsUEQKDDGa.945 for user conductor
2021-10-31 01:59:23.566819 I | auth: deleting token YonDeqerNFaGoZyH.947 for user conductor
2021-10-31 01:59:23.607346 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (366.809846ms) to execute
2021-10-31 01:59:24.809914 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200117423s) to execute
2021-10-31 01:59:25.038187 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.442977ms) to execute
2021-10-31 01:59:25.507224 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:25.566825 I | auth: deleting token JfxizQBOMLwHhzyI.948 for user conductor
2021-10-31 01:59:25.566867 I | auth: deleting token vlfstbpOZWUWQOVq.949 for user conductor
2021-10-31 01:59:27.511228 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.373048673s) to execute
2021-10-31 01:59:27.566832 I | auth: deleting token ofwViKTemmQYtgHE.951 for user conductor
2021-10-31 01:59:27.566883 I | auth: deleting token FZKebKZKIKRlvTcB.950 for user conductor
2021-10-31 01:59:28.566835 I | auth: deleting token hWYCOqybWhswUynA.952 for user conductor
2021-10-31 01:59:30.106640 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.165960811s) to execute
2021-10-31 01:59:30.507391 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:31.305413 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.196382643s) to execute
2021-10-31 01:59:31.305539 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.197015506s) to execute
2021-10-31 01:59:32.604797 I | auth: deleting token kCNLxwzbYnbPmWFN.953 for user conductor
2021-10-31 01:59:32.604848 I | auth: deleting token IOILIcjOnYczxOXs.956 for user conductor
2021-10-31 01:59:32.604859 I | auth: deleting token cqDJruRqsPrQNaXX.957 for user conductor
2021-10-31 01:59:32.604878 I | auth: deleting token mHXAjXwlUuOtiJDl.954 for user conductor
2021-10-31 01:59:32.604899 I | auth: deleting token ZkFGrZhcyENCQhez.955 for user conductor
2021-10-31 01:59:32.608129 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.203128119s) to execute
2021-10-31 01:59:33.809513 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.168580691s) to execute
2021-10-31 01:59:35.010793 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.199027058s) to execute
2021-10-31 01:59:35.010925 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.199464031s) to execute
2021-10-31 01:59:35.238258 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (131.121478ms) to execute
2021-10-31 01:59:35.507559 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:36.406639 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (968.212312ms) to execute
2021-10-31 01:59:36.604805 I | auth: deleting token eGHKdJElCpXNGoFs.962 for user conductor
2021-10-31 01:59:36.604860 I | auth: deleting token VkqKkKeSZXrTeXKa.960 for user conductor
2021-10-31 01:59:36.604875 I | auth: deleting token ShMsbbuPLSkmSQsO.958 for user conductor
2021-10-31 01:59:37.566837 I | auth: deleting token RXOEoklEoMODUiPg.959 for user conductor
2021-10-31 01:59:37.566917 I | auth: deleting token dFenPwafmZEnFrve.961 for user conductor
2021-10-31 01:59:37.706005 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (864.371272ms) to execute
2021-10-31 01:59:38.566853 I | auth: deleting token khdzommVFpSkZwrk.964 for user conductor
2021-10-31 01:59:38.566915 I | auth: deleting token DrASBzAkLjSwYlVZ.965 for user conductor
2021-10-31 01:59:38.566941 I | auth: deleting token miRPsvLAOmIovPcP.963 for user conductor
2021-10-31 01:59:38.908719 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (666.052226ms) to execute
2021-10-31 01:59:40.507774 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:40.604872 I | auth: deleting token iHByjkJIDdbVsXHG.966 for user conductor
2021-10-31 01:59:40.604919 I | auth: deleting token EDJDxvNWPznthTHL.967 for user conductor
2021-10-31 01:59:41.566853 I | auth: deleting token SbiJJdVUseoSyUWh.970 for user conductor
2021-10-31 01:59:41.566894 I | auth: deleting token ZzIufjfDBvPFIyZz.968 for user conductor
2021-10-31 01:59:41.566902 I | auth: deleting token glAWXLNPGbnbnXYd.969 for user conductor
2021-10-31 01:59:43.411209 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.072901461s) to execute
2021-10-31 01:59:44.566804 I | auth: deleting token oDunpoabDlULbskO.973 for user conductor
2021-10-31 01:59:44.566854 I | auth: deleting token xUqnQXsubwFhKGyz.971 for user conductor
2021-10-31 01:59:44.566870 I | auth: deleting token GMaQdghkDiSzaMRI.974 for user conductor
2021-10-31 01:59:44.566882 I | auth: deleting token zEICdNbymbgtQFDK.972 for user conductor
2021-10-31 01:59:45.507934 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:45.906816 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.868598459s) to execute
2021-10-31 01:59:47.107770 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (102.712144ms) to execute
2021-10-31 01:59:47.566839 I | auth: deleting token oexkaDPeLEtEXyKJ.977 for user conductor
2021-10-31 01:59:47.566894 I | auth: deleting token hhfrlcgPSWpefreT.975 for user conductor
2021-10-31 01:59:47.566905 I | auth: deleting token PJyZetXmnECSbqbi.976 for user conductor
2021-10-31 01:59:48.709792 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (371.686511ms) to execute
2021-10-31 01:59:49.566840 I | auth: deleting token MdVowrWKurkxrcGH.980 for user conductor
2021-10-31 01:59:49.566884 I | auth: deleting token uwJmSAqRjYLJpQxa.978 for user conductor
2021-10-31 01:59:49.566891 I | auth: deleting token WXHLSvAPcHQtxdgX.979 for user conductor
2021-10-31 01:59:49.566901 I | auth: deleting token ZIbLFLzrTXvzFLlB.981 for user conductor
2021-10-31 01:59:50.508145 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:51.566810 I | auth: deleting token mrHBdiiHGgIKJTAf.982 for user conductor
2021-10-31 01:59:53.566877 I | auth: deleting token JXlaBRNCmYGlLkRd.984 for user conductor
2021-10-31 01:59:53.566917 I | auth: deleting token JiFnTGSkSFsLTVww.983 for user conductor
2021-10-31 01:59:54.566868 I | auth: deleting token GZTXHAnvyLdpOkOT.986 for user conductor
2021-10-31 01:59:54.566917 I | auth: deleting token fJwzUibuaywziFNx.985 for user conductor
2021-10-31 01:59:55.508345 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:59:55.566880 I | auth: deleting token xDCXkZBmONLXBKox.987 for user conductor
2021-10-31 01:59:57.566852 I | auth: deleting token YMlPcqyLbeLNiqtq.990 for user conductor
2021-10-31 01:59:57.566899 I | auth: deleting token fhYrUTaLNaFDWkPg.988 for user conductor
2021-10-31 01:59:57.566927 I | auth: deleting token SlXkXojypFyGmLOw.992 for user conductor
2021-10-31 01:59:57.566951 I | auth: deleting token KGTnJFBmPqTWBDNf.991 for user conductor
2021-10-31 01:59:57.566958 I | auth: deleting token fZcmFagtEJIxaSft.989 for user conductor
2021-10-31 01:59:59.306883 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (901.802822ms) to execute
2021-10-31 02:00:00.508553 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:00.609487 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (671.382493ms) to execute
2021-10-31 02:00:01.566832 I | auth: deleting token FEKKxiGngDkyBOYS.993 for user conductor
2021-10-31 02:00:01.566867 I | auth: deleting token xhlzJhEZcjOWiTNa.994 for user conductor
2021-10-31 02:00:01.566878 I | auth: deleting token vDCrcRElbjeSaqUn.996 for user conductor
2021-10-31 02:00:01.566886 I | auth: deleting token hTSkzEmkiRhYQrzF.995 for user conductor
2021-10-31 02:00:03.566826 I | auth: deleting token jvVNPzkNvTuTQyZk.997 for user conductor
2021-10-31 02:00:03.566872 I | auth: deleting token slwbPvzhziBfozwB.998 for user conductor
2021-10-31 02:00:04.566925 I | auth: deleting token uLlSxWTYnuJReMoD.1000 for user conductor
2021-10-31 02:00:04.566964 I | auth: deleting token NDciGWFSMLisYmzW.1001 for user conductor
2021-10-31 02:00:04.566978 I | auth: deleting token tphIijpMHrXDJaOp.999 for user conductor
2021-10-31 02:00:05.508743 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:07.566844 I | auth: deleting token JXwaVzanVDrsvCbZ.1002 for user conductor
2021-10-31 02:00:07.566891 I | auth: deleting token cxgRPjXtJEFuvDJC.1003 for user conductor
2021-10-31 02:00:07.566924 I | auth: deleting token cDuMKMVXgGrlTKAV.1004 for user conductor
2021-10-31 02:00:08.566851 I | auth: deleting token kUxAFtoksmWdIKRC.1005 for user conductor
2021-10-31 02:00:08.566904 I | auth: deleting token fDuFnpLTRhZWwlfJ.1007 for user conductor
2021-10-31 02:00:08.566920 I | auth: deleting token rFInGskInMuzJBDW.1006 for user conductor
2021-10-31 02:00:10.508983 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:11.566847 I | auth: deleting token ZRDULjtOhoKNfbCJ.1011 for user conductor
2021-10-31 02:00:11.566886 I | auth: deleting token EYLZFCAHAeumFvna.1010 for user conductor
2021-10-31 02:00:11.566912 I | auth: deleting token zhafzFxiZkQNcZkC.1009 for user conductor
2021-10-31 02:00:11.566919 I | auth: deleting token jDLIuAQqLbLfkAKr.1008 for user conductor
2021-10-31 02:00:14.566782 I | auth: deleting token jCIuTrMpPNBMbUNB.1012 for user conductor
2021-10-31 02:00:14.566836 I | auth: deleting token HhfoMIXQzAWPzZAU.1013 for user conductor
2021-10-31 02:00:15.509200 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:15.566825 I | auth: deleting token oKebmQTkNNuTVkZa.1016 for user conductor
2021-10-31 02:00:15.566870 I | auth: deleting token xVzEHkoOBLSAnQBA.1014 for user conductor
2021-10-31 02:00:15.566892 I | auth: deleting token brDUGxexnJUbImdS.1015 for user conductor
2021-10-31 02:00:16.566848 I | auth: deleting token RCCXLqcYWimsnkaC.1017 for user conductor
2021-10-31 02:00:19.566857 I | auth: deleting token DJQXXgOMnYluWzrP.1018 for user conductor
2021-10-31 02:00:19.566893 I | auth: deleting token YqqPzMLcllJNiwnr.1019 for user conductor
2021-10-31 02:00:19.566907 I | auth: deleting token irZaCXMAgDiOJRRr.1020 for user conductor
2021-10-31 02:00:19.906227 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.201173767s) to execute
2021-10-31 02:00:20.509466 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:20.604827 I | auth: deleting token euCkWjsrZYrLfHDc.1021 for user conductor
2021-10-31 02:00:22.651616 I | auth: deleting token PHFhtcioimPGIIpa.1022 for user conductor
2021-10-31 02:00:22.651666 I | auth: deleting token BsiZPpeTClQGZEsZ.1023 for user conductor
2021-10-31 02:00:23.515059 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.276676166s) to execute
2021-10-31 02:00:23.566844 I | auth: deleting token AdOGPzNCzwKpjbCa.1024 for user conductor
2021-10-31 02:00:25.604826 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:25.909864 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.204822117s) to execute
2021-10-31 02:00:25.910210 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.305233442s) to execute
2021-10-31 02:00:25.910422 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.305455228s) to execute
2021-10-31 02:00:26.566884 I | auth: deleting token SyCTsfYGAyrSSudP.1026 for user conductor
2021-10-31 02:00:26.566927 I | auth: deleting token CdBUswAUXEIIjhew.1027 for user conductor
2021-10-31 02:00:26.566942 I | auth: deleting token SsjayEoWWtGMWhqz.1025 for user conductor
2021-10-31 02:00:27.604787 I | auth: deleting token aWnnpiGSZMbcKhxL.1028 for user conductor
2021-10-31 02:00:28.413782 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.174158071s) to execute
2021-10-31 02:00:29.706689 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (668.50435ms) to execute
2021-10-31 02:00:30.605053 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:33.566813 I | auth: deleting token CWBCtqVhXNnTpqPv.1032 for user conductor
2021-10-31 02:00:33.566852 I | auth: deleting token oKvNqPqChYgaBQXH.1033 for user conductor
2021-10-31 02:00:33.566866 I | auth: deleting token IFxquunGOgZBAnoY.1030 for user conductor
2021-10-31 02:00:33.566878 I | auth: deleting token ZKRWFXAROIJAvGTl.1031 for user conductor
2021-10-31 02:00:33.566884 I | auth: deleting token RHlQbvIMJtaNcHkZ.1029 for user conductor
2021-10-31 02:00:35.605265 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:36.566839 I | auth: deleting token WBedPSzTCnBpgsBt.1035 for user conductor
2021-10-31 02:00:36.566884 I | auth: deleting token oTTupqqylKpwNnQO.1037 for user conductor
2021-10-31 02:00:37.566885 I | auth: deleting token DNykAtnxeZxxkPnF.1038 for user conductor
2021-10-31 02:00:37.566964 I | auth: deleting token SgeJAUWjrfqRnkwr.1034 for user conductor
2021-10-31 02:00:37.566990 I | auth: deleting token WdrlPYxnkzbCTQNa.1036 for user conductor
2021-10-31 02:00:40.566866 I | auth: deleting token xanZmjxXeectqbxc.1042 for user conductor
2021-10-31 02:00:40.566916 I | auth: deleting token WQxdVSTukRoduyqo.1040 for user conductor
2021-10-31 02:00:40.605505 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:41.566840 I | auth: deleting token JkshiXLGWpymRQzE.1039 for user conductor
2021-10-31 02:00:41.566895 I | auth: deleting token XmsWWavUSDGneVvk.1043 for user conductor
2021-10-31 02:00:41.566907 I | auth: deleting token vEkZyUEzCndypAXT.1041 for user conductor
2021-10-31 02:00:42.566845 I | auth: deleting token RnDGeSbWqpIOLoNl.1044 for user conductor
2021-10-31 02:00:43.566847 I | auth: deleting token BkiVmojQQXNboUdW.1046 for user conductor
2021-10-31 02:00:44.566839 I | auth: deleting token ZglcQlZtYZpdjUqs.1045 for user conductor
2021-10-31 02:00:44.566902 I | auth: deleting token rbyrAGtrEixPSLWG.1047 for user conductor
2021-10-31 02:00:44.605044 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (564.691687ms) to execute
2021-10-31 02:00:45.605901 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:45.811905 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.204376836s) to execute
2021-10-31 02:00:46.604839 I | auth: deleting token iCnIgWCxcRmFRARD.1050 for user conductor
2021-10-31 02:00:46.604890 I | auth: deleting token WStuQOCZghkBoLYz.1048 for user conductor
2021-10-31 02:00:46.604904 I | auth: deleting token CwfMnODOWWpWOwDh.1049 for user conductor
2021-10-31 02:00:47.010197 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.004392091s) to execute
2021-10-31 02:00:48.309280 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.404308104s) to execute
2021-10-31 02:00:48.309315 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.201902711s) to execute
2021-10-31 02:00:48.309411 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.297590876s) to execute
2021-10-31 02:00:48.538334 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (133.301549ms) to execute
2021-10-31 02:00:49.705555 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.298865431s) to execute
2021-10-31 02:00:50.566851 I | auth: deleting token KqyxjQHLjWthbkgD.1051 for user conductor
2021-10-31 02:00:50.566916 I | auth: deleting token eBQpczGMeKKQuwaJ.1054 for user conductor
2021-10-31 02:00:50.606088 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:50.912701 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.006127635s) to execute
2021-10-31 02:00:51.566812 I | auth: deleting token uYriaKyZvzEdRYSx.1053 for user conductor
2021-10-31 02:00:51.566857 I | auth: deleting token QxCWMPDXGNACkrFU.1055 for user conductor
2021-10-31 02:00:51.566868 I | auth: deleting token DehZtpwXZLeyzCFK.1052 for user conductor
2021-10-31 02:00:51.566874 I | auth: deleting token PZqiihnMteiJLWuT.1056 for user conductor
2021-10-31 02:00:52.111395 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.171284162s) to execute
2021-10-31 02:00:52.566915 I | auth: deleting token PJIvcqsAorcSSetO.1057 for user conductor
2021-10-31 02:00:53.408399 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.296894909s) to execute
2021-10-31 02:00:53.408613 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.293811801s) to execute
2021-10-31 02:00:53.408638 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.49354798s) to execute
2021-10-31 02:00:54.604882 I | auth: deleting token UkduVAwJpUaJNCsf.1060 for user conductor
2021-10-31 02:00:54.604955 I | auth: deleting token fPCwQuQcSrEGheiu.1059 for user conductor
2021-10-31 02:00:54.604974 I | auth: deleting token iLfdOYxOxflGEiYM.1058 for user conductor
2021-10-31 02:00:55.606274 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:00:56.566854 I | auth: deleting token GgJJUfuViGiSzuch.1063 for user conductor
2021-10-31 02:00:56.566890 I | auth: deleting token vWwZlNvyjqBsfqwM.1061 for user conductor
2021-10-31 02:00:57.604868 I | auth: deleting token KIsgPBRGjymqalvI.1064 for user conductor
2021-10-31 02:00:57.604922 I | auth: deleting token sJfSUFvWZgswaLex.1062 for user conductor
2021-10-31 02:00:58.305292 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.590487726s) to execute
2021-10-31 02:00:58.566821 I | auth: deleting token EqwjpQuShJCMZtaj.1066 for user conductor
2021-10-31 02:00:58.566883 I | auth: deleting token yMFlwGcmkeYxMJBM.1065 for user conductor
2021-10-31 02:00:59.604885 I | auth: deleting token vEfhDsctcTkoIfJX.1067 for user conductor
2021-10-31 02:01:00.606536 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:00.810358 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.005473868s) to execute
2021-10-31 02:01:01.566846 I | auth: deleting token qVsHLhtPALVqqJfm.1069 for user conductor
2021-10-31 02:01:01.566891 I | auth: deleting token ghJjITuBCdKblrSg.1068 for user conductor
2021-10-31 02:01:02.108918 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.067612712s) to execute
2021-10-31 02:01:02.338253 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.564711ms) to execute
2021-10-31 02:01:02.566850 I | auth: deleting token skdwzsOxGogvyHDv.1070 for user conductor
2021-10-31 02:01:02.566915 I | auth: deleting token MWBEkiwPeKshQhrz.1071 for user conductor
2021-10-31 02:01:04.566856 I | auth: deleting token ylAFBiqUveotfMiM.1072 for user conductor
2021-10-31 02:01:04.606672 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.168357439s) to execute
2021-10-31 02:01:05.606776 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:05.910552 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (667.315518ms) to execute
2021-10-31 02:01:07.206206 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200580838s) to execute
2021-10-31 02:01:09.566816 I | auth: deleting token RPhBGvLZxewTycKf.1073 for user conductor
2021-10-31 02:01:09.566854 I | auth: deleting token StwzEuJtngxlbCdl.1074 for user conductor
2021-10-31 02:01:09.566872 I | auth: deleting token QYHJJKuCDZILkvtd.1075 for user conductor
2021-10-31 02:01:09.566880 I | auth: deleting token jUWQRiGMoNJNMned.1076 for user conductor
2021-10-31 02:01:09.566895 I | auth: deleting token PaCdAsAhIVctyJdS.1077 for user conductor
2021-10-31 02:01:09.708565 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.401658405s) to execute
2021-10-31 02:01:09.708937 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.50116313s) to execute
2021-10-31 02:01:10.607029 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:12.207757 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.497433671s) to execute
2021-10-31 02:01:12.207879 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.497869358s) to execute
2021-10-31 02:01:12.208026 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.40049843s) to execute
2021-10-31 02:01:12.208237 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.102491579s) to execute
2021-10-31 02:01:14.566873 I | auth: deleting token OMiryYOZxsMZZjSS.1082 for user conductor
2021-10-31 02:01:14.566921 I | auth: deleting token PgNjRHKNNSKxDpeN.1079 for user conductor
2021-10-31 02:01:15.607292 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:16.566856 I | auth: deleting token MVSbCICgqfFDEAmN.1084 for user conductor
2021-10-31 02:01:16.566896 I | auth: deleting token MLbonefucijtteSP.1081 for user conductor
