By type
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Skipping self-checking
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
2021-10-31 01:40:19.208858 I | etcdmain: etcd Version: 3.2.24
2021-10-31 01:40:19.208957 I | etcdmain: Git SHA: 420a45226
2021-10-31 01:40:19.208962 I | etcdmain: Go Version: go1.8.7
2021-10-31 01:40:19.208966 I | etcdmain: Go OS/Arch: linux/amd64
2021-10-31 01:40:19.208970 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-10-31 01:40:19.209091 I | embed: listening for peers on http://0.0.0.0:2380
2021-10-31 01:40:19.209146 I | embed: listening for client requests on 0.0.0.0:2379
2021-10-31 01:40:19.317071 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.68.16:2380
2021-10-31 01:40:19.404929 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.68.16:2380
2021-10-31 01:40:19.408106 I | etcdserver: name = onap-oof-has-etcd-1
2021-10-31 01:40:19.408126 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-10-31 01:40:19.408133 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-10-31 01:40:19.408137 I | etcdserver: heartbeat = 100ms
2021-10-31 01:40:19.408141 I | etcdserver: election = 1000ms
2021-10-31 01:40:19.408145 I | etcdserver: snapshot count = 100000
2021-10-31 01:40:19.408167 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2379
2021-10-31 01:40:19.408173 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2380
2021-10-31 01:40:19.408188 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-10-31 01:40:19.418376 I | etcdserver: starting member 72b38cc930a2fa6f in cluster e8b03869cbf54258
2021-10-31 01:40:19.418433 I | raft: 72b38cc930a2fa6f became follower at term 0
2021-10-31 01:40:19.418444 I | raft: newRaft 72b38cc930a2fa6f [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-10-31 01:40:19.418449 I | raft: 72b38cc930a2fa6f became follower at term 1
2021-10-31 01:40:19.423909 W | auth: simple token is not cryptographically signed
2021-10-31 01:40:19.426632 I | rafthttp: starting peer 2d249ba41c7e44fa...
2021-10-31 01:40:19.426735 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa
2021-10-31 01:40:19.505101 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-10-31 01:40:19.505422 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-10-31 01:40:19.506786 I | rafthttp: started peer 2d249ba41c7e44fa
2021-10-31 01:40:19.506919 I | rafthttp: added peer 2d249ba41c7e44fa
2021-10-31 01:40:19.506967 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-10-31 01:40:19.507008 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader)
2021-10-31 01:40:19.507146 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-10-31 01:40:19.507345 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-10-31 01:40:19.507901 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-31 01:40:19.606410 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-31 01:40:19.606777 I | rafthttp: started peer 8aae4c350a2413a5
2021-10-31 01:40:19.606823 I | rafthttp: added peer 8aae4c350a2413a5
2021-10-31 01:40:19.606878 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-10-31 01:40:19.607071 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-10-31 01:40:19.607561 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-10-31 01:40:19.609312 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-31 01:40:19.704931 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-31 01:40:19.705510 I | rafthttp: peer 8aae4c350a2413a5 became active
2021-10-31 01:40:19.705536 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message writer)
2021-10-31 01:40:19.705642 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 writer)
2021-10-31 01:40:19.707317 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-10-31 01:40:19.805905 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-31 01:40:19.806003 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message reader)
2021-10-31 01:40:19.948724 I | raft: 72b38cc930a2fa6f [term: 1] received a MsgVote message with higher term from 8aae4c350a2413a5 [term: 265]
2021-10-31 01:40:19.948775 I | raft: 72b38cc930a2fa6f became follower at term 265
2021-10-31 01:40:19.948797 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3, vote: 0] cast MsgVote for 8aae4c350a2413a5 [logterm: 1, index: 3] at term 265
2021-10-31 01:40:19.950561 I | raft: raft.node: 72b38cc930a2fa6f elected leader 8aae4c350a2413a5 at term 265
2021-10-31 01:40:19.953934 I | etcdserver: published {Name:onap-oof-has-etcd-1 ClientURLs:[http://onap-oof-has-etcd-1.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-10-31 01:40:19.953960 I | embed: ready to serve client requests
2021-10-31 01:40:19.954289 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-10-31 01:40:20.037902 N | etcdserver/membership: set the initial cluster version to 3.0
2021-10-31 01:40:20.038092 I | etcdserver/api: enabled capabilities for version 3.0
2021-10-31 01:40:24.507147 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:40:29.507334 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:40:34.507564 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:40:39.510106 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:40:44.510343 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:40:47.907729 N | auth: added a new user: root
2021-10-31 01:40:47.908161 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.147059459s) to execute
2021-10-31 01:40:49.510550 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:40:49.606619 N | auth: added a new user: conductor
2021-10-31 01:40:49.606695 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.138116982s) to execute
2021-10-31 01:40:50.262746 N | auth: Role conductor is created
2021-10-31 01:40:50.668514 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-10-31 01:40:51.161879 N | auth: granted role conductor to user conductor
2021-10-31 01:40:51.561554 N | auth: Role root is created
2021-10-31 01:40:51.564219 N | auth: granted role root to user root
2021-10-31 01:40:51.566482 N | auth: Authentication enabled
2021-10-31 01:40:54.512176 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:40:59.512354 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:04.512551 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:09.512731 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:14.512943 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:19.513135 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:24.513352 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:29.513568 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:34.513786 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:39.513974 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:44.514239 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:49.514462 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:54.514726 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:41:59.514990 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:04.515117 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:09.515409 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:14.515637 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-10-31 01:42:17.107325 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:14" took too long (1.069006106s) to execute
2021-10-31 01:42:18.606620 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (999.45133ms) to execute
2021-10-31 01:42:19.515918 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:21.508062 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (403.02155ms) to execute
2021-10-31 01:42:24.516108 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:29.516375 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:32.813290 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (408.301187ms) to execute
2021-10-31 01:42:34.516591 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:38.439239 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:0 size:4" took too long (298.579797ms) to execute
2021-10-31 01:42:39.516789 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:42.912832 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.307814741s) to execute
2021-10-31 01:42:44.516974 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:45.606291 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.167779599s) to execute
2021-10-31 01:42:48.214185 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.973822931s) to execute
2021-10-31 01:42:49.517253 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:50.909048 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.298237843s) to execute
2021-10-31 01:42:52.212265 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.274041312s) to execute
2021-10-31 01:42:52.212387 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.301856087s) to execute
2021-10-31 01:42:52.538245 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (233.188266ms) to execute
2021-10-31 01:42:54.517462 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:42:59.604852 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:02.712213 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.207093902s) to execute
2021-10-31 01:43:04.605081 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:05.505523 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.267336796s) to execute
2021-10-31 01:43:08.207953 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.169837021s) to execute
2021-10-31 01:43:09.505691 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (300.029418ms) to execute
2021-10-31 01:43:09.605335 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:12.107373 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102349602s) to execute
2021-10-31 01:43:13.408295 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (801.496147ms) to execute
2021-10-31 01:43:14.605525 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:15.906225 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.466309552s) to execute
2021-10-31 01:43:16.038200 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (129.95832ms) to execute
2021-10-31 01:43:16.044938 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:587" took too long (135.861308ms) to execute
2021-10-31 01:43:19.605744 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:20.008382 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.601352279s) to execute
2021-10-31 01:43:23.506404 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (961.741729ms) to execute
2021-10-31 01:43:24.605996 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:24.808103 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (666.451663ms) to execute
2021-10-31 01:43:26.310246 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (665.828516ms) to execute
2021-10-31 01:43:27.706632 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (668.489945ms) to execute
2021-10-31 01:43:29.606214 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:31.006481 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (768.347591ms) to execute
2021-10-31 01:43:32.405875 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (597.413176ms) to execute
2021-10-31 01:43:33.810232 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (305.254355ms) to execute
2021-10-31 01:43:34.606448 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:35.438260 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (197.757856ms) to execute
2021-10-31 01:43:36.910403 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (472.223952ms) to execute
2021-10-31 01:43:39.606626 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:39.609722 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.604668596s) to execute
2021-10-31 01:43:42.215355 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (910.304523ms) to execute
2021-10-31 01:43:44.606770 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:45.009156 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.566416546s) to execute
2021-10-31 01:43:45.238352 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (208.709943ms) to execute
2021-10-31 01:43:46.407825 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (867.88371ms) to execute
2021-10-31 01:43:49.606989 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:54.607190 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:43:56.606229 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (701.184806ms) to execute
2021-10-31 01:43:57.906828 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.001868121s) to execute
2021-10-31 01:43:59.207689 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.300735546s) to execute
2021-10-31 01:43:59.607664 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:00.510936 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.303142006s) to execute
2021-10-31 01:44:00.511530 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.603191388s) to execute
2021-10-31 01:44:01.906869 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.301856197s) to execute
2021-10-31 01:44:01.907034 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.394209273s) to execute
2021-10-31 01:44:01.907122 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.300037491s) to execute
2021-10-31 01:44:02.138961 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.512785ms) to execute
2021-10-31 01:44:03.607027 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (201.324045ms) to execute
2021-10-31 01:44:04.607877 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:06.108689 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.30363432s) to execute