2021-10-31 02:01:16.566904 I | auth: deleting token ZYEQyOBaNDBnsmXd.1083 for user conductor
2021-10-31 02:01:16.566917 I | auth: deleting token TBwMPPxpcGzJrAeU.1080 for user conductor
2021-10-31 02:01:16.566928 I | auth: deleting token SKMyUXpddpRSJDVh.1078 for user conductor
2021-10-31 02:01:17.013384 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.502276037s) to execute
2021-10-31 02:01:17.604854 I | auth: deleting token snnQgGnoaQfKdGhn.1085 for user conductor
2021-10-31 02:01:18.212125 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.104788073s) to execute
2021-10-31 02:01:18.212279 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.106933643s) to execute
2021-10-31 02:01:18.212372 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.106942525s) to execute
2021-10-31 02:01:18.307050 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.20008255s) to execute
2021-10-31 02:01:18.566858 I | auth: deleting token jwqjuQNAHAIcQZff.1086 for user conductor
2021-10-31 02:01:18.566913 I | auth: deleting token qMbqZsomolaYrlRs.1087 for user conductor
2021-10-31 02:01:19.566829 I | auth: deleting token TydQcOUpDvOygMka.1088 for user conductor
2021-10-31 02:01:20.566898 I | auth: deleting token YvTGKqAZpQkHNdMb.1089 for user conductor
2021-10-31 02:01:20.607604 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:21.910638 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.272425888s) to execute
2021-10-31 02:01:22.138378 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (225.452059ms) to execute
2021-10-31 02:01:22.139610 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (226.676354ms) to execute
2021-10-31 02:01:22.566871 I | auth: deleting token MuAiLbEwnhLwDggw.1091 for user conductor
2021-10-31 02:01:22.566933 I | auth: deleting token ykHriEHnlGZdySmb.1090 for user conductor
2021-10-31 02:01:23.566833 I | auth: deleting token MkchRQLMHjsORHDE.1092 for user conductor
2021-10-31 02:01:23.566877 I | auth: deleting token BzffTedJQWtYvdoy.1093 for user conductor
2021-10-31 02:01:25.566907 I | auth: deleting token UPfOAMdHiffSAnkt.1094 for user conductor
2021-10-31 02:01:25.566952 I | auth: deleting token EFXKxkzhdkFFXnwP.1095 for user conductor
2021-10-31 02:01:25.607811 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:26.006265 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.499614268s) to execute
2021-10-31 02:01:26.566822 I | auth: deleting token YoQsfFKhhsKOucRe.1096 for user conductor
2021-10-31 02:01:27.313712 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (206.946947ms) to execute
2021-10-31 02:01:27.566856 I | auth: deleting token vmbehdRiTjwEBdpW.1097 for user conductor
2021-10-31 02:01:28.514428 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.076249984s) to execute
2021-10-31 02:01:28.566818 I | auth: deleting token IzURUZpgOBqJZOkV.1098 for user conductor
2021-10-31 02:01:28.638464 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (121.868596ms) to execute
2021-10-31 02:01:30.608030 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:31.604802 I | auth: deleting token vvgYoNnJOQdJKGKl.1099 for user conductor
2021-10-31 02:01:31.604855 I | auth: deleting token DlZcxGcGohRkIaII.1100 for user conductor
2021-10-31 02:01:31.604863 I | auth: deleting token kDKUMveygxUoOMrJ.1101 for user conductor
2021-10-31 02:01:32.210933 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (872.188112ms) to execute
2021-10-31 02:01:33.410906 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.104395485s) to execute
2021-10-31 02:01:33.538253 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (125.302806ms) to execute
2021-10-31 02:01:33.566860 I | auth: deleting token czloGejYRcLCmCrk.1104 for user conductor
2021-10-31 02:01:33.566892 I | auth: deleting token CKAGYAVIvhEsrhWG.1102 for user conductor
2021-10-31 02:01:34.604832 I | auth: deleting token kACViSjgsRLRnkws.1105 for user conductor
2021-10-31 02:01:34.604870 I | auth: deleting token DXPhuQqzEWGAZlgx.1103 for user conductor
2021-10-31 02:01:35.566836 I | auth: deleting token zEPkvyZCSjzHuVuf.1106 for user conductor
2021-10-31 02:01:35.566875 I | auth: deleting token cbqzBkxSoTxJiAUa.1107 for user conductor
2021-10-31 02:01:35.608231 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:35.910737 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.668235461s) to execute
2021-10-31 02:01:36.566870 I | auth: deleting token MKoXZWavIfFGXDTq.1108 for user conductor
2021-10-31 02:01:37.111120 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200233766s) to execute
2021-10-31 02:01:38.311791 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.106549062s) to execute
2021-10-31 02:01:38.312535 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.307546571s) to execute
2021-10-31 02:01:38.406306 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.201143006s) to execute
2021-10-31 02:01:38.539329 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (134.300434ms) to execute
2021-10-31 02:01:39.566798 I | auth: deleting token fpkmlFthggOsEjuo.1109 for user conductor
2021-10-31 02:01:39.566847 I | auth: deleting token fRnppbfvgNmIDHMA.1113 for user conductor
2021-10-31 02:01:39.566866 I | auth: deleting token vIeWsxQSSAXSYjyp.1112 for user conductor
2021-10-31 02:01:39.566878 I | auth: deleting token DXGjPfGxwLGMUIMp.1111 for user conductor
2021-10-31 02:01:39.566883 I | auth: deleting token IgSBkbcDdhdVujco.1110 for user conductor
2021-10-31 02:01:39.707002 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.266919639s) to execute
2021-10-31 02:01:40.608401 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:41.566808 I | auth: deleting token iJwquAjvMrFlVjEh.1115 for user conductor
2021-10-31 02:01:41.566941 I | auth: deleting token VUkcWzPQGNoucEBc.1114 for user conductor
2021-10-31 02:01:42.215168 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.505679025s) to execute
2021-10-31 02:01:42.566835 I | auth: deleting token EMDikTMpReFhKVWD.1116 for user conductor
2021-10-31 02:01:43.414234 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.196773053s) to execute
2021-10-31 02:01:43.604812 I | auth: deleting token MJEuCLBqXKykvPGJ.1117 for user conductor
2021-10-31 02:01:44.610507 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.393301408s) to execute
2021-10-31 02:01:44.620158 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.313969986s) to execute
2021-10-31 02:01:44.620323 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.115355462s) to execute
2021-10-31 02:01:44.620408 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.11541349s) to execute
2021-10-31 02:01:45.566804 I | auth: deleting token HSfobyGWCUbDzBen.1118 for user conductor
2021-10-31 02:01:45.608558 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:46.604822 I | auth: deleting token fmTifHRmplwcbFDD.1119 for user conductor
2021-10-31 02:01:48.309058 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.203896538s) to execute
2021-10-31 02:01:49.416128 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.104937146s) to execute
2021-10-31 02:01:49.416306 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.076419121s) to execute
2021-10-31 02:01:49.416381 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.104620807s) to execute
2021-10-31 02:01:50.608750 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:50.707737 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.166467754s) to execute
2021-10-31 02:01:51.566851 I | auth: deleting token DxGoKUnUQGQJvDlD.1121 for user conductor
2021-10-31 02:01:51.566966 I | auth: deleting token aGCevisLEYKCLdUR.1120 for user conductor
2021-10-31 02:01:51.566998 I | auth: deleting token OZJojdemmpSxBbgp.1125 for user conductor
2021-10-31 02:01:51.567022 I | auth: deleting token RVjfriWyrWmBGEOV.1122 for user conductor
2021-10-31 02:01:51.567044 I | auth: deleting token xoxNrXLsUVRjsaWo.1124 for user conductor
2021-10-31 02:01:51.567075 I | auth: deleting token NPDTJOemPRENSSRu.1123 for user conductor
2021-10-31 02:01:51.908161 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.070033208s) to execute
2021-10-31 02:01:53.110649 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.199734192s) to execute
2021-10-31 02:01:53.110836 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.200105443s) to execute
2021-10-31 02:01:53.566851 I | auth: deleting token WqKoGifRnrrgUTVi.1127 for user conductor
2021-10-31 02:01:53.566985 I | auth: deleting token FhJcPBcBxADwdqwP.1126 for user conductor
2021-10-31 02:01:54.320166 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.20768301s) to execute
2021-10-31 02:01:54.320388 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.015575137s) to execute
2021-10-31 02:01:54.566848 I | auth: deleting token oLPWwPZBWKrMxQAe.1129 for user conductor
2021-10-31 02:01:54.566889 I | auth: deleting token PFmNzSisvUOXcnAO.1128 for user conductor
2021-10-31 02:01:55.608906 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:01:56.566837 I | auth: deleting token EeIWkaNLjLUivEcb.1130 for user conductor
2021-10-31 02:01:57.566862 I | auth: deleting token UmUDOKPgimMqCAhj.1132 for user conductor
2021-10-31 02:01:57.566901 I | auth: deleting token rlbMjBrIfypQprdA.1131 for user conductor
2021-10-31 02:01:57.815771 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (408.918912ms) to execute
2021-10-31 02:01:59.566874 I | auth: deleting token RRJezlumrfjDkbPs.1133 for user conductor
2021-10-31 02:02:00.609099 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:01.566845 I | auth: deleting token rKQELddOHthhGCdK.1135 for user conductor
2021-10-31 02:02:02.566896 I | auth: deleting token GERkRGEHfUyXicZf.1134 for user conductor
2021-10-31 02:02:03.566782 I | auth: deleting token YJofzyTgOKDvVSZT.1138 for user conductor
2021-10-31 02:02:03.566825 I | auth: deleting token WnzbhoZdPBRrsjhI.1137 for user conductor
2021-10-31 02:02:03.566844 I | auth: deleting token XclKVBcNJVLfsfVD.1136 for user conductor
2021-10-31 02:02:05.566782 I | auth: deleting token RdoGmHrcveraykWd.1141 for user conductor
2021-10-31 02:02:05.566835 I | auth: deleting token qEmaqHRYJGnPbCAo.1139 for user conductor
2021-10-31 02:02:05.609290 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:06.113342 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (675.147304ms) to execute
2021-10-31 02:02:06.604807 I | auth: deleting token qxBAIzFgByvrugNz.1140 for user conductor
2021-10-31 02:02:07.310885 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.171136634s) to execute
2021-10-31 02:02:07.438269 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (125.22949ms) to execute
2021-10-31 02:02:07.566858 I | auth: deleting token GkRkMdjRWmsZmCCu.1142 for user conductor
2021-10-31 02:02:07.566904 I | auth: deleting token OjGlvkMcQUVxcNmd.1144 for user conductor
2021-10-31 02:02:07.566921 I | auth: deleting token qWFRKvQJtPBKKBQE.1143 for user conductor
2021-10-31 02:02:08.566812 I | auth: deleting token EirQcekrEfQzeSfk.1145 for user conductor
2021-10-31 02:02:09.807452 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.269186687s) to execute
2021-10-31 02:02:10.038154 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (229.151853ms) to execute
2021-10-31 02:02:10.205895 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (364.879879ms) to execute
2021-10-31 02:02:10.566874 I | auth: deleting token qClYLaKsonOSoVZL.1146 for user conductor
2021-10-31 02:02:10.609464 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:12.566850 I | auth: deleting token cHTGRHgAPLbhaSsC.1147 for user conductor
2021-10-31 02:02:13.566895 I | auth: deleting token IRQMUtPGKJtXWGRZ.1148 for user conductor
2021-10-31 02:02:14.566833 I | auth: deleting token EuaJbNArbzBiyEsm.1149 for user conductor
2021-10-31 02:02:15.105052 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (761.554951ms) to execute
2021-10-31 02:02:15.609650 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:16.207038 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (969.028683ms) to execute
2021-10-31 02:02:16.566858 I | auth: deleting token QtWopAWbGHNfZvMY.1150 for user conductor
2021-10-31 02:02:17.566846 I | auth: deleting token uyLKrPnYEYFluqOz.1151 for user conductor
2021-10-31 02:02:18.608128 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.270022797s) to execute
2021-10-31 02:02:19.651626 I | auth: deleting token rwmMKJhjKNkzAWEG.1152 for user conductor
2021-10-31 02:02:20.604854 I | auth: deleting token PqhCXsDsGYJilvKV.1153 for user conductor
2021-10-31 02:02:20.609885 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:22.566874 I | auth: deleting token OoYzETlUicpXEARs.1154 for user conductor
2021-10-31 02:02:23.506793 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.600886845s) to execute
2021-10-31 02:02:24.604838 I | auth: deleting token syQcsdbVmvtxHYWJ.1155 for user conductor
2021-10-31 02:02:25.604805 I | auth: deleting token vTwRxrQkXVBmecRk.1157 for user conductor
2021-10-31 02:02:25.604936 I | auth: deleting token aMjreZQAjqeFdygN.1156 for user conductor
2021-10-31 02:02:25.609988 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:26.566875 I | auth: deleting token WabkDNvENsGzeWMM.1158 for user conductor
2021-10-31 02:02:27.206796 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.26858807s) to execute
2021-10-31 02:02:28.410265 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.201172234s) to execute
2021-10-31 02:02:28.410644 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.20240374s) to execute
2021-10-31 02:02:28.410795 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.202561112s) to execute
2021-10-31 02:02:28.566844 I | auth: deleting token YeGjmRXreEWGIGJa.1159 for user conductor
2021-10-31 02:02:29.566821 I | auth: deleting token DfxBQDZaEDkQClll.1161 for user conductor
2021-10-31 02:02:29.566871 I | auth: deleting token qDCeMDnyYRRMGYsZ.1162 for user conductor
2021-10-31 02:02:29.566891 I | auth: deleting token WODvXSxhjTkHUZFQ.1160 for user conductor
2021-10-31 02:02:29.566905 I | auth: deleting token UxqAZlOxfEEnWFEO.1163 for user conductor
2021-10-31 02:02:30.610184 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:31.005995 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.16252614s) to execute
2021-10-31 02:02:31.338506 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (104.212185ms) to execute
2021-10-31 02:02:32.566829 I | auth: deleting token eJEYULNJAsKNkweH.1164 for user conductor
2021-10-31 02:02:34.415917 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (377.773ms) to execute
2021-10-31 02:02:35.610368 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:36.038472 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (233.50537ms) to execute
2021-10-31 02:02:36.604848 I | auth: deleting token dOAsfzwVwGoPpGKm.1165 for user conductor
2021-10-31 02:02:36.604899 I | auth: deleting token rzzSLyIJTUHZYhRf.1166 for user conductor
2021-10-31 02:02:36.604910 I | auth: deleting token ZiBrdSSIakfBysmN.1167 for user conductor
2021-10-31 02:02:36.604918 I | auth: deleting token jhvHHdgSaDsFRDuY.1168 for user conductor
2021-10-31 02:02:36.604927 I | auth: deleting token xnTjQqzTqkPsqgJf.1169 for user conductor
2021-10-31 02:02:37.113204 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (274.792409ms) to execute
2021-10-31 02:02:37.566864 I | auth: deleting token DWvUueAtGJzLjCLT.1170 for user conductor
2021-10-31 02:02:37.566918 I | auth: deleting token GlNuZgpUVMKZvqSY.1171 for user conductor
2021-10-31 02:02:39.566844 I | auth: deleting token fTRgtvQrscwUjlSC.1172 for user conductor
2021-10-31 02:02:40.604846 I | auth: deleting token mHJJgQKICAtzAZEG.1173 for user conductor
2021-10-31 02:02:40.604906 I | auth: deleting token GuxJpkMJSCFdlCSx.1174 for user conductor
2021-10-31 02:02:40.610588 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:42.604894 I | auth: deleting token SpTlimkpjHpigbsY.1175 for user conductor
2021-10-31 02:02:42.604934 I | auth: deleting token OFeDBSFBswbHYFav.1176 for user conductor
2021-10-31 02:02:43.211241 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.270976279s) to execute
2021-10-31 02:02:43.538019 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (325.312802ms) to execute
2021-10-31 02:02:43.539569 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (234.443652ms) to execute
2021-10-31 02:02:44.604852 I | auth: deleting token JIBfkQUlGNKJifTC.1177 for user conductor
2021-10-31 02:02:44.604911 I | auth: deleting token AiNwFwLQCLkoSOtF.1178 for user conductor
2021-10-31 02:02:45.566908 I | auth: deleting token OtaoKZmzevkmEANY.1179 for user conductor
2021-10-31 02:02:45.610781 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:46.566846 I | auth: deleting token rEfGtHoRGfpCxZYF.1180 for user conductor
2021-10-31 02:02:46.566901 I | auth: deleting token dcwzoMSUmUUwyfTE.1181 for user conductor
2021-10-31 02:02:47.104932 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.799866952s) to execute
2021-10-31 02:02:48.216067 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.108631292s) to execute
2021-10-31 02:02:48.216237 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.109798673s) to execute
2021-10-31 02:02:48.216317 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.109901784s) to execute
2021-10-31 02:02:48.566866 I | auth: deleting token XcnRcxhcGRQAhsFg.1182 for user conductor
2021-10-31 02:02:48.640351 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (413.0913ms) to execute
2021-10-31 02:02:49.566808 I | auth: deleting token JUNxeLeYwPBlZDCL.1183 for user conductor
2021-10-31 02:02:49.804907 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (697.976876ms) to execute
2021-10-31 02:02:50.610993 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:52.566811 I | auth: deleting token BiSEcBeXxfhCCBxL.1184 for user conductor
2021-10-31 02:02:52.566847 I | auth: deleting token xECoykKeKDHuhgFg.1187 for user conductor
2021-10-31 02:02:52.566854 I | auth: deleting token tFuUjlnAIVfEPHMt.1186 for user conductor
2021-10-31 02:02:52.566868 I | auth: deleting token FTvHUiWpFWwcjnzy.1185 for user conductor
2021-10-31 02:02:53.309776 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.171660522s) to execute
2021-10-31 02:02:53.438490 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (126.641752ms) to execute
2021-10-31 02:02:53.604874 I | auth: deleting token xGiZUIBpIUgvxYUy.1188 for user conductor
2021-10-31 02:02:53.604961 I | auth: deleting token AbYpKTUGkjtEUOBn.1189 for user conductor
2021-10-31 02:02:55.611215 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:02:56.566841 I | auth: deleting token VrCdMZkeNjOmOkBb.1190 for user conductor
2021-10-31 02:02:57.205761 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.495813223s) to execute
2021-10-31 02:02:57.604810 I | auth: deleting token GiuqrdJfdpLrwQTb.1191 for user conductor
2021-10-31 02:02:57.604854 I | auth: deleting token aNYnIubtpEfvNMln.1192 for user conductor
2021-10-31 02:02:58.406942 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.167198207s) to execute
2021-10-31 02:02:58.407138 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.200016111s) to execute
2021-10-31 02:02:58.407280 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.200151287s) to execute
2021-10-31 02:02:58.540072 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (131.240404ms) to execute
2021-10-31 02:02:58.566855 I | auth: deleting token mbCHWMnkHzaHQLFZ.1194 for user conductor
2021-10-31 02:02:58.566894 I | auth: deleting token XYvoAElfLVuePTOa.1195 for user conductor
2021-10-31 02:02:58.566906 I | auth: deleting token LQnrVSpBWBWexchR.1193 for user conductor
2021-10-31 02:02:59.708200 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.165760903s) to execute
2021-10-31 02:03:00.704863 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:00.908301 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.1031692s) to execute
2021-10-31 02:03:01.566826 I | auth: deleting token dxBQXmMeQplxeHcY.1199 for user conductor
2021-10-31 02:03:01.566870 I | auth: deleting token KmsdhgpOoqbMPHho.1196 for user conductor
2021-10-31 02:03:01.566881 I | auth: deleting token HjyrngKLULgmEKYf.1197 for user conductor
2021-10-31 02:03:01.566888 I | auth: deleting token knZMXmckQhvTEzds.1198 for user conductor
2021-10-31 02:03:02.107935 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.191597911s) to execute
2021-10-31 02:03:02.205029 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.294970492s) to execute
2021-10-31 02:03:02.219293 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (109.920481ms) to execute
2021-10-31 02:03:03.566867 I | auth: deleting token zbascwVdBYgGlpoD.1200 for user conductor
2021-10-31 02:03:03.566915 I | auth: deleting token ulKKlwiSPXynILjp.1201 for user conductor
2021-10-31 02:03:03.566934 I | auth: deleting token InTgxmqYyiWeGoqe.1203 for user conductor
2021-10-31 02:03:03.566958 I | auth: deleting token PYoJWODKNEamxLuT.1202 for user conductor
2021-10-31 02:03:04.509105 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.301871318s) to execute
2021-10-31 02:03:05.566825 I | auth: deleting token LxZYzPvsPVcGlHWb.1204 for user conductor
2021-10-31 02:03:05.566865 I | auth: deleting token PMBjXcuRCaLhOCDG.1205 for user conductor
2021-10-31 02:03:05.705103 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:05.805498 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.300378116s) to execute
2021-10-31 02:03:06.566840 I | auth: deleting token hKFVyKxjoPJoubgL.1206 for user conductor
2021-10-31 02:03:07.011508 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.171587087s) to execute
2021-10-31 02:03:07.011637 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.204195314s) to execute
2021-10-31 02:03:07.011772 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.204614604s) to execute
2021-10-31 02:03:07.604851 I | auth: deleting token QsyjUHGJNBYCUJcO.1207 for user conductor
2021-10-31 02:03:09.566895 I | auth: deleting token mzaQRVgTogsAedTA.1209 for user conductor
2021-10-31 02:03:09.566941 I | auth: deleting token GGjxBxwOewbOqTdV.1208 for user conductor
2021-10-31 02:03:10.705303 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:11.566795 I | auth: deleting token cRJwcTEfVISIgSIC.1210 for user conductor
2021-10-31 02:03:11.566879 I | auth: deleting token bltGWCFWkcPyFNcd.1211 for user conductor
2021-10-31 02:03:12.566834 I | auth: deleting token qXsYgwotldeMiEhZ.1212 for user conductor
2021-10-31 02:03:13.566876 I | auth: deleting token DKhltilVmAtavTFA.1214 for user conductor
2021-10-31 02:03:13.566948 I | auth: deleting token xTdlWpVGYmZkNhxU.1213 for user conductor
2021-10-31 02:03:15.305513 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.298028185s) to execute
2021-10-31 02:03:15.566829 I | auth: deleting token ifOMPbVcOjtmzcQI.1215 for user conductor
2021-10-31 02:03:15.566886 I | auth: deleting token BRfBKRflYqmxQguQ.1216 for user conductor
2021-10-31 02:03:15.705540 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:16.508633 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (665.855117ms) to execute
2021-10-31 02:03:16.566867 I | auth: deleting token CcRVkviwwypUSknn.1218 for user conductor
2021-10-31 02:03:16.566910 I | auth: deleting token QuKpWLPsMYYpXmtz.1217 for user conductor
2021-10-31 02:03:17.566822 I | auth: deleting token mhqYQgoRUXdQljbB.1219 for user conductor
2021-10-31 02:03:17.712120 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.172037364s) to execute
2021-10-31 02:03:18.906039 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.191932591s) to execute
2021-10-31 02:03:18.906095 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.066870554s) to execute
2021-10-31 02:03:19.566842 I | auth: deleting token QoXVWIDKLpbJfVCw.1220 for user conductor
2021-10-31 02:03:19.566883 I | auth: deleting token BRkJlTlNEDeakcaj.1221 for user conductor
2021-10-31 02:03:20.566909 I | auth: deleting token SqUgodHNtVaiASSl.1223 for user conductor
2021-10-31 02:03:20.566990 I | auth: deleting token SqKHlfYDemkgEUzp.1222 for user conductor
2021-10-31 02:03:20.705758 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:22.011874 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (206.859052ms) to execute
2021-10-31 02:03:23.566863 I | auth: deleting token ugDSxzxfGLpRsYFl.1224 for user conductor
2021-10-31 02:03:23.566948 I | auth: deleting token LiNPNZDjwKLvtxBU.1225 for user conductor
2021-10-31 02:03:24.566839 I | auth: deleting token rQkpbVTpvGtcThin.1226 for user conductor
2021-10-31 02:03:24.610634 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.467838118s) to execute
2021-10-31 02:03:25.566848 I | auth: deleting token DBUVhjclcMXNgsMR.1228 for user conductor
2021-10-31 02:03:25.566885 I | auth: deleting token DeUnlSKcqNXHGsib.1229 for user conductor
2021-10-31 02:03:25.566904 I | auth: deleting token sSmUTvEJVZAXHxom.1227 for user conductor
2021-10-31 02:03:25.705946 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:25.906362 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.268168564s) to execute
2021-10-31 02:03:25.906583 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.29342242s) to execute
2021-10-31 02:03:26.566836 I | auth: deleting token GflaawOLUKCLSolm.1230 for user conductor
2021-10-31 02:03:27.604858 I | auth: deleting token PfJjkJZsoiMdtNuv.1232 for user conductor
2021-10-31 02:03:27.604928 I | auth: deleting token XLzbnbZdiBQDVKtU.1231 for user conductor
2021-10-31 02:03:28.212944 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.303592904s) to execute
2021-10-31 02:03:28.213246 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.304719654s) to execute
2021-10-31 02:03:29.505259 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.198277944s) to execute
2021-10-31 02:03:29.505390 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.200272035s) to execute
2021-10-31 02:03:29.505481 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.200321421s) to execute
2021-10-31 02:03:29.566884 I | auth: deleting token yYbnUSNefuvbBVxa.1233 for user conductor
2021-10-31 02:03:30.706203 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:31.566832 I | auth: deleting token kZNxOoxYjGjbaGyM.1234 for user conductor
2021-10-31 02:03:31.566887 I | auth: deleting token lnvMZWTIQomsTnHv.1236 for user conductor
2021-10-31 02:03:31.566902 I | auth: deleting token MxTsQdzlWiJKmJkc.1235 for user conductor
2021-10-31 02:03:31.911823 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.369994832s) to execute
2021-10-31 02:03:32.604908 I | auth: deleting token HoOZFEqjulfLBSjY.1237 for user conductor
2021-10-31 02:03:33.106282 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.30059998s) to execute
2021-10-31 02:03:34.406196 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (601.253453ms) to execute
2021-10-31 02:03:34.566870 I | auth: deleting token JINUWcthrFtQGqBU.1239 for user conductor
2021-10-31 02:03:35.605362 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.196849725s) to execute
2021-10-31 02:03:35.706452 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:36.566812 I | auth: deleting token SqXaXSKoPpRyfQTM.1242 for user conductor
2021-10-31 02:03:36.566853 I | auth: deleting token slIbzXDUfpWFLOnJ.1244 for user conductor
2021-10-31 02:03:36.566864 I | auth: deleting token bVqTnbcLZXSdMGAz.1243 for user conductor
2021-10-31 02:03:36.566874 I | auth: deleting token GxoTjXKwmCsiOkxX.1238 for user conductor
2021-10-31 02:03:36.566882 I | auth: deleting token nTvkELOjHobDrtvs.1240 for user conductor
2021-10-31 02:03:36.566893 I | auth: deleting token abteMXvDYPHgGPmj.1241 for user conductor
2021-10-31 02:03:36.807064 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.199387487s) to execute
2021-10-31 02:03:36.807220 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.200499922s) to execute
2021-10-31 02:03:38.008089 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.199409519s) to execute
2021-10-31 02:03:38.008292 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.196771173s) to execute
2021-10-31 02:03:39.208929 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.070531406s) to execute
2021-10-31 02:03:40.514298 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.304457259s) to execute
2021-10-31 02:03:40.706671 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:41.710817 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.07261333s) to execute
2021-10-31 02:03:41.711010 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.10599299s) to execute
2021-10-31 02:03:41.838336 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.133345589s) to execute
2021-10-31 02:03:42.566799 I | auth: deleting token iVqjGNdZuJhmYvaA.1246 for user conductor
2021-10-31 02:03:42.566844 I | auth: deleting token vuQIrkfPruGlJrGS.1245 for user conductor
2021-10-31 02:03:42.566852 I | auth: deleting token txAGVgXEqpyakUUN.1247 for user conductor
2021-10-31 02:03:42.566868 I | auth: deleting token qjnAMcxPjAToyJUu.1249 for user conductor
2021-10-31 02:03:42.566885 I | auth: deleting token lPrsupKtvKMRlEiU.1248 for user conductor
2021-10-31 02:03:43.110695 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.305593865s) to execute
2021-10-31 02:03:43.110867 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.27104636s) to execute
2021-10-31 02:03:43.238219 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (122.324796ms) to execute
2021-10-31 02:03:45.605511 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.167417965s) to execute
2021-10-31 02:03:45.706849 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:47.566857 I | auth: deleting token VYQcIHpnAnjoqaYD.1255 for user conductor
2021-10-31 02:03:47.566898 I | auth: deleting token nyFrcDbFKHsatjQY.1254 for user conductor
2021-10-31 02:03:47.566912 I | auth: deleting token bZktBnIAHayEeBKH.1250 for user conductor
2021-10-31 02:03:47.566923 I | auth: deleting token CeEIpYFdSYBLwHSM.1251 for user conductor
2021-10-31 02:03:47.566931 I | auth: deleting token qhNowByQjvSaSvJv.1253 for user conductor
2021-10-31 02:03:47.566946 I | auth: deleting token yLqAXZBwxcdLLTqw.1252 for user conductor
2021-10-31 02:03:49.308816 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.396476175s) to execute
2021-10-31 02:03:50.607706 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (202.626463ms) to execute
2021-10-31 02:03:50.707015 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:51.566835 I | auth: deleting token HoaAhjKxBpXJXteT.1259 for user conductor
2021-10-31 02:03:51.566893 I | auth: deleting token ocxNdZFxVLIESgqi.1258 for user conductor
2021-10-31 02:03:51.566910 I | auth: deleting token NDKpAcZmZXmFVJxf.1256 for user conductor
2021-10-31 02:03:51.566920 I | auth: deleting token FLhXqJoeDUqOHhIn.1257 for user conductor
2021-10-31 02:03:51.566928 I | auth: deleting token OhVrpRpliXINXyoN.1260 for user conductor
2021-10-31 02:03:53.566858 I | auth: deleting token TXTrrHfgTQFHwLyZ.1263 for user conductor
2021-10-31 02:03:53.566909 I | auth: deleting token CQtdTMQozLqRDYdp.1261 for user conductor
2021-10-31 02:03:53.706736 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.968446159s) to execute
2021-10-31 02:03:54.907489 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (202.533969ms) to execute
2021-10-31 02:03:55.566868 I | auth: deleting token cNOZZGurrDNVHRXk.1264 for user conductor
2021-10-31 02:03:55.566909 I | auth: deleting token xbReSZgbXdBfbWzF.1265 for user conductor
2021-10-31 02:03:55.566930 I | auth: deleting token XrgrdXIgfwKJWDhC.1262 for user conductor
2021-10-31 02:03:55.707220 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:03:56.311953 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (367.044115ms) to execute
2021-10-31 02:03:57.606419 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (168.435785ms) to execute
2021-10-31 02:03:57.614201 I | auth: deleting token fYLgZleZeoLYygqK.1266 for user conductor
2021-10-31 02:04:00.707458 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:04:01.566879 I | auth: deleting token NnEURijvYdtedKra.1268 for user conductor
2021-10-31 02:04:01.566929 I | auth: deleting token TQLsXbfoZbhwbtQU.1270 for user conductor
2021-10-31 02:04:01.566943 I | auth: deleting token cpasetmHVAGiUpxu.1269 for user conductor
2021-10-31 02:04:01.566963 I | auth: deleting token MwlisBczsBoUqQYU.1271 for user conductor
2021-10-31 02:04:01.566976 I | auth: deleting token zAyNbUNphMiFWHFH.1267 for user conductor
2021-10-31 02:04:02.009364 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.666371704s) to execute
2021-10-31 02:04:04.505696 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.467158637s) to execute
2021-10-31 02:04:05.566798 I | auth: deleting token klLxtIMeVnpGsAmF.1276 for user conductor
2021-10-31 02:04:05.566843 I | auth: deleting token SVgzYwSgdLwWAJCH.1275 for user conductor
2021-10-31 02:04:05.566851 I | auth: deleting token dFgcjehNeaZkRmHH.1274 for user conductor
2021-10-31 02:04:05.566861 I | auth: deleting token LwnOBjcVglHluDsb.1272 for user conductor
2021-10-31 02:04:05.566873 I | auth: deleting token SDUYZCGJuDgVOHKQ.1273 for user conductor
2021-10-31 02:04:05.708558 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:04:06.812155 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.007158446s) to execute
2021-10-31 02:04:07.566834 I | auth: deleting token uGPccsbdogRmabUT.1279 for user conductor
2021-10-31 02:04:07.566880 I | auth: deleting token eueDnVjDxAHNWVQG.1277 for user conductor
2021-10-31 02:04:09.312814 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.974513732s) to execute
2021-10-31 02:04:09.604857 I | auth: deleting token fVldvxtgSKhPiffL.1278 for user conductor
2021-10-31 02:04:10.566825 I | auth: deleting token wdQvnuQFkLkJKrqr.1280 for user conductor
2021-10-31 02:04:10.708779 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:04:11.604833 I | auth: deleting token JiCunOiZcERjrTgk.1283 for user conductor
2021-10-31 02:04:11.604879 I | auth: deleting token PBLvYbxTQFBGQFHF.1281 for user conductor
2021-10-31 02:04:11.604902 I | auth: deleting token PILIKTEFlEsNdmXu.1282 for user conductor
2021-10-31 02:04:11.711419 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.396029902s) to execute
2021-10-31 02:04:11.711661 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.397027558s) to execute
2021-10-31 02:04:13.011584 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.206559966s) to execute
2021-10-31 02:04:13.011697 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.298692548s) to execute
2021-10-31 02:04:13.011798 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.204251325s) to execute
2021-10-31 02:04:13.138277 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (117.993188ms) to execute
2021-10-31 02:04:15.708947 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:04:17.566834 I | auth: deleting token bVWJqFZUYBfutWxO.1287 for user conductor
2021-10-31 02:04:17.566878 I | auth: deleting token QLvPiAJJOraJqvpn.1285 for user conductor
2021-10-31 02:04:17.566892 I | auth: deleting token TRRCCyKabbtsByff.1284 for user conductor
2021-10-31 02:04:17.566905 I | auth: deleting token VUBgjhtsgrqpfasK.1286 for user conductor
2021-10-31 02:04:17.566910 I | auth: deleting token MvafKpYKaXcAuczy.1288 for user conductor
2021-10-31 02:04:17.905698 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.499400512s) to execute
2021-10-31 02:04:19.015680 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.107481386s) to execute
2021-10-31 02:04:19.017559 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.109828604s) to execute
2021-10-31 02:04:19.020208 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.112493655s) to execute
2021-10-31 02:04:19.020378 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.111728204s) to execute
2021-10-31 02:04:19.238225 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (216.632179ms) to execute
2021-10-31 02:04:20.709141 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:04:22.566807 I | auth: deleting token qWOcMjrfykxBHiEo.1292 for user conductor
2021-10-31 02:04:22.566846 I | auth: deleting token HkZSIuHonmvGUIuK.1290 for user conductor
2021-10-31 02:04:22.566864 I | auth: deleting token GOXuIxqLpdZaeykM.1294 for user conductor
2021-10-31 02:04:22.566870 I | auth: deleting token YrkYhmqFrcpcyMaO.1291 for user conductor
2021-10-31 02:04:22.566879 I | auth: deleting token duEFnYAhkUIDxsog.1289 for user conductor
2021-10-31 02:04:22.566886 I | auth: deleting token WkxBmdsjygUGCIfz.1293 for user conductor
2021-10-31 02:04:24.566835 I | auth: deleting token TaSzlZlzjWKWAucT.1295 for user conductor
2021-10-31 02:04:24.711500 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (106.421637ms) to execute
2021-10-31 02:04:25.604877 I | auth: deleting token gMjDQMRMobgIhlol.1298 for user conductor
2021-10-31 02:04:25.604942 I | auth: deleting token UcNbchMvSgWbParo.1297 for user conductor
2021-10-31 02:04:25.604980 I | auth: deleting token sJmNhGHXXDWBQqXB.1296 for user conductor
2021-10-31 02:04:25.709365 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:04:26.106297 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.368051539s) to execute
2021-10-31 02:04:27.314039 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.175731353s) to execute
2021-10-31 02:04:27.314422 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.205158144s) to execute
2021-10-31 02:04:27.566834 I | auth: deleting token mJsIsGjNxiXIqrZw.1299 for user conductor
2021-10-31 02:04:28.566810 I | auth: deleting token ruQFNCbznBYDGjvD.1300 for user conductor
2021-10-31 02:04:28.566849 I | auth: deleting token vWgYGUpPFoAmXncY.1301 for user conductor
2021-10-31 02:04:28.708186 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.268722486s) to execute
2021-10-31 02:04:28.708355 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.303365589s) to execute
2021-10-31 02:04:29.910766 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.105838404s) to execute
2021-10-31 02:04:29.911074 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.200769877s) to execute
2021-10-31 02:04:30.566839 I | auth: deleting token DlkoWJWDEPbVWqQw.1304 for user conductor
2021-10-31 02:04:30.566886 I | auth: deleting token MoHcAnFwjHxolQUR.1302 for user conductor
2021-10-31 02:04:30.709657 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:04:31.210722 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.297894497s) to execute
2021-10-31 02:04:31.566825 I | auth: deleting token IwAbJVAvMrfxAcby.1305 for user conductor
2021-10-31 02:04:31.566856 I | auth: deleting token PQCfJATxaSdOuchQ.1306 for user conductor
2021-10-31 02:04:31.566885 I | auth: deleting token JsIoetRkMmdUeAMe.1303 for user conductor
2021-10-31 02:04:32.410240 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.401436433s) to execute
2021-10-31 02:04:32.410379 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.399669704s) to execute
2021-10-31 02:04:33.705999 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.199048158s) to execute
2021-10-31 02:04:34.566860 I | auth: deleting token MweNTIPEdkcRSckR.1307 for user conductor
2021-10-31 02:04:34.566892 I | auth: deleting token kHpvocnOdmwYFDsj.1309 for user conductor
2021-10-31 02:04:35.566864 I | auth: deleting token HchkkZfxDefgOBNs.1310 for user conductor
2021-10-31 02:04:35.566917 I | auth: deleting token hQUVpdiEaUpNJoVC.1311 for user conductor
2021-10-31 02:04:35.566951 I | auth: deleting token VphKAinWkQTIrLzv.1308 for user conductor
2021-10-31 02:04:35.709817 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:04:36.112066 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.103791107s) to execute
2021-10-31 02:04:36.338199 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (133.271208ms) to execute
2021-10-31 02:04:36.566906 I | auth: deleting token CEskvgHEMAljZYrj.1312 for user conductor
2021-10-31 02:04:36.566962 I | auth: deleting token mnvsZfvNhxTkoDmK.1313 for user conductor
2021-10-31 02:04:37.505410 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (667.392139ms) to execute
2021-10-31 02:04:38.612000 I | auth: deleting token yqPeTVwUWbpOWQXG.1315 for user conductor
2021-10-31 02:04:38.612055 I | auth: deleting token WGtkISvksGPPEqNx.1314 for user conductor
2021-10-31 02:04:39.604771 I | auth: deleting token YpIdRKllTsWYYNTl.1317 for user conductor
2021-10-31 02:04:39.604804 I | auth: deleting token WBSwZpxJHeICwWXE.1318 for user conductor
2021-10-31 02:04:39.604817 I | auth: deleting token ELPQcawXUrQrIkBR.1316 for user conductor
2021-10-31 02:04:40.507338 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.069142289s) to execute
2021-10-31 02:04:40.710022 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:04:41.566905 I | auth: deleting token udrBgzIjtOupkbJJ.1319 for user conductor
2021-10-31 02:04:41.566959 I | auth: deleting token ZIeWdLyFqunuWpyg.1320 for user conductor
2021-10-31 02:04:43.008792 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.403727201s) to execute
2021-10-31 02:04:43.009030 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.403964849s) to execute
2021-10-31 02:04:43.566803 I | auth: deleting token JhzKEEBenuQyBwCE.1321 for user conductor
2021-10-31 02:04:43.566840 I | auth: deleting token lEjaxPkkuEKfYHPr.1323 for user conductor
2021-10-31 02:04:43.566850 I | auth: deleting token RRFZSECeIGHJYKxD.1322 for user conductor
2021-10-31 02:04:45.705623 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.600578363s) to execute
2021-10-31 02:04:45.705703 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.600670831s) to execute
2021-10-31 02:04:45.705803 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.596585554s) to execute
2021-10-31 02:04:45.705904 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.294782697s) to execute
2021-10-31 02:04:45.790836 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:04:46.566821 I | auth: deleting token YocInXtmwzmDZxoa.1327 for user conductor
2021-10-31 02:04:46.566873 I | auth: deleting token tCwhSZqVrxLVPwtP.1326 for user conductor
2021-10-31 02:04:46.566885 I | auth: deleting token ixLqouJEGOcRyAMy.1325 for user conductor
2021-10-31 02:04:46.566894 I | auth: deleting token dcldGcyHIkyOsLDH.1324 for user conductor
2021-10-31 02:04:47.566838 I | auth: deleting token coosWYXsRAkIvkbb.1328 for user conductor
2021-10-31 02:04:47.566875 I | auth: deleting token ImUddbcjXgnNzZDc.1329 for user conductor
2021-10-31 02:04:49.566863 I | auth: deleting token BTbaUZRgMwtpayCn.1330 for user conductor
2021-10-31 02:04:49.566934 I | auth: deleting token kWFXNsxXgoZSQiHE.1331 for user conductor
2021-10-31 02:04:50.566837 I | auth: deleting token tskZUVvXYEJuGNAw.1332 for user conductor
2021-10-31 02:04:50.791043 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:04:51.566913 I | auth: deleting token FmqozXBHVPClxTPU.1333 for user conductor
2021-10-31 02:04:52.566833 I | auth: deleting token frfMgETsjRGoEQgt.1334 for user conductor
2021-10-31 02:04:54.604829 I | auth: deleting token PKRJcIKsWtLytQkA.1335 for user conductor
2021-10-31 02:04:55.566840 I | auth: deleting token XzynkDrIojNCuZLo.1336 for user conductor
2021-10-31 02:04:55.791410 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:04:56.813256 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.874077188s) to execute
2021-10-31 02:04:57.138780 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (133.744975ms) to execute
2021-10-31 02:04:57.566853 I | auth: deleting token CYvICKlGTegTpYMb.1337 for user conductor
2021-10-31 02:04:58.566901 I | auth: deleting token tNFdUuCWvrWCOtzh.1338 for user conductor
2021-10-31 02:04:59.566864 I | auth: deleting token ENXzFfOEGkeWSUcT.1340 for user conductor
2021-10-31 02:04:59.566898 I | auth: deleting token szmaYoHEPivvWRpa.1339 for user conductor
2021-10-31 02:04:59.710185 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.405159722s) to execute
2021-10-31 02:05:00.791624 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:01.566817 I | auth: deleting token XglqnMowuugvrNqj.1343 for user conductor
2021-10-31 02:05:01.566864 I | auth: deleting token lTKLzOqepRKndsBL.1342 for user conductor
2021-10-31 02:05:01.566892 I | auth: deleting token eKBcyDvawFTOotLR.1341 for user conductor
2021-10-31 02:05:02.566834 I | auth: deleting token oOxYFCHlKaBDYNVH.1344 for user conductor
2021-10-31 02:05:04.566900 I | auth: deleting token NGJWSBTpxYopUCSe.1345 for user conductor
2021-10-31 02:05:05.566826 I | auth: deleting token NuyKuqbMWmTemNtg.1346 for user conductor
2021-10-31 02:05:05.791847 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:06.566801 I | auth: deleting token kWekbhKnFMtDwzos.1347 for user conductor
2021-10-31 02:05:07.711519 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (673.333244ms) to execute
2021-10-31 02:05:08.604821 I | auth: deleting token iNVQDIsITgNRuKGI.1348 for user conductor
2021-10-31 02:05:09.015421 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (409.628734ms) to execute
2021-10-31 02:05:09.566848 I | auth: deleting token sxWXoOlSDrSyzADZ.1349 for user conductor
2021-10-31 02:05:10.792109 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:11.566838 I | auth: deleting token jAauXTrEcptCnjxO.1350 for user conductor
2021-10-31 02:05:12.566850 I | auth: deleting token TgAeWDxlGPzwIyDd.1351 for user conductor
2021-10-31 02:05:13.604914 I | auth: deleting token IZwhRSkXDJWgpolx.1352 for user conductor
2021-10-31 02:05:14.607369 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (267.653271ms) to execute
2021-10-31 02:05:15.604805 I | auth: deleting token pVdPeUpXrIwmhSVc.1353 for user conductor
2021-10-31 02:05:15.792306 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:15.905637 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (100.698007ms) to execute
2021-10-31 02:05:16.566825 I | auth: deleting token MsQsoiveXSaXGSqD.1354 for user conductor
2021-10-31 02:05:20.566840 I | auth: deleting token IctTfWEQGlLKtQAy.1357 for user conductor
2021-10-31 02:05:20.566881 I | auth: deleting token xPORnWSbTGrRqVgT.1358 for user conductor
2021-10-31 02:05:20.566888 I | auth: deleting token YnylhWeyXJgrFnFC.1356 for user conductor
2021-10-31 02:05:20.566899 I | auth: deleting token UChKSgrqvLFOgMnu.1355 for user conductor
2021-10-31 02:05:20.566905 I | auth: deleting token jeSeMrRmxMgIlaAX.1359 for user conductor
2021-10-31 02:05:20.792498 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:23.566847 I | auth: deleting token sAzUblgHJysKLMZV.1361 for user conductor
2021-10-31 02:05:23.566891 I | auth: deleting token FPQdAdYtFcHoJxAo.1363 for user conductor
2021-10-31 02:05:25.792727 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:26.566800 I | auth: deleting token yjQHzmVeDyTzjtgg.1364 for user conductor
2021-10-31 02:05:26.566844 I | auth: deleting token ZhlKnAOezzfwkPew.1365 for user conductor
2021-10-31 02:05:26.566853 I | auth: deleting token xhWWpxxGdNyOIJRd.1360 for user conductor
2021-10-31 02:05:26.566870 I | auth: deleting token lbfDWxchzimXuVOI.1366 for user conductor
2021-10-31 02:05:26.566882 I | auth: deleting token xWkehOrtnduXRwAw.1362 for user conductor
2021-10-31 02:05:28.566826 I | auth: deleting token RkRszhqZYofDdqkf.1368 for user conductor
2021-10-31 02:05:28.566871 I | auth: deleting token zTxgCctFXXazlfpA.1367 for user conductor
2021-10-31 02:05:29.305225 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200197197s) to execute
2021-10-31 02:05:29.566924 I | auth: deleting token TFLZKzQvgsUeybQb.1369 for user conductor
2021-10-31 02:05:30.604789 I | auth: deleting token krBpFWpcOkrEykOA.1372 for user conductor
2021-10-31 02:05:30.604825 I | auth: deleting token UYshVUksnkQOCcDp.1371 for user conductor
2021-10-31 02:05:30.604834 I | auth: deleting token rVyddObhcOevjAHs.1370 for user conductor
2021-10-31 02:05:30.609562 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (971.343967ms) to execute
2021-10-31 02:05:30.804835 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:32.566876 I | auth: deleting token vBIzznZkwHMULAlB.1373 for user conductor
2021-10-31 02:05:33.210022 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.570469447s) to execute
2021-10-31 02:05:33.604823 I | auth: deleting token ndWXtvyCZmcIsPTz.1375 for user conductor
2021-10-31 02:05:33.604869 I | auth: deleting token IuornsrpXtMFImmc.1374 for user conductor
2021-10-31 02:05:34.566880 I | auth: deleting token GoltMbaDNMIcIcmR.1377 for user conductor
2021-10-31 02:05:34.566929 I | auth: deleting token aCAEqVyLNlfIuafE.1376 for user conductor
2021-10-31 02:05:35.804996 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:36.566838 I | auth: deleting token AHUSOrcLJimmRCsW.1378 for user conductor
2021-10-31 02:05:37.604929 I | auth: deleting token NLUjkTkDDTotwdkj.1379 for user conductor
2021-10-31 02:05:38.508925 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.770337559s) to execute
2021-10-31 02:05:38.566826 I | auth: deleting token pvowvXxzjhCHdZxD.1380 for user conductor
2021-10-31 02:05:38.639844 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.966709ms) to execute
2021-10-31 02:05:38.641037 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (129.878902ms) to execute
2021-10-31 02:05:38.641101 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.486968ms) to execute
2021-10-31 02:05:40.566824 I | auth: deleting token oSxwsEQPqVXgkcCH.1382 for user conductor
2021-10-31 02:05:40.566874 I | auth: deleting token SVGajMxmwtkPPELL.1381 for user conductor
2021-10-31 02:05:40.805171 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:41.308243 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.170049382s) to execute
2021-10-31 02:05:41.604826 I | auth: deleting token MvJulaDpEXParqPx.1383 for user conductor
2021-10-31 02:05:41.604885 I | auth: deleting token uvGhyCUhSKcLxzvK.1384 for user conductor
2021-10-31 02:05:42.566840 I | auth: deleting token WASCNKdabTuCpUZk.1385 for user conductor
2021-10-31 02:05:42.610905 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.300039528s) to execute
2021-10-31 02:05:42.611020 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.172615485s) to execute
2021-10-31 02:05:42.738428 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (125.692031ms) to execute
2021-10-31 02:05:44.011911 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (273.872657ms) to execute
2021-10-31 02:05:45.211140 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.006031335s) to execute
2021-10-31 02:05:45.604924 I | auth: deleting token RUCTFiIJWWBmCulm.1386 for user conductor
2021-10-31 02:05:45.805402 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:46.510927 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.20408683s) to execute
2021-10-31 02:05:46.511072 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.072621854s) to execute
2021-10-31 02:05:47.566903 I | auth: deleting token lRybJhTbgfhYhOXc.1388 for user conductor
2021-10-31 02:05:47.566948 I | auth: deleting token xHUblXMqrOxulSKk.1387 for user conductor
2021-10-31 02:05:47.908240 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.298440738s) to execute
2021-10-31 02:05:48.566932 I | auth: deleting token PWRTwoPquHqwmpFo.1389 for user conductor
2021-10-31 02:05:48.566979 I | auth: deleting token xkSuHjrAOibWKILN.1390 for user conductor
2021-10-31 02:05:48.566992 I | auth: deleting token vyXMjhDXYaJUMXOO.1391 for user conductor
2021-10-31 02:05:49.209872 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.299052572s) to execute
2021-10-31 02:05:50.706905 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.367424321s) to execute
2021-10-31 02:05:50.707069 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.402052753s) to execute
2021-10-31 02:05:50.805638 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:51.566847 I | auth: deleting token XdgMKUTLPzdehOsT.1394 for user conductor
2021-10-31 02:05:51.566902 I | auth: deleting token BHRaFnxUrLyzVIlx.1392 for user conductor
2021-10-31 02:05:52.111157 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.306048705s) to execute
2021-10-31 02:05:52.111268 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (606.227472ms) to execute
2021-10-31 02:05:52.238268 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (121.885466ms) to execute
2021-10-31 02:05:52.566925 I | auth: deleting token wJkKfCIminpTlNnF.1393 for user conductor
2021-10-31 02:05:53.408011 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (469.681646ms) to execute
2021-10-31 02:05:53.566850 I | auth: deleting token PTWKzBFscFhCgPAR.1397 for user conductor
2021-10-31 02:05:53.566910 I | auth: deleting token epJLBGVJObhTWSpJ.1398 for user conductor
2021-10-31 02:05:53.566934 I | auth: deleting token dtredlfJBOSeQHtT.1396 for user conductor
2021-10-31 02:05:53.566944 I | auth: deleting token ndUQRWaykzAhbGMs.1395 for user conductor
2021-10-31 02:05:55.007840 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (469.716482ms) to execute
2021-10-31 02:05:55.805869 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:05:56.310453 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.270465141s) to execute
2021-10-31 02:05:58.604848 I | auth: deleting token ZBfcGmKfkytKRCyS.1404 for user conductor
2021-10-31 02:05:58.604887 I | auth: deleting token eWcXbucBvUqZbhCs.1401 for user conductor
2021-10-31 02:05:58.604897 I | auth: deleting token ksvEWnllXHpiCPvu.1403 for user conductor
2021-10-31 02:05:58.604908 I | auth: deleting token ADYgFGzSXGDKXPjA.1402 for user conductor
2021-10-31 02:05:58.604915 I | auth: deleting token RCZopvThwMVBOSGD.1399 for user conductor
2021-10-31 02:05:58.604933 I | auth: deleting token wajGMddHHaHXRePK.1400 for user conductor
2021-10-31 02:06:00.505657 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.300555764s) to execute
2021-10-31 02:06:00.806085 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:01.604862 I | auth: deleting token aBSPPDhshHzgqank.1406 for user conductor
2021-10-31 02:06:01.604906 I | auth: deleting token qjCMmniOqlMXEUBe.1405 for user conductor
2021-10-31 02:06:01.604918 I | auth: deleting token spjMbnjVDopPGprj.1407 for user conductor
2021-10-31 02:06:01.905936 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.067630161s) to execute
2021-10-31 02:06:02.566856 I | auth: deleting token oLcPBoTtKxiMyZZo.1408 for user conductor
2021-10-31 02:06:02.566899 I | auth: deleting token UQQJkAVBIVTilWcV.1410 for user conductor
2021-10-31 02:06:02.566915 I | auth: deleting token dGMRjnwBxlhcFBbe.1409 for user conductor
2021-10-31 02:06:03.211692 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (704.888877ms) to execute
2021-10-31 02:06:04.608345 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (670.2093ms) to execute
2021-10-31 02:06:05.566814 I | auth: deleting token CSwSxdRwCMqNxeWy.1411 for user conductor
2021-10-31 02:06:05.566876 I | auth: deleting token CcJoGpsnmEudKMQU.1412 for user conductor
2021-10-31 02:06:05.566904 I | auth: deleting token AWvIDrbjESPGlKeM.1413 for user conductor
2021-10-31 02:06:05.806392 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:06.566936 I | auth: deleting token daHBPeZUjBeHVaov.1414 for user conductor
2021-10-31 02:06:07.566865 I | auth: deleting token SdVulrdsGQuWhjnB.1416 for user conductor
2021-10-31 02:06:10.566849 I | auth: deleting token ZTzadOuzTnHFWmbL.1417 for user conductor
2021-10-31 02:06:10.566892 I | auth: deleting token byUYMZbYZTlpHeYs.1418 for user conductor
2021-10-31 02:06:10.566900 I | auth: deleting token kuSMfnVMECQrrJXy.1420 for user conductor
2021-10-31 02:06:10.566920 I | auth: deleting token OTFiYkRhTiNxmHvG.1419 for user conductor
2021-10-31 02:06:10.566926 I | auth: deleting token zWHSQHlBxSQCogTy.1415 for user conductor
2021-10-31 02:06:10.806683 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:12.566873 I | auth: deleting token vlVcrAfeUUXPMwxn.1421 for user conductor
2021-10-31 02:06:12.566927 I | auth: deleting token aZzIyWKJkoxOSxEo.1422 for user conductor
2021-10-31 02:06:14.709356 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (604.18023ms) to execute
2021-10-31 02:06:15.806886 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:16.106244 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.393656124s) to execute
2021-10-31 02:06:18.566827 I | auth: deleting token WViIwnyKcMYEGnLg.1424 for user conductor
2021-10-31 02:06:18.566878 I | auth: deleting token RVatuldjLtskWCbm.1427 for user conductor
2021-10-31 02:06:18.566900 I | auth: deleting token NuibGxAQORkdjNhK.1423 for user conductor
2021-10-31 02:06:18.566912 I | auth: deleting token GsJekeXZumFOFVLx.1426 for user conductor
2021-10-31 02:06:18.566919 I | auth: deleting token JgxzgCSOAuMyjSFW.1425 for user conductor
2021-10-31 02:06:18.807289 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.667221328s) to execute
2021-10-31 02:06:18.807497 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.698814857s) to execute
2021-10-31 02:06:20.807058 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:22.604846 I | auth: deleting token VQHDbrHBZGocNQgC.1432 for user conductor
2021-10-31 02:06:22.604895 I | auth: deleting token reBXrkjItwhIqWIe.1428 for user conductor
2021-10-31 02:06:22.604919 I | auth: deleting token odJUBgGPctEBQxGX.1431 for user conductor
2021-10-31 02:06:22.604925 I | auth: deleting token GmaiGHresfrNKLHx.1430 for user conductor
2021-10-31 02:06:22.604940 I | auth: deleting token CdiifdaqpXuKEaww.1429 for user conductor
2021-10-31 02:06:22.810043 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.402158744s) to execute
2021-10-31 02:06:24.115174 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.302540775s) to execute
2021-10-31 02:06:24.115468 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.176777299s) to execute
2021-10-31 02:06:24.115572 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.30259141s) to execute
2021-10-31 02:06:24.339035 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (133.993716ms) to execute
2021-10-31 02:06:25.807241 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:26.566825 I | auth: deleting token TdsjDpvCoZyabtwL.1436 for user conductor
2021-10-31 02:06:26.566869 I | auth: deleting token LjkfYLAjBcQweYSU.1438 for user conductor
2021-10-31 02:06:26.566881 I | auth: deleting token ovXlEmGFhxGlAkFR.1434 for user conductor
2021-10-31 02:06:26.566893 I | auth: deleting token SHghghCzRWwGXkTz.1435 for user conductor
2021-10-31 02:06:26.566907 I | auth: deleting token jmTphFgRjnHzBUtu.1433 for user conductor
2021-10-31 02:06:26.566912 I | auth: deleting token bWZtvyBTrhsTWsWw.1437 for user conductor
2021-10-31 02:06:26.907929 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.100807992s) to execute
2021-10-31 02:06:27.566876 I | auth: deleting token rousZqtZRTzbePrX.1439 for user conductor
2021-10-31 02:06:28.115185 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (877.00714ms) to execute
2021-10-31 02:06:28.115352 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.203073633s) to execute
2021-10-31 02:06:29.408075 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.201088883s) to execute
2021-10-31 02:06:29.408305 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.203335697s) to execute
2021-10-31 02:06:29.538255 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.324853ms) to execute
2021-10-31 02:06:29.566866 I | auth: deleting token OrxiYbqTqMdVcCmz.1442 for user conductor
2021-10-31 02:06:29.566900 I | auth: deleting token tGrELKGZJUdACIYH.1440 for user conductor
2021-10-31 02:06:29.566919 I | auth: deleting token MsNmkkeRiwbgPjvJ.1441 for user conductor
2021-10-31 02:06:30.604858 I | auth: deleting token XQUlmDGdChfnZZtQ.1444 for user conductor
2021-10-31 02:06:30.604906 I | auth: deleting token nGXkKOycPJdMnnIi.1443 for user conductor
2021-10-31 02:06:30.807456 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:32.009838 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.471663928s) to execute
2021-10-31 02:06:32.566854 I | auth: deleting token LgPVrbFseRqEtPaS.1445 for user conductor
2021-10-31 02:06:33.566860 I | auth: deleting token KxPnVVmaHPZxFxzz.1448 for user conductor
2021-10-31 02:06:33.566909 I | auth: deleting token RLbMgQOXlNzaimgM.1446 for user conductor
2021-10-31 02:06:33.566920 I | auth: deleting token ZrXwbUIYpHRUDybj.1447 for user conductor
2021-10-31 02:06:34.608449 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.103489557s) to execute
2021-10-31 02:06:35.807640 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:35.909831 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.171632049s) to execute
2021-10-31 02:06:36.566830 I | auth: deleting token HmRjvcMaWlmPcgOS.1449 for user conductor
2021-10-31 02:06:37.210999 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.301058863s) to execute
2021-10-31 02:06:37.211119 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.599930467s) to execute
2021-10-31 02:06:37.604830 I | auth: deleting token xrexSoDuhzizZVek.1451 for user conductor
2021-10-31 02:06:38.512025 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.29832974s) to execute
2021-10-31 02:06:38.512161 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.299332335s) to execute
2021-10-31 02:06:38.512247 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.582915209s) to execute
2021-10-31 02:06:38.604800 I | auth: deleting token hBqwUWFewQZsREuK.1454 for user conductor
2021-10-31 02:06:38.604944 I | auth: deleting token VPOZtQEgazeOnaNf.1455 for user conductor
2021-10-31 02:06:38.605026 I | auth: deleting token BkqJLtJQbUgLurBM.1452 for user conductor
2021-10-31 02:06:38.605139 I | auth: deleting token EDigAuKFoIREgmVG.1456 for user conductor
2021-10-31 02:06:38.605242 I | auth: deleting token jAhSZLIPVmMFaqIV.1453 for user conductor
2021-10-31 02:06:38.605317 I | auth: deleting token MGrMqfhkgBYXluRl.1450 for user conductor
2021-10-31 02:06:39.909494 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.300878084s) to execute
2021-10-31 02:06:40.807848 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:41.305484 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (966.96874ms) to execute
2021-10-31 02:06:42.566851 I | auth: deleting token iKfdjYwvbrkUaYcy.1459 for user conductor
2021-10-31 02:06:42.607101 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.202111403s) to execute
2021-10-31 02:06:42.738462 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (129.461687ms) to execute
2021-10-31 02:06:43.566869 I | auth: deleting token JePGmWgOKkoYAtmM.1458 for user conductor
2021-10-31 02:06:43.566922 I | auth: deleting token XgkzKRMpWtbwlSSi.1457 for user conductor
2021-10-31 02:06:44.107363 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.002260247s) to execute
2021-10-31 02:06:45.604856 I | auth: deleting token InAqdXilmAHKuXxa.1462 for user conductor
2021-10-31 02:06:45.604900 I | auth: deleting token TaSuQNtbdotlkHLz.1461 for user conductor
2021-10-31 02:06:45.604911 I | auth: deleting token xmqqnBLCjLPkERTk.1460 for user conductor
2021-10-31 02:06:45.808122 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:46.707608 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (402.54791ms) to execute
2021-10-31 02:06:48.208959 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (570.432705ms) to execute
2021-10-31 02:06:48.566861 I | auth: deleting token awyJsTYNcMShutMB.1464 for user conductor
2021-10-31 02:06:48.566945 I | auth: deleting token fOLJTgbUbhQjImRX.1466 for user conductor
2021-10-31 02:06:48.566961 I | auth: deleting token RuBRrEubVmwwrgYz.1463 for user conductor
2021-10-31 02:06:49.607023 I | auth: deleting token EIXilAeedgYuuqRG.1467 for user conductor
2021-10-31 02:06:49.607090 I | auth: deleting token lsLQIxKXXSAhMhwT.1465 for user conductor
2021-10-31 02:06:50.604821 I | auth: deleting token kwEwHLBHfrTEFtsi.1468 for user conductor
2021-10-31 02:06:50.808362 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:52.566867 I | auth: deleting token JYisXjBcuPtiuGxP.1471 for user conductor
2021-10-31 02:06:52.566912 I | auth: deleting token YekcsevUwzjkHvnY.1469 for user conductor
2021-10-31 02:06:53.566862 I | auth: deleting token aQhmmeWiyiBcdVUT.1472 for user conductor
2021-10-31 02:06:53.566914 I | auth: deleting token KBWOzmRIChoXBGDx.1470 for user conductor
2021-10-31 02:06:53.566939 I | auth: deleting token yVfEVXaELcTfCERa.1473 for user conductor
2021-10-31 02:06:54.211777 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (273.546357ms) to execute
2021-10-31 02:06:54.604836 I | auth: deleting token bxqLWTmzcwYBTURg.1475 for user conductor
2021-10-31 02:06:54.604899 I | auth: deleting token lEntJkETXDLPCdnO.1474 for user conductor
2021-10-31 02:06:55.508048 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.069710389s) to execute
2021-10-31 02:06:55.808546 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:06:56.566812 I | auth: deleting token CQEBMsiMKACtDuZK.1476 for user conductor
2021-10-31 02:06:56.566861 I | auth: deleting token bitAyyMBRrzMPpBz.1477 for user conductor
2021-10-31 02:06:58.566842 I | auth: deleting token KtXjFoRgTqKPlIMH.1478 for user conductor
2021-10-31 02:06:58.566892 I | auth: deleting token yAnVONpVeluqQMBI.1479 for user conductor
2021-10-31 02:06:58.810857 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (167.55345ms) to execute
2021-10-31 02:06:59.566866 I | auth: deleting token HvCzewPxTPUaXNjC.1480 for user conductor
2021-10-31 02:07:00.566810 I | auth: deleting token KaaeCUiVSXyNWvwj.1481 for user conductor
2021-10-31 02:07:00.808735 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:01.566842 I | auth: deleting token UFMEzeMxaJLpAnWL.1482 for user conductor
2021-10-31 02:07:03.566860 I | auth: deleting token cFJQPTSFLhPxLUOx.1483 for user conductor
2021-10-31 02:07:04.566875 I | auth: deleting token wZoYklPaNurdMhgL.1484 for user conductor
2021-10-31 02:07:04.566950 I | auth: deleting token dvTUUMAIiieOBfLg.1485 for user conductor
2021-10-31 02:07:05.808969 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:06.566853 I | auth: deleting token GRwiBghzMUvlqUwV.1486 for user conductor
2021-10-31 02:07:07.604836 I | auth: deleting token OuxhsxBOzBknQcgp.1487 for user conductor
2021-10-31 02:07:07.604899 I | auth: deleting token ZyOAirBXVqGiilEe.1489 for user conductor
2021-10-31 02:07:07.604919 I | auth: deleting token WeVOEMjpDXbCZpvC.1488 for user conductor
2021-10-31 02:07:08.511663 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.306627004s) to execute
2021-10-31 02:07:08.739208 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (134.171996ms) to execute
2021-10-31 02:07:08.739268 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (134.255913ms) to execute
2021-10-31 02:07:10.566855 I | auth: deleting token GhGpXzKnWCUmXAln.1491 for user conductor
2021-10-31 02:07:10.566897 I | auth: deleting token owYlEQyFiOlPNZZW.1493 for user conductor
2021-10-31 02:07:10.566911 I | auth: deleting token sWTeGswUWaOhELZr.1492 for user conductor
2021-10-31 02:07:10.566930 I | auth: deleting token VSNEkRGNSRKwriWO.1490 for user conductor
2021-10-31 02:07:10.809141 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:11.405322 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.061376856s) to execute
2021-10-31 02:07:12.566856 I | auth: deleting token gugxXOXnCjriYznf.1494 for user conductor
2021-10-31 02:07:13.566873 I | auth: deleting token xApfLihyqQDqDbwj.1495 for user conductor
2021-10-31 02:07:14.215144 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.807129467s) to execute
2021-10-31 02:07:14.215402 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.808235885s) to execute
2021-10-31 02:07:15.566863 I | auth: deleting token byxQoAiWpGcDHpuN.1496 for user conductor
2021-10-31 02:07:15.620186 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.214145776s) to execute
2021-10-31 02:07:15.620336 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.315229699s) to execute
2021-10-31 02:07:15.620804 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.315556918s) to execute
2021-10-31 02:07:15.809400 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:16.566820 I | auth: deleting token AKzPcbdszRVjABUM.1499 for user conductor
2021-10-31 02:07:16.566948 I | auth: deleting token YqjepsvrBcAJuXeI.1498 for user conductor
2021-10-31 02:07:16.566995 I | auth: deleting token niDVHiszmTVLplST.1497 for user conductor
2021-10-31 02:07:17.009058 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (166.170063ms) to execute
2021-10-31 02:07:19.566821 I | auth: deleting token QKxMjrvvjSQYAeGm.1500 for user conductor
2021-10-31 02:07:19.566869 I | auth: deleting token ZyBcUaIpmwJFuWyy.1502 for user conductor
2021-10-31 02:07:19.566896 I | auth: deleting token YehGaPQGYKcgGmbx.1503 for user conductor
2021-10-31 02:07:19.566910 I | auth: deleting token CeMQaIqnLLWHfYso.1501 for user conductor
2021-10-31 02:07:20.809664 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:23.566853 I | auth: deleting token PRqLSrqwXnmLhWzC.1507 for user conductor
2021-10-31 02:07:23.566898 I | auth: deleting token NXmhGLQgWzACMDxW.1504 for user conductor
2021-10-31 02:07:23.566915 I | auth: deleting token iWsMqUHMzyGxKpDw.1505 for user conductor
2021-10-31 02:07:24.589904 I | auth: deleting token NpdbiRdoMvSoqfDQ.1509 for user conductor
2021-10-31 02:07:24.589951 I | auth: deleting token XPZHACelALiOWeCL.1508 for user conductor
2021-10-31 02:07:24.589973 I | auth: deleting token ZuqXCjbfRxuJYHWN.1506 for user conductor
2021-10-31 02:07:25.809881 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:26.505748 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.466564059s) to execute
2021-10-31 02:07:26.640136 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (132.716732ms) to execute
2021-10-31 02:07:26.641276 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (133.785368ms) to execute
2021-10-31 02:07:27.566859 I | auth: deleting token bxDEBGLKTyUDVtCP.1511 for user conductor
2021-10-31 02:07:27.566909 I | auth: deleting token wDHGiBnQvBIYdRdh.1513 for user conductor
2021-10-31 02:07:28.566821 I | auth: deleting token HYOiGgMxOlCIHuCK.1514 for user conductor
2021-10-31 02:07:28.566879 I | auth: deleting token BRCPPEJVJLwsKtNV.1510 for user conductor
2021-10-31 02:07:28.566888 I | auth: deleting token xsvClQLCZaUaoGxX.1515 for user conductor
2021-10-31 02:07:28.566910 I | auth: deleting token dRpcsutmiAeywNaf.1512 for user conductor
2021-10-31 02:07:30.211631 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.271550869s) to execute
2021-10-31 02:07:30.651693 I | auth: deleting token hvabVzRuHYynQZyB.1516 for user conductor
2021-10-31 02:07:30.810095 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:31.566833 I | auth: deleting token IzXYdCaIZFqjWaYz.1519 for user conductor
2021-10-31 02:07:31.566879 I | auth: deleting token XnmEwMmbuHshbvwW.1517 for user conductor
2021-10-31 02:07:31.566887 I | auth: deleting token LvsJkWgqpxjfkYtH.1518 for user conductor
2021-10-31 02:07:31.707628 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (969.213846ms) to execute
2021-10-31 02:07:32.566814 I | auth: deleting token kaBmWtlTUijTVuik.1520 for user conductor
2021-10-31 02:07:33.107573 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.06341286s) to execute
2021-10-31 02:07:34.406938 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.166415465s) to execute
2021-10-31 02:07:34.407149 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (669.040175ms) to execute
2021-10-31 02:07:34.566870 I | auth: deleting token zWKTJHjakHzkYOqT.1521 for user conductor
2021-10-31 02:07:35.566842 I | auth: deleting token bAhqZkbUDPBXoWcL.1522 for user conductor
2021-10-31 02:07:35.807488 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (564.32025ms) to execute
2021-10-31 02:07:35.810331 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:36.566844 I | auth: deleting token ajEHeBmtLfBZqgbi.1523 for user conductor
2021-10-31 02:07:36.566892 I | auth: deleting token iIZJuDCGOTNkMimv.1524 for user conductor
2021-10-31 02:07:37.604899 I | auth: deleting token TMkrfpINJHBtHDtU.1526 for user conductor
2021-10-31 02:07:37.604960 I | auth: deleting token LKcFNbREMfpdvpbK.1525 for user conductor
2021-10-31 02:07:38.566863 I | auth: deleting token ASptejtyhUPADNgm.1528 for user conductor
2021-10-31 02:07:38.566908 I | auth: deleting token MOyywLPhgIRqnAxG.1527 for user conductor
2021-10-31 02:07:40.566890 I | auth: deleting token srvKeViATlbDImlR.1529 for user conductor
2021-10-31 02:07:40.810531 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:41.309640 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.371389623s) to execute
2021-10-31 02:07:41.538403 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (226.815374ms) to execute
2021-10-31 02:07:43.604882 I | auth: deleting token eYtQYRnuFuXLrgNt.1534 for user conductor
2021-10-31 02:07:43.604952 I | auth: deleting token polXVJkLqCUSpOGP.1533 for user conductor
2021-10-31 02:07:43.604964 I | auth: deleting token IWREljdImlZtHhoT.1531 for user conductor
2021-10-31 02:07:43.604972 I | auth: deleting token aGdAGTAutrjBpAoJ.1530 for user conductor
2021-10-31 02:07:43.604979 I | auth: deleting token NvdPpHEQaNUZtJcf.1532 for user conductor
2021-10-31 02:07:45.310987 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.472584537s) to execute
2021-10-31 02:07:45.538289 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (133.133257ms) to execute
2021-10-31 02:07:45.810728 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:46.706900 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (559.046093ms) to execute
2021-10-31 02:07:47.604908 I | auth: deleting token ZuFmHVzQwGREfnnl.1535 for user conductor
2021-10-31 02:07:47.604974 I | auth: deleting token WSHDQXDNaKnMVNRB.1537 for user conductor
2021-10-31 02:07:48.105975 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (500.982791ms) to execute
2021-10-31 02:07:48.566843 I | auth: deleting token jcpXdXZZLHhNDQkm.1538 for user conductor
2021-10-31 02:07:48.566888 I | auth: deleting token XEoxMvgVxGvZAUcD.1536 for user conductor
2021-10-31 02:07:49.566844 I | auth: deleting token PbETzDCAzxSUkXQq.1540 for user conductor
2021-10-31 02:07:49.566947 I | auth: deleting token SgBjvPENNMJiiBOc.1539 for user conductor
2021-10-31 02:07:50.566876 I | auth: deleting token tUQjqNfoEvqQHrar.1541 for user conductor
2021-10-31 02:07:50.810902 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:53.604871 I | auth: deleting token IoeMZqYjYbvxPIaE.1543 for user conductor
2021-10-31 02:07:53.604910 I | auth: deleting token yZjMNyGENTJZJqXw.1546 for user conductor
2021-10-31 02:07:53.604925 I | auth: deleting token eAWKLonERfyVDWeG.1545 for user conductor
2021-10-31 02:07:53.604932 I | auth: deleting token fSzgUZzgzdaGcQDU.1548 for user conductor
2021-10-31 02:07:53.604937 I | auth: deleting token gPJmqJDUAjzDnmrW.1547 for user conductor
2021-10-31 02:07:53.604944 I | auth: deleting token NmwNsxXhuepcexgO.1542 for user conductor
2021-10-31 02:07:53.604952 I | auth: deleting token GtdSyEvUUAMUUCkv.1544 for user conductor
2021-10-31 02:07:55.811092 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:07:57.309742 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.704691818s) to execute
2021-10-31 02:07:57.438415 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (127.206023ms) to execute
2021-10-31 02:07:57.539139 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (227.797035ms) to execute
2021-10-31 02:07:57.539273 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (199.463631ms) to execute
2021-10-31 02:07:57.539340 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (227.676353ms) to execute
2021-10-31 02:07:57.566906 I | auth: deleting token LvRgTcdbiKDrDgZa.1551 for user conductor
2021-10-31 02:07:57.566949 I | auth: deleting token QIkCtEKpjrggNHxo.1550 for user conductor
2021-10-31 02:07:57.566958 I | auth: deleting token clvevgpepXEdpfsi.1549 for user conductor
2021-10-31 02:07:58.566820 I | auth: deleting token dcCztsDWfUHJEpjz.1553 for user conductor
2021-10-31 02:07:58.566860 I | auth: deleting token xcfXWlDdZiPAecti.1552 for user conductor
2021-10-31 02:07:59.604870 I | auth: deleting token UwyhjyPJRemZAsGy.1554 for user conductor
2021-10-31 02:08:00.811261 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:01.566874 I | auth: deleting token SigRbWtFLwGQZpxe.1555 for user conductor
2021-10-31 02:08:02.566849 I | auth: deleting token GIJNIVJDePXDifjG.1559 for user conductor
2021-10-31 02:08:02.566893 I | auth: deleting token LfGJCdGVJLXHRNQj.1556 for user conductor
2021-10-31 02:08:02.566903 I | auth: deleting token TCvKrxKfjULXNVrW.1557 for user conductor
2021-10-31 02:08:02.566918 I | auth: deleting token RNoOIawkUPfTvSYK.1558 for user conductor
2021-10-31 02:08:02.908557 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.068623627s) to execute
2021-10-31 02:08:04.206430 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.201375375s) to execute
2021-10-31 02:08:04.206614 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.296524506s) to execute
2021-10-31 02:08:04.209087 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.203995169s) to execute
2021-10-31 02:08:04.209210 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.204138533s) to execute
2021-10-31 02:08:04.338447 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.002377ms) to execute
2021-10-31 02:08:05.811471 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:06.566852 I | auth: deleting token PkTmuJsgpiIvvUlC.1560 for user conductor
2021-10-31 02:08:06.566916 I | auth: deleting token TucWuekfTJixOudr.1563 for user conductor
2021-10-31 02:08:06.566927 I | auth: deleting token JxmDzIPuYsyknxro.1562 for user conductor
2021-10-31 02:08:07.110861 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.170936266s) to execute
2021-10-31 02:08:07.438706 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (230.943128ms) to execute
2021-10-31 02:08:07.566845 I | auth: deleting token SYBqvodoMESMveeO.1566 for user conductor
2021-10-31 02:08:07.566913 I | auth: deleting token uWFJCWnqLEKuIeEw.1564 for user conductor
2021-10-31 02:08:07.566958 I | auth: deleting token OamvwJRppbMrTary.1561 for user conductor
2021-10-31 02:08:07.566998 I | auth: deleting token YtkGfcucSpsvJCFP.1565 for user conductor
2021-10-31 02:08:08.566812 I | auth: deleting token AzLyzXGTbzTccWNT.1567 for user conductor
2021-10-31 02:08:09.566937 I | auth: deleting token TGEaDohfpUWbvbjs.1568 for user conductor
2021-10-31 02:08:10.566910 I | auth: deleting token oGfHoZxXKBXDdazJ.1569 for user conductor
2021-10-31 02:08:10.811679 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:11.566956 I | auth: deleting token LfraiTZnYSlCmcuN.1570 for user conductor
2021-10-31 02:08:12.566871 I | auth: deleting token GVanUEwLlGbtyuzu.1571 for user conductor
2021-10-31 02:08:13.566871 I | auth: deleting token GXxYFtOybsAPYYez.1572 for user conductor
2021-10-31 02:08:13.566930 I | auth: deleting token GXdDeIjdhvdBpRwO.1573 for user conductor
2021-10-31 02:08:15.566918 I | auth: deleting token yOLJBruXbPuEAjIu.1576 for user conductor
2021-10-31 02:08:15.566981 I | auth: deleting token hesouTLdeFBGnwij.1575 for user conductor
2021-10-31 02:08:15.567005 I | auth: deleting token NAZxntSdRzLHYlil.1574 for user conductor
2021-10-31 02:08:15.709164 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.970094185s) to execute
2021-10-31 02:08:15.904813 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:16.566795 I | auth: deleting token dTghCjIYlXeBRhTA.1577 for user conductor
2021-10-31 02:08:17.006376 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.294884051s) to execute
2021-10-31 02:08:17.006524 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.295780744s) to execute
2021-10-31 02:08:17.008511 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.203439162s) to execute
2021-10-31 02:08:17.008572 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.297303555s) to execute
2021-10-31 02:08:18.651619 I | auth: deleting token AuVHuLIjsMPDbphW.1579 for user conductor
2021-10-31 02:08:18.651672 I | auth: deleting token HAVZfSCpflnRIHqC.1578 for user conductor
2021-10-31 02:08:19.604834 I | auth: deleting token SDsnkghTRewNZTEs.1582 for user conductor
2021-10-31 02:08:19.604881 I | auth: deleting token omejaOIKftCUiOoi.1580 for user conductor
2021-10-31 02:08:19.604907 I | auth: deleting token bKxOPSaHswsWagjn.1581 for user conductor
2021-10-31 02:08:20.604862 I | auth: deleting token rMeRySLLenVWkjVk.1583 for user conductor
2021-10-31 02:08:20.604911 I | auth: deleting token PxLUMAUGPbbwcQGA.1584 for user conductor
2021-10-31 02:08:20.905043 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:21.005795 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.466361971s) to execute
2021-10-31 02:08:21.138613 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (130.828232ms) to execute
2021-10-31 02:08:21.139792 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (131.472683ms) to execute
2021-10-31 02:08:22.566867 I | auth: deleting token PdcYGneKFMOvyXLy.1585 for user conductor
2021-10-31 02:08:22.566940 I | auth: deleting token CudDAkqiqMvAEjob.1586 for user conductor
2021-10-31 02:08:23.706005 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.86779896s) to execute
2021-10-31 02:08:25.566840 I | auth: deleting token ufBqeQbITFMNDYpT.1587 for user conductor
2021-10-31 02:08:25.905291 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:26.566787 I | auth: deleting token CmKpXSSzpTWWtMPW.1589 for user conductor
2021-10-31 02:08:26.566847 I | auth: deleting token hIXpHxTxRdQjsoZg.1588 for user conductor
2021-10-31 02:08:26.906567 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (468.010178ms) to execute
2021-10-31 02:08:28.206496 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.297765735s) to execute
2021-10-31 02:08:28.566846 I | auth: deleting token ollwFISZixmdkMFQ.1590 for user conductor
2021-10-31 02:08:29.604879 I | auth: deleting token OjgIgWupIWUPROMb.1593 for user conductor
2021-10-31 02:08:29.604932 I | auth: deleting token llIeLLdLvNCvLOzI.1594 for user conductor
2021-10-31 02:08:29.604942 I | auth: deleting token DZCOdEwfUyNeeLEN.1591 for user conductor
2021-10-31 02:08:29.604962 I | auth: deleting token lONiVgGoKzXAgGUh.1592 for user conductor
2021-10-31 02:08:30.566813 I | auth: deleting token GneXONrLlotEfNsm.1595 for user conductor
2021-10-31 02:08:30.905536 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:32.114515 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.507729163s) to execute
2021-10-31 02:08:33.510833 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.272653056s) to execute
2021-10-31 02:08:33.511225 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.306248432s) to execute
2021-10-31 02:08:33.566800 I | auth: deleting token KspiLoFGItxQIXpv.1597 for user conductor
2021-10-31 02:08:33.566835 I | auth: deleting token idCjmymdOLzZHizR.1599 for user conductor
2021-10-31 02:08:33.566848 I | auth: deleting token OEolHSnOYHtEaYIj.1600 for user conductor
2021-10-31 02:08:33.566855 I | auth: deleting token YafJZUGwmuspaQac.1598 for user conductor
2021-10-31 02:08:33.566867 I | auth: deleting token fsxzWpeQRleNHgYa.1596 for user conductor
2021-10-31 02:08:33.639558 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.434573199s) to execute
2021-10-31 02:08:34.566856 I | auth: deleting token vctzOeyeCBpstVvN.1601 for user conductor
2021-10-31 02:08:35.109046 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.467307186s) to execute
2021-10-31 02:08:35.905715 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:37.566798 I | auth: deleting token HnFchuMJjwTdRNVe.1604 for user conductor
2021-10-31 02:08:37.566846 I | auth: deleting token OOioZvzhNJhaJVRa.1602 for user conductor
2021-10-31 02:08:37.566870 I | auth: deleting token niyJJZhpKCYmepQT.1603 for user conductor
2021-10-31 02:08:37.705442 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.267185137s) to execute
2021-10-31 02:08:39.005324 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.299713355s) to execute
2021-10-31 02:08:39.005614 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.298657615s) to execute
2021-10-31 02:08:39.138711 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (131.568149ms) to execute
2021-10-31 02:08:39.140392 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (133.06039ms) to execute
2021-10-31 02:08:39.566857 I | auth: deleting token COtvHLCFwvnpgfUY.1605 for user conductor
2021-10-31 02:08:40.566829 I | auth: deleting token KdEkNjOFtdLzEVOg.1608 for user conductor
2021-10-31 02:08:40.905902 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:42.566838 I | auth: deleting token PfsDWdEjiYTJanAx.1607 for user conductor
2021-10-31 02:08:42.566883 I | auth: deleting token HsfKivtiPikKCfNV.1606 for user conductor
2021-10-31 02:08:42.566897 I | auth: deleting token QREElNVbglSGPQgt.1609 for user conductor
2021-10-31 02:08:42.566907 I | auth: deleting token IFqyJkldHVihHNZg.1611 for user conductor
2021-10-31 02:08:42.566920 I | auth: deleting token zoKIAXnqDJgAFvUm.1610 for user conductor
2021-10-31 02:08:43.566858 I | auth: deleting token SLBlLGqfxXypJTtx.1613 for user conductor
2021-10-31 02:08:43.566901 I | auth: deleting token JCkxiXmNUqzqzSzE.1612 for user conductor
2021-10-31 02:08:45.906124 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:46.566821 I | auth: deleting token jVvtYuJUsvIiZEzP.1615 for user conductor
2021-10-31 02:08:46.566848 I | auth: deleting token LPQeLlFiwwHTKPyL.1614 for user conductor
2021-10-31 02:08:46.566862 I | auth: deleting token PRYOFFIgbUSHqsFX.1617 for user conductor
2021-10-31 02:08:46.566884 I | auth: deleting token DrzCxbPfTJHJCtJJ.1616 for user conductor
2021-10-31 02:08:48.107495 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (802.531743ms) to execute
2021-10-31 02:08:49.506334 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.299258467s) to execute
2021-10-31 02:08:49.604805 I | auth: deleting token LyjmeUOhZZpSuYzb.1622 for user conductor
2021-10-31 02:08:49.604845 I | auth: deleting token dLukoycJkFXFASlF.1618 for user conductor
2021-10-31 02:08:49.604857 I | auth: deleting token lYddzksyoAeEdHMR.1619 for user conductor
2021-10-31 02:08:49.604862 I | auth: deleting token fbWjExDRpjxXHdBx.1620 for user conductor
2021-10-31 02:08:49.604878 I | auth: deleting token PWHRWUPtYgPxjdnn.1621 for user conductor
2021-10-31 02:08:50.712099 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.205685581s) to execute
2021-10-31 02:08:50.906342 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:51.566852 I | auth: deleting token QpmjyLezlihrqvzW.1623 for user conductor
2021-10-31 02:08:51.566898 I | auth: deleting token bgMXFeBWjoGswIKb.1624 for user conductor
2021-10-31 02:08:52.011196 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.503491485s) to execute
2021-10-31 02:08:52.012047 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.107093087s) to execute
2021-10-31 02:08:52.012215 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.205913866s) to execute
2021-10-31 02:08:52.140025 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (126.215118ms) to execute
2021-10-31 02:08:53.411039 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (372.66399ms) to execute
2021-10-31 02:08:54.604898 I | auth: deleting token ciolZYXkTMByMazk.1625 for user conductor
2021-10-31 02:08:54.604988 I | auth: deleting token raHlfGyhGcrFAQBd.1626 for user conductor
2021-10-31 02:08:54.605023 I | auth: deleting token xMKQdlFudWJGhhVL.1627 for user conductor
2021-10-31 02:08:54.605044 I | auth: deleting token MrnKlCdRuliSeVAN.1628 for user conductor
2021-10-31 02:08:55.509000 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.070572431s) to execute
2021-10-31 02:08:55.566810 I | auth: deleting token SXugSAgyeNVAEgfv.1630 for user conductor
2021-10-31 02:08:55.566854 I | auth: deleting token EFaeYDqNuCnoSicg.1629 for user conductor
2021-10-31 02:08:55.906485 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:08:56.566792 I | auth: deleting token JWVNbuSFJpoPqhQP.1631 for user conductor
2021-10-31 02:08:56.566851 I | auth: deleting token JJZFcgRDwxhWUcnN.1632 for user conductor
2021-10-31 02:08:56.912980 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.074715106s) to execute
2021-10-31 02:08:58.314444 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.07552653s) to execute
2021-10-31 02:08:58.566838 I | auth: deleting token YBHynqAnyHhVlhqR.1633 for user conductor
2021-10-31 02:08:58.566897 I | auth: deleting token dgLhGSCradLSwOgi.1634 for user conductor
2021-10-31 02:08:59.566854 I | auth: deleting token cpkvbPUILlPXhquH.1635 for user conductor
2021-10-31 02:09:00.906702 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:00.911028 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.573008424s) to execute
2021-10-31 02:09:01.038225 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (125.320465ms) to execute
2021-10-31 02:09:02.505695 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (500.709837ms) to execute
2021-10-31 02:09:02.566869 I | auth: deleting token LHnUwFKFMAetqAqF.1638 for user conductor
2021-10-31 02:09:02.566921 I | auth: deleting token qJONwbWYLSjXHfrz.1637 for user conductor
2021-10-31 02:09:02.566945 I | auth: deleting token ZwhEspCdsDmnUcHO.1636 for user conductor
2021-10-31 02:09:02.566964 I | auth: deleting token KTIGkjIlCNXKxtQo.1639 for user conductor
2021-10-31 02:09:03.709126 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.070616279s) to execute
2021-10-31 02:09:04.566840 I | auth: deleting token UUSHTLKqIOZOZIGT.1642 for user conductor
2021-10-31 02:09:04.566889 I | auth: deleting token aaNrhIUyMcMhfDam.1643 for user conductor
2021-10-31 02:09:04.566900 I | auth: deleting token JQbIrOEyxrmnwDSB.1641 for user conductor
2021-10-31 02:09:04.566910 I | auth: deleting token iAQwrFpUbnuHIEmP.1640 for user conductor
2021-10-31 02:09:05.007011 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.295740393s) to execute
2021-10-31 02:09:05.007166 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.296653342s) to execute
2021-10-31 02:09:05.906903 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:06.209396 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200035542s) to execute
2021-10-31 02:09:06.209608 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.201081311s) to execute
2021-10-31 02:09:07.566867 I | auth: deleting token MmMgmqZIoLeRvIbl.1645 for user conductor
2021-10-31 02:09:07.566913 I | auth: deleting token TLOfIMrNhjbawvZH.1646 for user conductor
2021-10-31 02:09:07.566924 I | auth: deleting token LkgufudmpcVTCkmH.1644 for user conductor
2021-10-31 02:09:07.606033 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.167566614s) to execute
2021-10-31 02:09:08.805572 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.593383906s) to execute
2021-10-31 02:09:09.566871 I | auth: deleting token vsfbRzYmddtUUldA.1647 for user conductor
2021-10-31 02:09:10.010254 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.304127828s) to execute
2021-10-31 02:09:10.010808 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.30580501s) to execute
2021-10-31 02:09:10.239511 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (134.477017ms) to execute
2021-10-31 02:09:10.907127 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:11.507713 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.402632579s) to execute
2021-10-31 02:09:11.507803 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.267642731s) to execute
2021-10-31 02:09:12.566816 I | auth: deleting token IIjbDKImJbygVIxd.1649 for user conductor
2021-10-31 02:09:12.566855 I | auth: deleting token nGQncNwsIGTUKroB.1650 for user conductor
2021-10-31 02:09:12.566871 I | auth: deleting token CTjBHJcvEJABRzqh.1651 for user conductor
2021-10-31 02:09:12.566893 I | auth: deleting token BcrkCjJwsluLwIMR.1648 for user conductor
2021-10-31 02:09:12.906380 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.301390088s) to execute
2021-10-31 02:09:13.604870 I | auth: deleting token yHjDTxgbxesvRBRb.1652 for user conductor
2021-10-31 02:09:14.108310 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.199369247s) to execute
2021-10-31 02:09:14.108480 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (903.48324ms) to execute
2021-10-31 02:09:15.606854 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (168.677277ms) to execute
2021-10-31 02:09:15.907400 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:18.566883 I | auth: deleting token EDjndtMTWYwwkIFk.1653 for user conductor
2021-10-31 02:09:19.108062 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.168242335s) to execute
2021-10-31 02:09:19.238676 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (128.255901ms) to execute
2021-10-31 02:09:19.566843 I | auth: deleting token RuWPQqtfqTVlrngd.1656 for user conductor
2021-10-31 02:09:19.566890 I | auth: deleting token TjCcGAeaLOWMsxbt.1657 for user conductor
2021-10-31 02:09:19.566903 I | auth: deleting token rnPZqEHpVqlvlHYr.1654 for user conductor
2021-10-31 02:09:19.566910 I | auth: deleting token CuYrTgOgBsfNnXVJ.1658 for user conductor
2021-10-31 02:09:19.566921 I | auth: deleting token IEdHUoKCqzmrDtLg.1655 for user conductor
2021-10-31 02:09:20.566897 I | auth: deleting token xUknEOvyAMEDowbk.1660 for user conductor
2021-10-31 02:09:20.566942 I | auth: deleting token hYeWWNQGLZUnlgJh.1659 for user conductor
2021-10-31 02:09:20.605321 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (366.962948ms) to execute
2021-10-31 02:09:20.907651 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:22.011380 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (206.323624ms) to execute
2021-10-31 02:09:22.566891 I | auth: deleting token YxhMhPemtourqfEp.1662 for user conductor
2021-10-31 02:09:22.566977 I | auth: deleting token iflyHkrDPnNjYQtE.1661 for user conductor
2021-10-31 02:09:23.566821 I | auth: deleting token jOHugRVXgyCepLUS.1663 for user conductor
2021-10-31 02:09:25.413957 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (708.900065ms) to execute
2021-10-31 02:09:25.651679 I | auth: deleting token npYIvhRFQSICyHLu.1664 for user conductor
2021-10-31 02:09:25.907872 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:26.806397 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.383459992s) to execute
2021-10-31 02:09:27.566849 I | auth: deleting token dtPCGphcnXNChUcb.1665 for user conductor
2021-10-31 02:09:27.566897 I | auth: deleting token CbEWPbZfckeQXKuF.1667 for user conductor
2021-10-31 02:09:28.006015 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.167897876s) to execute
2021-10-31 02:09:29.307696 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.498886974s) to execute
2021-10-31 02:09:29.307806 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.267912195s) to execute
2021-10-31 02:09:29.307902 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.299806872s) to execute
2021-10-31 02:09:29.604984 I | auth: deleting token tKoZgobSbpynkLWS.1669 for user conductor
2021-10-31 02:09:29.605106 I | auth: deleting token hnzTVMLigwgJCAdf.1666 for user conductor
2021-10-31 02:09:29.605407 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (294.100081ms) to execute
2021-10-31 02:09:30.604876 I | auth: deleting token hziXbxuTzEXqgbZS.1670 for user conductor
2021-10-31 02:09:30.604932 I | auth: deleting token XvYGTWisnydDOpAY.1671 for user conductor
2021-10-31 02:09:30.604976 I | auth: deleting token fJsMkFuWkrawijmX.1668 for user conductor
2021-10-31 02:09:30.908052 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:32.566842 I | auth: deleting token JACeVWnxYStdkQta.1674 for user conductor
2021-10-31 02:09:32.566888 I | auth: deleting token ceuKBWsILXEOOgOT.1672 for user conductor
2021-10-31 02:09:32.566903 I | auth: deleting token nxXAFEOvbJwoXdIo.1673 for user conductor
2021-10-31 02:09:33.315701 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.475983376s) to execute
2021-10-31 02:09:33.566869 I | auth: deleting token tlllbHpbsMEnVjPt.1675 for user conductor
2021-10-31 02:09:34.566836 I | auth: deleting token ViSFIXimtKfXghST.1676 for user conductor
2021-10-31 02:09:34.566883 I | auth: deleting token vlKRluQYOAnaVJbI.1677 for user conductor
2021-10-31 02:09:34.711931 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (373.647748ms) to execute
2021-10-31 02:09:35.908219 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:36.106089 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.299288635s) to execute
2021-10-31 02:09:36.238383 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (130.845964ms) to execute
2021-10-31 02:09:36.604855 I | auth: deleting token xtbQOSPMnkvzPhMZ.1678 for user conductor
2021-10-31 02:09:36.604902 I | auth: deleting token fUyTtfeSadqtTivo.1680 for user conductor
2021-10-31 02:09:36.604911 I | auth: deleting token hmcYjUKNojBzGAYq.1679 for user conductor
2021-10-31 02:09:37.566841 I | auth: deleting token nlatElwbuvoLfYZT.1681 for user conductor
2021-10-31 02:09:38.604827 I | auth: deleting token LAfsjvRatkiZGOIf.1683 for user conductor
2021-10-31 02:09:38.604888 I | auth: deleting token MHzrQbtFVerbSnOb.1682 for user conductor
2021-10-31 02:09:38.809993 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.104975736s) to execute
2021-10-31 02:09:40.107035 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.168387086s) to execute
2021-10-31 02:09:40.566909 I | auth: deleting token yFHxLxnGZSzoKBvk.1685 for user conductor
2021-10-31 02:09:40.908401 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:41.411030 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.303817049s) to execute
2021-10-31 02:09:41.411168 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.302483284s) to execute
2021-10-31 02:09:41.411301 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.590946982s) to execute
2021-10-31 02:09:42.905742 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (561.899438ms) to execute
2021-10-31 02:09:43.566801 I | auth: deleting token OmQkdgjxiZyjkUID.1684 for user conductor
2021-10-31 02:09:43.566935 I | auth: deleting token rErhYkEUEiPDHGWk.1686 for user conductor
2021-10-31 02:09:43.566976 I | auth: deleting token xOcayFlGnHbVlTKY.1688 for user conductor
2021-10-31 02:09:43.566997 I | auth: deleting token FzfsMZtJGQyUlkKC.1687 for user conductor
2021-10-31 02:09:44.107205 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.002239008s) to execute
2021-10-31 02:09:44.238663 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (129.581151ms) to execute
2021-10-31 02:09:45.908549 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:46.507144 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.068962112s) to execute
2021-10-31 02:09:46.604904 I | auth: deleting token KmbLUcCtgqVTzZcU.1690 for user conductor
2021-10-31 02:09:46.604942 I | auth: deleting token zFoSjNUwbXHzYioP.1689 for user conductor
2021-10-31 02:09:46.738235 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (130.926724ms) to execute
2021-10-31 02:09:47.604911 I | auth: deleting token BNRsOxGoxPmKXCmj.1691 for user conductor
2021-10-31 02:09:48.011874 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.104885446s) to execute
2021-10-31 02:09:49.566833 I | auth: deleting token DPmmvpQiEHxhxViz.1692 for user conductor
2021-10-31 02:09:50.566900 I | auth: deleting token BiEnPRUIIVSVreuM.1693 for user conductor
2021-10-31 02:09:50.908732 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 02:09:50.910489 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200379607s) to execute
2021-10-31 02:09:52.210763 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (666.786467ms) to execute
2021-10-31 02:09:52.566838 I | auth: deleting token zIKHCGGADvBsWoki.1694 for user conductor
2021-10-31 02:09:53.607418 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (502.406403ms) to execute
2021-10-31 02:09:53.623866 I | auth: deleting token aVHFnyrYkxmYFaVv.1695 for user conductor
2021-10-31 02:09:55.908923 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:09:57.604786 I | auth: deleting token MfTMSETWwuDUjkFt.1699 for user conductor
2021-10-31 02:09:57.604833 I | auth: deleting token nZEigGhVGTTKvByV.1697 for user conductor
2021-10-31 02:09:57.604849 I | auth: deleting token OFebINqrqtojtLON.1698 for user conductor
2021-10-31 02:09:57.604862 I | auth: deleting token rvpvzSnrHAHyUABE.1696 for user conductor
2021-10-31 02:09:57.909165 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.202421883s) to execute
2021-10-31 02:09:59.108223 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.198940896s) to execute
2021-10-31 02:09:59.108434 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.197758998s) to execute
2021-10-31 02:09:59.212904 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.325319ms) to execute
2021-10-31 02:10:00.405639 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.198071787s) to execute
2021-10-31 02:10:00.566873 I | auth: deleting token EfaBolrFaWjmRfEx.1702 for user conductor
2021-10-31 02:10:00.566944 I | auth: deleting token ieHWixmCbljgtLRr.1700 for user conductor
2021-10-31 02:10:00.566959 I | auth: deleting token lgmfJWfxsJEZxZKz.1701 for user conductor
2021-10-31 02:10:00.566979 I | auth: deleting token VKZiAgAwYtxQKeKE.1703 for user conductor
2021-10-31 02:10:00.909137 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:01.605602 I | auth: deleting token WRNsIwPBOzAbrAfS.1704 for user conductor
2021-10-31 02:10:01.610139 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.169967175s) to execute
2021-10-31 02:10:02.907146 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.102025945s) to execute
2021-10-31 02:10:02.907361 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.101123455s) to execute
2021-10-31 02:10:03.566845 I | auth: deleting token SvVJZCkYQTcvoZKi.1705 for user conductor
2021-10-31 02:10:04.111106 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.201977197s) to execute
2021-10-31 02:10:04.111371 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.171431093s) to execute
2021-10-31 02:10:04.111518 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (573.215922ms) to execute
2021-10-31 02:10:04.604826 I | auth: deleting token PfJtMTpxSkvSFoOw.1706 for user conductor
2021-10-31 02:10:05.309753 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.070273149s) to execute
2021-10-31 02:10:05.438652 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (127.159899ms) to execute
2021-10-31 02:10:05.604890 I | auth: deleting token xseziLMQGRvUwEkD.1707 for user conductor
2021-10-31 02:10:05.909312 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:07.812382 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.573905916s) to execute
2021-10-31 02:10:08.605008 I | auth: deleting token ARzkRQxoBghlHuuO.1709 for user conductor
2021-10-31 02:10:08.605051 I | auth: deleting token jxDYWVZGATalOsBx.1708 for user conductor
2021-10-31 02:10:09.008824 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.102938592s) to execute
2021-10-31 02:10:09.009007 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.180424214s) to execute
2021-10-31 02:10:09.566830 I | auth: deleting token uyNhFyMdBNhcQhPx.1710 for user conductor
2021-10-31 02:10:09.566869 I | auth: deleting token qlMIQnpwNzjshsbV.1711 for user conductor
2021-10-31 02:10:10.604854 I | auth: deleting token qZSfGmQRIrmaHuCm.1712 for user conductor
2021-10-31 02:10:10.909477 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:11.507742 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.30065389s) to execute
2021-10-31 02:10:11.508130 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.30077376s) to execute
2021-10-31 02:10:11.566866 I | auth: deleting token InUsDlvLIebVbjnR.1713 for user conductor
2021-10-31 02:10:11.566919 I | auth: deleting token wggByKtioMypkHxb.1714 for user conductor
2021-10-31 02:10:12.711523 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.201993482s) to execute
2021-10-31 02:10:13.604804 I | auth: deleting token hYPIUdbmFciSnhDX.1715 for user conductor
2021-10-31 02:10:13.905862 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.299253756s) to execute
2021-10-31 02:10:13.905963 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.299062916s) to execute
2021-10-31 02:10:13.906044 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.19249884s) to execute
2021-10-31 02:10:14.038292 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (130.522765ms) to execute
2021-10-31 02:10:15.566831 I | auth: deleting token phFOYYhsBOorqzQC.1716 for user conductor
2021-10-31 02:10:15.566890 I | auth: deleting token DVLnDEiaTmhvRibv.1717 for user conductor
2021-10-31 02:10:16.006027 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:16.507831 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.301092896s) to execute
2021-10-31 02:10:16.566849 I | auth: deleting token oRRCLieNsXUVSoHd.1718 for user conductor
2021-10-31 02:10:16.566883 I | auth: deleting token gWncrjewmNckOENf.1719 for user conductor
2021-10-31 02:10:17.566828 I | auth: deleting token wcWLOTMruzLhgyCc.1721 for user conductor
2021-10-31 02:10:17.566942 I | auth: deleting token LCJMIDRYZusnyLzW.1720 for user conductor
2021-10-31 02:10:19.566871 I | auth: deleting token ISQFagFggopOiWca.1723 for user conductor
2021-10-31 02:10:19.566970 I | auth: deleting token czDOcFXsNkQUXULI.1722 for user conductor
2021-10-31 02:10:20.566893 I | auth: deleting token CScGGieDuEWPMPMS.1724 for user conductor
2021-10-31 02:10:21.006190 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:22.306945 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.666586664s) to execute
2021-10-31 02:10:22.566934 I | auth: deleting token BVIsRvrokBJBMXyB.1725 for user conductor
2021-10-31 02:10:23.604836 I | auth: deleting token GObXKuSUgsrzDpGy.1726 for user conductor
2021-10-31 02:10:24.708067 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.398646203s) to execute
2021-10-31 02:10:24.708290 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.399195176s) to execute
2021-10-31 02:10:25.566854 I | auth: deleting token UmBClshzhamRkHuh.1727 for user conductor
2021-10-31 02:10:25.911291 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.201436111s) to execute
2021-10-31 02:10:25.911473 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.201942908s) to execute
2021-10-31 02:10:25.911602 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.199189057s) to execute
2021-10-31 02:10:26.006366 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:26.566802 I | auth: deleting token rWfKJTeTolmxjerM.1729 for user conductor
2021-10-31 02:10:26.566847 I | auth: deleting token SFzqBCtYUafXbCDY.1728 for user conductor
2021-10-31 02:10:27.206500 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.198855685s) to execute
2021-10-31 02:10:28.309035 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (970.922655ms) to execute
2021-10-31 02:10:29.415941 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (977.0839ms) to execute
2021-10-31 02:10:29.416101 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.011110756s) to execute
2021-10-31 02:10:29.539131 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (121.701657ms) to execute
2021-10-31 02:10:29.604771 I | auth: deleting token lbMwfrCBAmtCCDZe.1730 for user conductor
2021-10-31 02:10:29.604817 I | auth: deleting token ySGucmWPCYDOfPDp.1731 for user conductor
2021-10-31 02:10:29.604826 I | auth: deleting token boIYJbbjSKTJtLDe.1732 for user conductor
2021-10-31 02:10:29.738395 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (198.118551ms) to execute
2021-10-31 02:10:30.809706 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (471.369307ms) to execute
2021-10-31 02:10:31.006595 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:31.566830 I | auth: deleting token sVzwvFDQWeflTEgU.1733 for user conductor
2021-10-31 02:10:32.009432 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.071243215s) to execute
2021-10-31 02:10:33.307519 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (269.455061ms) to execute
2021-10-31 02:10:33.566807 I | auth: deleting token ORhycNVPprKVIQdy.1735 for user conductor
2021-10-31 02:10:33.566843 I | auth: deleting token gIxYqvlWDCbKPDjo.1734 for user conductor
2021-10-31 02:10:33.566854 I | auth: deleting token KsmRrRtMsvbZNQXh.1738 for user conductor
2021-10-31 02:10:33.566860 I | auth: deleting token rAyDerDwRcHiNFYy.1736 for user conductor
2021-10-31 02:10:33.566880 I | auth: deleting token zYzDRNZgiwQTLuBp.1737 for user conductor
2021-10-31 02:10:34.412100 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.074095185s) to execute
2021-10-31 02:10:35.612673 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.199249356s) to execute
2021-10-31 02:10:35.613009 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.007852642s) to execute
2021-10-31 02:10:36.006770 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:36.812457 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.106707698s) to execute
2021-10-31 02:10:36.812612 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.1820569s) to execute
2021-10-31 02:10:38.604795 I | auth: deleting token dtyREMUjRyYhqKFT.1742 for user conductor
2021-10-31 02:10:38.604834 I | auth: deleting token yPKqjxAfZYmLMvOg.1740 for user conductor
2021-10-31 02:10:39.109029 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.203983774s) to execute
2021-10-31 02:10:39.109090 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.200743318s) to execute
2021-10-31 02:10:39.109164 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.204157271s) to execute
2021-10-31 02:10:39.238448 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.902471ms) to execute
2021-10-31 02:10:39.590047 I | auth: deleting token ewoHroZebIlFFoOR.1744 for user conductor
2021-10-31 02:10:39.590094 I | auth: deleting token pVfuFkcZYTppTbMB.1741 for user conductor
2021-10-31 02:10:39.590128 I | auth: deleting token LjniMDKxXUohZjIc.1739 for user conductor
2021-10-31 02:10:39.590153 I | auth: deleting token ZbXkHDLepaCjsEWo.1743 for user conductor
2021-10-31 02:10:40.404990 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.198611595s) to execute
2021-10-31 02:10:40.405358 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.067039422s) to execute
2021-10-31 02:10:41.006958 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:41.566868 I | auth: deleting token vZxvyNfXsOgiMFBu.1747 for user conductor
2021-10-31 02:10:41.566908 I | auth: deleting token edMOsoQrEkLyoaYX.1746 for user conductor
2021-10-31 02:10:41.566918 I | auth: deleting token wMusnkTVdZLVcAkM.1745 for user conductor
2021-10-31 02:10:41.609078 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.10092464s) to execute
2021-10-31 02:10:41.838280 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (191.363293ms) to execute
2021-10-31 02:10:42.913340 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (773.540979ms) to execute
2021-10-31 02:10:43.566859 I | auth: deleting token iARNNhFUCkeBylIA.1749 for user conductor
2021-10-31 02:10:43.566922 I | auth: deleting token rJNBhkQJTlCLZSyN.1748 for user conductor
2021-10-31 02:10:43.566932 I | auth: deleting token NHYsqJgIfqxntRvy.1750 for user conductor
2021-10-31 02:10:44.566867 I | auth: deleting token FTqZMsdUrJSuiBri.1751 for user conductor
2021-10-31 02:10:45.305879 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (564.487715ms) to execute
2021-10-31 02:10:45.604817 I | auth: deleting token kpXwkLugdIrrXOii.1753 for user conductor
2021-10-31 02:10:45.604866 I | auth: deleting token RbBPWlemmWVPUvFD.1752 for user conductor
2021-10-31 02:10:46.104974 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:46.605105 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.28610395s) to execute
2021-10-31 02:10:47.566855 I | auth: deleting token DNpdVaJCsdapTIIy.1755 for user conductor
2021-10-31 02:10:47.566899 I | auth: deleting token RgEcOvFTwVHWnpMf.1756 for user conductor
2021-10-31 02:10:47.566927 I | auth: deleting token nthRpOVNMLIEpzLC.1754 for user conductor
2021-10-31 02:10:47.711015 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.105818419s) to execute
2021-10-31 02:10:48.905386 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.19428509s) to execute
2021-10-31 02:10:48.905633 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.298566966s) to execute
2021-10-31 02:10:49.566815 I | auth: deleting token bylxXPalyqvbrGzC.1758 for user conductor
2021-10-31 02:10:49.566867 I | auth: deleting token ErXaINgUHbvCBgLB.1757 for user conductor
2021-10-31 02:10:50.207888 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (500.719035ms) to execute
2021-10-31 02:10:51.105229 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:51.566864 I | auth: deleting token HXKcNHERIaytzCpa.1759 for user conductor
2021-10-31 02:10:51.566911 I | auth: deleting token erzhqfGoRiKfdsQk.1760 for user conductor
2021-10-31 02:10:51.566924 I | auth: deleting token AEkXNLkvVcSFTpoX.1761 for user conductor
2021-10-31 02:10:52.211533 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.071238291s) to execute
2021-10-31 02:10:52.566861 I | auth: deleting token PZywUpiOMYkmbmUI.1763 for user conductor
2021-10-31 02:10:52.566927 I | auth: deleting token WLZdBQdBUaayurxv.1762 for user conductor
2021-10-31 02:10:53.407608 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (869.375011ms) to execute
2021-10-31 02:10:53.566853 I | auth: deleting token pNoKrgzIBieyKxvu.1764 for user conductor
2021-10-31 02:10:53.566938 I | auth: deleting token wmzdljBugIyawVfq.1765 for user conductor
2021-10-31 02:10:54.709883 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (770.141563ms) to execute
2021-10-31 02:10:55.604851 I | auth: deleting token AmgYazUWEPGgRFKi.1766 for user conductor
2021-10-31 02:10:56.012516 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (407.565936ms) to execute
2021-10-31 02:10:56.105468 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:10:56.566795 I | auth: deleting token LuiQgFvjmPHGOIvi.1769 for user conductor
2021-10-31 02:10:56.566851 I | auth: deleting token LOkhhcSTaCEPQbuK.1767 for user conductor
2021-10-31 02:10:56.566874 I | auth: deleting token CDxCloUPqjheyESG.1768 for user conductor
2021-10-31 02:10:58.408700 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.26900001s) to execute
2021-10-31 02:10:58.538443 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (128.166581ms) to execute
2021-10-31 02:10:58.540363 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (129.632297ms) to execute
2021-10-31 02:10:58.540517 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (101.077251ms) to execute
2021-10-31 02:10:58.566847 I | auth: deleting token QZmdZXOnRNiAEqqN.1771 for user conductor
2021-10-31 02:10:58.566905 I | auth: deleting token hivBhSvZHkOqZIqz.1770 for user conductor
2021-10-31 02:11:00.604861 I | auth: deleting token QHWqXMpxIgfFfhyO.1773 for user conductor
2021-10-31 02:11:00.604911 I | auth: deleting token oyLBCHuiBjiMZOIp.1772 for user conductor
2021-10-31 02:11:01.105681 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:01.604919 I | auth: deleting token vlCUmHbTabUowEei.1774 for user conductor
2021-10-31 02:11:01.909623 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.971460068s) to execute
2021-10-31 02:11:02.604827 I | auth: deleting token QbfoPJncGVqfxUOX.1775 for user conductor
2021-10-31 02:11:02.604878 I | auth: deleting token IZuqSBQqJmoUMWqI.1776 for user conductor
2021-10-31 02:11:03.566817 I | auth: deleting token eGJRhxKtjYGjtdPe.1778 for user conductor
2021-10-31 02:11:03.566876 I | auth: deleting token YnawplMXNECpTrWt.1777 for user conductor
2021-10-31 02:11:05.566861 I | auth: deleting token QimqQDKVUfQaRGCT.1779 for user conductor
2021-10-31 02:11:05.566929 I | auth: deleting token JGwGauNqDWjlpOES.1780 for user conductor
2021-10-31 02:11:05.566936 I | auth: deleting token LnSNKuyGBSBXuUhN.1781 for user conductor
2021-10-31 02:11:05.608494 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.603406244s) to execute
2021-10-31 02:11:05.608786 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (3.696598368s) to execute
2021-10-31 02:11:06.105936 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:07.604864 I | auth: deleting token dmJpJfWZIlgUgLJq.1782 for user conductor
2021-10-31 02:11:08.604820 I | auth: deleting token xcuuHGSwstJkPuDM.1783 for user conductor
2021-10-31 02:11:10.566842 I | auth: deleting token QBQTDbFpuCGLMMco.1784 for user conductor
2021-10-31 02:11:10.607199 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.697037601s) to execute
2021-10-31 02:11:11.106132 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:11.566886 I | auth: deleting token LHjwQjQMwajtQVXU.1785 for user conductor
2021-10-31 02:11:12.566852 I | auth: deleting token WhqNLJoZnamKRrOw.1786 for user conductor
2021-10-31 02:11:15.566888 I | auth: deleting token QITiowWxvJEvKTNK.1787 for user conductor
2021-10-31 02:11:16.106315 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:16.566862 I | auth: deleting token QcUMFJwqjBJNlSze.1789 for user conductor
2021-10-31 02:11:19.566830 I | auth: deleting token wDmCOrrvbHzUCcJT.1792 for user conductor
2021-10-31 02:11:19.566867 I | auth: deleting token XrSFQAkqEAjXkPwM.1788 for user conductor
2021-10-31 02:11:19.566873 I | auth: deleting token BmZVXftyGcZzkbER.1791 for user conductor
2021-10-31 02:11:19.566880 I | auth: deleting token TjLpkYhUvayIuVGZ.1793 for user conductor
2021-10-31 02:11:19.566899 I | auth: deleting token xHagNlVsMVKhaMet.1794 for user conductor
2021-10-31 02:11:19.566912 I | auth: deleting token tvATSUNyNZcegThp.1790 for user conductor
2021-10-31 02:11:21.106540 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:21.808566 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (264.933647ms) to execute
2021-10-31 02:11:23.566816 I | auth: deleting token xyPECbwKDGYNUErC.1796 for user conductor
2021-10-31 02:11:23.566872 I | auth: deleting token gtGJocmemIOMHTKl.1795 for user conductor
2021-10-31 02:11:24.566823 I | auth: deleting token TVcvskZQWBoZWSrD.1798 for user conductor
2021-10-31 02:11:24.566873 I | auth: deleting token jVbKfpffNqnBumEL.1799 for user conductor
2021-10-31 02:11:24.566886 I | auth: deleting token xbiCAaKSFraeQset.1800 for user conductor
2021-10-31 02:11:24.566899 I | auth: deleting token puRgRfyELABSFBxX.1797 for user conductor
2021-10-31 02:11:25.508442 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.193029965s) to execute
2021-10-31 02:11:26.106736 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:27.566834 I | auth: deleting token TyMYIRrcQIYLxiHe.1801 for user conductor
2021-10-31 02:11:27.566901 I | auth: deleting token XcZWBErFKoSrDREL.1803 for user conductor
2021-10-31 02:11:28.008657 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.003596738s) to execute
2021-10-31 02:11:28.566787 I | auth: deleting token LyJUmFYixXMAoxKI.1802 for user conductor
2021-10-31 02:11:28.566813 I | auth: deleting token SZIGpGgxzddNzjnF.1805 for user conductor
2021-10-31 02:11:29.566855 I | auth: deleting token jwYtzSLbDIEJFyxk.1807 for user conductor
2021-10-31 02:11:29.566891 I | auth: deleting token OjgyOsHZdqgANdZU.1804 for user conductor
2021-10-31 02:11:29.566903 I | auth: deleting token PZrRfdNcMfJFMNFp.1806 for user conductor
2021-10-31 02:11:30.208512 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (103.542554ms) to execute
2021-10-31 02:11:31.106940 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:31.509329 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (169.428786ms) to execute
2021-10-31 02:11:31.638181 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (123.701905ms) to execute
2021-10-31 02:11:32.566859 I | auth: deleting token vzeshdGrSQJZVAvF.1808 for user conductor
2021-10-31 02:11:32.566926 I | auth: deleting token IQCvklVgpmkTbuSO.1809 for user conductor
2021-10-31 02:11:32.566945 I | auth: deleting token LOVTekCAhfgLsJWP.1810 for user conductor
2021-10-31 02:11:32.566968 I | auth: deleting token RRGGATrpqceqHkge.1811 for user conductor
2021-10-31 02:11:34.239136 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (197.492309ms) to execute
2021-10-31 02:11:35.566821 I | auth: deleting token PkahzpATvIQISTkm.1813 for user conductor
2021-10-31 02:11:36.107168 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:36.566806 I | auth: deleting token jALFhJbJNxUOJvnb.1812 for user conductor
2021-10-31 02:11:37.566851 I | auth: deleting token YKNTauheaOTBtlBi.1814 for user conductor
2021-10-31 02:11:37.566915 I | auth: deleting token hWFOWZSwoSAmLXAk.1815 for user conductor
2021-10-31 02:11:37.613321 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.206567253s) to execute
2021-10-31 02:11:37.738654 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (123.734184ms) to execute
2021-10-31 02:11:37.739862 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (113.901616ms) to execute
2021-10-31 02:11:38.566845 I | auth: deleting token CCiTibQyZVBNgNSt.1816 for user conductor
2021-10-31 02:11:39.566809 I | auth: deleting token jzxQkDQSpJqipbby.1818 for user conductor
2021-10-31 02:11:39.566841 I | auth: deleting token bcqawaQJGTVZBdEB.1817 for user conductor
2021-10-31 02:11:40.566861 I | auth: deleting token aFWAJOIZHVFVcayq.1819 for user conductor
2021-10-31 02:11:41.107384 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:41.407450 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.869319111s) to execute
2021-10-31 02:11:41.538452 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (128.303651ms) to execute
2021-10-31 02:11:41.538528 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (128.405632ms) to execute
2021-10-31 02:11:41.566871 I | auth: deleting token qlaWlvJHStWwuYIj.1820 for user conductor
2021-10-31 02:11:43.566847 I | auth: deleting token fuxcjOZuqMwhSXPP.1822 for user conductor
2021-10-31 02:11:43.566906 I | auth: deleting token FwKsCdObVwDwviIR.1821 for user conductor
2021-10-31 02:11:43.566915 I | auth: deleting token DuOiAKUtVSOwxBlK.1823 for user conductor
2021-10-31 02:11:43.710186 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.068736487s) to execute
2021-10-31 02:11:44.566859 I | auth: deleting token fqknPjyunAhByyDy.1825 for user conductor
2021-10-31 02:11:44.566904 I | auth: deleting token SLErTRMWhqTuvoWY.1824 for user conductor
2021-10-31 02:11:44.910414 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.170403846s) to execute
2021-10-31 02:11:45.566845 I | auth: deleting token qrUmXrdglmuJfjHD.1826 for user conductor
2021-10-31 02:11:46.105713 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.19247318s) to execute
2021-10-31 02:11:46.105879 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.193973087s) to execute
2021-10-31 02:11:46.107573 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:47.309973 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.202298965s) to execute
2021-10-31 02:11:47.310227 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.200640083s) to execute
2021-10-31 02:11:47.566830 I | auth: deleting token YbHcWNURNakhCSdP.1827 for user conductor
2021-10-31 02:11:47.566879 I | auth: deleting token bbpqOOnuEUoiijIL.1828 for user conductor
2021-10-31 02:11:48.566819 I | auth: deleting token aNtEBbmdgJeqkYbW.1830 for user conductor
2021-10-31 02:11:48.566870 I | auth: deleting token KNSyBHmceBqDJngX.1829 for user conductor
2021-10-31 02:11:49.604832 I | auth: deleting token ASymRrFosAWuIQBg.1831 for user conductor
2021-10-31 02:11:49.709020 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.304083628s) to execute
2021-10-31 02:11:50.912236 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200418727s) to execute
2021-10-31 02:11:50.912397 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.201602057s) to execute
2021-10-31 02:11:50.912726 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.201601568s) to execute
2021-10-31 02:11:51.107829 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:51.566877 I | auth: deleting token pNnmCwqSsGxaferA.1832 for user conductor
2021-10-31 02:11:51.566942 I | auth: deleting token WcyJMbYgNynRDtHF.1833 for user conductor
2021-10-31 02:11:52.208428 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.201637784s) to execute
2021-10-31 02:11:52.208631 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.2036069s) to execute
2021-10-31 02:11:52.604883 I | auth: deleting token FxbpjShZUXMiuNGi.1835 for user conductor
2021-10-31 02:11:52.604951 I | auth: deleting token ERWbrMjPRisFUTvQ.1834 for user conductor
2021-10-31 02:11:53.409238 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.168338521s) to execute
2021-10-31 02:11:53.409360 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.199554919s) to execute
2021-10-31 02:11:53.409597 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (102.478565ms) to execute
2021-10-31 02:11:54.604870 I | auth: deleting token DCjOQFbuIrHlkqXV.1836 for user conductor
2021-10-31 02:11:54.709321 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.069040134s) to execute
2021-10-31 02:11:55.038466 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.532009ms) to execute
2021-10-31 02:11:55.604854 I | auth: deleting token eWFatMAhDPhYHlcm.1837 for user conductor
2021-10-31 02:11:56.108014 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:11:56.566860 I | auth: deleting token hzFHAYqXdmpHPLqK.1839 for user conductor
2021-10-31 02:11:56.566901 I | auth: deleting token pQoRXelqaGJjdZIv.1838 for user conductor
2021-10-31 02:11:57.506133 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200276344s) to execute
2021-10-31 02:11:57.566817 I | auth: deleting token VqbeNvcZDtWSXRww.1840 for user conductor
2021-10-31 02:11:57.566883 I | auth: deleting token raAPQqFGMCTXCoqC.1841 for user conductor
2021-10-31 02:11:58.709837 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (668.142503ms) to execute
2021-10-31 02:11:59.566845 I | auth: deleting token eHAvIYzLtGsotKGg.1843 for user conductor
2021-10-31 02:11:59.566894 I | auth: deleting token qaisLQiaogTYtSvi.1842 for user conductor
2021-10-31 02:12:00.008829 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (470.704939ms) to execute
2021-10-31 02:12:00.651650 I | auth: deleting token ODMVOSiszyWsipLQ.1844 for user conductor
2021-10-31 02:12:01.108215 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:01.305975 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (467.736322ms) to execute
2021-10-31 02:12:02.510406 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (303.455708ms) to execute
2021-10-31 02:12:02.566843 I | auth: deleting token nVzSXZyhDdGEijFP.1845 for user conductor
2021-10-31 02:12:03.566845 I | auth: deleting token nGLOFPVpDzODmwbw.1846 for user conductor
2021-10-31 02:12:04.408719 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (868.274314ms) to execute
2021-10-31 02:12:05.566880 I | auth: deleting token yFYNyCbmymESxIjy.1847 for user conductor
2021-10-31 02:12:05.608095 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.069717714s) to execute
2021-10-31 02:12:06.108378 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:08.009156 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.47081321s) to execute
2021-10-31 02:12:08.566860 I | auth: deleting token chgZjxtBObhcpROB.1849 for user conductor
2021-10-31 02:12:08.566898 I | auth: deleting token hUAosHyJJwkjFqMX.1851 for user conductor
2021-10-31 02:12:09.207405 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.196145299s) to execute
2021-10-31 02:12:09.207560 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.196668032s) to execute
2021-10-31 02:12:09.566803 I | auth: deleting token DaRoSEUuPjiXMnqW.1850 for user conductor
2021-10-31 02:12:09.566861 I | auth: deleting token kBgwdMHEtWRYWVGQ.1848 for user conductor
2021-10-31 02:12:09.566871 I | auth: deleting token bEGAxRwQreMQXgGi.1852 for user conductor
2021-10-31 02:12:10.405900 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.166180749s) to execute
2021-10-31 02:12:10.406125 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.197239176s) to execute
2021-10-31 02:12:10.638902 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (227.712104ms) to execute
2021-10-31 02:12:11.108616 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:11.566844 I | auth: deleting token kObAMFjKyVGHyGpm.1853 for user conductor
2021-10-31 02:12:14.108623 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.564820789s) to execute
2021-10-31 02:12:14.566853 I | auth: deleting token KOObEmwSsindrPDS.1854 for user conductor
2021-10-31 02:12:15.405358 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.198627124s) to execute
2021-10-31 02:12:15.405545 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (767.468705ms) to execute
2021-10-31 02:12:15.638460 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (196.59987ms) to execute
2021-10-31 02:12:16.108847 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:16.566795 I | auth: deleting token ZuMwcFJEAJVeZyAb.1857 for user conductor
2021-10-31 02:12:16.566843 I | auth: deleting token zrdyicARIQYPVrVE.1856 for user conductor
2021-10-31 02:12:16.566858 I | auth: deleting token EdjlSboDoIpdHnNW.1855 for user conductor
2021-10-31 02:12:16.566868 I | auth: deleting token DcUnmGalYZdVAuLR.1858 for user conductor
2021-10-31 02:12:17.566807 I | auth: deleting token txLusYSnjWraCkVQ.1860 for user conductor
2021-10-31 02:12:17.566865 I | auth: deleting token gBmxXgcwzlwoyDaf.1859 for user conductor
2021-10-31 02:12:18.566825 I | auth: deleting token TPLievbFeVIPNZzm.1861 for user conductor
2021-10-31 02:12:18.705848 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.199873315s) to execute
2021-10-31 02:12:20.566868 I | auth: deleting token yoiTKFoKqdbyuONn.1862 for user conductor
2021-10-31 02:12:20.911321 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.203120203s) to execute
2021-10-31 02:12:20.911632 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.202909571s) to execute
2021-10-31 02:12:21.109024 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:21.612089 I | auth: deleting token BENgkkmKYIKcXRWD.1863 for user conductor
2021-10-31 02:12:22.114916 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.20184283s) to execute
2021-10-31 02:12:23.310725 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.304026386s) to execute
2021-10-31 02:12:23.566878 I | auth: deleting token VikopUkcIezKDbDQ.1864 for user conductor
2021-10-31 02:12:24.510406 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.303770513s) to execute
2021-10-31 02:12:25.708091 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.195234936s) to execute
2021-10-31 02:12:25.708376 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.195900057s) to execute
2021-10-31 02:12:25.805093 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.292130095s) to execute
2021-10-31 02:12:26.109253 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:26.591042 I | auth: deleting token ANqUbKJMqLGwASWn.1868 for user conductor
2021-10-31 02:12:26.591086 I | auth: deleting token uceaOYEMkxLLkgDh.1866 for user conductor
2021-10-31 02:12:26.912822 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.203337372s) to execute
2021-10-31 02:12:26.912925 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.106485279s) to execute
2021-10-31 02:12:27.566916 I | auth: deleting token WecYPrTcaSJGJcMn.1865 for user conductor
2021-10-31 02:12:27.566980 I | auth: deleting token IvTsBkAyTSESkldm.1869 for user conductor
2021-10-31 02:12:27.566992 I | auth: deleting token HjEriARECCMzkzGP.1870 for user conductor
2021-10-31 02:12:27.567006 I | auth: deleting token koEqeIjptvNsICAf.1867 for user conductor
2021-10-31 02:12:28.111110 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.863747514s) to execute
2021-10-31 02:12:29.409862 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (268.420163ms) to execute
2021-10-31 02:12:30.566855 I | auth: deleting token TUMBSyigZLAWWvTA.1871 for user conductor
2021-10-31 02:12:30.566910 I | auth: deleting token JPZmjqiflEVqknrE.1873 for user conductor
2021-10-31 02:12:30.566922 I | auth: deleting token hnruUrHCzBUWMMxG.1872 for user conductor
2021-10-31 02:12:31.109446 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:32.566827 I | auth: deleting token hdFQUbcenIRwEfBu.1875 for user conductor
2021-10-31 02:12:32.566878 I | auth: deleting token NDELHHXFqeVKIMdF.1874 for user conductor
2021-10-31 02:12:32.707471 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (668.960103ms) to execute
2021-10-31 02:12:33.604871 I | auth: deleting token aIsVaacwzaqfAtOn.1876 for user conductor
2021-10-31 02:12:33.604913 I | auth: deleting token RFCrraUfivQoxiIH.1877 for user conductor
2021-10-31 02:12:33.906530 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.166597023s) to execute
2021-10-31 02:12:34.604830 I | auth: deleting token ecCzvONAbUMykUkp.1879 for user conductor
2021-10-31 02:12:34.604886 I | auth: deleting token rBqLJkCrgsWQNToX.1878 for user conductor
2021-10-31 02:12:35.108324 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (269.908989ms) to execute
2021-10-31 02:12:36.109620 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:36.310783 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.17131435s) to execute
2021-10-31 02:12:36.566802 I | auth: deleting token AoPjrNlRojkvmBrh.1880 for user conductor
2021-10-31 02:12:36.566851 I | auth: deleting token hPbhacQHaCJVXUXU.1881 for user conductor
2021-10-31 02:12:37.604880 I | auth: deleting token lzlizhxMTUvJeieC.1882 for user conductor
2021-10-31 02:12:38.566879 I | auth: deleting token LUERqykmQrPGpZEY.1883 for user conductor
2021-10-31 02:12:38.566929 I | auth: deleting token vJxrhofyfrJtkZGE.1884 for user conductor
2021-10-31 02:12:38.705604 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (966.597408ms) to execute
2021-10-31 02:12:40.007153 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.068728764s) to execute
2021-10-31 02:12:41.109865 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:41.604777 I | auth: deleting token DagkemYmiuKtYhvY.1887 for user conductor
2021-10-31 02:12:41.604824 I | auth: deleting token pZTmqDtbRVQICQyO.1886 for user conductor
2021-10-31 02:12:41.604842 I | auth: deleting token BPLfezKoJZXznUYx.1885 for user conductor
2021-10-31 02:12:41.604861 I | auth: deleting token tdRDkTWrsJQocYKH.1888 for user conductor
2021-10-31 02:12:41.638259 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (122.648782ms) to execute
2021-10-31 02:12:42.711493 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (773.455966ms) to execute
2021-10-31 02:12:43.908850 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.06919936s) to execute
2021-10-31 02:12:44.039141 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (128.063741ms) to execute
2021-10-31 02:12:45.407089 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (862.113042ms) to execute
2021-10-31 02:12:45.566839 I | auth: deleting token LYgmOxdKjetphoYp.1893 for user conductor
2021-10-31 02:12:45.566897 I | auth: deleting token bvthkhetSCqoRicE.1892 for user conductor
2021-10-31 02:12:45.566907 I | auth: deleting token yKOXYDmMVzFCSmbH.1891 for user conductor
2021-10-31 02:12:45.566917 I | auth: deleting token PYiYZpHCJNcfCuzV.1890 for user conductor
2021-10-31 02:12:45.566922 I | auth: deleting token nJkrUvIyTmUtuGHi.1889 for user conductor
2021-10-31 02:12:45.638869 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (195.845232ms) to execute
2021-10-31 02:12:46.110104 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:47.604836 I | auth: deleting token TizkegSNfRDlysNh.1894 for user conductor
2021-10-31 02:12:47.604890 I | auth: deleting token wQzecEdwOraVBJGW.1895 for user conductor
2021-10-31 02:12:47.915572 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.577221176s) to execute
2021-10-31 02:12:48.238272 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (233.277172ms) to execute
2021-10-31 02:12:48.566830 I | auth: deleting token yXkdbNIaZnEFdHJH.1896 for user conductor
2021-10-31 02:12:48.566876 I | auth: deleting token czNOvniMEfDsIBEV.1897 for user conductor
2021-10-31 02:12:49.566865 I | auth: deleting token YwFpsqKZNRnioNcz.1898 for user conductor
2021-10-31 02:12:50.611644 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.669246058s) to execute
2021-10-31 02:12:51.204840 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:51.605055 I | auth: deleting token qpmchtLhDKIUzfXp.1899 for user conductor
2021-10-31 02:12:51.905660 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.289932598s) to execute
2021-10-31 02:12:51.905807 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.291170138s) to execute
2021-10-31 02:12:52.566887 I | auth: deleting token pZdGzjthVpvLLmdc.1900 for user conductor
2021-10-31 02:12:53.108728 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.167158182s) to execute
2021-10-31 02:12:54.314916 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.173499791s) to execute
2021-10-31 02:12:54.314986 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.009100818s) to execute
2021-10-31 02:12:55.608677 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.199644508s) to execute
2021-10-31 02:12:55.608760 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (870.652159ms) to execute
2021-10-31 02:12:56.205078 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 02:12:57.651615 I | auth: deleting token jwiWrSQqcgwlZQWM.1904 for user conductor
2021-10-31 02:12:57.651652 I | auth: deleting token PGnNfhrFeWAsOMjD.1903 for user conductor
2021-10-31 02:12:57.651664 I | auth: deleting token xxeYbEqTscMWFtFq.1906 for user conductor
2021-10-31 02:12:57.651681 I | auth: deleting token dmRKuFdNjSGPAmCq.1905 for user conductor
2021-10-31 02:12:57.651691 I | auth: deleting token QCEfbuBQpmPchhSV.1902 for user conductor
2021-10-31 02:12:57.651698 I | auth: deleting token FxRWMHI