2021-10-31 01:44:06.239308 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.778219ms) to execute
2021-10-31 01:44:09.105478 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.26443928s) to execute
2021-10-31 01:44:09.608067 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:10.808095 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (103.004025ms) to execute
2021-10-31 01:44:14.308987 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (670.976957ms) to execute
2021-10-31 01:44:14.608328 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:15.806126 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (368.07363ms) to execute
2021-10-31 01:44:17.209527 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (204.415588ms) to execute
2021-10-31 01:44:18.414696 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.174934223s) to execute
2021-10-31 01:44:19.608527 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:21.005468 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.500433325s) to execute
2021-10-31 01:44:21.005694 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.584834697s) to execute
2021-10-31 01:44:21.138472 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (131.526087ms) to execute
2021-10-31 01:44:21.239080 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (232.103895ms) to execute
2021-10-31 01:44:22.610407 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.370150241s) to execute
2021-10-31 01:44:23.809744 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.004716124s) to execute
2021-10-31 01:44:24.608655 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:25.110354 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.272505292s) to execute
2021-10-31 01:44:25.110511 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.299204723s) to execute
2021-10-31 01:44:26.415506 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.175165461s) to execute
2021-10-31 01:44:27.708026 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.169949755s) to execute
2021-10-31 01:44:27.840098 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (130.634882ms) to execute
2021-10-31 01:44:29.205697 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.164150278s) to execute
2021-10-31 01:44:29.608812 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:30.409216 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (904.18293ms) to execute
2021-10-31 01:44:31.710101 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.171880209s) to execute
2021-10-31 01:44:31.710242 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.205039072s) to execute
2021-10-31 01:44:32.038066 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (326.689189ms) to execute
2021-10-31 01:44:33.211105 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (371.401685ms) to execute
2021-10-31 01:44:34.607439 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (168.806124ms) to execute
2021-10-31 01:44:34.608979 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:39.609150 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:40.809953 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (270.870957ms) to execute
2021-10-31 01:44:41.138171 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.951762ms) to execute
2021-10-31 01:44:42.409352 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (371.100568ms) to execute
2021-10-31 01:44:44.609316 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:45.105246 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.599417829s) to execute
2021-10-31 01:44:46.307537 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.200070936s) to execute
2021-10-31 01:44:46.307626 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (969.182779ms) to execute
2021-10-31 01:44:46.307735 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.19997611s) to execute
2021-10-31 01:44:47.708392 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.301496579s) to execute
2021-10-31 01:44:49.009384 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.298107407s) to execute
2021-10-31 01:44:49.609500 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:51.707664 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.269593221s) to execute
2021-10-31 01:44:51.839626 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (129.613119ms) to execute
2021-10-31 01:44:54.609674 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:44:56.407270 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.164785817s) to execute
2021-10-31 01:44:57.707475 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.297611118s) to execute
2021-10-31 01:44:57.707651 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.298021898s) to execute
2021-10-31 01:44:59.009407 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.20431218s) to execute
2021-10-31 01:44:59.609878 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:00.412064 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.270751216s) to execute
2021-10-31 01:45:01.805806 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.366823833s) to execute
2021-10-31 01:45:04.511413 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.573029788s) to execute
2021-10-31 01:45:04.511638 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.70430899s) to execute
2021-10-31 01:45:04.610063 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:04.738903 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (129.61782ms) to execute
2021-10-31 01:45:08.508131 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.470024293s) to execute
2021-10-31 01:45:09.651731 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:09.809831 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.299743557s) to execute
2021-10-31 01:45:09.809963 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103603793s) to execute
2021-10-31 01:45:10.038172 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (133.033992ms) to execute
2021-10-31 01:45:10.039895 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.171748ms) to execute
2021-10-31 01:45:14.652007 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:19.704814 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:22.108551 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.670276049s) to execute
2021-10-31 01:45:22.239999 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (129.080059ms) to execute
2021-10-31 01:45:22.240125 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.515589ms) to execute
2021-10-31 01:45:22.538048 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (329.148322ms) to execute
2021-10-31 01:45:23.805801 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.066644949s) to execute
2021-10-31 01:45:24.704990 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:25.008847 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (970.615601ms) to execute
2021-10-31 01:45:25.138238 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (127.82809ms) to execute
2021-10-31 01:45:26.405537 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (963.143801ms) to execute
2021-10-31 01:45:27.706332 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.298060448s) to execute
2021-10-31 01:45:29.705255 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:30.406950 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.568664633s) to execute
2021-10-31 01:45:30.407109 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.698560865s) to execute
2021-10-31 01:45:33.207642 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.069620567s) to execute
2021-10-31 01:45:34.612230 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (672.313852ms) to execute
2021-10-31 01:45:34.705488 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:38.115327 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (209.350934ms) to execute
2021-10-31 01:45:39.705707 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:44.705906 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:46.005943 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.496127489s) to execute
2021-10-31 01:45:47.307948 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.299585943s) to execute
2021-10-31 01:45:48.607973 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.600500872s) to execute
2021-10-31 01:45:48.608043 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.600531418s) to execute
2021-10-31 01:45:48.608199 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203331094s) to execute
2021-10-31 01:45:48.608342 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.298552637s) to execute
2021-10-31 01:45:49.706110 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-31 01:45:52.304990 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.365904573s) to execute
2021-10-31 01:45:54.706333 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:45:54.712550 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.507568387s) to execute
2021-10-31 01:45:56.139098 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (134.176596ms) to execute
2021-10-31 01:45:59.308206 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (666.678329ms) to execute
2021-10-31 01:45:59.706538 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:00.605619 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (467.518771ms) to execute
2021-10-31 01:46:02.108936 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (603.914228ms) to execute
2021-10-31 01:46:03.607783 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (766.665498ms) to execute
2021-10-31 01:46:04.706752 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:04.809355 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.071223629s) to execute
2021-10-31 01:46:06.105516 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.293832861s) to execute
2021-10-31 01:46:06.105666 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.200598891s) to execute
2021-10-31 01:46:08.507125 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.167156507s) to execute
2021-10-31 01:46:08.638444 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.007006ms) to execute
2021-10-31 01:46:09.706964 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:11.911812 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.105129181s) to execute
2021-10-31 01:46:14.206634 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (501.674507ms) to execute
2021-10-31 01:46:14.707221 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:15.411123 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.169600895s) to execute
2021-10-31 01:46:15.411334 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (473.021631ms) to execute
2021-10-31 01:46:16.805837 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (462.568904ms) to execute
2021-10-31 01:46:18.211632 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (373.177381ms) to execute
2021-10-31 01:46:19.707421 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:22.809009 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (470.704194ms) to execute
2021-10-31 01:46:23.138172 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.624046ms) to execute
2021-10-31 01:46:24.505153 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (962.541111ms) to execute
2021-10-31 01:46:24.707617 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:25.711821 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.172288764s) to execute
2021-10-31 01:46:28.211176 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.497094895s) to execute
2021-10-31 01:46:28.211484 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.497780459s) to execute
2021-10-31 01:46:29.505415 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.292113821s) to execute
2021-10-31 01:46:29.505563 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.29227685s) to execute
2021-10-31 01:46:29.505669 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.285534997s) to execute
2021-10-31 01:46:29.707827 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:32.105625 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.267700584s) to execute
2021-10-31 01:46:32.239382 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (132.035293ms) to execute
2021-10-31 01:46:34.605127 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.157380111s) to execute
2021-10-31 01:46:34.708047 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:34.738327 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.370115ms) to execute
2021-10-31 01:46:36.010646 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (772.482338ms) to execute
2021-10-31 01:46:38.410202 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.271996889s) to execute
2021-10-31 01:46:39.708302 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:40.910795 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.405682215s) to execute
2021-10-31 01:46:40.911307 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.499618266s) to execute
2021-10-31 01:46:41.006018 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.50076159s) to execute
2021-10-31 01:46:43.412337 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.172745542s) to execute
2021-10-31 01:46:44.708541 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:46.810322 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (372.109098ms) to execute
2021-10-31 01:46:48.010616 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.104222801s) to execute
2021-10-31 01:46:48.438544 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (333.465397ms) to execute
2021-10-31 01:46:48.439828 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.729217ms) to execute
2021-10-31 01:46:49.708754 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:50.808817 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.402907278s) to execute
2021-10-31 01:46:50.938053 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (126.62421ms) to execute
2021-10-31 01:46:53.409669 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203090515s) to execute
2021-10-31 01:46:54.609046 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.195904887s) to execute
2021-10-31 01:46:54.609308 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.196495621s) to execute
2021-10-31 01:46:54.708933 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:46:54.839366 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (210.861672ms) to execute
2021-10-31 01:46:56.008192 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.168232311s) to execute
2021-10-31 01:46:57.209224 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.870992185s) to execute
2021-10-31 01:46:58.410443 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103650568s) to execute
2021-10-31 01:46:58.410627 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.198896725s) to execute
2021-10-31 01:46:58.638889 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (226.395852ms) to execute
2021-10-31 01:46:59.709118 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:02.009692 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.169331932s) to execute
2021-10-31 01:47:02.239253 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (227.896688ms) to execute
2021-10-31 01:47:04.612945 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.173362089s) to execute
2021-10-31 01:47:04.709306 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:05.911865 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (870.093574ms) to execute
2021-10-31 01:47:06.566871 I | auth: deleting token TTYLxwNRdTLBbvXt.17 for user conductor
2021-10-31 01:47:07.566893 I | auth: deleting token lPOJKvdwYPctWxaR.19 for user conductor
2021-10-31 01:47:08.207927 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (269.828753ms) to execute
2021-10-31 01:47:09.604869 I | auth: deleting token whJBfyprnFvabxLg.21 for user conductor
2021-10-31 01:47:09.705780 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (367.645706ms) to execute
2021-10-31 01:47:09.709546 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:10.566833 I | auth: deleting token lTyhWTfUtPCBfqlo.23 for user conductor
2021-10-31 01:47:11.106187 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (367.766195ms) to execute
2021-10-31 01:47:11.566891 I | auth: deleting token AFcNxCcxLdIXKnyA.25 for user conductor
2021-10-31 01:47:12.406064 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.199180735s) to execute
2021-10-31 01:47:13.566868 I | auth: deleting token jybAAwEAjiqocgit.27 for user conductor
2021-10-31 01:47:13.610347 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201989776s) to execute
2021-10-31 01:47:13.610497 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.202537426s) to execute
2021-10-31 01:47:13.739396 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (127.550869ms) to execute
2021-10-31 01:47:14.566845 I | auth: deleting token vNHTpJGXPXbuPyta.29 for user conductor
2021-10-31 01:47:14.709756 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:15.007643 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (600.815632ms) to execute
2021-10-31 01:47:16.211331 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.171805779s) to execute
2021-10-31 01:47:16.438599 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (225.423025ms) to execute
2021-10-31 01:47:16.566823 I | auth: deleting token vadHAoaZyzauwyXW.31 for user conductor
2021-10-31 01:47:17.566845 I | auth: deleting token jRFssHWDkyizKzQo.33 for user conductor
2021-10-31 01:47:17.612408 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (373.199944ms) to execute
2021-10-31 01:47:19.566843 I | auth: deleting token AWrdKZGCYqZVMtDO.37 for user conductor
2021-10-31 01:47:19.566965 I | auth: deleting token RGDXRVLoVeNQuPky.35 for user conductor
2021-10-31 01:47:19.709939 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:20.010290 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.303406598s) to execute
2021-10-31 01:47:20.138101 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (125.70249ms) to execute
2021-10-31 01:47:20.139525 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.13665ms) to execute
2021-10-31 01:47:20.566876 I | auth: deleting token ekCQYQyqyuPmRLJX.39 for user conductor
2021-10-31 01:47:21.566834 I | auth: deleting token uISdngLmacFcyoBt.41 for user conductor
2021-10-31 01:47:22.509168 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.204180106s) to execute
2021-10-31 01:47:22.566794 I | auth: deleting token CTmabimTDTSHpMoU.42 for user conductor
2021-10-31 01:47:22.566827 I | auth: deleting token ujaZCtPrAskGwucc.44 for user conductor
2021-10-31 01:47:23.712340 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.20082663s) to execute
2021-10-31 01:47:24.566838 I | auth: deleting token OzBsWdpZVkcJDtiP.45 for user conductor
2021-10-31 01:47:24.710129 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:24.908140 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.397025699s) to execute
2021-10-31 01:47:24.908266 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.193414371s) to execute
2021-10-31 01:47:24.908395 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.194378694s) to execute
2021-10-31 01:47:26.206285 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.197952094s) to execute
2021-10-31 01:47:26.566829 I | auth: deleting token WURivlJdXjDYBwiZ.47 for user conductor
2021-10-31 01:47:27.604874 I | auth: deleting token EaTnhJWCyJbSEhJg.48 for user conductor
2021-10-31 01:47:28.608266 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.069917931s) to execute
2021-10-31 01:47:29.604874 I | auth: deleting token UfhUAefqqPfdsuRD.49 for user conductor
2021-10-31 01:47:29.710345 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.72.193:2380: getsockopt: connection refused
2021-10-31 01:47:30.566827 I | auth: deleting token sFKRWmhUrlMWAfGp.50 for user conductor
2021-10-31 01:47:31.205836 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.765303377s) to execute
2021-10-31 01:47:31.604834 I | auth: deleting token poLFFhOrvuLcjyMr.51 for user conductor
2021-10-31 01:47:32.312184 W | etcdserver: request "header: