Results

By type

          Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Skipping self-checking
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
2021-11-01 02:06:05.056480 I | etcdmain: etcd Version: 3.2.24
2021-11-01 02:06:05.056686 I | etcdmain: Git SHA: 420a45226
2021-11-01 02:06:05.056703 I | etcdmain: Go Version: go1.8.7
2021-11-01 02:06:05.056717 I | etcdmain: Go OS/Arch: linux/amd64
2021-11-01 02:06:05.056733 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-11-01 02:06:05.056956 I | embed: listening for peers on http://0.0.0.0:2380
2021-11-01 02:06:05.057073 I | embed: listening for client requests on 0.0.0.0:2379
2021-11-01 02:06:05.357918 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.74.197:2380
2021-11-01 02:06:05.359450 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.74.197:2380
2021-11-01 02:06:05.452792 I | etcdserver: name = onap-oof-has-etcd-1
2021-11-01 02:06:05.452838 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-11-01 02:06:05.452852 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-11-01 02:06:05.452862 I | etcdserver: heartbeat = 100ms
2021-11-01 02:06:05.452871 I | etcdserver: election = 1000ms
2021-11-01 02:06:05.452880 I | etcdserver: snapshot count = 100000
2021-11-01 02:06:05.452902 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2379
2021-11-01 02:06:05.452915 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2380
2021-11-01 02:06:05.452960 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-11-01 02:06:05.557817 I | etcdserver: starting member 72b38cc930a2fa6f in cluster e8b03869cbf54258
2021-11-01 02:06:05.557942 I | raft: 72b38cc930a2fa6f became follower at term 0
2021-11-01 02:06:05.558009 I | raft: newRaft 72b38cc930a2fa6f [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-11-01 02:06:05.558046 I | raft: 72b38cc930a2fa6f became follower at term 1
2021-11-01 02:06:05.753054 W | auth: simple token is not cryptographically signed
2021-11-01 02:06:05.755300 I | rafthttp: starting peer 2d249ba41c7e44fa...
2021-11-01 02:06:05.755402 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa
2021-11-01 02:06:05.756350 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-11-01 02:06:05.855638 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-11-01 02:06:05.951202 I | rafthttp: started peer 2d249ba41c7e44fa
2021-11-01 02:06:05.951275 I | rafthttp: added peer 2d249ba41c7e44fa
2021-11-01 02:06:05.951320 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-11-01 02:06:05.951358 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-11-01 02:06:06.050479 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader)
2021-11-01 02:06:06.050656 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-11-01 02:06:06.056906 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-11-01 02:06:06.057486 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-11-01 02:06:06.057973 I | rafthttp: started peer 8aae4c350a2413a5
2021-11-01 02:06:06.058021 I | rafthttp: added peer 8aae4c350a2413a5
2021-11-01 02:06:06.058047 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-11-01 02:06:06.058833 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-11-01 02:06:06.072550 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-11-01 02:06:06.150462 I | rafthttp: peer 8aae4c350a2413a5 became active
2021-11-01 02:06:06.150526 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message writer)
2021-11-01 02:06:06.251157 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 writer)
2021-11-01 02:06:06.251397 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-11-01 02:06:06.350557 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-11-01 02:06:06.350745 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-11-01 02:06:06.350827 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message reader)
2021-11-01 02:06:06.350984 I | raft: 72b38cc930a2fa6f [term: 1] received a MsgVote message with higher term from 8aae4c350a2413a5 [term: 284]
2021-11-01 02:06:06.351024 I | raft: 72b38cc930a2fa6f became follower at term 284
2021-11-01 02:06:06.351046 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3, vote: 0] cast MsgVote for 8aae4c350a2413a5 [logterm: 1, index: 3] at term 284
2021-11-01 02:06:06.452971 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-11-01 02:06:06.554890 I | raft: raft.node: 72b38cc930a2fa6f elected leader 8aae4c350a2413a5 at term 284
2021-11-01 02:06:06.559827 I | etcdserver: published {Name:onap-oof-has-etcd-1 ClientURLs:[http://onap-oof-has-etcd-1.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-11-01 02:06:06.560050 I | embed: ready to serve client requests
2021-11-01 02:06:06.560686 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-11-01 02:06:06.850771 N | etcdserver/membership: set the initial cluster version to 3.0
2021-11-01 02:06:06.850879 I | etcdserver/api: enabled capabilities for version 3.0
2021-11-01 02:06:10.951784 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:15.952146 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:20.952653 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:25.953510 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:30.953782 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:35.954183 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:40.954356 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:45.954606 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:50.954876 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:55.955217 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:00.955651 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:05.956023 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:10.956586 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:15.956886 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:20.957373 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:25.957836 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:30.958186 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:35.958483 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:40.958838 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:45.959224 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:50.959540 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:55.959896 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:00.960147 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:05.960411 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:10.960719 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:13.055253 N | auth: added a new user: root
2021-11-01 02:08:13.055909 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (2.158442845s) to execute
2021-11-01 02:08:15.853650 N | auth: added a new user: conductor
2021-11-01 02:08:15.853734 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (2.575250729s) to execute
2021-11-01 02:08:15.961205 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:15.981823 N | auth: Role conductor is created
2021-11-01 02:08:16.376712 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-11-01 02:08:16.679547 N | auth: granted role conductor to user conductor
2021-11-01 02:08:17.151608 N | auth: Role root is created
2021-11-01 02:08:17.155796 N | auth: granted role root to user root
2021-11-01 02:08:17.159616 N | auth: Authentication enabled
2021-11-01 02:08:20.961544 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:25.961892 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:30.962149 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:35.964939 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:40.965216 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:45.965579 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:50.965828 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:55.966169 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:00.966427 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:05.966698 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:10.967049 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:15.967417 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:20.967720 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:25.968072 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:30.956047 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.000057214s) to execute
2021-11-01 02:09:31.050623 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:35.855065 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.316843785s) to execute
2021-11-01 02:09:36.050855 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:38.052813 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.101762559s) to execute
2021-11-01 02:09:39.954998 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.899526903s) to execute
2021-11-01 02:09:40.152251 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (192.050501ms) to execute
2021-11-01 02:09:41.051050 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:43.457940 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.606419464s) to execute
2021-11-01 02:09:45.551209 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.900484697s) to execute
2021-11-01 02:09:46.051422 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:48.155141 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.601302503s) to execute
2021-11-01 02:09:48.350763 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.07946ms) to execute
2021-11-01 02:09:51.051762 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:52.753188 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.199388208s) to execute
2021-11-01 02:09:55.551481 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (2.698895903s) to execute
2021-11-01 02:09:56.052121 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:58.555199 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.31667644s) to execute
2021-11-01 02:10:00.851732 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.213508218s) to execute
2021-11-01 02:10:01.052575 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:03.350874 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.495703698s) to execute
2021-11-01 02:10:03.353671 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.499218344s) to execute
2021-11-01 02:10:06.052805 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:07.457400 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.103385805s) to execute
2021-11-01 02:10:07.458215 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.104634554s) to execute
2021-11-01 02:10:09.857034 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.303173301s) to execute
2021-11-01 02:10:09.857272 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.306483224s) to execute
2021-11-01 02:10:11.053095 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:11.756427 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.803907745s) to execute
2021-11-01 02:10:11.756552 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.8057933s) to execute
2021-11-01 02:10:14.659154 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.906634063s) to execute
2021-11-01 02:10:16.053445 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:17.156949 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.218420291s) to execute
2021-11-01 02:10:19.750545 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.20936058s) to execute
2021-11-01 02:10:21.053675 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:24.460506 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.30032868s) to execute
2021-11-01 02:10:24.550626 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.69792138s) to execute
2021-11-01 02:10:24.551093 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.798088311s) to execute
2021-11-01 02:10:26.054162 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:31.054469 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:36.054752 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:38.555508 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (5.603290907s) to execute
2021-11-01 02:10:40.650629 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.996915786s) to execute
2021-11-01 02:10:40.650914 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (1.99793813s) to execute
2021-11-01 02:10:41.150430 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:43.051552 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:364" took too long (4.398279358s) to execute
2021-11-01 02:10:43.051626 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.398858108s) to execute
2021-11-01 02:10:43.051763 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.395787646s) to execute
2021-11-01 02:10:45.856078 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.800700388s) to execute
2021-11-01 02:10:46.150663 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:51.250550 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:53.856226 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.805557995s) to execute
2021-11-01 02:10:53.856559 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.997884042s) to execute
2021-11-01 02:10:54.051050 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (175.880731ms) to execute
2021-11-01 02:10:54.053114 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (177.706328ms) to execute
2021-11-01 02:10:56.250806 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:56.855781 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.80502744s) to execute
2021-11-01 02:10:56.856005 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.705202846s) to execute
2021-11-01 02:10:59.455475 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.504846031s) to execute
2021-11-01 02:11:01.251148 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:06.251599 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:09.950738 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.612240136s) to execute
2021-11-01 02:11:11.251896 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:12.554729 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.598844676s) to execute
2021-11-01 02:11:16.252344 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:20.056210 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.398392822s) to execute
2021-11-01 02:11:20.056489 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (7.497657409s) to execute
2021-11-01 02:11:21.350481 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:22.450716 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.298983284s) to execute
2021-11-01 02:11:22.450880 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.379725112s) to execute
2021-11-01 02:11:22.453498 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.382242713s) to execute
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-11-01 02:11:24.757159 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.193441949s) to execute
2021-11-01 02:11:26.350685 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:30.254726 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.702156988s) to execute
2021-11-01 02:11:31.350956 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:35.453174 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.01493143s) to execute
2021-11-01 02:11:35.453448 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.101499715s) to execute
2021-11-01 02:11:35.637998 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (178.224968ms) to execute
2021-11-01 02:11:36.351296 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:41.255800 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.50354586s) to execute
2021-11-01 02:11:41.351602 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:43.453458 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.015057058s) to execute
2021-11-01 02:11:43.453673 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.195558222s) to execute
2021-11-01 02:11:46.351900 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:48.554978 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.403884906s) to execute
2021-11-01 02:11:51.055498 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.499718281s) to execute
2021-11-01 02:11:51.150880 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.592725034s) to execute
2021-11-01 02:11:51.352146 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:53.556382 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.403167577s) to execute
2021-11-01 02:11:53.556490 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (915.656582ms) to execute
2021-11-01 02:11:53.556601 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.403129937s) to execute
2021-11-01 02:11:56.352327 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:56.450517 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.794280121s) to execute
2021-11-01 02:11:56.450572 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.297606668s) to execute
2021-11-01 02:11:59.856092 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.702571786s) to execute
2021-11-01 02:12:01.352552 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:06.352828 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:11.353086 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:12.555661 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103098738s) to execute
2021-11-01 02:12:15.256176 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.003766611s) to execute
2021-11-01 02:12:16.353368 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:19.552497 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.101692414s) to execute
2021-11-01 02:12:21.251648 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.599533457s) to execute
2021-11-01 02:12:21.251823 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.697987132s) to execute
2021-11-01 02:12:21.251980 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.601218101s) to execute
2021-11-01 02:12:21.353589 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:23.556672 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.202079868s) to execute
2021-11-01 02:12:23.556800 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.106147133s) to execute
2021-11-01 02:12:25.853453 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.199898576s) to execute
2021-11-01 02:12:25.853789 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.902909421s) to execute
2021-11-01 02:12:26.353840 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:28.160175 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.207635902s) to execute
2021-11-01 02:12:28.160292 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.208778047s) to execute
2021-11-01 02:12:31.354177 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:36.354492 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:41.354706 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:44.354663 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.30260489s) to execute
2021-11-01 02:12:46.354990 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:48.453630 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.902823034s) to execute
2021-11-01 02:12:48.453781 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.003116623s) to execute
2021-11-01 02:12:48.453952 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.903294399s) to execute
2021-11-01 02:12:51.450525 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:56.156053 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.30328109s) to execute
2021-11-01 02:12:56.352220 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.275333ms) to execute
2021-11-01 02:12:56.356064 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.548365ms) to execute
2021-11-01 02:12:56.450862 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:00.553173 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.508718058s) to execute
2021-11-01 02:13:01.451118 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:02.952477 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.999677056s) to execute
2021-11-01 02:13:05.554627 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.403997178s) to execute
2021-11-01 02:13:06.451478 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:08.457442 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.719419562s) to execute
2021-11-01 02:13:08.457699 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.900064673s) to execute
2021-11-01 02:13:10.860888 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.310471713s) to execute
2021-11-01 02:13:10.950340 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.310556999s) to execute
2021-11-01 02:13:11.451804 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:13.056289 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.105587873s) to execute
2021-11-01 02:13:13.056427 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (713.412343ms) to execute
2021-11-01 02:13:13.056510 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.09810405s) to execute
2021-11-01 02:13:14.852419 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.00193699s) to execute
2021-11-01 02:13:16.452020 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:17.153631 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (683.67315ms) to execute
2021-11-01 02:13:19.653611 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.509204788s) to execute
2021-11-01 02:13:21.452504 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:26.452766 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:27.051167 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.397514006s) to execute
2021-11-01 02:13:31.453107 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:34.350825 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.295995909s) to execute
2021-11-01 02:13:34.351083 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.296650257s) to execute
2021-11-01 02:13:36.453458 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:41.453596 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:41.755950 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.905179865s) to execute
2021-11-01 02:13:43.053968 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201364513s) to execute
2021-11-01 02:13:43.054185 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.203568851s) to execute
2021-11-01 02:13:43.054426 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.203821665s) to execute
2021-11-01 02:13:43.056154 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.200416687s) to execute
2021-11-01 02:13:46.453879 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:49.151950 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.601366893s) to execute
2021-11-01 02:13:51.457829 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:53.657805 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.306608465s) to execute
2021-11-01 02:13:55.853477 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.100752127s) to execute
2021-11-01 02:13:55.853695 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.103057382s) to execute
2021-11-01 02:13:56.051837 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (192.365228ms) to execute
2021-11-01 02:13:56.458045 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:58.455896 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.203519858s) to execute
2021-11-01 02:14:00.952364 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.413834363s) to execute
2021-11-01 02:14:01.550371 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:14:02.757975 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.805472551s) to execute
2021-11-01 02:14:04.956468 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.0020749s) to execute
2021-11-01 02:14:04.957486 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.103663096s) to execute
2021-11-01 02:14:04.957715 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.10635727s) to execute
2021-11-01 02:14:06.550630 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:14:07.458002 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.40716523s) to execute
2021-11-01 02:14:07.458239 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.400379742s) to execute
2021-11-01 02:14:07.464850 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (826.780413ms) to execute
2021-11-01 02:14:11.550969 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:14:16.151196 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.893548983s) to execute
2021-11-01 02:14:16.551417 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:21.357977 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.205266539s) to execute
2021-11-01 02:14:21.552059 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:25.851306 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.500576724s) to execute
2021-11-01 02:14:26.552456 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:28.156757 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (718.438952ms) to execute
2021-11-01 02:14:31.250479 I | auth: deleting token MdlMNOsvVgSIYRTS.17 for user conductor
2021-11-01 02:14:31.250573 I | auth: deleting token LrNTVKoOCdzqORQr.20 for user conductor
2021-11-01 02:14:31.250610 I | auth: deleting token zjmrpvyvJVRJxbME.18 for user conductor
2021-11-01 02:14:31.552633 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:32.656391 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.404547714s) to execute
2021-11-01 02:14:32.938306 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (182.401108ms) to execute
2021-11-01 02:14:36.159997 I | auth: deleting token ZCLKmelzZJTteHzU.29 for user conductor
2021-11-01 02:14:36.160037 I | auth: deleting token GpkbctAKBrkWsOgU.28 for user conductor
2021-11-01 02:14:36.160052 I | auth: deleting token WMiZiDbxLmphSyQi.27 for user conductor
2021-11-01 02:14:36.160059 I | auth: deleting token SiIfUpxYDSqNYGjw.23 for user conductor
2021-11-01 02:14:36.160066 I | auth: deleting token kWkDjxusXbTnxBHh.24 for user conductor
2021-11-01 02:14:36.552923 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:38.160126 I | auth: deleting token OwJtGKmQTJuuKbXk.33 for user conductor
2021-11-01 02:14:38.160183 I | auth: deleting token pYLxpaqmfFePPBGw.31 for user conductor
2021-11-01 02:14:40.160061 I | auth: deleting token VdGIWOmdtfCEmXDz.39 for user conductor
2021-11-01 02:14:40.160139 I | auth: deleting token vSiENpZEJVgFtafb.35 for user conductor
2021-11-01 02:14:40.160159 I | auth: deleting token SrFOQVQpbywOLcJR.37 for user conductor
2021-11-01 02:14:41.553204 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:42.856585 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.418048196s) to execute
2021-11-01 02:14:44.160014 I | auth: deleting token bWbUrfVMxkonWRaW.40 for user conductor
2021-11-01 02:14:44.160206 I | auth: deleting token oXnmIOCWHQJSzsvF.43 for user conductor
2021-11-01 02:14:44.160294 I | auth: deleting token IGGdGGodjMClXJfi.42 for user conductor
2021-11-01 02:14:45.655737 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.317175091s) to execute
2021-11-01 02:14:46.159990 I | auth: deleting token HMYbQCBWFvMLWUhj.45 for user conductor
2021-11-01 02:14:46.553495 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:48.160147 I | auth: deleting token jGNNaapQIynCedsX.49 for user conductor
2021-11-01 02:14:48.555978 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.896793165s) to execute
2021-11-01 02:14:49.160110 I | auth: deleting token udnoOrCdlgPGiAKY.51 for user conductor
2021-11-01 02:14:49.160174 I | auth: deleting token mdoqOxWAXHBzabNW.47 for user conductor
2021-11-01 02:14:51.553749 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:53.160307 I | auth: deleting token aGtgKpXmOTUNWNLu.61 for user conductor
2021-11-01 02:14:53.160358 I | auth: deleting token NkEUrEwMnTSIHwMo.52 for user conductor
2021-11-01 02:14:53.160371 I | auth: deleting token bqFVKCgviWkgvzGC.53 for user conductor
2021-11-01 02:14:53.160383 I | auth: deleting token TysqGnfYnHZnFSJH.58 for user conductor
2021-11-01 02:14:53.160396 I | auth: deleting token MhZZicbkEcMrDiHl.56 for user conductor
2021-11-01 02:14:53.160407 I | auth: deleting token leSXhDdWvyJeOznQ.57 for user conductor
2021-11-01 02:14:54.471940 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.629917187s) to execute
2021-11-01 02:14:56.554075 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:56.654644 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.916398475s) to execute
2021-11-01 02:14:59.250352 I | auth: deleting token RFzjuMMeidUVvumd.67 for user conductor
2021-11-01 02:14:59.250394 I | auth: deleting token LXepxHEQrlbZwhPy.64 for user conductor
2021-11-01 02:14:59.250410 I | auth: deleting token WwUHAaJWxHdktTBZ.62 for user conductor
2021-11-01 02:14:59.250422 I | auth: deleting token cJuiphfLUtDXpXfd.65 for user conductor
2021-11-01 02:14:59.360478 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.809840053s) to execute
2021-11-01 02:15:01.160048 I | auth: deleting token SpExsAKQGbvtRpNc.69 for user conductor
2021-11-01 02:15:01.160100 I | auth: deleting token GbqkIjHGWymJvvqu.73 for user conductor
2021-11-01 02:15:01.557563 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:01.956143 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.298193498s) to execute
2021-11-01 02:15:01.956518 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.205306356s) to execute
2021-11-01 02:15:04.160130 I | auth: deleting token cFGdAzdVoffLoEon.71 for user conductor
2021-11-01 02:15:06.557822 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:08.160096 I | auth: deleting token MezMGGOaAmPlTvPh.75 for user conductor
2021-11-01 02:15:08.160152 I | auth: deleting token eGdNwWERskZjwGyJ.77 for user conductor
2021-11-01 02:15:10.160096 I | auth: deleting token OEapbGlfqxVrjimr.76 for user conductor
2021-11-01 02:15:10.353004 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.713840877s) to execute
2021-11-01 02:15:11.558128 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:12.160000 I | auth: deleting token LfUYpnMlEdnucjRi.80 for user conductor
2021-11-01 02:15:12.160034 I | auth: deleting token UUnUwVmjAWOBAKDA.78 for user conductor
2021-11-01 02:15:12.160042 I | auth: deleting token uKLCOVGTAOqannCr.81 for user conductor
2021-11-01 02:15:12.160051 I | auth: deleting token FeMIuNNLyvIJpMNv.82 for user conductor
2021-11-01 02:15:12.654787 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.201944278s) to execute
2021-11-01 02:15:12.655417 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.204642405s) to execute
2021-11-01 02:15:15.160022 I | auth: deleting token okLoNEokjzCwRffg.85 for user conductor
2021-11-01 02:15:15.160067 I | auth: deleting token UbkYselbcBOBMKNR.83 for user conductor
2021-11-01 02:15:15.352322 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.90152081s) to execute
2021-11-01 02:15:15.352494 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.694727787s) to execute
2021-11-01 02:15:15.352618 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.680307791s) to execute
2021-11-01 02:15:15.352904 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (211.309966ms) to execute
2021-11-01 02:15:16.651757 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:17.160028 I | auth: deleting token iIUxFxuprmkPVnPD.87 for user conductor
2021-11-01 02:15:17.756313 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (998.436219ms) to execute
2021-11-01 02:15:20.051149 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.198733932s) to execute
2021-11-01 02:15:20.160117 I | auth: deleting token ZFqbGCooeMkgpzZC.86 for user conductor
2021-11-01 02:15:21.653602 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:25.250570 I | auth: deleting token VGKLuMUycpClANFi.91 for user conductor
2021-11-01 02:15:25.250662 I | auth: deleting token ZPiNVIeBAvnPXjuK.90 for user conductor
2021-11-01 02:15:25.250688 I | auth: deleting token KkgRqERLBSxOxKTt.88 for user conductor
2021-11-01 02:15:25.250716 I | auth: deleting token lZPMEHDcysCZPLZw.89 for user conductor
2021-11-01 02:15:26.160004 I | auth: deleting token oIeFIawpIsvwEBIK.92 for user conductor
2021-11-01 02:15:26.653756 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:27.957134 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.496380788s) to execute
2021-11-01 02:15:28.160087 I | auth: deleting token jZBFaGnwjxEuGvpG.93 for user conductor
2021-11-01 02:15:29.160106 I | auth: deleting token nBuJdWBOuYidCATS.94 for user conductor
2021-11-01 02:15:30.250448 I | auth: deleting token fLtXEZtyixpKtDKm.95 for user conductor
2021-11-01 02:15:30.752919 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.702427836s) to execute
2021-11-01 02:15:30.753467 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.602554028s) to execute
2021-11-01 02:15:31.654017 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:32.160096 I | auth: deleting token HnZRxBqtvYFyPYEX.96 for user conductor
2021-11-01 02:15:33.753498 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.901609303s) to execute
2021-11-01 02:15:33.753721 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.998620727s) to execute
2021-11-01 02:15:33.754001 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.998360783s) to execute
2021-11-01 02:15:36.560477 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.70550911s) to execute
2021-11-01 02:15:36.654606 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:39.155483 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.60489377s) to execute
2021-11-01 02:15:39.160286 I | auth: deleting token sTOGKknFUbRgyrap.102 for user conductor
2021-11-01 02:15:39.160315 I | auth: deleting token xDuaqDMUCCecEmGA.97 for user conductor
2021-11-01 02:15:39.160320 I | auth: deleting token MiOWLDgqRBOZkmBp.99 for user conductor
2021-11-01 02:15:39.160329 I | auth: deleting token MhoVMnfCwGgiVbfa.100 for user conductor
2021-11-01 02:15:41.252122 I | auth: deleting token XCUjSeuJWOcHIMaz.103 for user conductor
2021-11-01 02:15:41.252192 I | auth: deleting token fcyRkoxzmfALHVjP.101 for user conductor
2021-11-01 02:15:41.252213 I | auth: deleting token LgvVpbXSsXAgYCgg.104 for user conductor
2021-11-01 02:15:41.655932 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.305234262s) to execute
2021-11-01 02:15:41.656109 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.405339673s) to execute
2021-11-01 02:15:41.750460 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:44.451125 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.695422321s) to execute
2021-11-01 02:15:46.751797 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:49.754830 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.001908181s) to execute
2021-11-01 02:15:51.752188 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:52.456847 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.518736464s) to execute
2021-11-01 02:15:52.457171 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.686215843s) to execute
2021-11-01 02:15:52.551687 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.780704744s) to execute
2021-11-01 02:15:54.250496 I | auth: deleting token LftCoDCeprbMMvGd.108 for user conductor
2021-11-01 02:15:54.250563 I | auth: deleting token sLHriAtqStDFUuCO.106 for user conductor
2021-11-01 02:15:54.250576 I | auth: deleting token tnOqZsHHvTIdBCGF.107 for user conductor
2021-11-01 02:15:54.250590 I | auth: deleting token CnQfVeXyvFoIofXq.105 for user conductor
2021-11-01 02:15:54.250608 I | auth: deleting token VpdOuNLgQVvrZDQH.98 for user conductor
2021-11-01 02:15:54.250622 I | auth: deleting token xsAsDvtmnYqBBMFD.109 for user conductor
2021-11-01 02:15:55.354545 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.895413556s) to execute
2021-11-01 02:15:55.354970 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.799396022s) to execute
2021-11-01 02:15:55.355280 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102911052s) to execute
2021-11-01 02:15:56.752515 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:57.160046 I | auth: deleting token AmbcaziiXuBQBgyi.113 for user conductor
2021-11-01 02:15:57.160078 I | auth: deleting token PjrPPVsWYcLwhvLk.110 for user conductor
2021-11-01 02:15:57.160087 I | auth: deleting token iVqWHbOyVytkIyWa.114 for user conductor
2021-11-01 02:15:58.155951 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.20522801s) to execute
2021-11-01 02:16:00.160117 I | auth: deleting token SnKapjmKKexGPrNQ.117 for user conductor
2021-11-01 02:16:00.160178 I | auth: deleting token qhsbvsffPAJvDKlx.116 for user conductor
2021-11-01 02:16:00.160196 I | auth: deleting token RXgCrkhXALKBZneP.115 for user conductor
2021-11-01 02:16:01.160043 I | auth: deleting token OCaeYGdqXRqHWAYT.118 for user conductor
2021-11-01 02:16:01.950690 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:03.160165 I | auth: deleting token oZVkvPBTFyvpIGih.119 for user conductor
2021-11-01 02:16:05.160126 I | auth: deleting token rwOxVgiNVJPIjmsf.120 for user conductor
2021-11-01 02:16:06.250909 I | auth: deleting token BDugtmDYniXsdnwO.121 for user conductor
2021-11-01 02:16:06.950930 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:07.250621 I | auth: deleting token AbPjUhGadnhJkIFH.122 for user conductor
2021-11-01 02:16:10.160087 I | auth: deleting token kIrHDPADIFcAPuAf.123 for user conductor
2021-11-01 02:16:10.451120 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.498431216s) to execute
2021-11-01 02:16:11.951196 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:13.151377 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.697604779s) to execute
2021-11-01 02:16:13.151875 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.698534726s) to execute
2021-11-01 02:16:13.250435 I | auth: deleting token BNgehAKRKzDFWiTU.125 for user conductor
2021-11-01 02:16:15.855161 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.604120492s) to execute
2021-11-01 02:16:15.855420 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.604498999s) to execute
2021-11-01 02:16:16.951450 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:18.355398 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.004703449s) to execute
2021-11-01 02:16:20.250458 I | auth: deleting token HTQHErXZOMawHabf.126 for user conductor
2021-11-01 02:16:20.451257 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.000773167s) to execute
2021-11-01 02:16:20.739866 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (183.861305ms) to execute
2021-11-01 02:16:21.952187 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:23.160016 I | auth: deleting token BhwkHJlWifiykEyd.131 for user conductor
2021-11-01 02:16:23.160296 I | auth: deleting token NGUzIkVITgVoUdzi.129 for user conductor
2021-11-01 02:16:23.160304 I | auth: deleting token KpjEXZjeODxqAUHb.128 for user conductor
2021-11-01 02:16:23.160310 I | auth: deleting token kcncWqYiMprXlqiI.127 for user conductor
2021-11-01 02:16:23.160321 I | auth: deleting token WqdRzFpKYcIqULSI.130 for user conductor
2021-11-01 02:16:25.250450 I | auth: deleting token HkToBONcrVXHyJIf.133 for user conductor
2021-11-01 02:16:25.250528 I | auth: deleting token pQZFxYyPupbOqKSV.134 for user conductor
2021-11-01 02:16:25.250557 I | auth: deleting token xRnUoMQJiKZyLwso.135 for user conductor
2021-11-01 02:16:26.952527 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:28.755779 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.603043105s) to execute
2021-11-01 02:16:31.160111 I | auth: deleting token aesOLJwTTkvlCqpF.139 for user conductor
2021-11-01 02:16:31.160201 I | auth: deleting token ZAUNwdHcnQgsjNsM.137 for user conductor
2021-11-01 02:16:31.160219 I | auth: deleting token nmNqAlMIRgFVViyI.136 for user conductor
2021-11-01 02:16:32.050493 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:33.656703 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.805052576s) to execute
2021-11-01 02:16:33.656939 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.898355872s) to execute
2021-11-01 02:16:33.656983 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (4.898602786s) to execute
2021-11-01 02:16:33.851821 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (190.5272ms) to execute
2021-11-01 02:16:36.250474 I | auth: deleting token cZpddHobFimkRcJr.143 for user conductor
2021-11-01 02:16:36.250541 I | auth: deleting token CDdvMrqJQyiLIgPU.144 for user conductor
2021-11-01 02:16:36.250568 I | auth: deleting token rcAmxbxnNfZNuTNT.141 for user conductor
2021-11-01 02:16:36.250605 I | auth: deleting token hwEyBVzsvrKeSNRS.140 for user conductor
2021-11-01 02:16:36.250648 I | auth: deleting token vXpIJfpdejrEopRd.138 for user conductor
2021-11-01 02:16:36.250684 I | auth: deleting token pALpJKegzqyLrFln.142 for user conductor
2021-11-01 02:16:36.552598 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.799357627s) to execute
2021-11-01 02:16:37.150497 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:39.452537 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.101949732s) to execute
2021-11-01 02:16:42.054653 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.403128117s) to execute
2021-11-01 02:16:42.055287 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.504531323s) to execute
2021-11-01 02:16:42.150692 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:42.159993 I | auth: deleting token wUECXiPTPotGkaxe.149 for user conductor
2021-11-01 02:16:42.160030 I | auth: deleting token krqpQgiRuvBwMOSd.146 for user conductor
2021-11-01 02:16:42.160039 I | auth: deleting token pdprkHxdHrVNpLBl.148 for user conductor
2021-11-01 02:16:42.160055 I | auth: deleting token bMYiHpxoshjKZsdb.147 for user conductor
2021-11-01 02:16:42.160067 I | auth: deleting token PSkyDkBOgMHoYPHG.145 for user conductor
2021-11-01 02:16:44.250477 I | auth: deleting token TsSaZbNnCceHiYkC.153 for user conductor
2021-11-01 02:16:44.250545 I | auth: deleting token sRTRTkOlrFcyZecM.154 for user conductor
2021-11-01 02:16:44.250564 I | auth: deleting token ExliVLKIDIHuBKWI.151 for user conductor
2021-11-01 02:16:44.250582 I | auth: deleting token fsBYqXOpcyZchEJD.152 for user conductor
2021-11-01 02:16:44.355883 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.117072569s) to execute
2021-11-01 02:16:44.450687 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.299829014s) to execute
2021-11-01 02:16:46.854830 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.38387659s) to execute
2021-11-01 02:16:46.855083 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.402730591s) to execute
2021-11-01 02:16:47.151025 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:49.156139 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.205015739s) to execute
2021-11-01 02:16:49.156375 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.185648984s) to execute
2021-11-01 02:16:49.156561 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.217926146s) to execute
2021-11-01 02:16:49.160089 I | auth: deleting token WGnasVQwTBybscgy.155 for user conductor
2021-11-01 02:16:49.160132 I | auth: deleting token FgDogRMCWZmOnVCL.158 for user conductor
2021-11-01 02:16:51.160036 I | auth: deleting token yeJbvyECMXCyzBPH.162 for user conductor
2021-11-01 02:16:51.160091 I | auth: deleting token CJtCKdLOeqKZzgLa.159 for user conductor
2021-11-01 02:16:51.160108 I | auth: deleting token iGWXqCeYgesqsbtT.161 for user conductor
2021-11-01 02:16:51.160153 I | auth: deleting token aMDLvlAiKIQzHXLH.157 for user conductor
2021-11-01 02:16:52.151387 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:52.160115 I | auth: deleting token AgFSQJISWNKXgKxM.160 for user conductor
2021-11-01 02:16:52.160183 I | auth: deleting token CkeDeYZLXKrCpyzT.163 for user conductor
2021-11-01 02:16:53.151810 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.911549478s) to execute
2021-11-01 02:16:54.250566 I | auth: deleting token mXhmWdhYwGeLHMYG.164 for user conductor
2021-11-01 02:16:54.250666 I | auth: deleting token bCMMoCXMvlLbnRiY.165 for user conductor
2021-11-01 02:16:55.457130 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (606.531394ms) to execute
2021-11-01 02:16:57.151691 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:57.160160 I | auth: deleting token xiBqWEmZHIRFHJgn.166 for user conductor
2021-11-01 02:16:57.160227 I | auth: deleting token AcrVHBJFLhwUmdal.169 for user conductor
2021-11-01 02:16:57.160252 I | auth: deleting token MWKHVygHVJunNzEg.168 for user conductor
2021-11-01 02:16:57.160296 I | auth: deleting token CvmKRHcjDRwhmHxz.167 for user conductor
2021-11-01 02:17:00.159992 I | auth: deleting token HDUTQjWyskKlebej.170 for user conductor
2021-11-01 02:17:00.160046 I | auth: deleting token xrWkTcwZZFyolmRj.171 for user conductor
2021-11-01 02:17:00.160062 I | auth: deleting token raYSowcToVhnEwOI.172 for user conductor
2021-11-01 02:17:01.160164 I | auth: deleting token gxWKWRRGCSfGmhyG.173 for user conductor
2021-11-01 02:17:02.152096 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:03.160026 I | auth: deleting token SRyKnLQQVSuqsyeq.174 for user conductor
2021-11-01 02:17:04.250397 I | auth: deleting token bOTHUegAlTbPZpyi.175 for user conductor
2021-11-01 02:17:04.556198 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (715.30106ms) to execute
2021-11-01 02:17:06.160046 I | auth: deleting token nfcFJhCZkrAmzgvM.176 for user conductor
2021-11-01 02:17:07.152460 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:07.160082 I | auth: deleting token vGXItqTcQjcMWcRc.177 for user conductor
2021-11-01 02:17:09.160042 I | auth: deleting token sylUxAONgeDnNYsq.178 for user conductor
2021-11-01 02:17:10.160070 I | auth: deleting token ynYfxhdnrioACiwS.179 for user conductor
2021-11-01 02:17:12.250475 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:13.160211 I | auth: deleting token dSKaDpTcoujelDbN.180 for user conductor
2021-11-01 02:17:13.160277 I | auth: deleting token deFGNRxuUUtIokky.181 for user conductor
2021-11-01 02:17:13.160300 I | auth: deleting token dKCuSuOckIKSucXU.182 for user conductor
2021-11-01 02:17:16.160175 I | auth: deleting token KJzOsmBiHQXsHZnt.183 for user conductor
2021-11-01 02:17:17.250766 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:19.156565 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (8.605648558s) to execute
2021-11-01 02:17:20.160052 I | auth: deleting token YCoWAbZprLntbBJi.185 for user conductor
2021-11-01 02:17:20.160093 I | auth: deleting token IHKBSpeMNxubPdbQ.188 for user conductor
2021-11-01 02:17:20.160103 I | auth: deleting token PQFPzzldEgNSXoGe.187 for user conductor
2021-11-01 02:17:20.160118 I | auth: deleting token nJfZJOOiuDWgCuIJ.186 for user conductor
2021-11-01 02:17:21.756868 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.295870851s) to execute
2021-11-01 02:17:21.757171 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.406357145s) to execute
2021-11-01 02:17:21.940007 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.588676457s) to execute
2021-11-01 02:17:22.050788 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (200.041465ms) to execute
2021-11-01 02:17:22.250346 I | auth: deleting token cBpFFwulXYayaTnV.191 for user conductor
2021-11-01 02:17:22.250418 I | auth: deleting token seCifsmFqGGKpuVW.184 for user conductor
2021-11-01 02:17:22.250437 I | auth: deleting token zwvpsDEtWmDeLSYd.190 for user conductor
2021-11-01 02:17:22.250456 I | auth: deleting token ZkrxfCKWTNUIHTzj.189 for user conductor
2021-11-01 02:17:22.251101 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:24.250424 I | auth: deleting token HDQVgimmkwmqpDmc.192 for user conductor
2021-11-01 02:17:24.250652 I | auth: deleting token cSYcaLDtjMNOIJYJ.193 for user conductor
2021-11-01 02:17:26.250398 I | auth: deleting token MjSGfEiaXvdnudoT.194 for user conductor
2021-11-01 02:17:26.250457 I | auth: deleting token BwCAcLBhmPkhvpmc.196 for user conductor
2021-11-01 02:17:26.250477 I | auth: deleting token KPQBctJgKpNUpqOi.195 for user conductor
2021-11-01 02:17:27.251660 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:27.455568 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.514600716s) to execute
2021-11-01 02:17:29.250559 I | auth: deleting token PsPzwxcafOCrqeJo.199 for user conductor
2021-11-01 02:17:29.250685 I | auth: deleting token GvbAgidbQeQbAdlW.197 for user conductor
2021-11-01 02:17:29.250708 I | auth: deleting token WsfcGzxqwRWtGHOA.198 for user conductor
2021-11-01 02:17:30.250605 I | auth: deleting token nwqWPbNSjDYhHtZg.200 for user conductor
2021-11-01 02:17:30.250736 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.699159613s) to execute
2021-11-01 02:17:32.254306 I | auth: deleting token rnsRazLWEItOUqby.201 for user conductor
2021-11-01 02:17:32.254376 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:32.654046 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (702.816093ms) to execute
2021-11-01 02:17:33.160098 I | auth: deleting token qGseDhChQHexZYKF.202 for user conductor
2021-11-01 02:17:34.159985 I | auth: deleting token dgvyCfNpQFXaWFqk.203 for user conductor
2021-11-01 02:17:35.650940 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.200355286s) to execute
2021-11-01 02:17:36.160104 I | auth: deleting token mNOlKEKSZFlpffvW.204 for user conductor
2021-11-01 02:17:37.160110 I | auth: deleting token JzzCcbkVxWpjPMmy.205 for user conductor
2021-11-01 02:17:37.254546 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:39.159982 I | auth: deleting token dhitnxzvuKNBGuoX.206 for user conductor
2021-11-01 02:17:40.052992 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.802236056s) to execute
2021-11-01 02:17:42.254823 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:42.354580 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.103568489s) to execute
2021-11-01 02:17:42.651091 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.22323ms) to execute
2021-11-01 02:17:45.250482 I | auth: deleting token qvguNUrFlwaqQMpJ.207 for user conductor
2021-11-01 02:17:45.250531 I | auth: deleting token fCGmvjAgQpwPqOTY.211 for user conductor
2021-11-01 02:17:45.250543 I | auth: deleting token BpNQZaSAklwzfStP.209 for user conductor
2021-11-01 02:17:47.350474 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:47.954897 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.10418098s) to execute
2021-11-01 02:17:48.138155 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (178.353394ms) to execute
2021-11-01 02:17:49.160065 I | auth: deleting token RFhaBpzjrzPLMcDn.212 for user conductor
2021-11-01 02:17:49.160120 I | auth: deleting token uHxbfjdqPIObNuPU.214 for user conductor
2021-11-01 02:17:49.160142 I | auth: deleting token eNzQDSqvkCnTFfNa.213 for user conductor
2021-11-01 02:17:49.160161 I | auth: deleting token gmIojFDuHQzSZvPH.210 for user conductor
2021-11-01 02:17:49.160200 I | auth: deleting token YTwuYGdvrLLmbMtR.208 for user conductor
2021-11-01 02:17:50.452102 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.099265519s) to execute
2021-11-01 02:17:50.639412 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (182.210222ms) to execute
2021-11-01 02:17:52.350741 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:53.654708 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.11559407s) to execute
2021-11-01 02:17:56.171717 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.421052019s) to execute
2021-11-01 02:17:56.250629 I | auth: deleting token WLJzSeHjXsNaxtZm.220 for user conductor
2021-11-01 02:17:56.250740 I | auth: deleting token ZPnrXSDYNdkslmli.215 for user conductor
2021-11-01 02:17:56.250793 I | auth: deleting token SatNmXlfaWypSrOm.218 for user conductor
2021-11-01 02:17:56.250811 I | auth: deleting token ldRRKYHHtxFcSswH.217 for user conductor
2021-11-01 02:17:57.160016 I | auth: deleting token ntYlnSItVVjjOHJO.221 for user conductor
2021-11-01 02:17:57.160071 I | auth: deleting token mMqmVqwEpBYaibaq.222 for user conductor
2021-11-01 02:17:57.160092 I | auth: deleting token xvoivwuauFMIfuRZ.216 for user conductor
2021-11-01 02:17:57.160105 I | auth: deleting token GsRcOFQnuxBBowna.219 for user conductor
2021-11-01 02:17:57.351001 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:01.160105 I | auth: deleting token jSDrVeRUXghbseBI.223 for user conductor
2021-11-01 02:18:01.160167 I | auth: deleting token AEGaAFWMeeYnPUJN.224 for user conductor
2021-11-01 02:18:01.160186 I | auth: deleting token GmvCPmGoVLDPGbtN.225 for user conductor
2021-11-01 02:18:01.160202 I | auth: deleting token iPTaVBdsoqGDJbka.226 for user conductor
2021-11-01 02:18:01.355331 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.002572868s) to execute
2021-11-01 02:18:01.355868 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.005184847s) to execute
2021-11-01 02:18:02.351319 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:03.250508 I | auth: deleting token ampANlheJbGZHDFF.227 for user conductor
2021-11-01 02:18:03.250584 I | auth: deleting token kZvpmJnmFwadgzKD.228 for user conductor
2021-11-01 02:18:06.250456 I | auth: deleting token ymJASmlfqPuCMIFv.230 for user conductor
2021-11-01 02:18:06.250550 I | auth: deleting token jhMMaAgJgRRRemIG.229 for user conductor
2021-11-01 02:18:06.250579 I | auth: deleting token EuTfhhBSSUIJDOeP.231 for user conductor
2021-11-01 02:18:07.351649 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:09.057190 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.206553076s) to execute
2021-11-01 02:18:09.338896 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (185.754508ms) to execute
2021-11-01 02:18:09.338987 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (185.295657ms) to execute
2021-11-01 02:18:11.160132 I | auth: deleting token ZjDJZEYAXGetYkdu.237 for user conductor
2021-11-01 02:18:11.160195 I | auth: deleting token OnlqxoCUvCTNvFfA.233 for user conductor
2021-11-01 02:18:11.160216 I | auth: deleting token ALktxNICpBvIgVIr.234 for user conductor
2021-11-01 02:18:11.160232 I | auth: deleting token sPlHhvVhrgwleHme.235 for user conductor
2021-11-01 02:18:11.160247 I | auth: deleting token VOnJichwZbnjqFOl.236 for user conductor
2021-11-01 02:18:11.160261 I | auth: deleting token QzcNJCSwxvXEMtCH.232 for user conductor
2021-11-01 02:18:12.352212 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:13.160097 I | auth: deleting token eDWLzxcCCLOTmQUc.238 for user conductor
2021-11-01 02:18:14.160145 I | auth: deleting token CzCLZlZFdzEUXKDp.239 for user conductor
2021-11-01 02:18:15.160172 I | auth: deleting token rMulgWjEfpZnJRLu.240 for user conductor
2021-11-01 02:18:15.160239 I | auth: deleting token GsiztdDMBpkIDTEd.241 for user conductor
2021-11-01 02:18:15.160280 I | auth: deleting token WJrLnwiCYahBgpTF.242 for user conductor
2021-11-01 02:18:15.353753 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.00310375s) to execute
2021-11-01 02:18:15.539565 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (180.96748ms) to execute
2021-11-01 02:18:17.160125 I | auth: deleting token hMYcdNjjreaXkrSS.243 for user conductor
2021-11-01 02:18:17.352392 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:18.250443 I | auth: deleting token GOFSzZYMjZagCkYL.244 for user conductor
2021-11-01 02:18:20.160148 I | auth: deleting token LBgZZWoLdNFHvIAY.245 for user conductor
2021-11-01 02:18:20.160223 I | auth: deleting token AeKgqaNbBtXbVkxl.246 for user conductor
2021-11-01 02:18:20.160250 I | auth: deleting token xgKAPkagzleMpFEV.247 for user conductor
2021-11-01 02:18:21.057825 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.004888177s) to execute
2021-11-01 02:18:21.250593 I | auth: deleting token fmvBuEIuOhVsVgNI.248 for user conductor
2021-11-01 02:18:22.352529 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:24.353614 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.800752702s) to execute
2021-11-01 02:18:24.353787 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.190857304s) to execute
2021-11-01 02:18:24.539334 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (182.542682ms) to execute
2021-11-01 02:18:26.759486 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.218962764s) to execute
2021-11-01 02:18:27.250515 I | auth: deleting token VvsCSclSQOHKnFBM.250 for user conductor
2021-11-01 02:18:27.250570 I | auth: deleting token vfrQEnZttiVkRpDF.249 for user conductor
2021-11-01 02:18:27.353272 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:28.861295 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.010605422s) to execute
2021-11-01 02:18:32.255433 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.301942127s) to execute
2021-11-01 02:18:32.353554 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:35.055477 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (6.102603054s) to execute
2021-11-01 02:18:35.055692 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.796622888s) to execute
2021-11-01 02:18:35.055911 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.797344379s) to execute
2021-11-01 02:18:35.160088 I | auth: deleting token jgwSuorODVrgJeSK.254 for user conductor
2021-11-01 02:18:35.160295 I | auth: deleting token NrEsaNJgeVMVtOzL.255 for user conductor
2021-11-01 02:18:35.160366 I | auth: deleting token TaIKgEglTtZZoWDH.251 for user conductor
2021-11-01 02:18:35.160479 I | auth: deleting token pDnzEpUeFIFlzbAU.253 for user conductor
2021-11-01 02:18:35.160578 I | auth: deleting token gRkaeqqkeANzpRff.252 for user conductor
2021-11-01 02:18:37.353823 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:38.052838 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.812242246s) to execute
2021-11-01 02:18:38.053127 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.19995565s) to execute
2021-11-01 02:18:42.160192 I | auth: deleting token louCQxWDfCLXSzFn.256 for user conductor
2021-11-01 02:18:42.160254 I | auth: deleting token qaOuvGqtKMwQwlkA.261 for user conductor
2021-11-01 02:18:42.160276 I | auth: deleting token TsLSaqtoQXtJsZNv.259 for user conductor
2021-11-01 02:18:42.354172 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:43.160292 I | auth: deleting token sPyGAyIyqUUgKqNP.260 for user conductor
2021-11-01 02:18:43.160349 I | auth: deleting token jASjzewoZEbrHDzl.257 for user conductor
2021-11-01 02:18:43.160367 I | auth: deleting token KBZJWtYYLVyHWoKP.258 for user conductor
2021-11-01 02:18:43.160382 I | auth: deleting token zrDPiEhoUQzleYnE.262 for user conductor
2021-11-01 02:18:43.160405 I | auth: deleting token cQesAruIrgiCDsLT.263 for user conductor
2021-11-01 02:18:46.052955 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.400677064s) to execute
2021-11-01 02:18:47.354472 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:48.754322 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.503819386s) to execute
2021-11-01 02:18:48.938120 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (180.391864ms) to execute
2021-11-01 02:18:49.160157 I | auth: deleting token OZAEJLuwQpMdBwsS.264 for user conductor
2021-11-01 02:18:49.160236 I | auth: deleting token LZJFkRJnLLYBzzHW.268 for user conductor
2021-11-01 02:18:49.160250 I | auth: deleting token qOVqGwNJhFrxrouG.266 for user conductor
2021-11-01 02:18:49.160262 I | auth: deleting token gOSrwJoXcJMMEqwn.269 for user conductor
2021-11-01 02:18:50.160079 I | auth: deleting token wfimLlcNvfapZtKa.267 for user conductor
2021-11-01 02:18:50.160133 I | auth: deleting token lmQeZCETSetJDcxq.265 for user conductor
2021-11-01 02:18:50.160150 I | auth: deleting token ynQFkvEfRRQnRaRo.270 for user conductor
2021-11-01 02:18:52.354886 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:54.160165 I | auth: deleting token BVcAovjXquAPSPnv.273 for user conductor
2021-11-01 02:18:54.160228 I | auth: deleting token TdXmgCDBWimKnThr.274 for user conductor
2021-11-01 02:18:54.160253 I | auth: deleting token UiKpzKyRqPDbEVCL.271 for user conductor
2021-11-01 02:18:56.250351 I | auth: deleting token yysgsoHRQHwAAfVm.276 for user conductor
2021-11-01 02:18:56.250409 I | auth: deleting token JHIIsBMpiCcvLqRR.272 for user conductor
2021-11-01 02:18:56.250436 I | auth: deleting token ruhfCvuGMkqsnrLF.275 for user conductor
2021-11-01 02:18:56.250475 I | auth: deleting token weCCLqXxBEByGBpt.277 for user conductor
2021-11-01 02:18:57.355248 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:57.452417 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.107276395s) to execute
2021-11-01 02:18:59.250545 I | auth: deleting token FosyexHwGdDEhjLf.278 for user conductor
2021-11-01 02:18:59.250668 I | auth: deleting token cHCoRdYiwsvRbpcK.279 for user conductor
2021-11-01 02:19:00.751605 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.798467053s) to execute
2021-11-01 02:19:02.355562 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:19:03.160097 I | auth: deleting token GqLgWgsxqnyMWApn.282 for user conductor
2021-11-01 02:19:03.160137 I | auth: deleting token uaUAmYnWUUCcyDxR.280 for user conductor
2021-11-01 02:19:03.160152 I | auth: deleting token IjZIloIUifcAeqBC.284 for user conductor
2021-11-01 02:19:03.160159 I | auth: deleting token DiPuiQJjXzsTtcto.281 for user conductor
2021-11-01 02:19:03.451401 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.500679211s) to execute
2021-11-01 02:19:05.160082 I | auth: deleting token drgeasYIHfyyjtje.286 for user conductor
2021-11-01 02:19:05.160142 I | auth: deleting token IRYWQtMPjgGbVQNl.285 for user conductor
2021-11-01 02:19:05.160162 I | auth: deleting token bchPmuXjSBUKaiWD.283 for user conductor
2021-11-01 02:19:06.450409 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.995561272s) to execute
2021-11-01 02:19:06.450540 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.995132092s) to execute
2021-11-01 02:19:07.355816 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:19:08.250458 I | auth: deleting token jRykNnlBuqfvLhkj.288 for user conductor
2021-11-01 02:19:08.250535 I | auth: deleting token ZUdUvogWclfIdDDO.287 for user conductor
2021-11-01 02:19:08.250549 I | auth: deleting token QtWiwQTxqfbLmjjI.289 for user conductor
2021-11-01 02:19:09.250507 I | auth: deleting token cLxoiNHAIjGaezoM.290 for user conductor
2021-11-01 02:19:11.160145 I | auth: deleting token jvDmkgijuZcDIaHE.291 for user conductor
2021-11-01 02:19:12.150784 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.898318965s) to execute
2021-11-01 02:19:12.250427 I | auth: deleting token JvkTUZyEDLcFQFyL.292 for user conductor
2021-11-01 02:19:12.356294 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:19:14.751390 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.597767536s) to execute
2021-11-01 02:19:14.751638 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.599067881s) to execute
2021-11-01 02:19:15.038002 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (280.477231ms) to execute
2021-11-01 02:19:16.160095 I | auth: deleting token mgrHJvUdMFevMDQZ.293 for user conductor
2021-11-01 02:19:16.160157 I | auth: deleting token upKYpaJrhEOzwNwD.295 for user conductor
2021-11-01 02:19:17.160136 I | auth: deleting token CRDyuPAyioDnJwzn.296 for user conductor
2021-11-01 02:19:17.160205 I | auth: deleting token THgmCtVKVbqeIcmJ.297 for user conductor
2021-11-01 02:19:17.160235 I | auth: deleting token ArEKUFANhfEXaENZ.294 for user conductor
2021-11-01 02:19:17.356730 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:19:22.160238 I | auth: deleting token tdAUTqkbfLmeQtQx.301 for user conductor
2021-11-01 02:19:22.160376 I | auth: deleting token DsqHjMWJWFYnRjXZ.298 for user conductor
2021-11-01 02:19:22.160451 I | auth: deleting token hwgFAhsmHWTsVQoG.300 for user conductor
2021-11-01 02:19:22.160489 I | auth: deleting token DvbxmBFYrPbYWzDS.299 for user conductor
2021-11-01 02:19:22.160523 I | auth: deleting token mfdWLJbiBflaLjLD.302 for user conductor
2021-11-01 02:19:22.357038 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:19:23.160179 I | auth: deleting token ASzlqLlXlLfYDKWj.303 for user conductor
2021-11-01 02:19:23.860149 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.407115911s) to execute
2021-11-01 02:19:26.250396 I | auth: deleting token AtwOWwDVwbEytTDW.305 for user conductor
2021-11-01 02:19:26.250473 I | auth: deleting token ljdtJalmbbhsicoA.304 for user conductor
2021-11-01 02:19:26.250500 I | auth: deleting token guzMtIQngDGtGmhd.306 for user conductor
2021-11-01 02:19:26.856096 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.717770425s) to execute
2021-11-01 02:19:27.450640 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:19:28.160210 I | auth: deleting token sJnZrmSWfjLsqQuP.307 for user conductor
2021-11-01 02:19:29.556302 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.605596717s) to execute
2021-11-01 02:19:32.450957 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:19:33.160016 I | auth: deleting token KyzXsGverwLpBPNS.309 for user conductor
2021-11-01 02:19:33.160057 I | auth: deleting token RTcJAXvYIApiMckB.313 for user conductor
2021-11-01 02:19:33.160067 I | auth: deleting token IjCyjlmCxDseyxiz.308 for user conductor
2021-11-01 02:19:33.160075 I | auth: deleting token dmcDvtxBXFSIPOni.312 for user conductor
2021-11-01 02:19:33.160089 I | auth: deleting token HrYJxrMGrPafzESY.311 for user conductor
2021-11-01 02:19:33.160099 I | auth: deleting token UOAvtwdibdiEveLv.310 for user conductor
2021-11-01 02:19:34.160154 I | auth: deleting token ezTKSOHeOulpfuSU.314 for user conductor
2021-11-01 02:19:36.250349 I | auth: deleting token quRQQNYxQcPQmPmL.315 for user conductor
2021-11-01 02:19:37.257422 I | auth: deleting token LfpNANlMzfTYXMen.316 for user conductor
2021-11-01 02:19:37.451282 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:19:39.160124 I | auth: deleting token fKXjBdCwGxjkDqQP.317 for user conductor
2021-11-01 02:19:41.056138 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (8.004197336s) to execute
2021-11-01 02:19:42.451843 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:19:43.161527 I | auth: deleting token PgFtshvgqhzNQMBn.318 for user conductor
2021-11-01 02:19:43.161578 I | auth: deleting token hxTuGcnURYPIeJtG.320 for user conductor
2021-11-01 02:19:43.161593 I | auth: deleting token ximvwoiyDgSvqELC.319 for user conductor
2021-11-01 02:19:43.161609 I | auth: deleting token KDiLuHfKHnvhRyrL.321 for user conductor
2021-11-01 02:19:43.755570 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.603658759s) to execute
2021-11-01 02:19:46.160052 I | auth: deleting token fuaWFKGJjhiQTZKe.323 for user conductor
2021-11-01 02:19:46.160117 I | auth: deleting token OlzuapsFbyEUjJef.322 for user conductor
2021-11-01 02:19:46.255164 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.196735571s) to execute
2021-11-01 02:19:46.255389 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.196794144s) to execute
2021-11-01 02:19:46.255490 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.402196432s) to execute
2021-11-01 02:19:46.255656 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.40240978s) to execute
2021-11-01 02:19:47.452135 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:19:49.160143 I | auth: deleting token dtzwREUOPjJCKIUB.327 for user conductor
2021-11-01 02:19:49.160188 I | auth: deleting token CMaOkZfSJXweyDRO.324 for user conductor
2021-11-01 02:19:49.160199 I | auth: deleting token YoHbOuWzloVgwfCV.326 for user conductor
2021-11-01 02:19:49.160211 I | auth: deleting token JmpRCjydYayxUWGS.325 for user conductor
2021-11-01 02:19:51.154912 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (4.604138826s) to execute
2021-11-01 02:19:51.338329 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (181.066606ms) to execute
2021-11-01 02:19:52.452563 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:19:54.255176 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.602961164s) to execute
2021-11-01 02:19:55.160122 I | auth: deleting token XEiQgmjZuolxMGLc.329 for user conductor
2021-11-01 02:19:55.160219 I | auth: deleting token BySJpaPRqZxiyvGx.331 for user conductor
2021-11-01 02:19:55.160247 I | auth: deleting token HDKfUUjNuqMNQFIO.328 for user conductor
2021-11-01 02:19:57.160136 I | auth: deleting token JJrkfkafwNKkSHGx.333 for user conductor
2021-11-01 02:19:57.160200 I | auth: deleting token ICRMcnzmAGpKKoig.330 for user conductor
2021-11-01 02:19:57.452912 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:19:59.155509 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.801100555s) to execute
2021-11-01 02:20:02.250474 I | auth: deleting token vVSBMRSLVwTaURxi.332 for user conductor
2021-11-01 02:20:02.250553 I | auth: deleting token gEQWsbNuaXQUNsDM.335 for user conductor
2021-11-01 02:20:02.250581 I | auth: deleting token luEFPoLciXRfduHo.334 for user conductor
2021-11-01 02:20:02.250599 I | auth: deleting token QMcIJChaIvhczHmZ.336 for user conductor
2021-11-01 02:20:02.250622 I | auth: deleting token PZWKHQoXpnaOdEmt.337 for user conductor
2021-11-01 02:20:02.453138 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:04.353363 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.194788224s) to execute
2021-11-01 02:20:04.353877 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.195691109s) to execute
2021-11-01 02:20:04.550835 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.392605525s) to execute
2021-11-01 02:20:04.553173 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (102.40433ms) to execute
2021-11-01 02:20:04.553386 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.600708ms) to execute
2021-11-01 02:20:07.453493 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:11.250480 I | auth: deleting token kZMToIbEroFKSpsR.343 for user conductor
2021-11-01 02:20:11.250535 I | auth: deleting token sEclBebFQbPHKOFg.340 for user conductor
2021-11-01 02:20:11.250553 I | auth: deleting token DLSGrwqIhdqEwefa.342 for user conductor
2021-11-01 02:20:11.250568 I | auth: deleting token tLwOIMIPsFsrpUlH.338 for user conductor
2021-11-01 02:20:11.751754 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.810208123s) to execute
2021-11-01 02:20:12.453721 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:13.160129 I | auth: deleting token mlHZMWZNmUNgwlxp.346 for user conductor
2021-11-01 02:20:13.160308 I | auth: deleting token EDTIhnfNPgxnDJuU.341 for user conductor
2021-11-01 02:20:13.160369 I | auth: deleting token dXKFNLLKtPrmlnEs.345 for user conductor
2021-11-01 02:20:13.160449 I | auth: deleting token nWGYpumGGeYGAFWl.339 for user conductor
2021-11-01 02:20:13.160619 I | auth: deleting token UUHUUgeqaxIWRRLg.344 for user conductor
2021-11-01 02:20:16.160142 I | auth: deleting token CxyQxSlMglfvZusr.347 for user conductor
2021-11-01 02:20:16.160378 I | auth: deleting token QsfKQVeuualcJzkE.348 for user conductor
2021-11-01 02:20:16.955876 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.817699718s) to execute
2021-11-01 02:20:17.453962 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:18.250337 I | auth: deleting token sZRVaOvEqRXLZfUG.349 for user conductor
2021-11-01 02:20:20.161356 I | auth: deleting token ZbUQSshbOnyRMrbD.352 for user conductor
2021-11-01 02:20:20.161404 I | auth: deleting token rVMyjaNJkGbHfDIo.350 for user conductor
2021-11-01 02:20:20.250535 I | auth: deleting token JlxidrXKVrnLOqfW.351 for user conductor
2021-11-01 02:20:21.160087 I | auth: deleting token kWwDYJUdshgumfDs.353 for user conductor
2021-11-01 02:20:22.053375 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.802605904s) to execute
2021-11-01 02:20:22.454337 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:26.554990 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.498251347s) to execute
2021-11-01 02:20:26.555360 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.499646374s) to execute
2021-11-01 02:20:27.454630 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:28.250534 I | auth: deleting token CAFSVaQetpymZTGT.355 for user conductor
2021-11-01 02:20:28.250592 I | auth: deleting token TajslmPPKmaCKhfx.354 for user conductor
2021-11-01 02:20:31.160019 I | auth: deleting token BYDVvroWAjFwvcnj.356 for user conductor
2021-11-01 02:20:31.160055 I | auth: deleting token zUbzTwFTnvuTwGao.358 for user conductor
2021-11-01 02:20:31.160060 I | auth: deleting token ogKrbCVfimEbGhYC.359 for user conductor
2021-11-01 02:20:31.160073 I | auth: deleting token FtBYGQaukHdOFoKF.361 for user conductor
2021-11-01 02:20:31.451253 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.198495799s) to execute
2021-11-01 02:20:32.550548 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:34.250605 I | auth: deleting token nUdjPEogklKXfOpd.357 for user conductor
2021-11-01 02:20:34.250666 I | auth: deleting token LLtjpBkjPRzPdbFj.364 for user conductor
2021-11-01 02:20:34.250682 I | auth: deleting token bKUrmxZVyGdLkFPS.363 for user conductor
2021-11-01 02:20:34.250695 I | auth: deleting token UeGWAFHrhhNFoHfu.362 for user conductor
2021-11-01 02:20:34.250707 I | auth: deleting token NdoziszLwrnYbCML.365 for user conductor
2021-11-01 02:20:34.250736 I | auth: deleting token PTutFuDOGBCYLEPu.360 for user conductor
2021-11-01 02:20:34.851600 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.400086339s) to execute
2021-11-01 02:20:34.852029 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.398551095s) to execute
2021-11-01 02:20:37.450939 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.596103595s) to execute
2021-11-01 02:20:37.451833 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.596994419s) to execute
2021-11-01 02:20:37.550772 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:39.250465 I | auth: deleting token lZjKrkeHAhpaSgBS.366 for user conductor
2021-11-01 02:20:39.250540 I | auth: deleting token pszirGolVLPKjeOF.368 for user conductor
2021-11-01 02:20:39.557493 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.006964107s) to execute
2021-11-01 02:20:39.557614 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.099968134s) to execute
2021-11-01 02:20:42.250374 I | auth: deleting token wuuEIMynCViAdWvB.370 for user conductor
2021-11-01 02:20:42.250435 I | auth: deleting token pDAyObGExDzncrae.372 for user conductor
2021-11-01 02:20:42.250449 I | auth: deleting token oamZFPWtAGWcWSiz.369 for user conductor
2021-11-01 02:20:42.250474 I | auth: deleting token qWXxTBduqfyFNGOm.371 for user conductor
2021-11-01 02:20:42.250485 I | auth: deleting token DXtVpnDxWRixFWSA.367 for user conductor
2021-11-01 02:20:42.452283 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.701637064s) to execute
2021-11-01 02:20:42.452742 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.801824604s) to execute
2021-11-01 02:20:42.550952 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:45.051381 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.596675818s) to execute
2021-11-01 02:20:45.051690 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.298452463s) to execute
2021-11-01 02:20:45.051744 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.482188665s) to execute
2021-11-01 02:20:47.551173 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:47.656447 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.005737268s) to execute
2021-11-01 02:20:50.160086 I | auth: deleting token AFowthPhUgFxvnvt.376 for user conductor
2021-11-01 02:20:50.160148 I | auth: deleting token ZOdkCCITMkocZuOR.374 for user conductor
2021-11-01 02:20:50.160161 I | auth: deleting token XtiuQkBCDMdSIDdN.373 for user conductor
2021-11-01 02:20:50.160172 I | auth: deleting token wRnZGkNqPmUCoxfQ.378 for user conductor
2021-11-01 02:20:52.551422 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:53.160190 I | auth: deleting token dXznaVvtnBbMbRYC.379 for user conductor
2021-11-01 02:20:53.160271 I | auth: deleting token euECEymaerhcbcTc.380 for user conductor
2021-11-01 02:20:53.160294 I | auth: deleting token JpAhnRsnJhoysGVQ.375 for user conductor
2021-11-01 02:20:53.160310 I | auth: deleting token WBliLdnYXdnpZMjw.377 for user conductor
2021-11-01 02:20:53.160329 I | auth: deleting token OOlsgUNgSsGHgLKh.381 for user conductor
2021-11-01 02:20:53.952490 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.101743364s) to execute
2021-11-01 02:20:56.160168 I | auth: deleting token peDDjePgUuLCHcvv.383 for user conductor
2021-11-01 02:20:56.160217 I | auth: deleting token ckNqkjDTqMbofBwr.382 for user conductor
2021-11-01 02:20:57.551749 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:20:58.251654 I | auth: deleting token sTVADblJmIySYHRR.384 for user conductor
2021-11-01 02:20:58.251705 I | auth: deleting token SudCYGmaOYnQVwKL.385 for user conductor
2021-11-01 02:20:59.250578 I | auth: deleting token zpGgLLnNuVMOxhmu.386 for user conductor
2021-11-01 02:21:00.160085 I | auth: deleting token UuBxeoRMMIiMivZS.387 for user conductor
2021-11-01 02:21:01.160107 I | auth: deleting token KtoPAaFrRMGrcmRx.388 for user conductor
2021-11-01 02:21:01.650565 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.598924226s) to execute
2021-11-01 02:21:02.551978 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:03.160113 I | auth: deleting token bRXtwwmxqVsQjJTY.389 for user conductor
2021-11-01 02:21:04.160280 I | auth: deleting token cKVTfJxtInZdvtSj.390 for user conductor
2021-11-01 02:21:06.160016 I | auth: deleting token xnRuQBpQTdmzTdrr.391 for user conductor
2021-11-01 02:21:06.952809 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.907030623s) to execute
2021-11-01 02:21:07.552235 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:09.557298 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.50419121s) to execute
2021-11-01 02:21:09.650753 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.599934449s) to execute
2021-11-01 02:21:11.250484 I | auth: deleting token FjKReBzPGGUnbvvg.392 for user conductor
2021-11-01 02:21:11.250546 I | auth: deleting token uCLcsLAmDJUZeLyj.394 for user conductor
2021-11-01 02:21:11.250557 I | auth: deleting token qegbXblAOeLKEIqE.395 for user conductor
2021-11-01 02:21:12.353452 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.699897483s) to execute
2021-11-01 02:21:12.552430 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:13.160112 I | auth: deleting token OgmmLpFHXLHietVY.397 for user conductor
2021-11-01 02:21:13.160169 I | auth: deleting token mYdGVNAOhaZaTYjQ.393 for user conductor
2021-11-01 02:21:15.155560 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.002549171s) to execute
2021-11-01 02:21:15.438422 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (184.794016ms) to execute
2021-11-01 02:21:16.160119 I | auth: deleting token YvImiRmvzyoofxFz.398 for user conductor
2021-11-01 02:21:16.160190 I | auth: deleting token GerdpjuOdIeXuEQy.396 for user conductor
2021-11-01 02:21:16.160208 I | auth: deleting token YAliGFamGmDvIbUD.400 for user conductor
2021-11-01 02:21:16.160230 I | auth: deleting token uXaNMPOLLzpdjRhR.399 for user conductor
2021-11-01 02:21:17.552769 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:19.160185 I | auth: deleting token pKptItsVfwvHLcTg.401 for user conductor
2021-11-01 02:21:21.160011 I | auth: deleting token SCFPijuJZkUUIvIf.404 for user conductor
2021-11-01 02:21:21.160058 I | auth: deleting token odBudboQfMyQCZRf.402 for user conductor
2021-11-01 02:21:21.160070 I | auth: deleting token jcxuOlllVOCcyqgr.405 for user conductor
2021-11-01 02:21:21.160083 I | auth: deleting token INtjWbzGecRJUhgE.403 for user conductor
2021-11-01 02:21:22.553221 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:23.356239 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (917.654295ms) to execute
2021-11-01 02:21:27.553531 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:28.154741 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.504028736s) to execute
2021-11-01 02:21:29.160068 I | auth: deleting token XBDlDlbpDHxSgNtz.407 for user conductor
2021-11-01 02:21:29.160159 I | auth: deleting token cIexPfUXEgsMoMTC.406 for user conductor
2021-11-01 02:21:29.160182 I | auth: deleting token hwwSYYPncYpPPhYZ.409 for user conductor
2021-11-01 02:21:31.156532 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.505921709s) to execute
2021-11-01 02:21:32.553815 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:33.854668 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.503930832s) to execute
2021-11-01 02:21:34.160029 I | auth: deleting token bdJvpfKmQfCwrhdz.408 for user conductor
2021-11-01 02:21:34.160088 I | auth: deleting token hVwiCGDsndLiqETx.412 for user conductor
2021-11-01 02:21:34.160102 I | auth: deleting token OBiADlMGdpmGQRuI.410 for user conductor
2021-11-01 02:21:34.160113 I | auth: deleting token YAAksIavHlEGEfXi.413 for user conductor
2021-11-01 02:21:34.160131 I | auth: deleting token GTHuDEePAptISMzf.411 for user conductor
2021-11-01 02:21:36.253733 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (901.083613ms) to execute
2021-11-01 02:21:37.554105 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:40.160061 I | auth: deleting token TBKKFAaJTAnFIDSG.414 for user conductor
2021-11-01 02:21:40.160132 I | auth: deleting token phDBOdvBuSOSvWKg.416 for user conductor
2021-11-01 02:21:40.160171 I | auth: deleting token novppIFxRetPTALw.417 for user conductor
2021-11-01 02:21:40.857235 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (918.940791ms) to execute
2021-11-01 02:21:42.160221 I | auth: deleting token IueEYMzDqSlNeycK.420 for user conductor
2021-11-01 02:21:42.160278 I | auth: deleting token DWQAWLWEXuATPYmu.419 for user conductor
2021-11-01 02:21:42.160289 I | auth: deleting token FCZsgMEReAYJwUEm.415 for user conductor
2021-11-01 02:21:42.554359 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:45.160133 I | auth: deleting token tytTcTEReWYveyEp.418 for user conductor
2021-11-01 02:21:45.160206 I | auth: deleting token DrEaSZZhYPUBEren.422 for user conductor
2021-11-01 02:21:47.160012 I | auth: deleting token VDGdTgrRSkFHkBJg.421 for user conductor
2021-11-01 02:21:47.160078 I | auth: deleting token MYzMRWBvosSGrPwP.425 for user conductor
2021-11-01 02:21:47.160097 I | auth: deleting token KMWXvrDtoVfcQLls.423 for user conductor
2021-11-01 02:21:47.160116 I | auth: deleting token PsMxwAGGkrgIXlDH.424 for user conductor
2021-11-01 02:21:47.554574 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:49.250520 I | auth: deleting token ZpXszLRvzLqiyJgl.426 for user conductor
2021-11-01 02:21:50.250638 I | auth: deleting token vLwatauwDTvfAWMV.427 for user conductor
2021-11-01 02:21:50.250694 I | auth: deleting token UMZjKGZRbaQXhhPq.428 for user conductor
2021-11-01 02:21:50.752430 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.892291503s) to execute
2021-11-01 02:21:52.554785 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:53.160041 I | auth: deleting token GhFulVGcpjyBqFdj.430 for user conductor
2021-11-01 02:21:53.160116 I | auth: deleting token TbssauMwTTxgBSXU.429 for user conductor
2021-11-01 02:21:53.260377 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.507712016s) to execute
2021-11-01 02:21:53.260690 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.505408048s) to execute
2021-11-01 02:21:53.438817 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (175.516532ms) to execute
2021-11-01 02:21:53.538131 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (187.424765ms) to execute
2021-11-01 02:21:54.160072 I | auth: deleting token mbxcOpBNwLVRXwDd.431 for user conductor
2021-11-01 02:21:56.155492 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.503751966s) to execute
2021-11-01 02:21:56.250640 I | auth: deleting token QvKvknNyjeTWWgic.433 for user conductor
2021-11-01 02:21:56.250835 I | auth: deleting token JzDRsXNYWMHYbYTO.432 for user conductor
2021-11-01 02:21:57.159978 I | auth: deleting token qjtePKhVwjCkDhhI.434 for user conductor
2021-11-01 02:21:57.555036 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:21:58.160053 I | auth: deleting token PKRFGJxgwYMOQJna.435 for user conductor
2021-11-01 02:21:59.054665 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.603956363s) to execute
2021-11-01 02:22:00.160091 I | auth: deleting token POLsjPJCvRDaXFZW.436 for user conductor
2021-11-01 02:22:01.160250 I | auth: deleting token wgVxoKApxBsjRkRZ.437 for user conductor
2021-11-01 02:22:01.854907 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.603166796s) to execute
2021-11-01 02:22:02.555298 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:03.160093 I | auth: deleting token NQbTPPVMFvVTqswy.438 for user conductor
2021-11-01 02:22:04.553163 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.51512834s) to execute
2021-11-01 02:22:04.553339 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.696257623s) to execute
2021-11-01 02:22:05.250357 I | auth: deleting token BCcjkIeBMQHkYkOt.441 for user conductor
2021-11-01 02:22:05.250434 I | auth: deleting token kViKuARjYFfCOROi.439 for user conductor
2021-11-01 02:22:05.250462 I | auth: deleting token TODdWDSeBgkrcRvi.440 for user conductor
2021-11-01 02:22:07.057488 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.403916551s) to execute
2021-11-01 02:22:07.057812 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.406829439s) to execute
2021-11-01 02:22:07.250364 I | auth: deleting token fhlRdrxhgKFqDVUV.442 for user conductor
2021-11-01 02:22:07.555650 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:09.160124 I | auth: deleting token oRASfrNMKWBdzaDF.443 for user conductor
2021-11-01 02:22:12.550558 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.39962259s) to execute
2021-11-01 02:22:12.550715 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.395136867s) to execute
2021-11-01 02:22:12.550838 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.998210154s) to execute
2021-11-01 02:22:12.555935 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:12.737981 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (183.525774ms) to execute
2021-11-01 02:22:15.251743 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.813256689s) to execute
2021-11-01 02:22:17.650392 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:18.252295 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.200375527s) to execute
2021-11-01 02:22:19.160068 I | auth: deleting token OkTRahpZhCUtUtFb.449 for user conductor
2021-11-01 02:22:19.160121 I | auth: deleting token ZflFWvoUbFIFAtru.451 for user conductor
2021-11-01 02:22:19.160137 I | auth: deleting token tvfxNJlmrSMDGZTn.444 for user conductor
2021-11-01 02:22:19.160154 I | auth: deleting token DlYUKpfcJNsBQRdE.447 for user conductor
2021-11-01 02:22:19.160165 I | auth: deleting token cDvfxSLnYKNmfSsz.446 for user conductor
2021-11-01 02:22:19.160181 I | auth: deleting token nEWoBwuubaouOBdb.445 for user conductor
2021-11-01 02:22:20.356866 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.906251563s) to execute
2021-11-01 02:22:22.160135 I | auth: deleting token ntqEyywSAziOdOjm.450 for user conductor
2021-11-01 02:22:22.160231 I | auth: deleting token IGfcMZeFzeGssfHo.454 for user conductor
2021-11-01 02:22:22.160255 I | auth: deleting token PMoqVPHyJnmddLcC.448 for user conductor
2021-11-01 02:22:22.160278 I | auth: deleting token dbAgRlJKSoiVmbRe.452 for user conductor
2021-11-01 02:22:22.160303 I | auth: deleting token qJEWXntXuvViJQLV.453 for user conductor
2021-11-01 02:22:22.651070 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:23.552258 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.101515469s) to execute
2021-11-01 02:22:23.552630 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.101797457s) to execute
2021-11-01 02:22:26.155635 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.60103575s) to execute
2021-11-01 02:22:26.156217 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.505337906s) to execute
2021-11-01 02:22:26.156482 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.303331307s) to execute
2021-11-01 02:22:27.651411 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:28.750637 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.494917482s) to execute
2021-11-01 02:22:28.750857 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.007002876s) to execute
2021-11-01 02:22:31.250442 I | auth: deleting token ZUKrotpncItdCZuU.456 for user conductor
2021-11-01 02:22:31.250497 I | auth: deleting token UAuDGfYnfuqXkFoB.459 for user conductor
2021-11-01 02:22:31.250510 I | auth: deleting token deqCVyJpELqxBPai.460 for user conductor
2021-11-01 02:22:31.250519 I | auth: deleting token fsBOeaXngCJLjgxQ.461 for user conductor
2021-11-01 02:22:31.250530 I | auth: deleting token WQlubmQsPmEYIbbU.455 for user conductor
2021-11-01 02:22:31.250540 I | auth: deleting token DauMcfxMQPYYGLsh.462 for user conductor
2021-11-01 02:22:31.250547 I | auth: deleting token nncDOMZmaSMTWMQp.458 for user conductor
2021-11-01 02:22:31.250554 I | auth: deleting token mYwrpYIcNWxIiPpz.457 for user conductor
2021-11-01 02:22:32.653646 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:33.250327 I | auth: deleting token EtVuTkIuTznYYOlJ.464 for user conductor
2021-11-01 02:22:33.250404 I | auth: deleting token cRBoXldIgnJYXzVw.463 for user conductor
2021-11-01 02:22:35.354778 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.401909863s) to execute
2021-11-01 02:22:36.160107 I | auth: deleting token HmTBRZmiadEbHSEv.466 for user conductor
2021-11-01 02:22:36.160172 I | auth: deleting token rjLPfIfYJXgqelBZ.465 for user conductor
2021-11-01 02:22:36.160192 I | auth: deleting token EMaPoVSpflSXeCtD.467 for user conductor
2021-11-01 02:22:37.160205 I | auth: deleting token llUfoUquefdXWUsR.468 for user conductor
2021-11-01 02:22:37.653923 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:40.160107 I | auth: deleting token xVzpzoPphwHsaBpP.470 for user conductor
2021-11-01 02:22:40.160170 I | auth: deleting token ZWQKrVbxenZCcHGk.469 for user conductor
2021-11-01 02:22:42.654226 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:42.953682 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.502964597s) to execute
2021-11-01 02:22:42.954056 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.597506581s) to execute
2021-11-01 02:22:43.066034 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (109.764751ms) to execute
2021-11-01 02:22:43.067857 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (111.170318ms) to execute
2021-11-01 02:22:43.160150 I | auth: deleting token YgwHBDbKdIKUYnWq.471 for user conductor
2021-11-01 02:22:43.160222 I | auth: deleting token ukFUabcwtRpgvVxD.472 for user conductor
2021-11-01 02:22:43.160237 I | auth: deleting token pxxdQTlECkaPlOnJ.474 for user conductor
2021-11-01 02:22:43.160249 I | auth: deleting token fdhRuFqWnwcujLKB.473 for user conductor
2021-11-01 02:22:47.060692 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.209531344s) to execute
2021-11-01 02:22:47.654744 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:48.160216 I | auth: deleting token UxBffxceNPvziZvn.479 for user conductor
2021-11-01 02:22:48.160302 I | auth: deleting token mhOomuqcADTQcCpe.476 for user conductor
2021-11-01 02:22:48.160318 I | auth: deleting token ZZlVMrWMmLwUzIeN.478 for user conductor
2021-11-01 02:22:48.160338 I | auth: deleting token SeyKvKajLIyTSHSg.475 for user conductor
2021-11-01 02:22:48.160353 I | auth: deleting token SWYzcppKrHXevVoc.477 for user conductor
2021-11-01 02:22:49.456834 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (918.743972ms) to execute
2021-11-01 02:22:51.250427 I | auth: deleting token imzixRjCNwLOiyHY.480 for user conductor
2021-11-01 02:22:51.250501 I | auth: deleting token WQhXvuGvoijkWtXk.481 for user conductor
2021-11-01 02:22:51.250522 I | auth: deleting token RpqMzSDVNTceYdZp.482 for user conductor
2021-11-01 02:22:51.660972 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.109416093s) to execute
2021-11-01 02:22:52.750661 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:54.160152 I | auth: deleting token PKsLtxHMNzqwhCIo.484 for user conductor
2021-11-01 02:22:54.160252 I | auth: deleting token bbDdIuyEFLJbankO.483 for user conductor
2021-11-01 02:22:54.952746 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.289614086s) to execute
2021-11-01 02:22:54.953271 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.101519223s) to execute
2021-11-01 02:22:57.250569 I | auth: deleting token xEwVNPPXlBkOqYuX.486 for user conductor
2021-11-01 02:22:57.355591 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.400111321s) to execute
2021-11-01 02:22:57.453420 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.49689416s) to execute
2021-11-01 02:22:57.750946 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:22:59.951853 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.593891049s) to execute
2021-11-01 02:22:59.952129 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.496332308s) to execute
2021-11-01 02:22:59.952356 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.11371161s) to execute
2021-11-01 02:23:02.250591 I | auth: deleting token abfPDSiHWqlPqwsc.487 for user conductor
2021-11-01 02:23:02.250658 I | auth: deleting token fGnrGaZfczPpkytW.488 for user conductor
2021-11-01 02:23:02.250672 I | auth: deleting token yPbibDlWlulevQAL.489 for user conductor
2021-11-01 02:23:02.250689 I | auth: deleting token uZEUbvLNOSppzMXD.490 for user conductor
2021-11-01 02:23:02.250711 I | auth: deleting token WGTOfaFPBleUPlzI.491 for user conductor
2021-11-01 02:23:02.250724 I | auth: deleting token KaSzTFkMylRUvRTc.485 for user conductor
2021-11-01 02:23:02.250751 I | auth: deleting token IlVNzPVJoupwtUtm.492 for user conductor
2021-11-01 02:23:02.651795 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.513802301s) to execute
2021-11-01 02:23:02.751252 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:05.158615 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.501963388s) to execute
2021-11-01 02:23:05.158929 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.505249838s) to execute
2021-11-01 02:23:05.353683 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.559841ms) to execute
2021-11-01 02:23:07.556577 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.202338447s) to execute
2021-11-01 02:23:07.557057 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (505.298384ms) to execute
2021-11-01 02:23:07.751435 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:09.160261 I | auth: deleting token zgwvsdCtdQiLumHE.498 for user conductor
2021-11-01 02:23:09.160312 I | auth: deleting token dMkRySOqVWxYQbUi.493 for user conductor
2021-11-01 02:23:09.160323 I | auth: deleting token uMrONQXRWRAIqBaT.495 for user conductor
2021-11-01 02:23:09.160336 I | auth: deleting token qjObhskeKYntbrTX.496 for user conductor
2021-11-01 02:23:10.250382 I | auth: deleting token GyYIjjcqaKSENPwA.500 for user conductor
2021-11-01 02:23:10.250426 I | auth: deleting token iVSiPSvmSdTKkmyc.497 for user conductor
2021-11-01 02:23:10.250434 I | auth: deleting token pQqzTPZXIJySnvTG.499 for user conductor
2021-11-01 02:23:10.250445 I | auth: deleting token KvExTYBRyrZPjXWP.494 for user conductor
2021-11-01 02:23:10.354409 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.701559914s) to execute
2021-11-01 02:23:12.751843 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:13.351557 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.211382774s) to execute
2021-11-01 02:23:15.852192 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.401600843s) to execute
2021-11-01 02:23:16.160067 I | auth: deleting token ZhBjfpdZngVOJMYe.501 for user conductor
2021-11-01 02:23:16.160123 I | auth: deleting token fXiaMDfJWwSLVCdP.505 for user conductor
2021-11-01 02:23:16.160145 I | auth: deleting token HFrymFIcvEZfyAEi.502 for user conductor
2021-11-01 02:23:16.160161 I | auth: deleting token axKJzkwcValNRMAL.503 for user conductor
2021-11-01 02:23:16.160172 I | auth: deleting token sfSJJEoKuXpAdIjT.504 for user conductor
2021-11-01 02:23:17.752070 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:18.451742 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.413666721s) to execute
2021-11-01 02:23:18.452166 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.597351268s) to execute
2021-11-01 02:23:21.052835 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.598769649s) to execute
2021-11-01 02:23:21.053004 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.595745678s) to execute
2021-11-01 02:23:21.250731 I | auth: deleting token gGHottGzHYnzehna.506 for user conductor
2021-11-01 02:23:21.250820 I | auth: deleting token MfIpsTBdaHtLhTdI.509 for user conductor
2021-11-01 02:23:21.250858 I | auth: deleting token ELADEKYybmflhgWB.507 for user conductor
2021-11-01 02:23:22.250320 I | auth: deleting token LkBKwjWjsbaXRfXx.508 for user conductor
2021-11-01 02:23:22.752448 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:24.053329 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.408313165s) to execute
2021-11-01 02:23:25.160232 I | auth: deleting token idwCCmAmngUHVDsg.513 for user conductor
2021-11-01 02:23:25.160288 I | auth: deleting token kdJozwdNiIVUoLkN.511 for user conductor
2021-11-01 02:23:25.160307 I | auth: deleting token QWRHSTIGrwOXuicp.512 for user conductor
2021-11-01 02:23:25.160324 I | auth: deleting token bZHEyWIgMMkfCWeO.510 for user conductor
2021-11-01 02:23:25.160359 I | auth: deleting token yBJCNZNDUAhPThnN.514 for user conductor
2021-11-01 02:23:26.552737 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.302106882s) to execute
2021-11-01 02:23:27.752736 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:28.957086 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.404238561s) to execute
2021-11-01 02:23:28.957384 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.901363747s) to execute
2021-11-01 02:23:28.957535 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.40229663s) to execute
2021-11-01 02:23:29.160087 I | auth: deleting token cSwvOQsGmYYGvXZM.517 for user conductor
2021-11-01 02:23:29.160152 I | auth: deleting token LgJoRmgOtgcSvyTK.518 for user conductor
2021-11-01 02:23:29.160167 I | auth: deleting token xuCEKSGAOSFolUsE.515 for user conductor
2021-11-01 02:23:31.451889 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.401175973s) to execute
2021-11-01 02:23:31.452122 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.399281679s) to execute
2021-11-01 02:23:31.452219 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.014124909s) to execute
2021-11-01 02:23:32.753029 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:33.160085 I | auth: deleting token juFVMmpVdbywjqkm.516 for user conductor
2021-11-01 02:23:35.171349 I | auth: deleting token efgUtMlDvcifDGXH.521 for user conductor
2021-11-01 02:23:35.171434 I | auth: deleting token oogtCEBDSvUNcVdY.519 for user conductor
2021-11-01 02:23:35.171468 I | auth: deleting token zULjInzZZqfcaafK.522 for user conductor
2021-11-01 02:23:36.160113 I | auth: deleting token UVWRWReVPXJQDDJD.520 for user conductor
2021-11-01 02:23:36.160192 I | auth: deleting token aMsDWguLvbEAraVG.523 for user conductor
2021-11-01 02:23:36.855628 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.102556358s) to execute
2021-11-01 02:23:37.753358 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:38.160250 I | auth: deleting token KICzpqPwGTKPoESU.524 for user conductor
2021-11-01 02:23:38.160321 I | auth: deleting token UvlcEqHUjDvQtfKU.525 for user conductor
2021-11-01 02:23:39.250397 I | auth: deleting token TDrPCEJhKiXJwRqJ.527 for user conductor
2021-11-01 02:23:39.250476 I | auth: deleting token EsjxidJATzkvEpLx.526 for user conductor
2021-11-01 02:23:39.760289 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.808271972s) to execute
2021-11-01 02:23:39.760447 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.809740085s) to execute
2021-11-01 02:23:40.238611 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (298.449614ms) to execute
2021-11-01 02:23:41.160129 I | auth: deleting token tTgxIycbDYXoqXsy.528 for user conductor
2021-11-01 02:23:42.659317 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.321103259s) to execute
2021-11-01 02:23:42.753623 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:43.250417 I | auth: deleting token WFdSBQbLjxsphMsA.529 for user conductor
2021-11-01 02:23:45.651015 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.899267072s) to execute
2021-11-01 02:23:46.160202 I | auth: deleting token RwyCbWtvLzEvjbDD.530 for user conductor
2021-11-01 02:23:46.160258 I | auth: deleting token uUxoHxJIAXusUwnh.531 for user conductor
2021-11-01 02:23:47.753935 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:47.956204 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.217677872s) to execute
2021-11-01 02:23:47.956338 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.303034136s) to execute
2021-11-01 02:23:49.161874 I | auth: deleting token NfUPxwTmpuoaVWiX.532 for user conductor
2021-11-01 02:23:49.161917 I | auth: deleting token TQpxATNbJtWdntZw.533 for user conductor
2021-11-01 02:23:49.161934 I | auth: deleting token vpWLdhnNSMtxBHsU.535 for user conductor
2021-11-01 02:23:49.161957 I | auth: deleting token BCKyzsxYRrKmyrrb.534 for user conductor
2021-11-01 02:23:50.560007 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.50418329s) to execute
2021-11-01 02:23:51.160345 I | auth: deleting token UJsyxBuFYnqlAjAo.536 for user conductor
2021-11-01 02:23:52.754213 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:53.056254 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.104827318s) to execute
2021-11-01 02:23:53.160081 I | auth: deleting token QLYvwvHwGkoycqhB.537 for user conductor
2021-11-01 02:23:54.160116 I | auth: deleting token KaFgggfdiFJdbPWP.538 for user conductor
2021-11-01 02:23:57.754520 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:23:57.952862 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.702138281s) to execute
2021-11-01 02:23:57.953432 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.802609484s) to execute
2021-11-01 02:23:58.160227 I | auth: deleting token GNwwubMssTCSOcOP.541 for user conductor
2021-11-01 02:23:58.160284 I | auth: deleting token wfEyUmZfPlAwoUcN.539 for user conductor
2021-11-01 02:23:58.160299 I | auth: deleting token PiLgctedENhKoPEO.540 for user conductor
2021-11-01 02:24:00.156659 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.201538645s) to execute
2021-11-01 02:24:00.157123 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.202462365s) to execute
2021-11-01 02:24:00.157482 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.106171256s) to execute
2021-11-01 02:24:00.438415 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (184.076808ms) to execute
2021-11-01 02:24:01.160089 I | auth: deleting token fRQwMzrPvOiCnMAI.543 for user conductor
2021-11-01 02:24:01.160201 I | auth: deleting token IwAOholvkdaMkFMg.542 for user conductor
2021-11-01 02:24:02.755016 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:03.151466 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.613148957s) to execute
2021-11-01 02:24:04.159945 I | auth: deleting token WTkhLITAGRyDWToi.546 for user conductor
2021-11-01 02:24:04.159995 I | auth: deleting token WoooAmqgDRsmPLWW.545 for user conductor
2021-11-01 02:24:07.160086 I | auth: deleting token JgDguJWFINPuBykd.548 for user conductor
2021-11-01 02:24:07.160278 I | auth: deleting token wwhxFCkIlsxjXrei.544 for user conductor
2021-11-01 02:24:07.160373 I | auth: deleting token FOWUZMOZYeZzQpBW.550 for user conductor
2021-11-01 02:24:07.160551 I | auth: deleting token GCcJLmfVmPKvTmsT.549 for user conductor
2021-11-01 02:24:07.160666 I | auth: deleting token ckBwkHyJHykKTAtw.547 for user conductor
2021-11-01 02:24:07.755206 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:09.253725 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (803.072148ms) to execute
2021-11-01 02:24:12.160173 I | auth: deleting token IyMurtWuDwqNNgNC.553 for user conductor
2021-11-01 02:24:12.160229 I | auth: deleting token TOxxdqbTQqPRYMWt.551 for user conductor
2021-11-01 02:24:12.555941 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.412743112s) to execute
2021-11-01 02:24:12.755466 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:15.055693 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.402873619s) to execute
2021-11-01 02:24:15.250367 I | auth: deleting token vTWCFIsQsbpEiOzK.554 for user conductor
2021-11-01 02:24:15.250405 I | auth: deleting token qaGMoATnXmkeCEXE.556 for user conductor
2021-11-01 02:24:15.250419 I | auth: deleting token MBeGqLiYSUaWiPKl.552 for user conductor
2021-11-01 02:24:15.250426 I | auth: deleting token KDVonSmROPJbUClU.555 for user conductor
2021-11-01 02:24:15.250436 I | auth: deleting token VVOnHpnvpZXLuMEK.557 for user conductor
2021-11-01 02:24:16.250502 I | auth: deleting token AgPMtPWhwwphXXrU.558 for user conductor
2021-11-01 02:24:17.160131 I | auth: deleting token DaTTpHBvJvVrKTvY.559 for user conductor
2021-11-01 02:24:17.753710 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.602085492s) to execute
2021-11-01 02:24:17.755700 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:19.159983 I | auth: deleting token VsFFDmtClsRJPpiF.560 for user conductor
2021-11-01 02:24:20.250448 I | auth: deleting token UjLQXGxwbQfBXMjp.561 for user conductor
2021-11-01 02:24:20.758162 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.004314051s) to execute
2021-11-01 02:24:20.758559 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.700595533s) to execute
2021-11-01 02:24:21.160105 I | auth: deleting token jZLFMqnMhvGfufQS.562 for user conductor
2021-11-01 02:24:22.850516 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:23.353174 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.402343584s) to execute
2021-11-01 02:24:23.353407 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.597546049s) to execute
2021-11-01 02:24:23.450668 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.59984478s) to execute
2021-11-01 02:24:24.160247 I | auth: deleting token wmClbkSfZgmedNvP.563 for user conductor
2021-11-01 02:24:24.160328 I | auth: deleting token CxhPURBTUXrfllvV.565 for user conductor
2021-11-01 02:24:24.160346 I | auth: deleting token ZOJKUTpyPohqNYWq.564 for user conductor
2021-11-01 02:24:26.051570 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.696235706s) to execute
2021-11-01 02:24:26.051691 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.597608717s) to execute
2021-11-01 02:24:27.160015 I | auth: deleting token tiYZleizxtISdqEM.566 for user conductor
2021-11-01 02:24:27.160075 I | auth: deleting token naktMaGYhCEbDJmZ.567 for user conductor
2021-11-01 02:24:27.850778 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:29.859174 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.804371202s) to execute
2021-11-01 02:24:30.160045 I | auth: deleting token UscJXJvRPMsxxYXH.568 for user conductor
2021-11-01 02:24:30.160106 I | auth: deleting token hXtvTcWZTaBHPnaE.570 for user conductor
2021-11-01 02:24:30.160124 I | auth: deleting token mzjUwMUPkzJiJOPh.569 for user conductor
2021-11-01 02:24:30.160142 I | auth: deleting token NQCKhRArEketXLrn.571 for user conductor
2021-11-01 02:24:31.160051 I | auth: deleting token uBAAzScVoWxNfEmp.572 for user conductor
2021-11-01 02:24:31.554206 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.601310082s) to execute
2021-11-01 02:24:31.554329 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.603679762s) to execute
2021-11-01 02:24:31.738273 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.787560224s) to execute
2021-11-01 02:24:32.850974 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:34.261249 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (522.977065ms) to execute
2021-11-01 02:24:36.652591 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.214470423s) to execute
2021-11-01 02:24:37.851245 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:41.250566 I | auth: deleting token aepDkyWATnVWTNlS.576 for user conductor
2021-11-01 02:24:41.250602 I | auth: deleting token vCeeUAbtThNCGBna.574 for user conductor
2021-11-01 02:24:41.250614 I | auth: deleting token rBgJyVLXisriLFTI.573 for user conductor
2021-11-01 02:24:41.250625 I | auth: deleting token GDmbGVTdhNHMkbfO.575 for user conductor
2021-11-01 02:24:41.250632 I | auth: deleting token nnOjtTZPFMeJgVzc.578 for user conductor
2021-11-01 02:24:41.351960 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.201289066s) to execute
2021-11-01 02:24:41.539154 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (183.200543ms) to execute
2021-11-01 02:24:42.851576 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:44.160004 I | auth: deleting token mSasTkSgpdiSATHK.577 for user conductor
2021-11-01 02:24:44.160043 I | auth: deleting token VynsEyADgulzdfJX.579 for user conductor
2021-11-01 02:24:44.852122 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (998.924801ms) to execute
2021-11-01 02:24:47.160045 I | auth: deleting token VQcTFmHtWHEJcmKR.581 for user conductor
2021-11-01 02:24:47.160102 I | auth: deleting token irJTfjRWJJjkUDtU.580 for user conductor
2021-11-01 02:24:47.160124 I | auth: deleting token SXfetbqDkprslSLx.582 for user conductor
2021-11-01 02:24:47.360429 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.209034957s) to execute
2021-11-01 02:24:47.851974 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:49.557211 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.104420024s) to execute
2021-11-01 02:24:51.160122 I | auth: deleting token mgZMVEOfwRULDIAt.587 for user conductor
2021-11-01 02:24:51.160171 I | auth: deleting token yWqVtpREFApBJHLw.584 for user conductor
2021-11-01 02:24:51.160181 I | auth: deleting token koCgwWeWDIXYkAFM.585 for user conductor
2021-11-01 02:24:51.651852 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.094529803s) to execute
2021-11-01 02:24:51.652016 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.001353606s) to execute
2021-11-01 02:24:52.160062 I | auth: deleting token TFrSEoQDZXINxpJi.588 for user conductor
2021-11-01 02:24:52.160111 I | auth: deleting token VeEzFHMMwQxVgnMs.586 for user conductor
2021-11-01 02:24:52.852278 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:54.056044 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.618222192s) to execute
2021-11-01 02:24:55.251639 I | auth: deleting token kiizbLsyomHohsUQ.589 for user conductor
2021-11-01 02:24:55.251709 I | auth: deleting token QJZkgTqVbJkCIPrH.590 for user conductor
2021-11-01 02:24:57.852394 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:24:59.160104 I | auth: deleting token RWMTFMWdKOKhZlHC.592 for user conductor
2021-11-01 02:24:59.160143 I | auth: deleting token bljVpeeVSUXjRIDw.595 for user conductor
2021-11-01 02:24:59.160161 I | auth: deleting token vIgWzVKIeRJVDFbL.593 for user conductor
2021-11-01 02:25:00.350921 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.199464476s) to execute
2021-11-01 02:25:02.852726 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:03.554607 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.200418941s) to execute
2021-11-01 02:25:03.554917 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.202508843s) to execute
2021-11-01 02:25:03.558345 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.205017685s) to execute
2021-11-01 02:25:03.558589 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.205019249s) to execute
2021-11-01 02:25:05.243314 I | auth: deleting token ZgAILsLCOvsTqhZC.597 for user conductor
2021-11-01 02:25:05.243404 I | auth: deleting token fqmRRUCPuoOZdVpV.591 for user conductor
2021-11-01 02:25:05.243437 I | auth: deleting token OwUTYcppyaExpsHM.598 for user conductor
2021-11-01 02:25:05.243450 I | auth: deleting token VlveBsmwJKhNrwZk.594 for user conductor
2021-11-01 02:25:05.243471 I | auth: deleting token ZVWyUefNvwDnJTgt.596 for user conductor
2021-11-01 02:25:07.853002 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:12.160035 I | auth: deleting token ZPqnkyRDgaTdqBTs.603 for user conductor
2021-11-01 02:25:12.160084 I | auth: deleting token RRluxQbOnBebzAxU.602 for user conductor
2021-11-01 02:25:12.160107 I | auth: deleting token uAXDGUnceEorgIFF.604 for user conductor
2021-11-01 02:25:12.160120 I | auth: deleting token BADfoDpVycvziRjV.599 for user conductor
2021-11-01 02:25:12.160130 I | auth: deleting token PNQNZJQaofwMTArL.605 for user conductor
2021-11-01 02:25:12.160141 I | auth: deleting token DYiLOLcMNbpVMvPH.601 for user conductor
2021-11-01 02:25:12.160153 I | auth: deleting token bygcvyRkBbNDsctD.606 for user conductor
2021-11-01 02:25:12.160171 I | auth: deleting token AargCkOTXAamlJGg.600 for user conductor
2021-11-01 02:25:12.853442 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:14.250460 I | auth: deleting token emIZezFjtuzFqIWj.607 for user conductor
2021-11-01 02:25:17.054510 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (10.503835435s) to execute
2021-11-01 02:25:17.250486 I | auth: deleting token eBqoUnCDtwBZvNex.609 for user conductor
2021-11-01 02:25:17.250581 I | auth: deleting token ACTXZSFxqXGzWMeS.610 for user conductor
2021-11-01 02:25:17.250600 I | auth: deleting token MjNCJBmdGnRhaqQS.608 for user conductor
2021-11-01 02:25:17.853763 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:19.456465 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.399147591s) to execute
2021-11-01 02:25:19.456865 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.399915728s) to execute
2021-11-01 02:25:21.456933 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.399917186s) to execute
2021-11-01 02:25:21.457378 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.904053771s) to execute
2021-11-01 02:25:22.160087 I | auth: deleting token DtlTumVrqEbJqKzn.611 for user conductor
2021-11-01 02:25:22.160148 I | auth: deleting token WdbuLzBtjWPQcTPd.612 for user conductor
2021-11-01 02:25:22.160166 I | auth: deleting token fidpbphPkYtmVwBB.614 for user conductor
2021-11-01 02:25:22.854021 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:24.354651 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.80368209s) to execute
2021-11-01 02:25:24.354726 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.800891247s) to execute
2021-11-01 02:25:26.854699 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.495373575s) to execute
2021-11-01 02:25:26.855335 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.496167994s) to execute
2021-11-01 02:25:27.160132 I | auth: deleting token nJvDdRDQbpuEmnup.619 for user conductor
2021-11-01 02:25:27.160192 I | auth: deleting token LTRPrNkmeBhbBTPo.616 for user conductor
2021-11-01 02:25:27.160206 I | auth: deleting token oKWriblYiVcAaeqB.613 for user conductor
2021-11-01 02:25:27.160222 I | auth: deleting token wxZSbWzptqSYVYuP.615 for user conductor
2021-11-01 02:25:27.160234 I | auth: deleting token aSnauSYUXAdQJtrk.618 for user conductor
2021-11-01 02:25:27.160243 I | auth: deleting token uVhLXuJgVdWxnMVE.617 for user conductor
2021-11-01 02:25:27.854282 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:31.655386 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.704840127s) to execute
2021-11-01 02:25:31.656053 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.798408493s) to execute
2021-11-01 02:25:32.160059 I | auth: deleting token aAXPbjebPLlSuvcS.621 for user conductor
2021-11-01 02:25:32.160170 I | auth: deleting token SIXvYPxaxIyrpinU.620 for user conductor
2021-11-01 02:25:32.854656 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:34.160289 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.50081442s) to execute
2021-11-01 02:25:34.160806 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.502847119s) to execute
2021-11-01 02:25:35.160196 I | auth: deleting token ylNTPqvLhiqkYrmN.625 for user conductor
2021-11-01 02:25:35.160261 I | auth: deleting token XvzROEBqRDZoGZmX.627 for user conductor
2021-11-01 02:25:35.160300 I | auth: deleting token TQkcxfcCbroYSzLX.626 for user conductor
2021-11-01 02:25:35.160322 I | auth: deleting token uBthYcmZdRGWjdau.622 for user conductor
2021-11-01 02:25:35.160342 I | auth: deleting token DcGswexwiFuUHDJd.623 for user conductor
2021-11-01 02:25:37.854871 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:38.160149 I | auth: deleting token zxZThLtgvTFDLxZT.624 for user conductor
2021-11-01 02:25:38.160208 I | auth: deleting token BzxqnDowFshUQfTB.629 for user conductor
2021-11-01 02:25:38.160230 I | auth: deleting token TXBOUvqoYPDaWcnR.630 for user conductor
2021-11-01 02:25:38.954563 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.616360205s) to execute
2021-11-01 02:25:39.138288 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (177.337015ms) to execute
2021-11-01 02:25:40.250383 I | auth: deleting token fBODKeuOgNYxLuQV.628 for user conductor
2021-11-01 02:25:41.250964 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (999.236207ms) to execute
2021-11-01 02:25:42.855821 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:43.160098 I | auth: deleting token zXlEuPeFPksvlMuw.633 for user conductor
2021-11-01 02:25:43.160162 I | auth: deleting token pJjxxZyZbOqxxcju.632 for user conductor
2021-11-01 02:25:43.160177 I | auth: deleting token faWdzmJQvTTpzllr.635 for user conductor
2021-11-01 02:25:43.160191 I | auth: deleting token UGruVyShgPXleoBr.634 for user conductor
2021-11-01 02:25:43.160230 I | auth: deleting token qkDovBsaxKiYeXZJ.631 for user conductor
2021-11-01 02:25:45.160097 I | auth: deleting token QrVuSpWFSDmgkgWR.637 for user conductor
2021-11-01 02:25:45.160142 I | auth: deleting token nnJnhbQzLmySYqyI.636 for user conductor
2021-11-01 02:25:46.160116 I | auth: deleting token vykwlUQyVMuxxZbv.638 for user conductor
2021-11-01 02:25:47.856124 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:48.160076 I | auth: deleting token sokNFXfULLONGwwm.641 for user conductor
2021-11-01 02:25:48.160129 I | auth: deleting token RrCShiXqFoayxaxB.639 for user conductor
2021-11-01 02:25:48.160154 I | auth: deleting token jSalWxJZGifWiUFG.640 for user conductor
2021-11-01 02:25:49.051971 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.101239246s) to execute
2021-11-01 02:25:50.160176 I | auth: deleting token ZlzwTFfAiukhxVdp.642 for user conductor
2021-11-01 02:25:51.160110 I | auth: deleting token ihluDhCgvmOxPHxy.643 for user conductor
2021-11-01 02:25:51.854512 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.301491951s) to execute
2021-11-01 02:25:52.856498 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:25:54.250514 I | auth: deleting token NtowLmLvZpGUqlPl.644 for user conductor
2021-11-01 02:25:57.854448 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.112163937s) to execute
2021-11-01 02:25:57.856700 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:26:02.160061 I | auth: deleting token stOglYkXOrFzyPlv.651 for user conductor
2021-11-01 02:26:02.160112 I | auth: deleting token WDTJuJTdLSlxjLrp.650 for user conductor
2021-11-01 02:26:02.160123 I | auth: deleting token RESZgivMFbJdcKFq.649 for user conductor
2021-11-01 02:26:02.160133 I | auth: deleting token cWmTBXzdyRRkpiCi.646 for user conductor
2021-11-01 02:26:02.160146 I | auth: deleting token NMBETAXuXUkgsfvq.645 for user conductor
2021-11-01 02:26:02.160163 I | auth: deleting token mjLCJCVgTKXSJyVj.648 for user conductor
2021-11-01 02:26:02.160178 I | auth: deleting token NWvcKWWXJQeOudPl.652 for user conductor
2021-11-01 02:26:02.160192 I | auth: deleting token yDYAlXCCiAtiiVpJ.647 for user conductor
2021-11-01 02:26:02.950535 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:26:04.857428 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.906815204s) to execute
2021-11-01 02:26:04.858011 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (7.000960394s) to execute
2021-11-01 02:26:07.250547 I | auth: deleting token IlnjXGspMRuXFyQh.653 for user conductor
2021-11-01 02:26:07.250622 I | auth: deleting token akvVTRiMBvMCuZpL.656 for user conductor
2021-11-01 02:26:07.250646 I | auth: deleting token paxLJrKObIBTFlHh.654 for user conductor
2021-11-01 02:26:07.252259 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.391960233s) to execute
2021-11-01 02:26:07.950848 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:26:09.555365 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.504541455s) to execute
2021-11-01 02:26:09.555412 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.204493933s) to execute
2021-11-01 02:26:10.250403 I | auth: deleting token UesLgxtKRPoDIUVh.655 for user conductor
2021-11-01 02:26:10.250474 I | auth: deleting token emssjyLHeQPSFxeq.660 for user conductor
2021-11-01 02:26:10.250488 I | auth: deleting token BrEXgRHzezsplpHg.657 for user conductor
2021-11-01 02:26:10.250500 I | auth: deleting token nnMhdrZLrqoEMZmA.659 for user conductor
2021-11-01 02:26:10.250514 I | auth: deleting token mSRXdwScgPqkOAVE.658 for user conductor
2021-11-01 02:26:12.951354 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:26:15.250466 I | auth: deleting token kXakPMoiVPdYrJAP.664 for user conductor
2021-11-01 02:26:15.250536 I | auth: deleting token cIMLolNdoHhJutXT.663 for user conductor
2021-11-01 02:26:15.250551 I | auth: deleting token eptKQEnAyiYLmwkb.661 for user conductor
2021-11-01 02:26:15.557099 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.405371825s) to execute
2021-11-01 02:26:16.160094 I | auth: deleting token GaahHmIpzAFvBoxD.665 for user conductor
2021-11-01 02:26:16.160154 I | auth: deleting token fBBdvdhBrjgfHqqx.662 for user conductor
2021-11-01 02:26:16.160170 I | auth: deleting token SRsCAfLATaDTaXNZ.666 for user conductor
2021-11-01 02:26:17.160024 I | auth: deleting token KpmZmtvgHdPjusbX.667 for user conductor
2021-11-01 02:26:17.951614 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:26:18.155024 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.504384396s) to execute
2021-11-01 02:26:18.250508 I | auth: deleting token uTHKWNOYRdGvxJhb.668 for user conductor
2021-11-01 02:26:18.438338 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (280.339711ms) to execute
2021-11-01 02:26:20.250444 I | auth: deleting token UDIPkDUAFwupdmui.669 for user conductor
2021-11-01 02:26:20.652440 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.900105333s) to execute
2021-11-01 02:26:21.160056 I | auth: deleting token hQDJWyIoyJAyusFI.670 for user conductor
2021-11-01 02:26:22.951874 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:26:23.352284 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.601710011s) to execute
2021-11-01 02:26:24.160107 I | auth: deleting token OKvgonfcnQhDXazC.673 for user conductor
2021-11-01 02:26:24.160297 I | auth: deleting token PMsIdNhNTgtcKEkG.671 for user conductor
2021-11-01 02:26:24.160352 I | auth: deleting token zWkCihuGLWJcjdpl.672 for user conductor
2021-11-01 02:26:25.160084 I | auth: deleting token MQpgsMvwaiEOXNnL.674 for user conductor
2021-11-01 02:26:25.756620 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.305927035s) to execute
2021-11-01 02:26:27.952199 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:26:28.160053 I | auth: deleting token HxnOuhaJpXpFsEyv.675 for user conductor
2021-11-01 02:26:28.160130 I | auth: deleting token JqsiXkQhiYxxsbXN.676 for user conductor
2021-11-01 02:26:28.552073 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.601284686s) to execute
2021-11-01 02:26:29.250441 I | auth: deleting token qNqYoYBCWJnpBmVR.677 for user conductor
2021-11-01 02:26:31.052703 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.5004864s) to execute
2021-11-01 02:26:31.053006 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.498524711s) to execute
2021-11-01 02:26:31.053183 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.294177677s) to execute
2021-11-01 02:26:31.160065 I | auth: deleting token TMTmQlIbMnomaovD.679 for user conductor
2021-11-01 02:26:31.160130 I | auth: deleting token RIauklSohBGXngOi.678 for user conductor
2021-11-01 02:26:32.160112 I | auth: deleting token BDSYxMwhSFeimkIA.680 for user conductor
2021-11-01 02:26:32.952426 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:26:34.160174 I | auth: deleting token TAolxJwxhHdUlRkb.681 for user conductor
2021-11-01 02:26:34.160230 I | auth: deleting token gTpQpldmSgrzTjiW.683 for user conductor
2021-11-01 02:26:34.160253 I | auth: deleting token DoEBJhSPivbiYDMe.682 for user conductor
2021-11-01 02:26:34.352852 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.314672802s) to execute
2021-11-01 02:26:37.160036 I | auth: deleting token asKShnnfnCIyFGuS.686 for user conductor
2021-11-01 02:26:37.160097 I | auth: deleting token BwCzKTFXAqIOYkzq.684 for user conductor
2021-11-01 02:26:37.160118 I | auth: deleting token auLRJEFIsMWaoWqX.685 for user conductor
2021-11-01 02:26:37.554280 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.113054733s) to execute
2021-11-01 02:26:37.952627 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:26:38.160065 I | auth: deleting token SoLphvgYdqQODCpY.687 for user conductor
2021-11-01 02:26:40.253894 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.503184397s) to execute
2021-11-01 02:26:40.254280 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.603590804s) to execute
2021-11-01 02:26:41.160113 I | auth: deleting token fQufFqZpJPaaEJtL.688 for user conductor
2021-11-01 02:26:41.160183 I | auth: deleting token mARcfRBzdBSdtWRN.689 for user conductor
2021-11-01 02:26:42.160084 I | auth: deleting token kqFXhypEcLrwjQvl.690 for user conductor
2021-11-01 02:26:42.953009 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:26:43.160061 I | auth: deleting token nxqSHvzaoofSqcka.691 for user conductor
2021-11-01 02:26:44.160081 I | auth: deleting token BLBmbNYrIalIUIOD.692 for user conductor
2021-11-01 02:26:45.156705 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.899758963s) to execute
2021-11-01 02:26:45.157024 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.901030035s) to execute
2021-11-01 02:26:46.160215 I | auth: deleting token TbGcpZLlBouTZfGr.693 for user conductor
2021-11-01 02:26:47.953234 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:26:48.155189 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.904126175s) to execute
2021-11-01 02:26:48.155353 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.902168664s) to execute
2021-11-01 02:26:48.155506 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.217305565s) to execute
2021-11-01 02:26:50.753106 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.498310091s) to execute
2021-11-01 02:26:50.753559 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.21072646s) to execute
2021-11-01 02:26:51.250519 I | auth: deleting token zHOWRGDQYvoCZnTm.694 for user conductor
2021-11-01 02:26:52.953560 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:26:53.255636 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.317395525s) to execute
2021-11-01 02:26:53.452095 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.126089ms) to execute
2021-11-01 02:26:54.250627 I | auth: deleting token VwAQOsZZLFXvExDx.701 for user conductor
2021-11-01 02:26:54.250678 I | auth: deleting token ijtPqlTfeKfWfCMA.700 for user conductor
2021-11-01 02:26:54.250690 I | auth: deleting token myOcNGmDjjaDHmgo.696 for user conductor
2021-11-01 02:26:54.250702 I | auth: deleting token iYyqvdzPYaCUGATO.697 for user conductor
2021-11-01 02:26:54.250707 I | auth: deleting token BOSWPuOfUvmaHjPz.699 for user conductor
2021-11-01 02:26:54.250713 I | auth: deleting token eRWvtVhloZEQASBx.695 for user conductor
2021-11-01 02:26:54.250721 I | auth: deleting token PKhmHzxsLtCwilDU.698 for user conductor
2021-11-01 02:26:56.160169 I | auth: deleting token CKJLmYMOVnqDLxiz.703 for user conductor
2021-11-01 02:26:56.160239 I | auth: deleting token VMRXvTUIlENnkLwP.702 for user conductor
2021-11-01 02:26:57.250954 I | auth: deleting token xhCHfBVgobEZVqTi.704 for user conductor
2021-11-01 02:26:57.953854 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:26:58.854971 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.804189918s) to execute
2021-11-01 02:26:59.160077 I | auth: deleting token pCMGtjZDKiBFwqbF.705 for user conductor
2021-11-01 02:26:59.160139 I | auth: deleting token eJJwdXpxYnwSBfmX.706 for user conductor
2021-11-01 02:27:02.160061 I | auth: deleting token cSPZAHEaghDXFQkm.709 for user conductor
2021-11-01 02:27:02.160149 I | auth: deleting token YrCqbUVStbEoBImX.708 for user conductor
2021-11-01 02:27:02.954220 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:05.160151 I | auth: deleting token DYySeRiddJiMfOEE.707 for user conductor
2021-11-01 02:27:05.160193 I | auth: deleting token keKsqfDuQEewOaoc.711 for user conductor
2021-11-01 02:27:06.852237 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.514062589s) to execute
2021-11-01 02:27:07.038352 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (179.772093ms) to execute
2021-11-01 02:27:07.160118 I | auth: deleting token cqtIELYaKFHgkXhj.710 for user conductor
2021-11-01 02:27:07.160359 I | auth: deleting token ZnfttQlmYdDyzAgX.712 for user conductor
2021-11-01 02:27:07.954461 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:08.160150 I | auth: deleting token KZgTbjTEJezumxND.713 for user conductor
2021-11-01 02:27:12.954772 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:13.160033 I | auth: deleting token tpDjnysjeoOzGkIf.717 for user conductor
2021-11-01 02:27:13.160083 I | auth: deleting token vnWcsHyHODGfFzNy.716 for user conductor
2021-11-01 02:27:13.160105 I | auth: deleting token GeiIiBGVZivIyntq.714 for user conductor
2021-11-01 02:27:13.160132 I | auth: deleting token IbuZkbetVexMuBJN.715 for user conductor
2021-11-01 02:27:16.160122 I | auth: deleting token UFxTfTBFHJZezujx.718 for user conductor
2021-11-01 02:27:16.160206 I | auth: deleting token oelCNMnQVuUZMsbU.720 for user conductor
2021-11-01 02:27:16.160235 I | auth: deleting token mfsuUONyyIYxAHeM.719 for user conductor
2021-11-01 02:27:17.954965 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:19.160044 I | auth: deleting token MCJRPSMWYbeYCdWi.721 for user conductor
2021-11-01 02:27:19.160141 I | auth: deleting token CwiYcNiheKYBdFGS.722 for user conductor
2021-11-01 02:27:21.250462 I | auth: deleting token NORhoeROqyyWMaDA.724 for user conductor
2021-11-01 02:27:21.354655 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.91511786s) to execute
2021-11-01 02:27:21.552562 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (101.753909ms) to execute
2021-11-01 02:27:22.955167 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:24.160020 I | auth: deleting token qIToiNefltGVJJLD.727 for user conductor
2021-11-01 02:27:24.160102 I | auth: deleting token BdlSTjnjsSvPKorW.725 for user conductor
2021-11-01 02:27:24.160123 I | auth: deleting token XZuBfcXjRoWuidGv.723 for user conductor
2021-11-01 02:27:24.160140 I | auth: deleting token weBjDkszOuozBZxT.728 for user conductor
2021-11-01 02:27:24.160158 I | auth: deleting token HZzRnjgIFtColZHZ.726 for user conductor
2021-11-01 02:27:24.160168 I | auth: deleting token iURvkkzPiAtuuVzI.729 for user conductor
2021-11-01 02:27:24.551423 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.699566537s) to execute
2021-11-01 02:27:26.160050 I | auth: deleting token bZHcsdUKCeQAalbH.730 for user conductor
2021-11-01 02:27:27.160101 I | auth: deleting token mbpjDybuLwhpeYYv.731 for user conductor
2021-11-01 02:27:27.955396 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:29.160040 I | auth: deleting token QIwpowetMaPnXXtD.734 for user conductor
2021-11-01 02:27:29.160094 I | auth: deleting token yYHlPtMlBgjFXIQA.732 for user conductor
2021-11-01 02:27:29.160122 I | auth: deleting token MkFpXYanrmofCEFq.733 for user conductor
2021-11-01 02:27:30.160179 I | auth: deleting token WbrylRyJJZSyXVYH.735 for user conductor
2021-11-01 02:27:32.955817 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:36.160006 I | auth: deleting token iuHSgSJZrhOWstWt.739 for user conductor
2021-11-01 02:27:36.160076 I | auth: deleting token oMxmWnBgFsXfdIKq.737 for user conductor
2021-11-01 02:27:36.160092 I | auth: deleting token mxOuPoflEpiAYycB.736 for user conductor
2021-11-01 02:27:38.052196 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:43.052334 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:43.160110 I | auth: deleting token XWsiKLUSmLQbsLLN.738 for user conductor
2021-11-01 02:27:43.250495 I | auth: deleting token YJOXOTefrISFIZcJ.742 for user conductor
2021-11-01 02:27:43.250659 I | auth: deleting token zwECAQtMGXSULzPX.741 for user conductor
2021-11-01 02:27:43.250770 I | auth: deleting token CMDGbAVCmRVAQfuf.743 for user conductor
2021-11-01 02:27:43.250865 I | auth: deleting token GDpsrbltGOvHZjZI.740 for user conductor
2021-11-01 02:27:45.160271 I | auth: deleting token gfANunIwbYwEwgzK.744 for user conductor
2021-11-01 02:27:47.250538 I | auth: deleting token LSEgunRMXDHZpLtB.747 for user conductor
2021-11-01 02:27:47.250594 I | auth: deleting token VWmNbUpWfwktwcnA.745 for user conductor
2021-11-01 02:27:47.250622 I | auth: deleting token nqbGSWBVOzXINynf.746 for user conductor
2021-11-01 02:27:47.453906 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (8.601248071s) to execute
2021-11-01 02:27:48.052618 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:49.758357 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.106933059s) to execute
2021-11-01 02:27:50.160001 I | auth: deleting token KZWRfBoPkfrCDrYJ.748 for user conductor
2021-11-01 02:27:52.160098 I | auth: deleting token GOxUjTDZMbxhWBSq.751 for user conductor
2021-11-01 02:27:52.160160 I | auth: deleting token XnITiDigzBgpYEYI.750 for user conductor
2021-11-01 02:27:52.160184 I | auth: deleting token KJEKZdeddlxPVnJm.749 for user conductor
2021-11-01 02:27:53.052833 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:54.153100 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.000158176s) to execute
2021-11-01 02:27:55.160231 I | auth: deleting token cRcCQwznBGfNUTDE.753 for user conductor
2021-11-01 02:27:55.160282 I | auth: deleting token reLbEZWYySuzXjsT.754 for user conductor
2021-11-01 02:27:57.450941 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.212910784s) to execute
2021-11-01 02:27:58.053041 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:27:58.250366 I | auth: deleting token GXlqUNOlkEaXBIzk.752 for user conductor
2021-11-01 02:27:58.250423 I | auth: deleting token dwtZvLaSeZnqQuPA.755 for user conductor
2021-11-01 02:27:58.250436 I | auth: deleting token ghWiGQBZKgxppdZv.757 for user conductor
2021-11-01 02:27:58.250449 I | auth: deleting token qYkcztVoiCeMWMJb.756 for user conductor
2021-11-01 02:27:59.952654 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.501577803s) to execute
2021-11-01 02:28:00.160068 I | auth: deleting token qBYipxgiqKtuiaRi.758 for user conductor
2021-11-01 02:28:02.855468 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.398413398s) to execute
2021-11-01 02:28:02.855667 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.802971458s) to execute
2021-11-01 02:28:02.855879 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.90051127s) to execute
2021-11-01 02:28:03.053384 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:03.138278 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (182.650371ms) to execute
2021-11-01 02:28:03.250417 I | auth: deleting token RbuRSCMiKXObOgzB.760 for user conductor
2021-11-01 02:28:03.250592 I | auth: deleting token iMImeyOpuMELUJJu.759 for user conductor
2021-11-01 02:28:03.250647 I | auth: deleting token JvJVHQibZKbTpMmf.761 for user conductor
2021-11-01 02:28:05.250515 I | auth: deleting token GXdPgyJBSbDFvAqF.763 for user conductor
2021-11-01 02:28:05.951460 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.51118765s) to execute
2021-11-01 02:28:06.160041 I | auth: deleting token YBZvjNNTJJbIDRQf.764 for user conductor
2021-11-01 02:28:06.160092 I | auth: deleting token XdAiTjAWzFjOLFNn.762 for user conductor
2021-11-01 02:28:06.160132 I | auth: deleting token UyEmgBJTguhCGGeq.765 for user conductor
2021-11-01 02:28:08.053602 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:08.160105 I | auth: deleting token iwBhLtvEEjsslDAS.766 for user conductor
2021-11-01 02:28:08.852809 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.898614745s) to execute
2021-11-01 02:28:11.160082 I | auth: deleting token tJBJyJFwjeWSfhTu.770 for user conductor
2021-11-01 02:28:11.160155 I | auth: deleting token OAteepnSzYjXxXAt.768 for user conductor
2021-11-01 02:28:11.160171 I | auth: deleting token VDAFmmtPJxRtFAGz.769 for user conductor
2021-11-01 02:28:11.160195 I | auth: deleting token dGQxDDwouXjEMdMg.767 for user conductor
2021-11-01 02:28:11.357354 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.405678838s) to execute
2021-11-01 02:28:13.053918 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:14.250484 I | auth: deleting token VOfAWlZBTnbCQDcW.771 for user conductor
2021-11-01 02:28:14.250624 I | auth: deleting token lUxbrzacmbYViHtO.772 for user conductor
2021-11-01 02:28:14.357064 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.501336155s) to execute
2021-11-01 02:28:14.390776 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.840026861s) to execute
2021-11-01 02:28:14.390955 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (3.031208548s) to execute
2021-11-01 02:28:16.250363 I | auth: deleting token bDwTJUlDxZpeGXMh.774 for user conductor
2021-11-01 02:28:16.250426 I | auth: deleting token aHhDvgoWEfuSfmzC.775 for user conductor
2021-11-01 02:28:17.556366 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.101434254s) to execute
2021-11-01 02:28:18.054309 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:19.250359 I | auth: deleting token oMpgZuOgukOHpqfT.776 for user conductor
2021-11-01 02:28:19.250453 I | auth: deleting token erzuyvyXkxUFuxnk.773 for user conductor
2021-11-01 02:28:19.250480 I | auth: deleting token iWKjlcNMUAapNqKp.778 for user conductor
2021-11-01 02:28:19.250498 I | auth: deleting token bgFUUnsGJVNyYcJN.777 for user conductor
2021-11-01 02:28:19.957289 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.10654115s) to execute
2021-11-01 02:28:22.161492 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.108681921s) to execute
2021-11-01 02:28:22.161711 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.011253487s) to execute
2021-11-01 02:28:22.352078 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (169.741473ms) to execute
2021-11-01 02:28:23.054489 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:24.250443 I | auth: deleting token ZoxsEeIQRqHXxEMc.779 for user conductor
2021-11-01 02:28:24.250490 I | auth: deleting token hUcZOskTxkXbXYlu.782 for user conductor
2021-11-01 02:28:24.250513 I | auth: deleting token BedGoyRwriWuqxFP.781 for user conductor
2021-11-01 02:28:27.250405 I | auth: deleting token vUFnlDLFoEXsOhIv.780 for user conductor
2021-11-01 02:28:28.054768 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:29.160111 I | auth: deleting token NHBwnNLZWikOHuHA.786 for user conductor
2021-11-01 02:28:29.160169 I | auth: deleting token gUenMrxEfeEbMzZu.784 for user conductor
2021-11-01 02:28:29.160185 I | auth: deleting token WoNqHKFcDqykYxdp.783 for user conductor
2021-11-01 02:28:29.160198 I | auth: deleting token DaUtRiAoYifuecnP.785 for user conductor
2021-11-01 02:28:29.951108 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.512699481s) to execute
2021-11-01 02:28:32.160078 I | auth: deleting token FTozWIGpRZETWYWh.788 for user conductor
2021-11-01 02:28:32.160137 I | auth: deleting token dRUtfUDHaKouvFZn.787 for user conductor
2021-11-01 02:28:32.951047 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.897927303s) to execute
2021-11-01 02:28:32.951236 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.99730791s) to execute
2021-11-01 02:28:32.951419 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.997351919s) to execute
2021-11-01 02:28:33.054986 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:35.451628 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.497129672s) to execute
2021-11-01 02:28:35.451940 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.498482198s) to execute
2021-11-01 02:28:37.160045 I | auth: deleting token mAJpVPGLJXTCRoIH.792 for user conductor
2021-11-01 02:28:37.160097 I | auth: deleting token sDsdbikiMPwyecZx.790 for user conductor
2021-11-01 02:28:37.160113 I | auth: deleting token mtdRDWnNzvgDJYxq.789 for user conductor
2021-11-01 02:28:37.160136 I | auth: deleting token MPvSTvSHkCKvzThQ.793 for user conductor
2021-11-01 02:28:37.757534 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.206750639s) to execute
2021-11-01 02:28:38.055844 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:40.250573 I | auth: deleting token PkcpuuIJvClzwyhq.794 for user conductor
2021-11-01 02:28:40.250631 I | auth: deleting token KIMjGQWifoLrpWlY.796 for user conductor
2021-11-01 02:28:40.250648 I | auth: deleting token vzDNOzQxywcSxGwe.791 for user conductor
2021-11-01 02:28:40.250665 I | auth: deleting token EsaBPoosOTnXhDiV.795 for user conductor
2021-11-01 02:28:40.250676 I | auth: deleting token CUrTCMKSviIalFlQ.797 for user conductor
2021-11-01 02:28:40.251199 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.796975006s) to execute
2021-11-01 02:28:43.055630 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.004979434s) to execute
2021-11-01 02:28:43.056058 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.205241889s) to execute
2021-11-01 02:28:43.056329 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:43.160047 I | auth: deleting token PPNUokIDyYhhnvWP.799 for user conductor
2021-11-01 02:28:43.160195 I | auth: deleting token vkQhQqtjXrelSrvc.798 for user conductor
2021-11-01 02:28:43.250962 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (100.276734ms) to execute
2021-11-01 02:28:43.339827 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (186.488686ms) to execute
2021-11-01 02:28:46.250440 I | auth: deleting token HKuCiXapaEtZPeXl.801 for user conductor
2021-11-01 02:28:46.250505 I | auth: deleting token vLQUNAZlZJJRuRLe.802 for user conductor
2021-11-01 02:28:48.150458 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:48.150671 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.300084428s) to execute
2021-11-01 02:28:48.250569 I | auth: deleting token DTpqMliTufBIJjJE.805 for user conductor
2021-11-01 02:28:48.250620 I | auth: deleting token zgQLEjMWszyJfxaY.806 for user conductor
2021-11-01 02:28:48.250636 I | auth: deleting token uAkhuRaklyLnaOBW.803 for user conductor
2021-11-01 02:28:48.250652 I | auth: deleting token XXDiwWmMRrqCpVbu.804 for user conductor
2021-11-01 02:28:48.250661 I | auth: deleting token nHqtbmpjNvflnZdA.800 for user conductor
2021-11-01 02:28:50.551022 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.300034809s) to execute
2021-11-01 02:28:50.551176 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.398421027s) to execute
2021-11-01 02:28:53.052271 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.497297708s) to execute
2021-11-01 02:28:53.052458 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.498732942s) to execute
2021-11-01 02:28:53.150783 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:53.160089 I | auth: deleting token YVSfbGMNOpldxxVo.807 for user conductor
2021-11-01 02:28:53.160184 I | auth: deleting token BQIssXTcfekNXwaP.809 for user conductor
2021-11-01 02:28:55.950618 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.300028591s) to execute
2021-11-01 02:28:58.152217 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:28:58.159973 I | auth: deleting token PktlesWigoEEQKeE.812 for user conductor
2021-11-01 02:28:58.160005 I | auth: deleting token YMEwdOhhHLQwUjkJ.808 for user conductor
2021-11-01 02:28:58.160014 I | auth: deleting token RqStUlZoozuSznEd.814 for user conductor
2021-11-01 02:28:58.160020 I | auth: deleting token ZrOHpBijyhKhfchn.811 for user conductor
2021-11-01 02:28:58.160028 I | auth: deleting token vuQhToGBmENYZdzS.810 for user conductor
2021-11-01 02:28:58.160034 I | auth: deleting token TvUgWtwJZymASbqK.813 for user conductor
2021-11-01 02:28:58.655602 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.602336946s) to execute
2021-11-01 02:29:01.160055 I | auth: deleting token DdUvXUzmfobCGtUX.815 for user conductor
2021-11-01 02:29:01.853439 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.002962305s) to execute
2021-11-01 02:29:03.152404 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:03.159951 I | auth: deleting token olEixZaIVNDvHSds.817 for user conductor
2021-11-01 02:29:03.159977 I | auth: deleting token bylPwRIlTbcBbNND.816 for user conductor
2021-11-01 02:29:04.250476 I | auth: deleting token JbDWXIBtoziHUoOZ.819 for user conductor
2021-11-01 02:29:04.250553 I | auth: deleting token kIZupPknmQNonYJP.818 for user conductor
2021-11-01 02:29:04.555333 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.701771391s) to execute
2021-11-01 02:29:04.555481 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.804888752s) to execute
2021-11-01 02:29:04.555658 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.699800643s) to execute
2021-11-01 02:29:06.250466 I | auth: deleting token mXecZLZNIHmvJVKs.820 for user conductor
2021-11-01 02:29:07.160027 I | auth: deleting token atQVSJCXKadjZvHB.821 for user conductor
2021-11-01 02:29:07.256093 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.684989625s) to execute
2021-11-01 02:29:07.256231 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.605664407s) to execute
2021-11-01 02:29:08.152791 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:10.152926 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.102221172s) to execute
2021-11-01 02:29:10.160107 I | auth: deleting token XbHCYGjQFYrKZiGh.822 for user conductor
2021-11-01 02:29:10.160173 I | auth: deleting token JkRTJtkmcaMjqQRw.823 for user conductor
2021-11-01 02:29:10.160202 I | auth: deleting token oTRnxOWiPLjiwqks.824 for user conductor
2021-11-01 02:29:13.153073 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:13.250527 I | auth: deleting token lcDzCqyDGFIYsVAC.826 for user conductor
2021-11-01 02:29:13.250594 I | auth: deleting token xcimcZLpYYdFCYXy.825 for user conductor
2021-11-01 02:29:15.255197 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.904348939s) to execute
2021-11-01 02:29:15.350669 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.189926944s) to execute
2021-11-01 02:29:18.150944 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.798600079s) to execute
2021-11-01 02:29:18.151124 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.799935167s) to execute
2021-11-01 02:29:18.151302 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.798051217s) to execute
2021-11-01 02:29:18.151431 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.09880623s) to execute
2021-11-01 02:29:18.153416 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:18.160288 I | auth: deleting token ENgjUssDhgycDdxW.827 for user conductor
2021-11-01 02:29:20.554298 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.300621729s) to execute
2021-11-01 02:29:20.554796 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.901855341s) to execute
2021-11-01 02:29:21.250483 I | auth: deleting token sqiShikyYmqgNEmy.828 for user conductor
2021-11-01 02:29:21.250548 I | auth: deleting token FiRBSqYRQSxPFXRD.829 for user conductor
2021-11-01 02:29:23.153777 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:24.250708 I | auth: deleting token OqIqFXBIFsbSuqkR.831 for user conductor
2021-11-01 02:29:24.250807 I | auth: deleting token VlqlcHxzaKyepTuv.832 for user conductor
2021-11-01 02:29:24.250842 I | auth: deleting token QHDyiFrQoMCyOSQs.830 for user conductor
2021-11-01 02:29:26.053970 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.303186436s) to execute
2021-11-01 02:29:28.154103 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:28.857239 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.606400254s) to execute
2021-11-01 02:29:28.950529 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.799609668s) to execute
2021-11-01 02:29:30.160125 I | auth: deleting token eGLAIgVzaulVfLJk.836 for user conductor
2021-11-01 02:29:30.160195 I | auth: deleting token jShFnYIPYKngMaIR.834 for user conductor
2021-11-01 02:29:31.255157 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.104147395s) to execute
2021-11-01 02:29:31.255439 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.304389149s) to execute
2021-11-01 02:29:31.255574 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.301673663s) to execute
2021-11-01 02:29:32.250502 I | auth: deleting token rtDjIjkScnhycsnN.838 for user conductor
2021-11-01 02:29:32.250559 I | auth: deleting token wDcsnGsrWdZhzoeK.837 for user conductor
2021-11-01 02:29:32.250571 I | auth: deleting token RsdOJdfHhjCJjmWp.835 for user conductor
2021-11-01 02:29:32.250580 I | auth: deleting token ylCSMurxKHKIBpSU.833 for user conductor
2021-11-01 02:29:33.154359 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:33.160043 I | auth: deleting token HeHByyxCGCiPiXZQ.839 for user conductor
2021-11-01 02:29:34.057060 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.704760706s) to execute
2021-11-01 02:29:35.160123 I | auth: deleting token zMtWthDaTonUNMfx.840 for user conductor
2021-11-01 02:29:36.953564 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.801612331s) to execute
2021-11-01 02:29:36.953899 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.802945498s) to execute
2021-11-01 02:29:37.250384 I | auth: deleting token XiSfbzEptcOziSvc.841 for user conductor
2021-11-01 02:29:37.250441 I | auth: deleting token PeRyGrqyZLZaMeVv.844 for user conductor
2021-11-01 02:29:37.250455 I | auth: deleting token ZmtDdzhEwxGNfdxi.842 for user conductor
2021-11-01 02:29:37.250478 I | auth: deleting token ZWmSqEcdNYVeKTrV.843 for user conductor
2021-11-01 02:29:38.154636 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:42.153880 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.001953664s) to execute
2021-11-01 02:29:42.154153 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.003222458s) to execute
2021-11-01 02:29:42.171087 I | auth: deleting token pCzXxncTHTNzqmVQ.846 for user conductor
2021-11-01 02:29:42.171130 I | auth: deleting token enEsfjPRsyJWnycW.848 for user conductor
2021-11-01 02:29:42.171158 I | auth: deleting token KiBuQdToJkvyejlk.847 for user conductor
2021-11-01 02:29:42.171169 I | auth: deleting token BcqRZQCordByGVgZ.845 for user conductor
2021-11-01 02:29:42.171181 I | auth: deleting token uxgDeBslVQONFNmJ.849 for user conductor
2021-11-01 02:29:43.154893 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:43.160009 I | auth: deleting token wvDcupralNjNeMpV.850 for user conductor
2021-11-01 02:29:45.058707 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.900633639s) to execute
2021-11-01 02:29:45.059152 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.902580089s) to execute
2021-11-01 02:29:45.059347 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.888502723s) to execute
2021-11-01 02:29:45.059555 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.405980404s) to execute
2021-11-01 02:29:45.160097 I | auth: deleting token apTuQyFoIrHuUbje.851 for user conductor
2021-11-01 02:29:45.160150 I | auth: deleting token pBlfpwEqEDIUcRsf.852 for user conductor
2021-11-01 02:29:48.155119 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:48.160292 I | auth: deleting token HfVUlfjnlLKoRFzV.853 for user conductor
2021-11-01 02:29:48.160327 I | auth: deleting token mNjVyWIDhwikDSiQ.854 for user conductor
2021-11-01 02:29:52.159998 I | auth: deleting token epCKkvXBkRZUrszx.857 for user conductor
2021-11-01 02:29:52.160042 I | auth: deleting token WunsHFodJJggOtNz.856 for user conductor
2021-11-01 02:29:52.160053 I | auth: deleting token KcYbtenJupcFGXQA.859 for user conductor
2021-11-01 02:29:52.160060 I | auth: deleting token BAWAjtZmrhPRFvnu.855 for user conductor
2021-11-01 02:29:52.160076 I | auth: deleting token jjQneMeyLPBOatBf.858 for user conductor
2021-11-01 02:29:53.155514 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:54.160150 I | auth: deleting token NLjJTwmmDqSAwtPf.860 for user conductor
2021-11-01 02:29:54.160206 I | auth: deleting token hEiVnLPqJVKcswNT.861 for user conductor
2021-11-01 02:29:58.155801 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:29:59.652081 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.19658546s) to execute
2021-11-01 02:30:01.160086 I | auth: deleting token zgPGcfTrSLfGDZSU.863 for user conductor
2021-11-01 02:30:02.753751 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.815526094s) to execute
2021-11-01 02:30:02.753896 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.001081734s) to execute
2021-11-01 02:30:02.753987 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.099141085s) to execute
2021-11-01 02:30:03.156127 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:04.250609 I | auth: deleting token CJAYhdMvBumxGXBf.867 for user conductor
2021-11-01 02:30:04.250680 I | auth: deleting token VBkbjyYVEvURhVdi.864 for user conductor
2021-11-01 02:30:04.250704 I | auth: deleting token vgRkjwNLsUtkbIoV.866 for user conductor
2021-11-01 02:30:04.250724 I | auth: deleting token UfHOdQpfepkwqlct.862 for user conductor
2021-11-01 02:30:04.250747 I | auth: deleting token MjdRIdAWoUqAaFUq.865 for user conductor
2021-11-01 02:30:05.953618 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.314591925s) to execute
2021-11-01 02:30:08.156709 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:13.157081 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:14.256017 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.201451046s) to execute
2021-11-01 02:30:14.450916 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (192.198787ms) to execute
2021-11-01 02:30:14.539485 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (280.62449ms) to execute
2021-11-01 02:30:17.160050 I | auth: deleting token TrYazyWGiBooMixD.869 for user conductor
2021-11-01 02:30:17.160091 I | auth: deleting token jnklRlthtEjsLwlM.868 for user conductor
2021-11-01 02:30:17.354407 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.003857071s) to execute
2021-11-01 02:30:18.157369 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:20.160089 I | auth: deleting token LQrMfejfaKkxSeGR.870 for user conductor
2021-11-01 02:30:20.160146 I | auth: deleting token VXqUcvsEMYIrFPLI.871 for user conductor
2021-11-01 02:30:21.155786 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.903079145s) to execute
2021-11-01 02:30:22.160046 I | auth: deleting token nVvCGtnMPplpCVdd.873 for user conductor
2021-11-01 02:30:22.160088 I | auth: deleting token GlhUycZvFKDTbinF.872 for user conductor
2021-11-01 02:30:23.157727 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:26.752145 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.399166815s) to execute
2021-11-01 02:30:27.250398 I | auth: deleting token MdVTAeIFZSQPhKdo.874 for user conductor
2021-11-01 02:30:28.158012 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:29.054948 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.302686638s) to execute
2021-11-01 02:30:29.055209 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.30094241s) to execute
2021-11-01 02:30:31.659242 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.601845031s) to execute
2021-11-01 02:30:31.659559 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.508814211s) to execute
2021-11-01 02:30:32.250391 I | auth: deleting token rvuIrGyUXkJRPsZg.876 for user conductor
2021-11-01 02:30:32.250459 I | auth: deleting token CtOBvCsacPdPtdwq.878 for user conductor
2021-11-01 02:30:33.250430 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:34.151166 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.500455185s) to execute
2021-11-01 02:30:34.170862 I | auth: deleting token PhKGmlajaGvTJqGr.881 for user conductor
2021-11-01 02:30:34.170926 I | auth: deleting token nfaBOchPEZTEOYRj.877 for user conductor
2021-11-01 02:30:35.160134 I | auth: deleting token MsoQAXBxTAjoVXWi.879 for user conductor
2021-11-01 02:30:35.160206 I | auth: deleting token IvnesQHTCwHFzwjS.883 for user conductor
2021-11-01 02:30:35.160242 I | auth: deleting token JcUddUUudyuRebpE.882 for user conductor
2021-11-01 02:30:36.160027 I | auth: deleting token iLeKTnftTVDfyiwF.884 for user conductor
2021-11-01 02:30:38.250646 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:39.160121 I | auth: deleting token vrNCdpkoavAnUbBs.885 for user conductor
2021-11-01 02:30:39.160184 I | auth: deleting token DZELvRYjQGwDUOlu.886 for user conductor
2021-11-01 02:30:39.160206 I | auth: deleting token teyuYLRTgDLQNDkX.887 for user conductor
2021-11-01 02:30:41.954596 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.604009897s) to execute
2021-11-01 02:30:41.954938 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (7.801150833s) to execute
2021-11-01 02:30:42.250535 I | auth: deleting token bDZHYPIpjnNKNwEO.889 for user conductor
2021-11-01 02:30:42.250601 I | auth: deleting token CKxsyPCUVNxliwwB.890 for user conductor
2021-11-01 02:30:42.250629 I | auth: deleting token hEAdcEpcmzrcmieW.888 for user conductor
2021-11-01 02:30:43.160029 I | auth: deleting token iNxGqXViOdrcgCwr.891 for user conductor
2021-11-01 02:30:43.250957 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:45.150820 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.193582799s) to execute
2021-11-01 02:30:45.150983 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.100211877s) to execute
2021-11-01 02:30:45.151200 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.000502084s) to execute
2021-11-01 02:30:45.160059 I | auth: deleting token jIJwJMeYmCgcSaro.892 for user conductor
2021-11-01 02:30:45.339674 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (185.969181ms) to execute
2021-11-01 02:30:46.160105 I | auth: deleting token kDuqsxkCTXQXnkZx.893 for user conductor
2021-11-01 02:30:48.251398 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:48.351178 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.897163744s) to execute
2021-11-01 02:30:49.160102 I | auth: deleting token fAeNdSihXjwKiwOs.894 for user conductor
2021-11-01 02:30:49.160176 I | auth: deleting token AbRcpLjSCoIKsxgo.895 for user conductor
2021-11-01 02:30:50.250503 I | auth: deleting token coGseDfgLQpetFFm.896 for user conductor
2021-11-01 02:30:50.253049 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.800260863s) to execute
2021-11-01 02:30:52.160130 I | auth: deleting token cDhaKkjIThqxnCsE.898 for user conductor
2021-11-01 02:30:52.160207 I | auth: deleting token IIyXwKnshmKfaeIu.897 for user conductor
2021-11-01 02:30:52.160235 I | auth: deleting token ehvCHWDpsaYvulkn.899 for user conductor
2021-11-01 02:30:53.160151 I | auth: deleting token sKzpIgsPJRpgTuFG.900 for user conductor
2021-11-01 02:30:53.251823 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:30:58.160076 I | auth: deleting token FBsUTyOJHtftNLme.902 for user conductor
2021-11-01 02:30:58.160153 I | auth: deleting token XOGErRfaAoMRmYcD.901 for user conductor
2021-11-01 02:30:58.160174 I | auth: deleting token tDAuuucmWsJnNtJe.904 for user conductor
2021-11-01 02:30:58.252129 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:31:03.252531 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:31:03.551530 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.398719608s) to execute
2021-11-01 02:31:03.738300 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (184.081501ms) to execute
2021-11-01 02:31:03.741150 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (186.823355ms) to execute
2021-11-01 02:31:05.160164 I | auth: deleting token AlteuHLZhviQzGOE.903 for user conductor
2021-11-01 02:31:05.160434 I | auth: deleting token QJCkrctrrcIJylIi.906 for user conductor
2021-11-01 02:31:05.160713 I | auth: deleting token raRVLJwQJFNUBzor.907 for user conductor
2021-11-01 02:31:05.160937 I | auth: deleting token ypJeETDhetRjhxMF.905 for user conductor
2021-11-01 02:31:05.161098 I | auth: deleting token EWfXzuMngDkMRxwO.908 for user conductor
2021-11-01 02:31:08.252724 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:31:10.160281 I | auth: deleting token YOYrjEmGdabsrkqy.909 for user conductor
2021-11-01 02:31:10.160360 I | auth: deleting token ZtLxoQNxgShpOdDL.912 for user conductor
2021-11-01 02:31:10.160376 I | auth: deleting token UmuPHScaUBeQZXlb.911 for user conductor
2021-11-01 02:31:10.160391 I | auth: deleting token UevdUXAJeohRXAyh.910 for user conductor
2021-11-01 02:31:13.253090 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:31:16.250392 I | auth: deleting token BuhydFkNfeeMLwuA.915 for user conductor
2021-11-01 02:31:16.250460 I | auth: deleting token RZjpkEURYJCNOBoO.914 for user conductor
2021-11-01 02:31:16.250479 I | auth: deleting token gFswGCuVUxNFbCVq.916 for user conductor
2021-11-01 02:31:16.250495 I | auth: deleting token rlswvWOvICVxznZu.918 for user conductor
2021-11-01 02:31:16.250518 I | auth: deleting token lDghHwsPKJZDzZqf.917 for user conductor
2021-11-01 02:31:18.160119 I | auth: deleting token zZTwrMZCfbbMacUV.921 for user conductor
2021-11-01 02:31:18.253420 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:31:19.250501 I | auth: deleting token inxtjdUQGQejHTVz.922 for user conductor
2021-11-01 02:31:19.250584 I | auth: deleting token oTGUXaPNSuamLgTa.919 for user conductor
2021-11-01 02:31:21.160149 I | auth: deleting token LOSwhfqNvfgVuvqU.924 for user conductor
2021-11-01 02:31:21.160218 I | auth: deleting token ILuTPJAiYvECHIJo.925 for user conductor
2021-11-01 02:31:21.160246 I | auth: deleting token XpbklMzqDVsfIVCC.923 for user conductor
2021-11-01 02:31:23.253818 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:31:23.854727 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (9.703113261s) to execute
2021-11-01 02:31:24.250414 I | auth: deleting token adHvspJVNnmqDnFN.926 for user conductor
2021-11-01 02:31:24.250451 I | auth: deleting token ODuVgDOtYxDVjrvM.927 for user conductor
2021-11-01 02:31:26.160046 I | auth: deleting token WWOGfyUNdhdpvIjR.929 for user conductor
2021-11-01 02:31:26.652298 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.699710919s) to execute
2021-11-01 02:31:26.652490 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.701767865s) to execute
2021-11-01 02:31:26.654788 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.703754893s) to execute
2021-11-01 02:31:26.654869 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.703704377s) to execute
2021-11-01 02:31:28.254178 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:31:29.160169 I | auth: deleting token tVOqIPWlZkTghSKt.928 for user conductor
2021-11-01 02:31:31.160058 I | auth: deleting token FvfnYDktXycirJRC.932 for user conductor
2021-11-01 02:31:31.160112 I | auth: deleting token ezrkxgPZxaNsxEou.930 for user conductor
2021-11-01 02:31:31.160126 I | auth: deleting token ZEoahppRGyyhSoLz.931 for user conductor
2021-11-01 02:31:31.160157 I | auth: deleting token MCTAFcODnjdbgJPj.933 for user conductor
2021-11-01 02:31:32.250435 I | auth: deleting token JcKENbhSusAwuyMD.934 for user conductor
2021-11-01 02:31:33.254779 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:31:35.160162 I | auth: deleting token BEhrUbmRMPQXOgWe.936 for user conductor
2021-11-01 02:31:35.160246 I | auth: deleting token FBOalqlhfWyoQpsb.935 for user conductor
2021-11-01 02:31:37.451518 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (9.413314677s) to execute
2021-11-01 02:31:38.160016 I | auth: deleting token DPAxFJrPkTWngDAq.938 for user conductor
2021-11-01 02:31:38.160073 I | auth: deleting token jLqqIXYhaDobEtVs.939 for user conductor
2021-11-01 02:31:38.350694 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:31:40.152445 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.001871764s) to execute
2021-11-01 02:31:41.160219 I | auth: deleting token zcbWwIPEWCPUNSvu.941 for user conductor
2021-11-01 02:31:41.160288 I | auth: deleting token jpPGqumVQJMJHTur.937 for user conductor
2021-11-01 02:31:42.356138 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.717656671s) to execute
2021-11-01 02:31:43.351054 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:31:44.453239 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.093907178s) to execute
2021-11-01 02:31:45.160128 I | auth: deleting token kzGLreaWogprrsFD.945 for user conductor
2021-11-01 02:31:45.160227 I | auth: deleting token MixpgAHUpxAZyINc.940 for user conductor
2021-11-01 02:31:45.160263 I | auth: deleting token sxcnWkeNxjgBtgZb.943 for user conductor
2021-11-01 02:31:46.250460 I | auth: deleting token ZVNaZJNJdTmwCaCI.946 for user conductor
2021-11-01 02:31:46.250518 I | auth: deleting token jtqwFapJenjuqLIp.942 for user conductor
2021-11-01 02:31:46.250538 I | auth: deleting token TtkXljWLgLhFoeNu.944 for user conductor
2021-11-01 02:31:47.154049 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.700435408s) to execute
2021-11-01 02:31:47.154542 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.698751893s) to execute
2021-11-01 02:31:48.160048 I | auth: deleting token iWZfBRVgqbnoKgIp.947 for user conductor
2021-11-01 02:31:48.351371 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:31:49.160070 I | auth: deleting token dLRxjSjFMwMdNNnB.948 for user conductor
2021-11-01 02:31:49.653959 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.403363751s) to execute
2021-11-01 02:31:49.654189 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.401297359s) to execute
2021-11-01 02:31:49.654330 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.112100693s) to execute
2021-11-01 02:31:51.160223 I | auth: deleting token xZJbhsvUubduwgnc.950 for user conductor
2021-11-01 02:31:51.160282 I | auth: deleting token wxOCwKOipMxJLtPn.949 for user conductor
2021-11-01 02:31:52.054221 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.415085913s) to execute
2021-11-01 02:31:53.351788 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:31:54.160068 I | auth: deleting token tIbEqymNPEYhwqIm.953 for user conductor
2021-11-01 02:31:54.160159 I | auth: deleting token wESdljeAlwznCqcL.951 for user conductor
2021-11-01 02:31:54.160186 I | auth: deleting token GGiFTRSHBgLCFIYi.954 for user conductor
2021-11-01 02:31:54.160207 I | auth: deleting token GjqobBTVVJQxzexm.952 for user conductor
2021-11-01 02:31:56.054579 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.412962751s) to execute
2021-11-01 02:31:58.352074 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:31:59.160020 I | auth: deleting token ljHpXQmZHSoNJpSZ.956 for user conductor
2021-11-01 02:31:59.160081 I | auth: deleting token pLhlRPiqJxpTvzlY.959 for user conductor
2021-11-01 02:31:59.160091 I | auth: deleting token WNVRvglxKcoWOzvC.958 for user conductor
2021-11-01 02:31:59.160102 I | auth: deleting token DzCWPKxaXxcWwaNH.955 for user conductor
2021-11-01 02:31:59.160110 I | auth: deleting token bCGdQQxKgwGPxiCK.957 for user conductor
2021-11-01 02:32:00.160013 I | auth: deleting token xjgqzyOyqSAEQvVj.960 for user conductor
2021-11-01 02:32:00.757655 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.605651399s) to execute
2021-11-01 02:32:03.156448 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.300748801s) to execute
2021-11-01 02:32:03.156662 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.306058427s) to execute
2021-11-01 02:32:03.156725 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.306106168s) to execute
2021-11-01 02:32:03.352913 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:06.055017 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.800493805s) to execute
2021-11-01 02:32:07.160096 I | auth: deleting token ZayoklxyYHXQtzyh.964 for user conductor
2021-11-01 02:32:07.160178 I | auth: deleting token XppmVMqmKVQuIgSd.961 for user conductor
2021-11-01 02:32:07.160195 I | auth: deleting token seDoPsSeuOWYgtxR.962 for user conductor
2021-11-01 02:32:07.160207 I | auth: deleting token ZJdSYQYPhITRVLTV.966 for user conductor
2021-11-01 02:32:07.160218 I | auth: deleting token vTHzsNlAdjQFBhFx.965 for user conductor
2021-11-01 02:32:07.160253 I | auth: deleting token wSoAMzLlSCSXdElX.963 for user conductor
2021-11-01 02:32:07.160269 I | auth: deleting token EqwqBxcAlHONvHCH.967 for user conductor
2021-11-01 02:32:08.353193 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:08.656037 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.40519682s) to execute
2021-11-01 02:32:08.656468 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.405328979s) to execute
2021-11-01 02:32:08.656579 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.598689182s) to execute
2021-11-01 02:32:09.160219 I | auth: deleting token HEQUqCgzQutpUUxu.968 for user conductor
2021-11-01 02:32:11.056371 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.303284131s) to execute
2021-11-01 02:32:11.057480 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.303828717s) to execute
2021-11-01 02:32:11.250466 I | auth: deleting token zZzZphZWfYyTbeMW.969 for user conductor
2021-11-01 02:32:12.160097 I | auth: deleting token kKXqrDaZTeOWCDyI.970 for user conductor
2021-11-01 02:32:13.256413 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.103472201s) to execute
2021-11-01 02:32:13.353544 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:14.160165 I | auth: deleting token lwEHCRHzrmbaEwUK.971 for user conductor
2021-11-01 02:32:15.160140 I | auth: deleting token NLxSVxMLQlbXDhGE.972 for user conductor
2021-11-01 02:32:15.453032 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.29996503s) to execute
2021-11-01 02:32:15.453149 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.102178253s) to execute
2021-11-01 02:32:15.453611 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.194588436s) to execute
2021-11-01 02:32:15.652154 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.118789ms) to execute
2021-11-01 02:32:17.160079 I | auth: deleting token jrxTLofOrOoIcnex.973 for user conductor
2021-11-01 02:32:17.759316 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.108490094s) to execute
2021-11-01 02:32:18.353779 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:19.956490 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.10374046s) to execute
2021-11-01 02:32:22.160031 I | auth: deleting token SUMCSYYzLujOffHQ.975 for user conductor
2021-11-01 02:32:22.160087 I | auth: deleting token xGxufemjVXWunBPY.978 for user conductor
2021-11-01 02:32:22.160107 I | auth: deleting token tDDigohiDzJtdAof.974 for user conductor
2021-11-01 02:32:22.160113 I | auth: deleting token COfhTCIFEAZmWegf.976 for user conductor
2021-11-01 02:32:22.160120 I | auth: deleting token DqfPOpwpuFFeLnFH.977 for user conductor
2021-11-01 02:32:22.350809 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.300034075s) to execute
2021-11-01 02:32:23.353961 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:24.852251 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.501313839s) to execute
2021-11-01 02:32:24.852519 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.89372066s) to execute
2021-11-01 02:32:25.160156 I | auth: deleting token tBYwAyjnySwtMjyO.979 for user conductor
2021-11-01 02:32:25.160216 I | auth: deleting token XahSzDRuPfGJoKIA.980 for user conductor
2021-11-01 02:32:25.160232 I | auth: deleting token zlPLmsUrmLckqqGL.981 for user conductor
2021-11-01 02:32:26.160088 I | auth: deleting token pTAeRzuxcNNYSDgw.982 for user conductor
2021-11-01 02:32:27.555729 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.202211253s) to execute
2021-11-01 02:32:27.555873 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.604985585s) to execute
2021-11-01 02:32:27.556090 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.701300131s) to execute
2021-11-01 02:32:28.160209 I | auth: deleting token SCAqLSAHCNcLynZP.983 for user conductor
2021-11-01 02:32:28.354279 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:29.160097 I | auth: deleting token BqItJUGYkEgKcGWY.984 for user conductor
2021-11-01 02:32:30.653917 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.912757017s) to execute
2021-11-01 02:32:30.654132 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.003514369s) to execute
2021-11-01 02:32:31.230479 I | auth: deleting token kzNopQvnabgHnYaA.985 for user conductor
2021-11-01 02:32:32.160108 I | auth: deleting token ppnSuVQScQAnovgp.986 for user conductor
2021-11-01 02:32:33.252354 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.595624891s) to execute
2021-11-01 02:32:33.354516 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:34.160140 I | auth: deleting token gMneyWGrkhxDjgck.987 for user conductor
2021-11-01 02:32:36.160024 I | auth: deleting token JTrjlyaDfaEYzago.988 for user conductor
2021-11-01 02:32:37.250462 I | auth: deleting token YwvXsQMHjkksuVmM.989 for user conductor
2021-11-01 02:32:37.461135 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.110374791s) to execute
2021-11-01 02:32:37.551901 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.297447501s) to execute
2021-11-01 02:32:38.354851 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:40.053900 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.500960795s) to execute
2021-11-01 02:32:40.054354 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.502240343s) to execute
2021-11-01 02:32:40.054555 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.499086944s) to execute
2021-11-01 02:32:42.460571 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.299659165s) to execute
2021-11-01 02:32:43.355106 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:44.957375 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.306418215s) to execute
2021-11-01 02:32:44.957628 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.40452164s) to execute
2021-11-01 02:32:48.160156 I | auth: deleting token huQhOHCuSHtBQFut.991 for user conductor
2021-11-01 02:32:48.160211 I | auth: deleting token wPdPZMaZIBGTSvtU.998 for user conductor
2021-11-01 02:32:48.160226 I | auth: deleting token NCvFIDAIFFPJITeO.995 for user conductor
2021-11-01 02:32:48.160245 I | auth: deleting token iFhxiDgLTWZvCrwN.996 for user conductor
2021-11-01 02:32:48.160258 I | auth: deleting token BRqryGvFneWfOZPM.993 for user conductor
2021-11-01 02:32:48.160269 I | auth: deleting token NSbLILBvoUOMCyuJ.994 for user conductor
2021-11-01 02:32:48.160288 I | auth: deleting token MqBWtzTAMrRVWtWF.990 for user conductor
2021-11-01 02:32:48.160300 I | auth: deleting token gDTKcdsxRLFlRdxF.992 for user conductor
2021-11-01 02:32:48.160316 I | auth: deleting token dMJpUsBhhPToxqRR.997 for user conductor
2021-11-01 02:32:48.449827 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:50.160018 I | auth: deleting token tMOARVoOdhtjUchg.999 for user conductor
2021-11-01 02:32:50.160093 I | auth: deleting token ohfibJLMXRetLCsi.1000 for user conductor
2021-11-01 02:32:50.752883 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.110408706s) to execute
2021-11-01 02:32:51.165288 I | auth: deleting token XBwEMRCtmJtsIYzI.1001 for user conductor
2021-11-01 02:32:53.252556 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.497178989s) to execute
2021-11-01 02:32:53.252677 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.30205772s) to execute
2021-11-01 02:32:53.438898 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (183.576291ms) to execute
2021-11-01 02:32:53.450046 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:32:54.160080 I | auth: deleting token LpoZPcXurgkkzmot.1003 for user conductor
2021-11-01 02:32:54.160115 I | auth: deleting token NgtRjjRXKEpoedvR.1002 for user conductor
2021-11-01 02:32:55.852541 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.899904881s) to execute
2021-11-01 02:32:58.450413 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:00.160015 I | auth: deleting token AcKXctuyPxHiROfH.1005 for user conductor
2021-11-01 02:33:00.160090 I | auth: deleting token KSdhnXVLUWMuTVDK.1007 for user conductor
2021-11-01 02:33:00.160124 I | auth: deleting token NgzNNKjfvXjTzBxs.1004 for user conductor
2021-11-01 02:33:03.160031 I | auth: deleting token jOyWxJeqJsLozSLi.1008 for user conductor
2021-11-01 02:33:03.160072 I | auth: deleting token wABuegxpRyBSxseS.1011 for user conductor
2021-11-01 02:33:03.160087 I | auth: deleting token ITJjbHmMDJnWZfkT.1006 for user conductor
2021-11-01 02:33:03.160095 I | auth: deleting token bKqWIsUTbqAbcDSe.1009 for user conductor
2021-11-01 02:33:03.160101 I | auth: deleting token NOEvFnzfWixQPccG.1010 for user conductor
2021-11-01 02:33:03.450693 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:04.856355 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.614643658s) to execute
2021-11-01 02:33:05.038747 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (180.127198ms) to execute
2021-11-01 02:33:06.160137 I | auth: deleting token JAQgfcgtwWHDLDyn.1013 for user conductor
2021-11-01 02:33:06.160208 I | auth: deleting token yUFCwLwViXyeLQOS.1012 for user conductor
2021-11-01 02:33:08.451005 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:09.160136 I | auth: deleting token JUoXgcBVBIDYYodu.1015 for user conductor
2021-11-01 02:33:09.160217 I | auth: deleting token qzgIHQTMMJhOWUeQ.1014 for user conductor
2021-11-01 02:33:09.160505 I | auth: deleting token AURvRRxyKbJFwANk.1016 for user conductor
2021-11-01 02:33:12.250409 I | auth: deleting token LBNSbWDGiuxbwcQd.1018 for user conductor
2021-11-01 02:33:13.451265 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:15.160050 I | auth: deleting token iyYXxkAYAxSJiYIW.1020 for user conductor
2021-11-01 02:33:15.160099 I | auth: deleting token tPmmhxnjrPuKDVLj.1022 for user conductor
2021-11-01 02:33:15.160116 I | auth: deleting token HLrXYVRGllxvQDVo.1021 for user conductor
2021-11-01 02:33:15.160123 I | auth: deleting token TWvQmRDDgULqgOGf.1019 for user conductor
2021-11-01 02:33:15.160135 I | auth: deleting token MGAYBFVJqPkdfBvy.1017 for user conductor
2021-11-01 02:33:17.255477 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.402626892s) to execute
2021-11-01 02:33:18.451608 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:20.051476 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.698430272s) to execute
2021-11-01 02:33:20.051739 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.700992014s) to execute
2021-11-01 02:33:20.060310 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.70950721s) to execute
2021-11-01 02:33:20.160015 I | auth: deleting token FUMjqTRUMmICYRWK.1023 for user conductor
2021-11-01 02:33:20.160057 I | auth: deleting token nsXhqOzsebngHJTu.1026 for user conductor
2021-11-01 02:33:20.160065 I | auth: deleting token WrYoAXqqQDuVOyMT.1024 for user conductor
2021-11-01 02:33:20.238624 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (184.626696ms) to execute
2021-11-01 02:33:22.250451 I | auth: deleting token GiraDDmCutddktrJ.1025 for user conductor
2021-11-01 02:33:22.250522 I | auth: deleting token mtAxdfKVYDQFBBCI.1029 for user conductor
2021-11-01 02:33:22.250555 I | auth: deleting token ykyEBSfaHrFxRAtJ.1028 for user conductor
2021-11-01 02:33:22.453192 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.302331136s) to execute
2021-11-01 02:33:22.453382 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.815114037s) to execute
2021-11-01 02:33:23.160129 I | auth: deleting token VwYNdOSmxkiAQEjH.1027 for user conductor
2021-11-01 02:33:23.160208 I | auth: deleting token hoNFbymhlMOiQlMM.1030 for user conductor
2021-11-01 02:33:23.452005 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:27.551396 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.61327075s) to execute
2021-11-01 02:33:28.452280 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:30.160063 I | auth: deleting token jgmxVuZBkoQEmlmw.1032 for user conductor
2021-11-01 02:33:30.160130 I | auth: deleting token ohApptjQOcPHxkjB.1035 for user conductor
2021-11-01 02:33:30.160147 I | auth: deleting token qcFNetHJqZQuMRLW.1031 for user conductor
2021-11-01 02:33:30.160161 I | auth: deleting token KrGwVSbcpMivmDUZ.1034 for user conductor
2021-11-01 02:33:30.160182 I | auth: deleting token qqGhOrpebapwkVfb.1036 for user conductor
2021-11-01 02:33:30.350570 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.299861743s) to execute
2021-11-01 02:33:32.351118 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.998145216s) to execute
2021-11-01 02:33:33.160087 I | auth: deleting token xwxwfmyuKxVCqrkn.1037 for user conductor
2021-11-01 02:33:33.160133 I | auth: deleting token LVlhYQsLlBWLvewC.1033 for user conductor
2021-11-01 02:33:33.452524 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:34.955519 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.60426871s) to execute
2021-11-01 02:33:34.955704 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.602056947s) to execute
2021-11-01 02:33:36.160105 I | auth: deleting token rdOrZIGmxAJttOyF.1038 for user conductor
2021-11-01 02:33:38.053127 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.702582122s) to execute
2021-11-01 02:33:38.160052 I | auth: deleting token ohDHYpLspnrejBsQ.1039 for user conductor
2021-11-01 02:33:38.452917 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:40.353034 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.412913789s) to execute
2021-11-01 02:33:42.950628 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.498189331s) to execute
2021-11-01 02:33:43.160137 I | auth: deleting token EJmFTTdunzBdpniF.1040 for user conductor
2021-11-01 02:33:43.160214 I | auth: deleting token TjUkFYneMnwqsjzp.1041 for user conductor
2021-11-01 02:33:43.453147 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:44.160157 I | auth: deleting token TCMeULIFudQjVVlE.1042 for user conductor
2021-11-01 02:33:44.160238 I | auth: deleting token OVOpbEmlHPwIHIbj.1043 for user conductor
2021-11-01 02:33:48.250449 I | auth: deleting token cDqTmcSXgqjEdWVW.1045 for user conductor
2021-11-01 02:33:48.250525 I | auth: deleting token xbrjsrcUbSedeUFl.1047 for user conductor
2021-11-01 02:33:48.250545 I | auth: deleting token tUrYrSiWBfUfLpLE.1044 for user conductor
2021-11-01 02:33:48.453369 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:50.351070 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.397403831s) to execute
2021-11-01 02:33:50.351361 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (7.398617768s) to execute
2021-11-01 02:33:51.160390 I | auth: deleting token vAxeszEOdTrRMcjv.1049 for user conductor
2021-11-01 02:33:51.160446 I | auth: deleting token gUdIYXqyBsKxcHgu.1046 for user conductor
2021-11-01 02:33:52.954918 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.601337468s) to execute
2021-11-01 02:33:53.050465 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.600271836s) to execute
2021-11-01 02:33:53.050698 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.59535376s) to execute
2021-11-01 02:33:53.160106 I | auth: deleting token wGBdoJgmGwMHtXgw.1050 for user conductor
2021-11-01 02:33:53.160350 I | auth: deleting token glVmAXdViuSndgWY.1048 for user conductor
2021-11-01 02:33:53.160444 I | auth: deleting token kHLTPaDbVNBxUwES.1052 for user conductor
2021-11-01 02:33:53.160512 I | auth: deleting token jBnWrZgNXKVxzfHp.1051 for user conductor
2021-11-01 02:33:53.453660 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:55.755181 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.704470168s) to execute
2021-11-01 02:33:56.160171 I | auth: deleting token UJzaWGjHeoURgnAe.1054 for user conductor
2021-11-01 02:33:56.160250 I | auth: deleting token eBrvCSFiEhtZfedd.1053 for user conductor
2021-11-01 02:33:58.454063 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:33:59.160038 I | auth: deleting token sBtyUPnqbEaqiUCw.1057 for user conductor
2021-11-01 02:33:59.160197 I | auth: deleting token wKlXZNAxsDZZZUaT.1056 for user conductor
2021-11-01 02:34:00.655866 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.417280371s) to execute
2021-11-01 02:34:02.160026 I | auth: deleting token BWccFzxUekqMEPPJ.1055 for user conductor
2021-11-01 02:34:03.454248 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:05.250410 I | auth: deleting token PtvmpfQIrBIiEjtt.1058 for user conductor
2021-11-01 02:34:05.250490 I | auth: deleting token NNaTLcrPAlBXInrc.1061 for user conductor
2021-11-01 02:34:05.250511 I | auth: deleting token uGSxFGbpiZbQMNiZ.1060 for user conductor
2021-11-01 02:34:05.250538 I | auth: deleting token FeNXkgqtBGQoScaU.1059 for user conductor
2021-11-01 02:34:05.250553 I | auth: deleting token iUJZCGScgbHHufTV.1062 for user conductor
2021-11-01 02:34:06.950988 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.900022191s) to execute
2021-11-01 02:34:08.550491 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:09.253010 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.298491978s) to execute
2021-11-01 02:34:09.253244 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.300303761s) to execute
2021-11-01 02:34:10.250543 I | auth: deleting token RgmfXpRXVzBFtTlq.1065 for user conductor
2021-11-01 02:34:10.250605 I | auth: deleting token jdndAIwuDYFsqRuf.1063 for user conductor
2021-11-01 02:34:11.351080 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.094814383s) to execute
2021-11-01 02:34:11.351403 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.093555828s) to execute
2021-11-01 02:34:13.550930 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:16.250433 I | auth: deleting token iPxRwFVnIjyszwpf.1067 for user conductor
2021-11-01 02:34:16.250911 I | auth: deleting token TwsYQXFTXmvNGxbZ.1066 for user conductor
2021-11-01 02:34:16.250925 I | auth: deleting token odZLthfFFEoQfjca.1064 for user conductor
2021-11-01 02:34:16.250943 I | auth: deleting token NhTNcDOeAMOelGoZ.1068 for user conductor
2021-11-01 02:34:16.250957 I | auth: deleting token fODReHTjFNcZVWuL.1069 for user conductor
2021-11-01 02:34:16.354886 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.000311554s) to execute
2021-11-01 02:34:18.160159 I | auth: deleting token JpBXuYyIPZCOkDsb.1070 for user conductor
2021-11-01 02:34:18.551205 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:18.751676 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.299590443s) to execute
2021-11-01 02:34:18.751834 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.301040089s) to execute
2021-11-01 02:34:19.250684 I | auth: deleting token pMxnqLKcicotBfDP.1071 for user conductor
2021-11-01 02:34:21.154251 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.703417295s) to execute
2021-11-01 02:34:21.154595 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.303997129s) to execute
2021-11-01 02:34:21.155004 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.400966943s) to execute
2021-11-01 02:34:21.251488 I | auth: deleting token DyZEWfvLrYTCJTpf.1073 for user conductor
2021-11-01 02:34:21.251541 I | auth: deleting token QEmPScjBAbQtrdZn.1072 for user conductor
2021-11-01 02:34:23.551602 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:24.053747 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.802714286s) to execute
2021-11-01 02:34:26.160027 I | auth: deleting token XdiKEKnbgLNcHJOH.1075 for user conductor
2021-11-01 02:34:26.160115 I | auth: deleting token xjZVUMPvuXUtjhaR.1077 for user conductor
2021-11-01 02:34:26.654620 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.398481967s) to execute
2021-11-01 02:34:28.551819 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:28.554370 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.403580803s) to execute
2021-11-01 02:34:29.160125 I | auth: deleting token kCFfxXQAKKObLInH.1076 for user conductor
2021-11-01 02:34:29.160233 I | auth: deleting token FXLFLpUXecBltgnm.1074 for user conductor
2021-11-01 02:34:29.160254 I | auth: deleting token gFRIsHDHaoxZDyor.1078 for user conductor
2021-11-01 02:34:29.160358 I | auth: deleting token QxpHFeqpCbnwkfJP.1080 for user conductor
2021-11-01 02:34:29.160370 I | auth: deleting token LrmmRlFoKxiemHjf.1079 for user conductor
2021-11-01 02:34:31.155480 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.502623897s) to execute
2021-11-01 02:34:31.155638 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.599189485s) to execute
2021-11-01 02:34:31.250431 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.599159797s) to execute
2021-11-01 02:34:33.552265 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:37.250465 I | auth: deleting token SVTSOoByxFcmGjZV.1081 for user conductor
2021-11-01 02:34:38.552560 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:42.159973 I | auth: deleting token KZUhbDVLwyMkHfHW.1082 for user conductor
2021-11-01 02:34:43.060073 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (9.107898321s) to execute
2021-11-01 02:34:43.250452 I | auth: deleting token gtjPaHThjCHpRlBr.1083 for user conductor
2021-11-01 02:34:43.250514 I | auth: deleting token YuQyuoekpUFQlpTC.1084 for user conductor
2021-11-01 02:34:43.250538 I | auth: deleting token dRzhJecQkRrllwUs.1085 for user conductor
2021-11-01 02:34:43.252136 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.568843ms) to execute
2021-11-01 02:34:43.253836 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (103.200813ms) to execute
2021-11-01 02:34:43.254100 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (103.250234ms) to execute
2021-11-01 02:34:43.552858 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:45.160105 I | auth: deleting token HHHyQlRbNuzyVQAD.1086 for user conductor
2021-11-01 02:34:46.250413 I | auth: deleting token rnHueNseyoxVxVyA.1088 for user conductor
2021-11-01 02:34:46.250460 I | auth: deleting token XwuUOfCvXOwyWYOt.1087 for user conductor
2021-11-01 02:34:47.250648 I | auth: deleting token YEWRhqAuAgpmbMby.1089 for user conductor
2021-11-01 02:34:48.550593 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.910540702s) to execute
2021-11-01 02:34:48.553158 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:49.160124 I | auth: deleting token vCCCqlBWdfmbwZCj.1090 for user conductor
2021-11-01 02:34:50.856467 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.216578586s) to execute
2021-11-01 02:34:50.856617 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.303641952s) to execute
2021-11-01 02:34:51.160093 I | auth: deleting token mGFgruHdKFQBRebt.1091 for user conductor
2021-11-01 02:34:52.250394 I | auth: deleting token KvoIZnZRaUNaNyHm.1092 for user conductor
2021-11-01 02:34:53.253951 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.603373161s) to execute
2021-11-01 02:34:53.553411 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:34:58.553701 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:00.154360 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.416032705s) to execute
2021-11-01 02:35:00.160089 I | auth: deleting token GbsBjOVjtpvXHgiN.1093 for user conductor
2021-11-01 02:35:00.160118 I | auth: deleting token MVtJXlTmNAMCoAZQ.1096 for user conductor
2021-11-01 02:35:00.160132 I | auth: deleting token MYAkmhIVyvGYpizA.1097 for user conductor
2021-11-01 02:35:00.160141 I | auth: deleting token aiZfDVhgulfeAdBV.1095 for user conductor
2021-11-01 02:35:00.160147 I | auth: deleting token qSfqyEmTizOVZamF.1098 for user conductor
2021-11-01 02:35:02.751856 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.213685815s) to execute
2021-11-01 02:35:03.160052 I | auth: deleting token pQFapfMtsMXbXwAD.1101 for user conductor
2021-11-01 02:35:03.160369 I | auth: deleting token YpjMsiYOBlALPOZj.1099 for user conductor
2021-11-01 02:35:03.160612 I | auth: deleting token YpZWrzBvaCWjRtpG.1100 for user conductor
2021-11-01 02:35:03.160797 I | auth: deleting token CatrqTStaoDCFHfb.1102 for user conductor
2021-11-01 02:35:03.161025 I | auth: deleting token ixPmRegiaBxnynsh.1094 for user conductor
2021-11-01 02:35:03.553978 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:05.153194 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (714.829211ms) to execute
2021-11-01 02:35:06.160233 I | auth: deleting token QgUPmijlvPAvmFph.1103 for user conductor
2021-11-01 02:35:08.554183 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:12.851940 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (801.049823ms) to execute
2021-11-01 02:35:13.554392 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:15.151787 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.700323286s) to execute
2021-11-01 02:35:15.160105 I | auth: deleting token MOGIapXOMNimvBQC.1107 for user conductor
2021-11-01 02:35:15.160157 I | auth: deleting token poKRnrNiGQlGYXjR.1105 for user conductor
2021-11-01 02:35:15.160169 I | auth: deleting token JiBJYQSDPTXqsbjp.1111 for user conductor
2021-11-01 02:35:15.160183 I | auth: deleting token lMHrmBsYkczFpoOf.1106 for user conductor
2021-11-01 02:35:15.160193 I | auth: deleting token zbDoITtDdKraeEOQ.1104 for user conductor
2021-11-01 02:35:15.160208 I | auth: deleting token wDMYtvdQsAebXfiH.1109 for user conductor
2021-11-01 02:35:15.160220 I | auth: deleting token XqNlhFbDZOOVCYsZ.1108 for user conductor
2021-11-01 02:35:15.160233 I | auth: deleting token jdfrthgGeuFuCmJH.1110 for user conductor
2021-11-01 02:35:15.160247 I | auth: deleting token yptWEmNirsKoZYCd.1112 for user conductor
2021-11-01 02:35:18.160119 I | auth: deleting token vsBtXFEZwThPpCJW.1116 for user conductor
2021-11-01 02:35:18.160187 I | auth: deleting token ahBSDukbxMPddHka.1113 for user conductor
2021-11-01 02:35:18.160214 I | auth: deleting token GeBAsSenGttiECuB.1115 for user conductor
2021-11-01 02:35:18.554662 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:21.160100 I | auth: deleting token fscYfOYmmOPLhVpo.1117 for user conductor
2021-11-01 02:35:21.160145 I | auth: deleting token FrXrwBVrxyQEBQGR.1118 for user conductor
2021-11-01 02:35:23.555081 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:26.152652 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.301911316s) to execute
2021-11-01 02:35:28.059739 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.721701357s) to execute
2021-11-01 02:35:28.074134 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.823418407s) to execute
2021-11-01 02:35:28.152906 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.902088886s) to execute
2021-11-01 02:35:28.251068 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (176.839326ms) to execute
2021-11-01 02:35:28.555436 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:29.160154 I | auth: deleting token vmZNkkkLjbnZfiQo.1123 for user conductor
2021-11-01 02:35:29.160231 I | auth: deleting token kLoZvjhiKANFYCzs.1124 for user conductor
2021-11-01 02:35:29.160249 I | auth: deleting token QRnMCVwIPjoLmfZm.1122 for user conductor
2021-11-01 02:35:29.160273 I | auth: deleting token RrTFAOTsDPyIFFXo.1119 for user conductor
2021-11-01 02:35:29.160285 I | auth: deleting token yUQJtkLpOJESlYrF.1125 for user conductor
2021-11-01 02:35:29.160295 I | auth: deleting token IuhizHqhirznGhYA.1121 for user conductor
2021-11-01 02:35:29.160306 I | auth: deleting token CZJSESlbITwmCkOf.1120 for user conductor
2021-11-01 02:35:30.452053 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.101297324s) to execute
2021-11-01 02:35:33.555699 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:34.160073 I | auth: deleting token KegmTxbpfuCpTbaq.1126 for user conductor
2021-11-01 02:35:34.160144 I | auth: deleting token jnTTBEkIBglXPmMk.1127 for user conductor
2021-11-01 02:35:36.650499 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.10516403s) to execute
2021-11-01 02:35:38.555979 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:42.160032 I | auth: deleting token VpPLvWtEgIFBonBA.1129 for user conductor
2021-11-01 02:35:42.160084 I | auth: deleting token EEMdDXWkyrLiEugF.1131 for user conductor
2021-11-01 02:35:42.160103 I | auth: deleting token zPxSfdYCneopOTUS.1130 for user conductor
2021-11-01 02:35:42.160113 I | auth: deleting token DyfqQFytBISSLQFv.1128 for user conductor
2021-11-01 02:35:43.556437 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:44.153940 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.803343548s) to execute
2021-11-01 02:35:44.351992 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (101.337481ms) to execute
2021-11-01 02:35:44.352141 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.41366ms) to execute
2021-11-01 02:35:44.539548 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (186.042733ms) to execute
2021-11-01 02:35:45.160138 I | auth: deleting token FnKidrEquRoYrbhp.1133 for user conductor
2021-11-01 02:35:46.160143 I | auth: deleting token WOkqcaKWZwdeYfvk.1132 for user conductor
2021-11-01 02:35:46.160227 I | auth: deleting token jZuiuxAojPNqvhHn.1134 for user conductor
2021-11-01 02:35:47.158076 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.306026492s) to execute
2021-11-01 02:35:48.650409 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:49.160366 I | auth: deleting token wtFeiIDBDDvxtpAp.1137 for user conductor
2021-11-01 02:35:49.160522 I | auth: deleting token rRKSVEqNUiRwWHfB.1136 for user conductor
2021-11-01 02:35:49.854458 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601113382s) to execute
2021-11-01 02:35:51.160100 I | auth: deleting token klqCOsFYBnuFcxpZ.1140 for user conductor
2021-11-01 02:35:51.160175 I | auth: deleting token roZPotIvxhEfulit.1141 for user conductor
2021-11-01 02:35:51.160189 I | auth: deleting token sZiOcVflKHSnrWjO.1139 for user conductor
2021-11-01 02:35:51.160213 I | auth: deleting token kbXhhbXuOZWUDrZD.1138 for user conductor
2021-11-01 02:35:53.250502 I | auth: deleting token aGcBykKfMxaWwEDa.1143 for user conductor
2021-11-01 02:35:53.650735 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:54.957290 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.317236504s) to execute
2021-11-01 02:35:55.160164 I | auth: deleting token UsBigmkcbdWMPtVG.1144 for user conductor
2021-11-01 02:35:56.160101 I | auth: deleting token tGumPQhhsiSDiBSx.1145 for user conductor
2021-11-01 02:35:58.651077 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:35:58.653273 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.201542218s) to execute
2021-11-01 02:36:00.659306 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.002128019s) to execute
2021-11-01 02:36:03.651362 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:04.160140 I | auth: deleting token rHbRVErOJvBioiid.1146 for user conductor
2021-11-01 02:36:04.160210 I | auth: deleting token uZUAEBbROhZiuPQZ.1152 for user conductor
2021-11-01 02:36:04.160230 I | auth: deleting token KnzIilBSmziuFRBB.1151 for user conductor
2021-11-01 02:36:04.160249 I | auth: deleting token dXjmczdmnVpjlVfs.1150 for user conductor
2021-11-01 02:36:04.160269 I | auth: deleting token JBBmjzzpVHvJlrnZ.1148 for user conductor
2021-11-01 02:36:04.160300 I | auth: deleting token AhnPnZfXfiRwRnko.1147 for user conductor
2021-11-01 02:36:04.160321 I | auth: deleting token VvENRgChaOwzzJeh.1153 for user conductor
2021-11-01 02:36:04.160342 I | auth: deleting token dDuvOBjsWqrvNDfM.1149 for user conductor
2021-11-01 02:36:06.160062 I | auth: deleting token WtXSlKEQximASbMx.1154 for user conductor
2021-11-01 02:36:06.351754 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.513291422s) to execute
2021-11-01 02:36:07.160232 I | auth: deleting token dBmUtcVduRsztFQw.1155 for user conductor
2021-11-01 02:36:08.651870 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:09.160122 I | auth: deleting token HatILGoiKdjKchWt.1156 for user conductor
2021-11-01 02:36:10.160108 I | auth: deleting token FHDUgzsLHVTVRuzS.1157 for user conductor
2021-11-01 02:36:12.250486 I | auth: deleting token CGkZHShwqYYjfpgR.1158 for user conductor
2021-11-01 02:36:13.652258 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:18.652374 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:21.260540 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.307678788s) to execute
2021-11-01 02:36:23.652604 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:23.654464 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.301617269s) to execute
2021-11-01 02:36:23.654614 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.303897943s) to execute
2021-11-01 02:36:23.654698 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.303965704s) to execute
2021-11-01 02:36:23.752215 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.401296834s) to execute
2021-11-01 02:36:24.160156 I | auth: deleting token dxFQEUCADmeVAmVn.1159 for user conductor
2021-11-01 02:36:27.245809 I | auth: deleting token gfkKaUBSOlfdCqmP.1162 for user conductor
2021-11-01 02:36:27.245851 I | auth: deleting token xlFfMfdPLpikjVqy.1160 for user conductor
2021-11-01 02:36:27.245860 I | auth: deleting token awQNnTXhJbNSgccC.1161 for user conductor
2021-11-01 02:36:27.245866 I | auth: deleting token ZDIQfljgMVwIqjMz.1164 for user conductor
2021-11-01 02:36:27.245877 I | auth: deleting token VdhygbWNmWTvIkZD.1163 for user conductor
2021-11-01 02:36:28.652830 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:28.851828 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.699375014s) to execute
2021-11-01 02:36:31.457521 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.004904219s) to execute
2021-11-01 02:36:33.653166 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:33.754063 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.203422671s) to execute
2021-11-01 02:36:35.957271 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.184856624s) to execute
2021-11-01 02:36:38.160158 I | auth: deleting token SGIDjIMQVKeUSDwK.1166 for user conductor
2021-11-01 02:36:38.160331 I | auth: deleting token fZozZKyheogUJHXE.1173 for user conductor
2021-11-01 02:36:38.160387 I | auth: deleting token LCRWaFOKwTSSDKWW.1174 for user conductor
2021-11-01 02:36:38.160463 I | auth: deleting token jPvNseJoIroZexTo.1171 for user conductor
2021-11-01 02:36:38.160527 I | auth: deleting token ymhOrbnemjGJbMYl.1167 for user conductor
2021-11-01 02:36:38.160649 I | auth: deleting token bLqDGUxvWpUkCMpm.1169 for user conductor
2021-11-01 02:36:38.160776 I | auth: deleting token bpweLOHSTIalsRzN.1165 for user conductor
2021-11-01 02:36:38.160852 I | auth: deleting token SIxaYQudiGJxeUpn.1172 for user conductor
2021-11-01 02:36:38.160900 I | auth: deleting token VZzyFPXmUbbSuNYT.1168 for user conductor
2021-11-01 02:36:38.160946 I | auth: deleting token SiLLcXySCHjHsRRn.1170 for user conductor
2021-11-01 02:36:38.653854 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:38.853993 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.803354458s) to execute
2021-11-01 02:36:38.854100 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.097669817s) to execute
2021-11-01 02:36:40.160077 I | auth: deleting token ALoWqweDvefzaohO.1175 for user conductor
2021-11-01 02:36:41.250510 I | auth: deleting token ipUjLOtiDuGeORej.1177 for user conductor
2021-11-01 02:36:41.255196 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.202476676s) to execute
2021-11-01 02:36:41.255615 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.303393286s) to execute
2021-11-01 02:36:41.256019 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.381374447s) to execute
2021-11-01 02:36:43.160075 I | auth: deleting token eCItVUjGhpusONEs.1179 for user conductor
2021-11-01 02:36:43.160163 I | auth: deleting token lBEsxkkwIbhrgjQX.1178 for user conductor
2021-11-01 02:36:43.654368 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:44.154412 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.803708012s) to execute
2021-11-01 02:36:44.154617 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.703859303s) to execute
2021-11-01 02:36:44.154975 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.516692953s) to execute
2021-11-01 02:36:46.652457 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.398682215s) to execute
2021-11-01 02:36:46.652746 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.207072581s) to execute
2021-11-01 02:36:47.160157 I | auth: deleting token ldRXbaBXyfWCvdLm.1183 for user conductor
2021-11-01 02:36:47.160215 I | auth: deleting token hyoGAVOokugUaBSm.1181 for user conductor
2021-11-01 02:36:47.160236 I | auth: deleting token sevYvkXGStyLemia.1180 for user conductor
2021-11-01 02:36:47.160253 I | auth: deleting token gmTquIOMndZOkxQU.1184 for user conductor
2021-11-01 02:36:48.160099 I | auth: deleting token GdVqhBFlBIIiHvvt.1182 for user conductor
2021-11-01 02:36:48.160164 I | auth: deleting token hTWXFngsfZcXRDGW.1185 for user conductor
2021-11-01 02:36:48.654804 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:50.250391 I | auth: deleting token RNkaAVXxBleovPzm.1186 for user conductor
2021-11-01 02:36:50.250451 I | auth: deleting token NBMHcKFcRFyanQLF.1187 for user conductor
2021-11-01 02:36:51.053649 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.415532595s) to execute
2021-11-01 02:36:51.238558 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (178.865151ms) to execute
2021-11-01 02:36:52.160019 I | auth: deleting token keKQMqjXOqNuRVmk.1190 for user conductor
2021-11-01 02:36:52.160097 I | auth: deleting token TTCIFXynXtruYYgf.1189 for user conductor
2021-11-01 02:36:52.160116 I | auth: deleting token puSFKrXAzRqqGcLI.1188 for user conductor
2021-11-01 02:36:53.250536 I | auth: deleting token rNFwHgkwfsrjGHYI.1191 for user conductor
2021-11-01 02:36:53.652216 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.113817847s) to execute
2021-11-01 02:36:53.655134 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:36:56.151123 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (912.711628ms) to execute
2021-11-01 02:36:56.250435 I | auth: deleting token ZNKogIiPuFWGYMcY.1193 for user conductor
2021-11-01 02:36:56.250507 I | auth: deleting token nOmPLdlTAWtyfdRQ.1192 for user conductor
2021-11-01 02:36:58.655449 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:00.850398 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.5027673s) to execute
2021-11-01 02:37:01.250661 I | auth: deleting token UFUOixOPBRmtncyY.1195 for user conductor
2021-11-01 02:37:01.250734 I | auth: deleting token KGrlTJGLTAaNLzqC.1197 for user conductor
2021-11-01 02:37:01.250757 I | auth: deleting token sSJbTWIaQhKErLwb.1198 for user conductor
2021-11-01 02:37:03.154565 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.301928944s) to execute
2021-11-01 02:37:03.154810 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.302101595s) to execute
2021-11-01 02:37:03.154954 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.301348808s) to execute
2021-11-01 02:37:03.155065 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.704433068s) to execute
2021-11-01 02:37:03.160072 I | auth: deleting token khlHKNXVSePqjOaQ.1194 for user conductor
2021-11-01 02:37:03.160120 I | auth: deleting token YFBJoHasveSXxqwD.1196 for user conductor
2021-11-01 02:37:03.655953 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:06.160110 I | auth: deleting token qspMsQEcoBNOuRvh.1199 for user conductor
2021-11-01 02:37:08.656228 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:08.752659 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.213780213s) to execute
2021-11-01 02:37:09.160192 I | auth: deleting token YXkXkjWRRrUqZqZm.1200 for user conductor
2021-11-01 02:37:11.160199 I | auth: deleting token SEMSvnzJJnvRnYnh.1201 for user conductor
2021-11-01 02:37:13.656499 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:14.160079 I | auth: deleting token iVtoyCFGoxIGDeUG.1202 for user conductor
2021-11-01 02:37:14.160166 I | auth: deleting token NPZJPyWPsVxHLyMU.1204 for user conductor
2021-11-01 02:37:16.160134 I | auth: deleting token kDnycIZzBgOiCYBV.1206 for user conductor
2021-11-01 02:37:16.160180 I | auth: deleting token rvNtFllBOKGiuVCk.1207 for user conductor
2021-11-01 02:37:16.160206 I | auth: deleting token CUeuLkJdnbQQvoVg.1208 for user conductor
2021-11-01 02:37:16.160215 I | auth: deleting token HQRcyDejMNbLZGCV.1203 for user conductor
2021-11-01 02:37:16.160222 I | auth: deleting token MmAfbdZtNeCTIAXT.1205 for user conductor
2021-11-01 02:37:18.656874 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:20.160165 I | auth: deleting token xtFwpafBhBahxQnr.1211 for user conductor
2021-11-01 02:37:20.160269 I | auth: deleting token ZOrKKnNEtTWNGWUk.1209 for user conductor
2021-11-01 02:37:23.160137 I | auth: deleting token nHhwfhrUPxfzNhwM.1210 for user conductor
2021-11-01 02:37:23.657143 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:25.160154 I | auth: deleting token TDYZIrDJhLHxnPnc.1212 for user conductor
2021-11-01 02:37:25.160233 I | auth: deleting token kKHHQmGMJuQiRTDY.1213 for user conductor
2021-11-01 02:37:28.160104 I | auth: deleting token wopSwOoMeWKCFpba.1214 for user conductor
2021-11-01 02:37:28.160175 I | auth: deleting token iODtNLbaSAlIdDgH.1215 for user conductor
2021-11-01 02:37:28.160211 I | auth: deleting token SZJskduzSUHlKVgr.1216 for user conductor
2021-11-01 02:37:28.160224 I | auth: deleting token uUezJdZJpoVivrTC.1217 for user conductor
2021-11-01 02:37:28.750433 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:29.152186 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.613757034s) to execute
2021-11-01 02:37:29.338983 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (183.775368ms) to execute
2021-11-01 02:37:31.250514 I | auth: deleting token DJZLNcspNLgEnezG.1219 for user conductor
2021-11-01 02:37:31.250591 I | auth: deleting token diEdwzzcsLjcHmXD.1218 for user conductor
2021-11-01 02:37:31.451145 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.298587696s) to execute
2021-11-01 02:37:33.750765 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:34.060249 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.409723793s) to execute
2021-11-01 02:37:34.160119 I | auth: deleting token cFuJJbihnhzaNTYJ.1221 for user conductor
2021-11-01 02:37:34.160182 I | auth: deleting token CZYjKoYWUCHLupss.1222 for user conductor
2021-11-01 02:37:34.250921 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (100.039109ms) to execute
2021-11-01 02:37:38.160226 I | auth: deleting token ZxFZGrJDpbHiOQGe.1224 for user conductor
2021-11-01 02:37:38.160311 I | auth: deleting token DdxcNAxvMaIkswfZ.1226 for user conductor
2021-11-01 02:37:38.160330 I | auth: deleting token FdzVRFjQHeUvNaxc.1223 for user conductor
2021-11-01 02:37:38.160344 I | auth: deleting token vUzWykCrgjewEihP.1220 for user conductor
2021-11-01 02:37:38.160360 I | auth: deleting token cMxSysufaazifjSL.1225 for user conductor
2021-11-01 02:37:38.751019 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:43.250543 I | auth: deleting token zkeToRqEJfyrkVkY.1227 for user conductor
2021-11-01 02:37:43.250643 I | auth: deleting token bclnPkJBcLldphYG.1228 for user conductor
2021-11-01 02:37:43.751264 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:45.160139 I | auth: deleting token CapMtMrfMkaartGA.1232 for user conductor
2021-11-01 02:37:45.160193 I | auth: deleting token JzPFLERSaRLLteHW.1229 for user conductor
2021-11-01 02:37:45.160236 I | auth: deleting token KyDhhWpqKEkuPAsM.1231 for user conductor
2021-11-01 02:37:45.160248 I | auth: deleting token KALsKPTcIAUqMZmz.1230 for user conductor
2021-11-01 02:37:45.954082 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.915637904s) to execute
2021-11-01 02:37:48.055355 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.31727789s) to execute
2021-11-01 02:37:48.751509 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:50.757030 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.606456223s) to execute
2021-11-01 02:37:51.250586 I | auth: deleting token ARBuhksCOtKGcVrn.1233 for user conductor
2021-11-01 02:37:51.250649 I | auth: deleting token AmcWFwhcxXBdQePS.1234 for user conductor
2021-11-01 02:37:51.250672 I | auth: deleting token OJkGexWhmEAsabyk.1236 for user conductor
2021-11-01 02:37:51.250687 I | auth: deleting token ciUFpjNePgPfIXbl.1235 for user conductor
2021-11-01 02:37:53.053637 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.293308422s) to execute
2021-11-01 02:37:53.751698 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:37:54.160104 I | auth: deleting token dgNOCgynrjjbcrHh.1240 for user conductor
2021-11-01 02:37:54.160164 I | auth: deleting token AjrLqekFRtLzbKof.1238 for user conductor
2021-11-01 02:37:54.160186 I | auth: deleting token PbsDwETjbxPlCcSj.1237 for user conductor
2021-11-01 02:37:54.160198 I | auth: deleting token CzQmEqGuKFRcwiIO.1239 for user conductor
2021-11-01 02:37:56.160246 I | auth: deleting token XEFgBBPVnxbRAhvb.1243 for user conductor
2021-11-01 02:37:56.160317 I | auth: deleting token aDIhSjpqjfAvHiBL.1241 for user conductor
2021-11-01 02:37:56.160330 I | auth: deleting token gqjXQTzluzMGZGhX.1242 for user conductor
2021-11-01 02:37:57.160181 I | auth: deleting token pQoHDTlHOdsJHhBv.1244 for user conductor
2021-11-01 02:37:58.160031 I | auth: deleting token KMMWEMQixZmxjNpe.1245 for user conductor
2021-11-01 02:37:58.752522 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:38:00.250410 I | auth: deleting token ayuAJsaTtcYIwXdz.1246 for user conductor
2021-11-01 02:38:00.451879 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.298378104s) to execute
2021-11-01 02:38:00.452386 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.301632508s) to execute
2021-11-01 02:38:02.951771 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.401082572s) to execute
2021-11-01 02:38:03.752723 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:38:05.160136 I | auth: deleting token nfSFddrOLerbsefB.1249 for user conductor
2021-11-01 02:38:05.160214 I | auth: deleting token mOyOaaKtwmXrREIT.1247 for user conductor
2021-11-01 02:38:05.160241 I | auth: deleting token cwMvUGijyKAglChQ.1251 for user conductor
2021-11-01 02:38:05.160253 I | auth: deleting token PscaQoFMqdQnaxji.1250 for user conductor
2021-11-01 02:38:05.160284 I | auth: deleting token JjlQJUlvAQKFpfFm.1248 for user conductor
2021-11-01 02:38:06.160205 I | auth: deleting token vdUpITOZQqGCcDPL.1252 for user conductor
2021-11-01 02:38:07.160004 I | auth: deleting token CcVWbdxoqjJcPpwO.1253 for user conductor
2021-11-01 02:38:07.857769 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.004692664s) to execute
2021-11-01 02:38:08.038222 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (176.354538ms) to execute
2021-11-01 02:38:08.753056 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:38:09.160146 I | auth: deleting token AMVdNXJZLZyZpYIA.1254 for user conductor
2021-11-01 02:38:10.160072 I | auth: deleting token ZeBhgFSkaUYhfaGr.1255 for user conductor
2021-11-01 02:38:13.753404 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:38:18.160079 I | auth: deleting token VCEgIScxopVlkPAg.1258 for user conductor
2021-11-01 02:38:18.160136 I | auth: deleting token lgrBnOSZtcMicRBr.1256 for user conductor
2021-11-01 02:38:18.160156 I | auth: deleting token beBgeavIsIfgMECQ.1259 for user conductor
2021-11-01 02:38:18.753717 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:38:20.160113 I | auth: deleting token MKNdcPsdrfQSNugI.1260 for user conductor
2021-11-01 02:38:20.160179 I | auth: deleting token nfRvmHHZTXgwkaGO.1257 for user conductor
2021-11-01 02:38:20.160197 I | auth: deleting token YAluCXIACzGXPprs.1263 for user conductor
2021-11-01 02:38:20.160215 I | auth: deleting token ZubVHYqTICXJuqJX.1262 for user conductor
2021-11-01 02:38:21.250825 I | auth: deleting token CHWIDOuamudAXdKT.1261 for user conductor
2021-11-01 02:38:21.250888 I | auth: deleting token VKkhPbKjUvnectnX.1264 for user conductor
2021-11-01 02:38:21.956943 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.006313788s) to execute
2021-11-01 02:38:23.160057 I | auth: deleting token MlZeuYnLRzHuqpsI.1265 for user conductor
2021-11-01 02:38:23.160271 I | auth: deleting token UozirSOmMwKFDZCA.1266 for user conductor
2021-11-01 02:38:23.160536 I | auth: deleting token iojlUSUGxSfVLDaz.1267 for user conductor
2021-11-01 02:38:23.753924 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:38:24.160055 I | auth: deleting token tcuggKuLnGKpaFrf.1268 for user conductor
2021-11-01 02:38:24.555957 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.403809275s) to execute
2021-11-01 02:38:24.556148 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.583744681s) to execute
2021-11-01 02:38:24.556304 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.581739544s) to execute
2021-11-01 02:38:27.053953 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.30214204s) to execute
2021-11-01 02:38:27.054338 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.403683729s) to execute
2021-11-01 02:38:28.160048 I | auth: deleting token dxwrilJPyFRgSUxm.1270 for user conductor
2021-11-01 02:38:28.160159 I | auth: deleting token NHbbFKRWbUbKfgvC.1272 for user conductor
2021-11-01 02:38:28.250502 I | auth: deleting token GunXsCgGxvFLNbRa.1269 for user conductor
2021-11-01 02:38:28.250645 I | auth: deleting token YkgZeODsJIboMvSb.1271 for user conductor
2021-11-01 02:38:28.754155 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:38:29.751067 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.694173422s) to execute
2021-11-01 02:38:29.751172 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.493044962s) to execute
2021-11-01 02:38:31.160148 I | auth: deleting token YBeiMvhyQwpGShrE.1274 for user conductor
2021-11-01 02:38:31.160198 I | auth: deleting token mMIAiIqtdfqevkMB.1273 for user conductor
2021-11-01 02:38:32.751758 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.598089509s) to execute
2021-11-01 02:38:32.751898 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.996943684s) to execute
2021-11-01 02:38:33.754473 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:38:35.160117 I | auth: deleting token VmolsIUaYYZzkjzn.1279 for user conductor
2021-11-01 02:38:35.160189 I | auth: deleting token KXRlidTAvXbRlhnd.1280 for user conductor
2021-11-01 02:38:35.160208 I | auth: deleting token EWIiKgxJYmcgSUQB.1275 for user conductor
2021-11-01 02:38:35.160235 I | auth: deleting token PdKFkAdOmabGXyNA.1278 for user conductor
2021-11-01 02:38:35.160242 I | auth: deleting token fXtKJyXhEMzJFCvO.1277 for user conductor
2021-11-01 02:38:35.160249 I | auth: deleting token XWqMIGhZBCpyRoFM.1276 for user conductor
2021-11-01 02:38:35.854850 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.100335741s) to execute
2021-11-01 02:38:38.160024 I | auth: deleting token ujSBXCmiBvreSyRR.1282 for user conductor
2021-11-01 02:38:38.160102 I | auth: deleting token RODLCBxSuFaAaqCj.1281 for user conductor
2021-11-01 02:38:38.460842 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.705895334s) to execute
2021-11-01 02:38:38.754715 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:38:39.160169 I | auth: deleting token xNuLwhlTGcAxxtPN.1283 for user conductor
2021-11-01 02:38:40.956419 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.005658964s) to execute
2021-11-01 02:38:41.050312 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (5.099715031s) to execute
2021-11-01 02:38:41.160106 I | auth: deleting token rFUQTyOKUJshHYoe.1284 for user conductor
2021-11-01 02:38:41.160178 I | auth: deleting token sSEwEUHaqniVAyHd.1285 for user conductor
2021-11-01 02:38:43.754969 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:38:44.056588 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.005832602s) to execute
2021-11-01 02:38:44.072985 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.022005832s) to execute
2021-11-01 02:38:44.150456 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.922586377s) to execute
2021-11-01 02:38:46.554519 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.402341997s) to execute
2021-11-01 02:38:48.755548 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:38:48.760911 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.110309845s) to execute
2021-11-01 02:38:48.761078 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.20406607s) to execute
2021-11-01 02:38:51.055244 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.101469033s) to execute
2021-11-01 02:38:51.055551 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.104658688s) to execute
2021-11-01 02:38:51.159997 I | auth: deleting token tGmdjSGRWAzWPZTE.1290 for user conductor
2021-11-01 02:38:51.160046 I | auth: deleting token VczEKfsLmrDsMQFo.1286 for user conductor
2021-11-01 02:38:51.160059 I | auth: deleting token pAQCuouKemiUYzPG.1288 for user conductor
2021-11-01 02:38:51.160066 I | auth: deleting token FSgvuQidCAvrAlmD.1289 for user conductor
2021-11-01 02:38:51.160073 I | auth: deleting token muAWSNKJASIAryLL.1287 for user conductor
2021-11-01 02:38:53.850595 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:38:53.858266 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.61994157s) to execute
2021-11-01 02:38:53.858563 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.800827958s) to execute
2021-11-01 02:38:56.160050 I | auth: deleting token JHqpvjpaNncCUlJt.1294 for user conductor
2021-11-01 02:38:56.160129 I | auth: deleting token ecJtquiLduBvyURG.1293 for user conductor
2021-11-01 02:38:56.160146 I | auth: deleting token UalhiqyAgFzYcZUA.1292 for user conductor
2021-11-01 02:38:56.160159 I | auth: deleting token cHFvlwbwZgxYwzeF.1291 for user conductor
2021-11-01 02:38:57.355878 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.315195532s) to execute
2021-11-01 02:38:58.850797 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:01.160067 I | auth: deleting token kfCIbrPgoDbRaieG.1297 for user conductor
2021-11-01 02:39:01.160124 I | auth: deleting token WKskQIaENZIQtTgk.1299 for user conductor
2021-11-01 02:39:01.160150 I | auth: deleting token RCDKZcffhIxoEGXT.1298 for user conductor
2021-11-01 02:39:01.160162 I | auth: deleting token cPsKSkAmQUdCgbiM.1300 for user conductor
2021-11-01 02:39:01.160173 I | auth: deleting token HysTFtMunDjRABzz.1296 for user conductor
2021-11-01 02:39:02.160089 I | auth: deleting token fVZeoBDyvgDOKWSb.1302 for user conductor
2021-11-01 02:39:02.656196 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.217898206s) to execute
2021-11-01 02:39:03.851075 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:05.655214 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.998799036s) to execute
2021-11-01 02:39:05.655667 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.997059657s) to execute
2021-11-01 02:39:06.138277 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (465.925798ms) to execute
2021-11-01 02:39:06.140415 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (200.107307ms) to execute
2021-11-01 02:39:06.140527 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (389.653664ms) to execute
2021-11-01 02:39:07.160049 I | auth: deleting token HhhxFlOsmyUYOXqb.1306 for user conductor
2021-11-01 02:39:07.160107 I | auth: deleting token UWXTAKwqOWhQiqKO.1303 for user conductor
2021-11-01 02:39:07.160116 I | auth: deleting token rcpElRvzhdxKVdLF.1305 for user conductor
2021-11-01 02:39:08.555990 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.305391802s) to execute
2021-11-01 02:39:08.851310 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:10.250451 I | auth: deleting token XreiHNBZcUzbAbKw.1309 for user conductor
2021-11-01 02:39:10.250495 I | auth: deleting token RnuCngxyDhWiFygb.1304 for user conductor
2021-11-01 02:39:10.250504 I | auth: deleting token NPyHBjCtuLiMOyXY.1307 for user conductor
2021-11-01 02:39:10.250517 I | auth: deleting token aOUyvTKmggrBffvH.1308 for user conductor
2021-11-01 02:39:10.250523 I | auth: deleting token mHUWgspGhIjkMoGz.1310 for user conductor
2021-11-01 02:39:10.852683 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.102074139s) to execute
2021-11-01 02:39:11.138273 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (195.944868ms) to execute
2021-11-01 02:39:13.851632 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:13.853572 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.102915063s) to execute
2021-11-01 02:39:17.160205 I | auth: deleting token SAOxdgIdSklPLlJF.1315 for user conductor
2021-11-01 02:39:17.160273 I | auth: deleting token yijqqQQpZwLmscqr.1312 for user conductor
2021-11-01 02:39:17.160289 I | auth: deleting token jfaXxqADeDEDNUKV.1314 for user conductor
2021-11-01 02:39:18.852225 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:19.160073 I | auth: deleting token bydKxbnzCdteCfwF.1311 for user conductor
2021-11-01 02:39:19.160121 I | auth: deleting token hlTiqsihaSqWIDcH.1313 for user conductor
2021-11-01 02:39:21.250554 I | auth: deleting token qTYWIokAhvYsXOnU.1316 for user conductor
2021-11-01 02:39:22.052289 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (901.601927ms) to execute
2021-11-01 02:39:22.160060 I | auth: deleting token yXNBYuhxHZQzzfgf.1317 for user conductor
2021-11-01 02:39:22.160112 I | auth: deleting token vidxHfkigijduZoX.1318 for user conductor
2021-11-01 02:39:23.852402 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:28.852588 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:29.250540 I | auth: deleting token XpYAWEibapCaUGzn.1320 for user conductor
2021-11-01 02:39:29.250613 I | auth: deleting token uKbYFKZPgiatmycd.1321 for user conductor
2021-11-01 02:39:31.160102 I | auth: deleting token iEVvEfSfoIiiMpHg.1319 for user conductor
2021-11-01 02:39:31.160158 I | auth: deleting token yRrdvJTkGLEbNeJs.1323 for user conductor
2021-11-01 02:39:31.160182 I | auth: deleting token dYKkrvMWhNMSAhJV.1324 for user conductor
2021-11-01 02:39:32.248588 I | auth: deleting token oygCwFhHCmJToZQZ.1325 for user conductor
2021-11-01 02:39:32.248657 I | auth: deleting token xTAWluPallWQhVhg.1322 for user conductor
2021-11-01 02:39:32.854572 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.702266746s) to execute
2021-11-01 02:39:33.852976 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:38.853136 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:43.160036 I | auth: deleting token SjnILoamjcMppufJ.1331 for user conductor
2021-11-01 02:39:43.160108 I | auth: deleting token ShxSXyDLejZZNXNY.1326 for user conductor
2021-11-01 02:39:43.853717 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:44.250473 I | auth: deleting token rPvBGAIuRwVpIVpT.1328 for user conductor
2021-11-01 02:39:44.250548 I | auth: deleting token wJQHVbjhQNtOVQOY.1327 for user conductor
2021-11-01 02:39:44.250563 I | auth: deleting token XFpBiPxCFmDEvJjW.1330 for user conductor
2021-11-01 02:39:44.250581 I | auth: deleting token CuAKvpQFXsndoejX.1329 for user conductor
2021-11-01 02:39:45.851437 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (9.896713728s) to execute
2021-11-01 02:39:48.355710 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.501657358s) to execute
2021-11-01 02:39:48.355910 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.501781777s) to execute
2021-11-01 02:39:48.853902 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:49.160030 I | auth: deleting token nNeIIHiqOTezzmqW.1335 for user conductor
2021-11-01 02:39:49.160112 I | auth: deleting token NIKvjlePeePHFiPf.1332 for user conductor
2021-11-01 02:39:49.160149 I | auth: deleting token xwIOOdTHNQNtFzxu.1333 for user conductor
2021-11-01 02:39:49.160164 I | auth: deleting token eVIumHdxVVXSlErO.1334 for user conductor
2021-11-01 02:39:50.554661 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.698935792s) to execute
2021-11-01 02:39:50.554970 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.195730138s) to execute
2021-11-01 02:39:50.555290 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.196608277s) to execute
2021-11-01 02:39:51.250698 I | auth: deleting token UbDwLDXwOTbJMOkJ.1336 for user conductor
2021-11-01 02:39:51.250757 I | auth: deleting token XwggerwAUyoTBASC.1337 for user conductor
2021-11-01 02:39:51.250770 I | auth: deleting token FcBNLaLzNbUamZaq.1338 for user conductor
2021-11-01 02:39:51.250785 I | auth: deleting token GQuedWTqAFhxWugo.1339 for user conductor
2021-11-01 02:39:53.352154 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.69965472s) to execute
2021-11-01 02:39:53.352409 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.784467892s) to execute
2021-11-01 02:39:53.854130 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:54.250704 I | auth: deleting token jjbOlrjRxFgYbNrc.1341 for user conductor
2021-11-01 02:39:54.250760 I | auth: deleting token ZTIUDFbZmyTfUKLU.1340 for user conductor
2021-11-01 02:39:54.250775 I | auth: deleting token AcQiciZihEByYcBz.1342 for user conductor
2021-11-01 02:39:55.160096 I | auth: deleting token PSLenQCAxrkGVKds.1343 for user conductor
2021-11-01 02:39:56.160133 I | auth: deleting token poHmYshAbnTEClYz.1344 for user conductor
2021-11-01 02:39:56.651321 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.200694891s) to execute
2021-11-01 02:39:58.160059 I | auth: deleting token QsGxaMMHTIyfxJpt.1345 for user conductor
2021-11-01 02:39:58.854368 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:39:59.853673 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.300583795s) to execute
2021-11-01 02:40:00.160031 I | auth: deleting token HJczIpDrFVPRQxax.1346 for user conductor
2021-11-01 02:40:01.160017 I | auth: deleting token IvXwfKSsOSvDyXUo.1347 for user conductor
2021-11-01 02:40:01.160053 I | auth: deleting token zkCjQEoZsjsNUaZh.1348 for user conductor
2021-11-01 02:40:02.259132 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.315834775s) to execute
2021-11-01 02:40:02.538446 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (187.792074ms) to execute
2021-11-01 02:40:03.250569 I | auth: deleting token BPZDTtggsMXcdrDz.1351 for user conductor
2021-11-01 02:40:03.250642 I | auth: deleting token MlqCfAwSAXLTaxFS.1349 for user conductor
2021-11-01 02:40:03.250672 I | auth: deleting token NQcKLFzfhkZEaidd.1350 for user conductor
2021-11-01 02:40:03.950460 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:05.154474 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.700050781s) to execute
2021-11-01 02:40:05.154591 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.811695937s) to execute
2021-11-01 02:40:05.250645 I | auth: deleting token xuPfERFIGYLKpuDE.1352 for user conductor
2021-11-01 02:40:06.160030 I | auth: deleting token GcHbRdrvJasaNDxf.1354 for user conductor
2021-11-01 02:40:06.160060 I | auth: deleting token oBUMIPJpawIPsQSP.1353 for user conductor
2021-11-01 02:40:07.460877 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.010238682s) to execute
2021-11-01 02:40:07.738337 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (187.757256ms) to execute
2021-11-01 02:40:08.160029 I | auth: deleting token ufygKDuNfQIJIlaX.1355 for user conductor
2021-11-01 02:40:08.950836 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:09.160145 I | auth: deleting token CYqwfAODcNHDqOiP.1356 for user conductor
2021-11-01 02:40:09.951037 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.912955819s) to execute
2021-11-01 02:40:11.160483 I | auth: deleting token zRlozNWzImWZfwQj.1357 for user conductor
2021-11-01 02:40:12.751315 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.69813019s) to execute
2021-11-01 02:40:13.160073 I | auth: deleting token HUaCUQUSsFtDDrAF.1358 for user conductor
2021-11-01 02:40:13.160107 I | auth: deleting token ulOTZqkLITSdejyn.1359 for user conductor
2021-11-01 02:40:13.951012 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:15.053358 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (802.512553ms) to execute
2021-11-01 02:40:15.160087 I | auth: deleting token iwIFAyMAwIVnejbV.1361 for user conductor
2021-11-01 02:40:15.160132 I | auth: deleting token djUTuMdOmZsePPnN.1360 for user conductor
2021-11-01 02:40:16.250362 I | auth: deleting token AamCRNaqbRHSBMdn.1363 for user conductor
2021-11-01 02:40:16.250438 I | auth: deleting token FvWuHvoCicbScxsV.1362 for user conductor
2021-11-01 02:40:17.757048 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.506338109s) to execute
2021-11-01 02:40:17.757208 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.206567704s) to execute
2021-11-01 02:40:18.951232 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:20.452654 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.693393581s) to execute
2021-11-01 02:40:22.856375 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.400948309s) to execute
2021-11-01 02:40:22.950362 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.401379768s) to execute
2021-11-01 02:40:23.951591 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:25.852260 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.501016471s) to execute
2021-11-01 02:40:26.160124 I | auth: deleting token xYOMFNSzQRyxZTfV.1371 for user conductor
2021-11-01 02:40:26.160184 I | auth: deleting token TxJdfLQkRuDdYoUY.1364 for user conductor
2021-11-01 02:40:26.160215 I | auth: deleting token vtaKlneYiAoriMmR.1370 for user conductor
2021-11-01 02:40:26.160228 I | auth: deleting token cPZwIgANAPKEEECZ.1365 for user conductor
2021-11-01 02:40:26.160242 I | auth: deleting token agKospkHsbSDRHmq.1367 for user conductor
2021-11-01 02:40:26.160253 I | auth: deleting token rOErljRcaWgLrozJ.1366 for user conductor
2021-11-01 02:40:28.160143 I | auth: deleting token kVHOKmDDJIfahlVb.1369 for user conductor
2021-11-01 02:40:28.160204 I | auth: deleting token bdnokIQltNMAGDjj.1368 for user conductor
2021-11-01 02:40:28.160228 I | auth: deleting token ChwrKEqYIjjNFgoE.1375 for user conductor
2021-11-01 02:40:28.160251 I | auth: deleting token RKbDaAAfWhyHcjmE.1373 for user conductor
2021-11-01 02:40:28.951928 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:29.170844 I | auth: deleting token cOLlUiDnliVofdQi.1374 for user conductor
2021-11-01 02:40:29.170908 I | auth: deleting token rXrWETiFGsWUNhvt.1372 for user conductor
2021-11-01 02:40:29.755966 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.502996995s) to execute
2021-11-01 02:40:31.160534 I | auth: deleting token gxypXsQOmIBhjITu.1378 for user conductor
2021-11-01 02:40:31.160562 I | auth: deleting token aytLsDMOewePNWwX.1377 for user conductor
2021-11-01 02:40:31.160577 I | auth: deleting token VkOQHDbmCvlHWRtU.1379 for user conductor
2021-11-01 02:40:33.952155 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:37.250497 I | auth: deleting token bfViZHmiwfDZQqtQ.1382 for user conductor
2021-11-01 02:40:37.250579 I | auth: deleting token ZHekgfzkZdorpfvm.1384 for user conductor
2021-11-01 02:40:37.250607 I | auth: deleting token ZOJwqqrvhgAerJcG.1383 for user conductor
2021-11-01 02:40:37.250629 I | auth: deleting token roaKPdoBAFYOgyNa.1381 for user conductor
2021-11-01 02:40:37.250651 I | auth: deleting token eQXZSXNMZamwHuBr.1385 for user conductor
2021-11-01 02:40:37.250672 I | auth: deleting token gmvGrtMNOsgxrTRC.1380 for user conductor
2021-11-01 02:40:37.954458 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.100383259s) to execute
2021-11-01 02:40:38.952447 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:40.257085 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.30243126s) to execute
2021-11-01 02:40:43.154897 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.10421082s) to execute
2021-11-01 02:40:43.155435 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.60471898s) to execute
2021-11-01 02:40:43.157747 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.707210634s) to execute
2021-11-01 02:40:43.250852 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.899906439s) to execute
2021-11-01 02:40:43.952683 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:44.160044 I | auth: deleting token URSGlwbXnHejNmLs.1387 for user conductor
2021-11-01 02:40:44.160090 I | auth: deleting token abHpgeyvGEziSwqM.1386 for user conductor
2021-11-01 02:40:45.160248 I | auth: deleting token rhNOyPVOMvjTXOSp.1389 for user conductor
2021-11-01 02:40:45.160288 I | auth: deleting token iysfjtYaWIcOncZr.1388 for user conductor
2021-11-01 02:40:45.160304 I | auth: deleting token ghBLjNznwAWJNFIu.1390 for user conductor
2021-11-01 02:40:45.160318 I | auth: deleting token yAOfnFsJKGYwigSa.1392 for user conductor
2021-11-01 02:40:45.160372 I | auth: deleting token lWrXVLSsrSUyQARP.1391 for user conductor
2021-11-01 02:40:47.250586 I | auth: deleting token MHpoERhodpQYpYWb.1393 for user conductor
2021-11-01 02:40:47.250657 I | auth: deleting token MHPhcJrEAHOJggvU.1394 for user conductor
2021-11-01 02:40:48.953015 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:50.159957 I | auth: deleting token NlCxZdCWDZkbLyrW.1396 for user conductor
2021-11-01 02:40:50.160007 I | auth: deleting token GOnFceqoSpdxhyGb.1397 for user conductor
2021-11-01 02:40:50.160020 I | auth: deleting token bbJuQLtYDwzTcFiZ.1395 for user conductor
2021-11-01 02:40:50.160036 I | auth: deleting token EjvNTRUSyCAMPthb.1398 for user conductor
2021-11-01 02:40:51.051335 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (7.700590039s) to execute
2021-11-01 02:40:51.051574 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.406023667s) to execute
2021-11-01 02:40:51.238380 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (183.919647ms) to execute
2021-11-01 02:40:53.953379 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:55.160132 I | auth: deleting token DNVNEBnUCOtujQvI.1399 for user conductor
2021-11-01 02:40:55.160184 I | auth: deleting token OpXhvjNlxxqrfkTi.1401 for user conductor
2021-11-01 02:40:55.160196 I | auth: deleting token bQwonzQURIRfBBIO.1402 for user conductor
2021-11-01 02:40:55.160205 I | auth: deleting token koOWXLqMxTTlyIvu.1403 for user conductor
2021-11-01 02:40:55.160217 I | auth: deleting token ewLoFKSNLvuKhPCW.1400 for user conductor
2021-11-01 02:40:56.160097 I | auth: deleting token jRKHZPAkRYAMKTSf.1405 for user conductor
2021-11-01 02:40:56.160135 I | auth: deleting token iqVlrvADDnoZxAJU.1404 for user conductor
2021-11-01 02:40:58.553125 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.802428133s) to execute
2021-11-01 02:40:58.953580 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:40:59.160156 I | auth: deleting token gGZyfmiqEjqGxtCt.1406 for user conductor
2021-11-01 02:41:00.956618 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.400385652s) to execute
2021-11-01 02:41:00.956738 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.401079796s) to execute
2021-11-01 02:41:01.160176 I | auth: deleting token EkPDilKkHLRzRfwN.1410 for user conductor
2021-11-01 02:41:01.160242 I | auth: deleting token YLBUUkjyWmxAWdcl.1407 for user conductor
2021-11-01 02:41:01.160273 I | auth: deleting token SCldfXbufljVgdCV.1408 for user conductor
2021-11-01 02:41:01.160291 I | auth: deleting token sDqTesVChpfeVvWs.1409 for user conductor
2021-11-01 02:41:03.953922 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:05.651325 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.400686643s) to execute
2021-11-01 02:41:07.159991 I | auth: deleting token WsPKUcFvAyYvZNOJ.1415 for user conductor
2021-11-01 02:41:07.160054 I | auth: deleting token BldIyujhfrFuiEDa.1411 for user conductor
2021-11-01 02:41:07.160077 I | auth: deleting token dzDZFGjKjIIhiLDR.1413 for user conductor
2021-11-01 02:41:07.160090 I | auth: deleting token RodkMbTYHgGspOMz.1414 for user conductor
2021-11-01 02:41:07.160107 I | auth: deleting token lddANsjvoCcveDjn.1412 for user conductor
2021-11-01 02:41:07.160121 I | auth: deleting token rIyfxuCOzDJqlkRd.1416 for user conductor
2021-11-01 02:41:08.160320 I | auth: deleting token lemHFyZfUNmjeVMP.1417 for user conductor
2021-11-01 02:41:08.458062 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.403606814s) to execute
2021-11-01 02:41:08.458442 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.707657593s) to execute
2021-11-01 02:41:08.458543 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.804664689s) to execute
2021-11-01 02:41:08.458825 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.804860623s) to execute
2021-11-01 02:41:08.954248 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:09.252267 I | auth: deleting token sQnoaxzqnqBFXZcL.1418 for user conductor
2021-11-01 02:41:11.160150 I | auth: deleting token zILGwyNngbyCAigs.1419 for user conductor
2021-11-01 02:41:12.160029 I | auth: deleting token BcypxBFISKzTifwB.1420 for user conductor
2021-11-01 02:41:13.954500 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:14.459457 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.904333185s) to execute
2021-11-01 02:41:17.052743 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.814554332s) to execute
2021-11-01 02:41:17.238475 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (183.131665ms) to execute
2021-11-01 02:41:17.240540 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (184.512658ms) to execute
2021-11-01 02:41:18.954706 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:21.757403 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.719173198s) to execute
2021-11-01 02:41:22.160060 I | auth: deleting token DhuIEGiWkacfEmGE.1427 for user conductor
2021-11-01 02:41:22.160111 I | auth: deleting token mNfuvvBaoERKQrZq.1421 for user conductor
2021-11-01 02:41:22.160132 I | auth: deleting token ppqUhfNNBlSAhFxD.1424 for user conductor
2021-11-01 02:41:22.160143 I | auth: deleting token vDABeJnPUmfMEKjm.1422 for user conductor
2021-11-01 02:41:22.160163 I | auth: deleting token cEzKCLaqbLqqLYWT.1428 for user conductor
2021-11-01 02:41:24.051182 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:24.160222 I | auth: deleting token ZdfVysjJriuwOIHd.1429 for user conductor
2021-11-01 02:41:24.160395 I | auth: deleting token QrighNEgPuiCRSEt.1425 for user conductor
2021-11-01 02:41:24.160443 I | auth: deleting token UgbPfPvhKIypmSUU.1430 for user conductor
2021-11-01 02:41:24.160486 I | auth: deleting token qDVPiyNHHeAanpUo.1423 for user conductor
2021-11-01 02:41:24.160525 I | auth: deleting token HodaHvDnJKdkrnvA.1426 for user conductor
2021-11-01 02:41:26.854992 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.304326521s) to execute
2021-11-01 02:41:29.051498 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:29.250397 I | auth: deleting token gplZCiiJpIcvVaJT.1433 for user conductor
2021-11-01 02:41:29.250468 I | auth: deleting token PCARbniMorMtiMan.1434 for user conductor
2021-11-01 02:41:29.250495 I | auth: deleting token cKTDdnWSuBsepTAD.1431 for user conductor
2021-11-01 02:41:29.250512 I | auth: deleting token itMQnRwTaAAIdkSB.1432 for user conductor
2021-11-01 02:41:29.250526 I | auth: deleting token qsptHKpzBiZenkcC.1435 for user conductor
2021-11-01 02:41:29.452078 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.499369241s) to execute
2021-11-01 02:41:32.156370 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.704158319s) to execute
2021-11-01 02:41:32.250458 I | auth: deleting token BoMQWMIguwQYvLYw.1436 for user conductor
2021-11-01 02:41:32.250552 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.393318546s) to execute
2021-11-01 02:41:32.250632 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.79559462s) to execute
2021-11-01 02:41:34.051822 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:34.160051 I | auth: deleting token KllpWvvWuLzUYvJZ.1438 for user conductor
2021-11-01 02:41:34.160107 I | auth: deleting token CuiaBfyKuVrReiQJ.1439 for user conductor
2021-11-01 02:41:36.160239 I | auth: deleting token xTtzkbSPcHvoLEWv.1437 for user conductor
2021-11-01 02:41:37.253261 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.402657986s) to execute
2021-11-01 02:41:39.052098 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:39.160020 I | auth: deleting token ICavxkIRCyNggMgL.1440 for user conductor
2021-11-01 02:41:42.160267 I | auth: deleting token kBLedpEooNaMxtYz.1443 for user conductor
2021-11-01 02:41:42.160342 I | auth: deleting token xbQhYZEhgqCDDTnL.1442 for user conductor
2021-11-01 02:41:42.160384 I | auth: deleting token hLKnPhECrkZoqRXJ.1441 for user conductor
2021-11-01 02:41:44.052387 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:44.160402 I | auth: deleting token hjitaJcEVVSsGTxz.1445 for user conductor
2021-11-01 02:41:44.160481 I | auth: deleting token qqrkpBKWSkgnreyR.1444 for user conductor
2021-11-01 02:41:45.160166 I | auth: deleting token zWVTYuHMJiGyVFoc.1446 for user conductor
2021-11-01 02:41:47.160108 I | auth: deleting token aOuKdxkqnexKFhnS.1448 for user conductor
2021-11-01 02:41:47.160153 I | auth: deleting token MBoHHEpoXJRsUCsz.1449 for user conductor
2021-11-01 02:41:47.160160 I | auth: deleting token HPTDYVoxLeVLFpaK.1447 for user conductor
2021-11-01 02:41:48.250340 I | auth: deleting token PxWUyPjXRfRSfKVr.1450 for user conductor
2021-11-01 02:41:49.052556 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:51.159968 I | auth: deleting token cOlPcujJaMgyWvQe.1452 for user conductor
2021-11-01 02:41:51.160016 I | auth: deleting token czifmzriWwHgpPlN.1451 for user conductor
2021-11-01 02:41:51.760243 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.807797122s) to execute
2021-11-01 02:41:51.952464 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (101.731485ms) to execute
2021-11-01 02:41:52.250312 I | auth: deleting token xVdNUnWWEuHnOiPA.1453 for user conductor
2021-11-01 02:41:54.052790 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:41:54.250522 I | auth: deleting token UGewVZLmlppGssXO.1454 for user conductor
2021-11-01 02:41:54.250590 I | auth: deleting token lALKZzkoVbIJJngm.1455 for user conductor
2021-11-01 02:41:54.250623 I | auth: deleting token bzTNrHzukEFpcnNw.1456 for user conductor
2021-11-01 02:41:56.160118 I | auth: deleting token EhnzbixCQfFxDxjF.1457 for user conductor
2021-11-01 02:41:59.053039 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:00.256950 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.704380457s) to execute
2021-11-01 02:42:01.160010 I | auth: deleting token rCYIqPzYTdBXicbB.1459 for user conductor
2021-11-01 02:42:01.160071 I | auth: deleting token bBirDDcigfIfeAgr.1460 for user conductor
2021-11-01 02:42:01.160083 I | auth: deleting token pemfvUdRyjgmJxzA.1461 for user conductor
2021-11-01 02:42:01.160097 I | auth: deleting token TvriguVtgKdmUvtb.1458 for user conductor
2021-11-01 02:42:01.160109 I | auth: deleting token nWbUWUwHjXcJqEPv.1462 for user conductor
2021-11-01 02:42:01.160117 I | auth: deleting token plwuESixpvDgmeTB.1463 for user conductor
2021-11-01 02:42:02.551100 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.199546005s) to execute
2021-11-01 02:42:02.551256 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.278739241s) to execute
2021-11-01 02:42:03.250507 I | auth: deleting token UJapKUaoQFQNNiTh.1465 for user conductor
2021-11-01 02:42:03.250545 I | auth: deleting token vtJkVrBKZjMGZgiU.1464 for user conductor
2021-11-01 02:42:04.055477 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:04.160038 I | auth: deleting token bgNXEOTJiDujZtuU.1466 for user conductor
2021-11-01 02:42:04.852282 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.576701797s) to execute
2021-11-01 02:42:04.852403 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.298686859s) to execute
2021-11-01 02:42:04.852583 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.298338473s) to execute
2021-11-01 02:42:06.854363 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.900989151s) to execute
2021-11-01 02:42:06.854598 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.903923664s) to execute
2021-11-01 02:42:09.055870 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:09.160097 I | auth: deleting token jeHfcLvexWwnjZZQ.1472 for user conductor
2021-11-01 02:42:09.160159 I | auth: deleting token dqQMRwRVaPFLUIlP.1471 for user conductor
2021-11-01 02:42:09.160175 I | auth: deleting token JXJnjuDYfVNGaSJV.1470 for user conductor
2021-11-01 02:42:09.160189 I | auth: deleting token eTwRZebRfBLWbUwr.1468 for user conductor
2021-11-01 02:42:09.160201 I | auth: deleting token bYIfBzKusCNjNZKH.1467 for user conductor
2021-11-01 02:42:09.160210 I | auth: deleting token hTehWLcAmLCZsrZC.1469 for user conductor
2021-11-01 02:42:09.757182 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.806544035s) to execute
2021-11-01 02:42:09.850560 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.899663002s) to execute
2021-11-01 02:42:11.160065 I | auth: deleting token ZQgpmweliKPsSnsq.1473 for user conductor
2021-11-01 02:42:11.859446 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.908835706s) to execute
2021-11-01 02:42:11.859542 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.908603239s) to execute
2021-11-01 02:42:12.160086 I | auth: deleting token AapPkfJgdeHrPspB.1474 for user conductor
2021-11-01 02:42:13.160140 I | auth: deleting token QiaGwYhetXMaZiSE.1475 for user conductor
2021-11-01 02:42:14.056246 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:15.160018 I | auth: deleting token gnTDPttYXyEOsLHX.1476 for user conductor
2021-11-01 02:42:16.160071 I | auth: deleting token PWyVIyENnoFtOoBx.1477 for user conductor
2021-11-01 02:42:16.954200 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.003457055s) to execute
2021-11-01 02:42:16.954458 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.901621701s) to execute
2021-11-01 02:42:17.160069 I | auth: deleting token PPawXOaRjTEpsluc.1478 for user conductor
2021-11-01 02:42:19.056593 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:19.250495 I | auth: deleting token BOdzzpfKVLRgPIXX.1479 for user conductor
2021-11-01 02:42:20.250444 I | auth: deleting token YAJRFLuIxFURxFkJ.1480 for user conductor
2021-11-01 02:42:21.350675 I | auth: deleting token XwnpZkwrwMeUbLGv.1481 for user conductor
2021-11-01 02:42:24.056876 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:27.050945 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.599117165s) to execute
2021-11-01 02:42:29.150406 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:29.160063 I | auth: deleting token YbcRYWraAMNLMbyp.1487 for user conductor
2021-11-01 02:42:29.160132 I | auth: deleting token zstiCHuABRfPFOhO.1482 for user conductor
2021-11-01 02:42:29.160166 I | auth: deleting token bwyIASyWIuZprQXg.1484 for user conductor
2021-11-01 02:42:29.160177 I | auth: deleting token AOQKhuFdExdjCbLN.1485 for user conductor
2021-11-01 02:42:29.250437 I | auth: deleting token VBhIrJGnrqkGnnUy.1488 for user conductor
2021-11-01 02:42:29.553636 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.401469835s) to execute
2021-11-01 02:42:29.553817 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.5006223s) to execute
2021-11-01 02:42:29.553906 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.500479693s) to execute
2021-11-01 02:42:30.160065 I | auth: deleting token CJdKpNXmIuIhyIzM.1486 for user conductor
2021-11-01 02:42:30.160113 I | auth: deleting token VQbDVsphRTLliJaU.1483 for user conductor
2021-11-01 02:42:30.160129 I | auth: deleting token MvdwoIWmmovIFWFN.1489 for user conductor
2021-11-01 02:42:32.153436 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.500463447s) to execute
2021-11-01 02:42:32.160085 I | auth: deleting token IXDjFSwZimQDKeOx.1490 for user conductor
2021-11-01 02:42:34.150778 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:34.250448 I | auth: deleting token xkTFFsxQwqRNskcv.1492 for user conductor
2021-11-01 02:42:34.250495 I | auth: deleting token FCsrxAMjWoGBcMDT.1493 for user conductor
2021-11-01 02:42:34.851314 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.500408998s) to execute
2021-11-01 02:42:35.250593 I | auth: deleting token rtsNTwIxsLKQaECr.1495 for user conductor
2021-11-01 02:42:35.250669 I | auth: deleting token iCaRLxAmzOxCVJEc.1494 for user conductor
2021-11-01 02:42:35.250685 I | auth: deleting token XPgWVApLsDjHvsoo.1491 for user conductor
2021-11-01 02:42:36.250486 I | auth: deleting token BmvSRCNjpZQpgbsu.1496 for user conductor
2021-11-01 02:42:37.250519 I | auth: deleting token PUAQCBBhDUFwodkU.1497 for user conductor
2021-11-01 02:42:37.559832 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.620618063s) to execute
2021-11-01 02:42:37.650617 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.796433113s) to execute
2021-11-01 02:42:38.160154 I | auth: deleting token rAQIGhuhUpNtulAD.1498 for user conductor
2021-11-01 02:42:39.151117 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:40.250430 I | auth: deleting token nCSbVMLIucBLLUru.1499 for user conductor
2021-11-01 02:42:42.950408 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.604375411s) to execute
2021-11-01 02:42:43.138162 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (184.754441ms) to execute
2021-11-01 02:42:43.338435 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (278.899093ms) to execute
2021-11-01 02:42:44.151535 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:46.160119 I | auth: deleting token VharPtsgIusQRisa.1501 for user conductor
2021-11-01 02:42:46.160182 I | auth: deleting token jAhZzpUUeyhCKvRu.1502 for user conductor
2021-11-01 02:42:46.160198 I | auth: deleting token MVZYSvRzrgBMjTpn.1504 for user conductor
2021-11-01 02:42:46.160213 I | auth: deleting token aJlvKpIitEHsKKRt.1505 for user conductor
2021-11-01 02:42:46.160227 I | auth: deleting token leEteUOpjTrwYFGo.1506 for user conductor
2021-11-01 02:42:46.160241 I | auth: deleting token QxhuzGpjLyXIvXnF.1503 for user conductor
2021-11-01 02:42:46.160252 I | auth: deleting token KndrEwijLGscVaco.1500 for user conductor
2021-11-01 02:42:48.160053 I | auth: deleting token dthjsuPAUNQssgYF.1509 for user conductor
2021-11-01 02:42:48.160101 I | auth: deleting token kvdEZBnUqhiDgWIz.1507 for user conductor
2021-11-01 02:42:48.160119 I | auth: deleting token EIRiEqRoBNfjXfWT.1508 for user conductor
2021-11-01 02:42:49.152423 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:51.160197 I | auth: deleting token pfJyugLWdiqVRaBl.1510 for user conductor
2021-11-01 02:42:54.152982 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:42:59.153444 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:43:01.160149 I | auth: deleting token RSOPOvLQkasicWSs.1515 for user conductor
2021-11-01 02:43:01.160215 I | auth: deleting token EePzwqcrIPgGfIfr.1513 for user conductor
2021-11-01 02:43:01.160230 I | auth: deleting token DYSjEmAsCdIXqYCW.1512 for user conductor
2021-11-01 02:43:01.160244 I | auth: deleting token vbrxBEXXcLlNJeho.1514 for user conductor
2021-11-01 02:43:01.160253 I | auth: deleting token bOgOuKNrPoRDsuWy.1511 for user conductor
2021-11-01 02:43:01.352991 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.51490884s) to execute
2021-11-01 02:43:04.051241 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.09900753s) to execute
2021-11-01 02:43:04.153725 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:43:04.338331 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (195.113768ms) to execute
2021-11-01 02:43:08.250367 I | auth: deleting token QNblZNadkIOZyGKq.1521 for user conductor
2021-11-01 02:43:08.250460 I | auth: deleting token BEAFhdeQvfuxSBpK.1522 for user conductor
2021-11-01 02:43:08.250492 I | auth: deleting token pvvNLcFfWfymbgQm.1518 for user conductor
2021-11-01 02:43:08.250824 I | auth: deleting token AoeEIGgekqjzrVHd.1516 for user conductor
2021-11-01 02:43:08.250870 I | auth: deleting token airbsGgAHVtYnany.1519 for user conductor
2021-11-01 02:43:08.250888 I | auth: deleting token OlMMeMZIsLvCSrGj.1520 for user conductor
2021-11-01 02:43:08.250912 I | auth: deleting token lPZGxbwoPxbdtIzv.1523 for user conductor
2021-11-01 02:43:08.250943 I | auth: deleting token gmzFfyTqPdBimdOR.1517 for user conductor
2021-11-01 02:43:09.153998 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:43:09.250542 I | auth: deleting token IdfahvFxvDaQsQYv.1524 for user conductor
2021-11-01 02:43:10.160133 I | auth: deleting token TKynkcLLxVuBMfBE.1525 for user conductor
2021-11-01 02:43:12.250569 I | auth: deleting token bjCmVBQcwESuOgmQ.1526 for user conductor
2021-11-01 02:43:13.250341 I | auth: deleting token NlwgHIiHeXDiQvaY.1527 for user conductor
2021-11-01 02:43:14.154271 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:43:14.160182 I | auth: deleting token TUwXmnTXiLBPwXdO.1528 for user conductor
2021-11-01 02:43:17.656702 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (10.904752808s) to execute
2021-11-01 02:43:19.154582 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:43:20.656819 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.914747s) to execute
2021-11-01 02:43:20.657140 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.906488976s) to execute
2021-11-01 02:43:20.752566 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (3.001717099s) to execute
2021-11-01 02:43:20.851097 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.383588ms) to execute
2021-11-01 02:43:22.160102 I | auth: deleting token LHEZbWIzEPSKPPkN.1529 for user conductor
2021-11-01 02:43:22.160162 I | auth: deleting token tNILRKSbjzFdEcNr.1531 for user conductor
2021-11-01 02:43:22.160175 I | auth: deleting token YKdBbyFuMqsZSIfD.1532 for user conductor
2021-11-01 02:43:23.552475 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.701533023s) to execute
2021-11-01 02:43:23.552628 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.501980948s) to execute
2021-11-01 02:43:24.154907 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:43:25.160148 I | auth: deleting token zzSFHStYtxtaaFUd.1530 for user conductor
2021-11-01 02:43:25.160232 I | auth: deleting token bjgvnhIJDRlgnxBB.1533 for user conductor
2021-11-01 02:43:25.756500 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.018209285s) to execute
2021-11-01 02:43:27.160066 I | auth: deleting token VZotEPkzmzyownPT.1534 for user conductor
2021-11-01 02:43:28.160161 I | auth: deleting token OHWfUTlIgUDJaslV.1535 for user conductor
2021-11-01 02:43:28.351143 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.399482319s) to execute
2021-11-01 02:43:29.155265 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:43:30.250407 I | auth: deleting token mIyySUqvslECLKuK.1536 for user conductor
2021-11-01 02:43:30.250472 I | auth: deleting token xLEQoFJFWTaRlNWm.1537 for user conductor
2021-11-01 02:43:30.250493 I | auth: deleting token BUJtPVpKHxZzIUQG.1538 for user conductor
2021-11-01 02:43:30.657557 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (806.784106ms) to execute
2021-11-01 02:43:33.160154 I | auth: deleting token GoYCKglPnkkTUqXz.1540 for user conductor
2021-11-01 02:43:34.155635 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:43:36.160121 I | auth: deleting token lPhqXbZhdGLrMIPy.1539 for user conductor
2021-11-01 02:43:37.252846 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.891914887s) to execute
2021-11-01 02:43:39.155828 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:43:39.450899 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.113005142s) to execute
2021-11-01 02:43:41.160164 I | auth: deleting token YfhcaxfrshCJvCUK.1543 for user conductor
2021-11-01 02:43:41.160234 I | auth: deleting token EQkXlZKjaUshECHX.1544 for user conductor
2021-11-01 02:43:41.160257 I | auth: deleting token gBfYgDbdiODOYRtB.1542 for user conductor
2021-11-01 02:43:41.160268 I | auth: deleting token LuGHxqVPUmpNgvde.1541 for user conductor
2021-11-01 02:43:41.851270 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.396371938s) to execute
2021-11-01 02:43:41.851512 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.301113188s) to execute
2021-11-01 02:43:44.156224 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:43:45.051855 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (913.484375ms) to execute
2021-11-01 02:43:47.160043 I | auth: deleting token QLxdyhWdsaKWaZlF.1546 for user conductor
2021-11-01 02:43:47.724208 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.173463748s) to execute
2021-11-01 02:43:49.156550 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:43:49.160124 I | auth: deleting token sdYJSgLIcuxDQFRd.1545 for user conductor
2021-11-01 02:43:49.160180 I | auth: deleting token vQfJYqGnFhOAnAvK.1548 for user conductor
2021-11-01 02:43:51.160092 I | auth: deleting token twsMrGawLacVIqxL.1550 for user conductor
2021-11-01 02:43:51.160152 I | auth: deleting token occrxywxtUEfsbXQ.1547 for user conductor
2021-11-01 02:43:51.951918 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.001193559s) to execute
2021-11-01 02:43:52.139065 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (184.826175ms) to execute
2021-11-01 02:43:52.139244 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (182.17106ms) to execute
2021-11-01 02:43:54.250830 I | auth: deleting token hyuVsNcUaIxRHKls.1553 for user conductor
2021-11-01 02:43:54.250882 I | auth: deleting token QEUeUgYDtLTgieWM.1549 for user conductor
2021-11-01 02:43:54.250901 I | auth: deleting token mzEgdgMaTmgJWdvi.1552 for user conductor
2021-11-01 02:43:54.250929 I | auth: deleting token ifBrcCApaKKmXSOW.1554 for user conductor
2021-11-01 02:43:54.250954 I | auth: deleting token zdxKZWWtDhqnPykw.1551 for user conductor
2021-11-01 02:43:54.250970 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:43:54.656965 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.906305516s) to execute
2021-11-01 02:43:59.251297 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:02.554893 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (902.280147ms) to execute
2021-11-01 02:44:03.160149 I | auth: deleting token avOgQhUicLuDCtdJ.1555 for user conductor
2021-11-01 02:44:03.160214 I | auth: deleting token iKLegWyBURXYPiha.1557 for user conductor
2021-11-01 02:44:04.251603 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:05.356961 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.606293531s) to execute
2021-11-01 02:44:06.250449 I | auth: deleting token jSAdlSslZMkLnLBX.1561 for user conductor
2021-11-01 02:44:06.250515 I | auth: deleting token vOMmVDoiKuVIcCIR.1559 for user conductor
2021-11-01 02:44:06.250535 I | auth: deleting token VOyVzlAtHFRoUYWb.1563 for user conductor
2021-11-01 02:44:06.250564 I | auth: deleting token UgjmNyavHxJnoDnK.1558 for user conductor
2021-11-01 02:44:06.250591 I | auth: deleting token LOoGZVjdffgVNRHi.1556 for user conductor
2021-11-01 02:44:06.250628 I | auth: deleting token zVhYtVhvZFgHZyOg.1560 for user conductor
2021-11-01 02:44:06.250912 I | auth: deleting token rdzWiRCAGnvWJnrb.1562 for user conductor
2021-11-01 02:44:08.252749 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.60217403s) to execute
2021-11-01 02:44:09.250571 I | auth: deleting token KaSXeFVuEejeMPQv.1564 for user conductor
2021-11-01 02:44:09.251889 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:10.852540 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.599692772s) to execute
2021-11-01 02:44:10.852733 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.401898576s) to execute
2021-11-01 02:44:11.160039 I | auth: deleting token SzqAsrHChSUcNBeP.1567 for user conductor
2021-11-01 02:44:11.160099 I | auth: deleting token lDmiDankZpcNcIwK.1566 for user conductor
2021-11-01 02:44:11.160115 I | auth: deleting token rOWhvhkTzLkivvbe.1568 for user conductor
2021-11-01 02:44:11.160137 I | auth: deleting token shtHMVFGVMxdzipN.1565 for user conductor
2021-11-01 02:44:13.257205 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.404535939s) to execute
2021-11-01 02:44:13.260782 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.004438449s) to execute
2021-11-01 02:44:14.160060 I | auth: deleting token pOlnbCiVdvRDRrlQ.1569 for user conductor
2021-11-01 02:44:14.160120 I | auth: deleting token HXXsXBaTwzWkzhxQ.1570 for user conductor
2021-11-01 02:44:14.160131 I | auth: deleting token KTPqZrvsjwPCHBio.1571 for user conductor
2021-11-01 02:44:14.252249 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:15.160221 I | auth: deleting token cTkykKIHTsJCYozE.1572 for user conductor
2021-11-01 02:44:17.250545 I | auth: deleting token oRJFJUKVkCbxmrjU.1573 for user conductor
2021-11-01 02:44:17.957071 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.006004176s) to execute
2021-11-01 02:44:18.239134 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (184.38574ms) to execute
2021-11-01 02:44:19.160080 I | auth: deleting token IvXEIQLWqaBOHJDN.1574 for user conductor
2021-11-01 02:44:19.252465 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:20.160149 I | auth: deleting token UaWzTtqHIcnDkRXs.1575 for user conductor
2021-11-01 02:44:22.160037 I | auth: deleting token AlVqPbZabEsbumlN.1576 for user conductor
2021-11-01 02:44:23.054158 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.403532296s) to execute
2021-11-01 02:44:23.160156 I | auth: deleting token UmAATUoUoWbBfuUK.1578 for user conductor
2021-11-01 02:44:23.160233 I | auth: deleting token JCrKobxHRxmcJBzv.1577 for user conductor
2021-11-01 02:44:24.252955 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:28.857253 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.906621149s) to execute
2021-11-01 02:44:29.253299 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:33.250434 I | auth: deleting token TMvaYtNAdssVZgSg.1583 for user conductor
2021-11-01 02:44:33.250501 I | auth: deleting token YpQMPbAuVyyCbxKc.1579 for user conductor
2021-11-01 02:44:33.250518 I | auth: deleting token iAWOpQkYGBUKeGRo.1587 for user conductor
2021-11-01 02:44:33.250535 I | auth: deleting token TiyhgPCFFBjkyEDB.1581 for user conductor
2021-11-01 02:44:33.250552 I | auth: deleting token dRefDmUTMNfrDwoK.1584 for user conductor
2021-11-01 02:44:33.250564 I | auth: deleting token SyGMLtVASXetsWFX.1580 for user conductor
2021-11-01 02:44:33.250575 I | auth: deleting token DJCwTJHjYEygAKUw.1582 for user conductor
2021-11-01 02:44:33.250587 I | auth: deleting token INZxqFKXgNcJrfMY.1585 for user conductor
2021-11-01 02:44:33.250604 I | auth: deleting token qleagIItedDmVLev.1586 for user conductor
2021-11-01 02:44:33.656264 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.704352685s) to execute
2021-11-01 02:44:33.657214 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.780872372s) to execute
2021-11-01 02:44:33.938038 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (187.267379ms) to execute
2021-11-01 02:44:33.938246 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (184.073511ms) to execute
2021-11-01 02:44:34.253590 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:36.161482 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.608442132s) to execute
2021-11-01 02:44:39.253859 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:39.851793 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.301323s) to execute
2021-11-01 02:44:43.155075 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.617044613s) to execute
2021-11-01 02:44:44.254116 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:45.556411 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.505784332s) to execute
2021-11-01 02:44:46.250477 I | auth: deleting token VOZFnbjCwHGjiPzp.1589 for user conductor
2021-11-01 02:44:46.250524 I | auth: deleting token XYhIyODRYNRmPjNw.1588 for user conductor
2021-11-01 02:44:47.954894 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.315236699s) to execute
2021-11-01 02:44:49.160032 I | auth: deleting token KkBrUAjqQcTcfSWz.1591 for user conductor
2021-11-01 02:44:49.160088 I | auth: deleting token AHDeGdWxhrLSPIei.1590 for user conductor
2021-11-01 02:44:49.254358 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:51.160235 I | auth: deleting token WwtWfcVkpwfNuFBC.1592 for user conductor
2021-11-01 02:44:54.160005 I | auth: deleting token QYdFbMdaZVscziMX.1594 for user conductor
2021-11-01 02:44:54.160068 I | auth: deleting token aeIWFfonclrPUmAH.1593 for user conductor
2021-11-01 02:44:54.160151 I | auth: deleting token cLrMwnEVpMrTsUeK.1595 for user conductor
2021-11-01 02:44:54.254628 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:44:55.354424 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.396065502s) to execute
2021-11-01 02:44:55.354659 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (7.397547586s) to execute
2021-11-01 02:44:57.160112 I | auth: deleting token IEgvEhmoniJKSfuE.1598 for user conductor
2021-11-01 02:44:57.160191 I | auth: deleting token nrVsjAxnHxtBcmur.1596 for user conductor
2021-11-01 02:44:57.160213 I | auth: deleting token lFxPrhYVcioxPJYn.1600 for user conductor
2021-11-01 02:44:57.160231 I | auth: deleting token IgxlLvVrbTZtWOpl.1599 for user conductor
2021-11-01 02:44:59.254866 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:00.160054 I | auth: deleting token daqqhCJAvwyTBAhW.1602 for user conductor
2021-11-01 02:45:00.160155 I | auth: deleting token aRuUucNnTEPgvsww.1601 for user conductor
2021-11-01 02:45:02.855422 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.902331829s) to execute
2021-11-01 02:45:03.160042 I | auth: deleting token EVnibdlVxLlImbGy.1605 for user conductor
2021-11-01 02:45:03.160121 I | auth: deleting token lrKajKAvqGOObyoe.1604 for user conductor
2021-11-01 02:45:03.160142 I | auth: deleting token wsDVGgrvqrVxDejK.1603 for user conductor
2021-11-01 02:45:03.160169 I | auth: deleting token yzmevjwvyCSApGDh.1606 for user conductor
2021-11-01 02:45:04.255227 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:05.159949 I | auth: deleting token KIHtFPhiacLHJBcI.1607 for user conductor
2021-11-01 02:45:05.159989 I | auth: deleting token WiZAYfiKQcrVxUxd.1608 for user conductor
2021-11-01 02:45:05.651413 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.01325487s) to execute
2021-11-01 02:45:08.160040 I | auth: deleting token dkTEgjKxHmZxryuC.1610 for user conductor
2021-11-01 02:45:08.160108 I | auth: deleting token QHRoifrCQqdvpkmH.1609 for user conductor
2021-11-01 02:45:08.160127 I | auth: deleting token aCiBNxZmsOyhZbGa.1611 for user conductor
2021-11-01 02:45:08.655957 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.505291354s) to execute
2021-11-01 02:45:09.255482 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:10.160128 I | auth: deleting token kuuHAQeQHGvWjPnF.1613 for user conductor
2021-11-01 02:45:10.160182 I | auth: deleting token bYikFxhzMAVpvMLw.1614 for user conductor
2021-11-01 02:45:10.160211 I | auth: deleting token xYbuCtuvNnOJfCxW.1612 for user conductor
2021-11-01 02:45:13.250531 I | auth: deleting token QVHBebYEkRoellJd.1616 for user conductor
2021-11-01 02:45:13.250599 I | auth: deleting token ufADXGyEPazvoPfX.1617 for user conductor
2021-11-01 02:45:13.250637 I | auth: deleting token SMZbvgYBWpFsXtQQ.1615 for user conductor
2021-11-01 02:45:14.255704 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:15.160122 I | auth: deleting token vAyvIdFSKrBBByrU.1618 for user conductor
2021-11-01 02:45:16.160107 I | auth: deleting token GuZSImCefdAyvHsa.1619 for user conductor
2021-11-01 02:45:18.160155 I | auth: deleting token sxQePjalaxyAXlxM.1621 for user conductor
2021-11-01 02:45:18.160226 I | auth: deleting token zeHhHDlaKVMKFrHp.1620 for user conductor
2021-11-01 02:45:19.250889 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.812948378s) to execute
2021-11-01 02:45:19.350941 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:21.250451 I | auth: deleting token zhYYgwtxvNPBIROM.1623 for user conductor
2021-11-01 02:45:21.855897 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601987647s) to execute
2021-11-01 02:45:21.856513 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.602563991s) to execute
2021-11-01 02:45:21.953014 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.698943684s) to execute
2021-11-01 02:45:23.160135 I | auth: deleting token vPsACHcvHtTPOKfl.1626 for user conductor
2021-11-01 02:45:23.160194 I | auth: deleting token PHNyQvBDrhUGZLBY.1624 for user conductor
2021-11-01 02:45:23.160226 I | auth: deleting token FPGHvYWDNUJaoiEc.1622 for user conductor
2021-11-01 02:45:23.160239 I | auth: deleting token gqLTrKeJaKJjzAtx.1627 for user conductor
2021-11-01 02:45:23.160267 I | auth: deleting token BqjbkxorzniNgUwb.1625 for user conductor
2021-11-01 02:45:24.351218 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.395578459s) to execute
2021-11-01 02:45:24.351422 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:24.351893 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.477649645s) to execute
2021-11-01 02:45:26.160066 I | auth: deleting token cNdUAQTPLQZCTtRI.1630 for user conductor
2021-11-01 02:45:26.160146 I | auth: deleting token wuetcEklrmLqkDtx.1628 for user conductor
2021-11-01 02:45:26.160163 I | auth: deleting token NvCvUQIdgdXCPADz.1629 for user conductor
2021-11-01 02:45:27.254734 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.903152988s) to execute
2021-11-01 02:45:29.351758 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:29.650644 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.395671457s) to execute
2021-11-01 02:45:29.651070 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.300467441s) to execute
2021-11-01 02:45:30.160200 I | auth: deleting token SfSeAYpSmCYcWiez.1631 for user conductor
2021-11-01 02:45:30.160404 I | auth: deleting token YxpSvsOClFmWayST.1632 for user conductor
2021-11-01 02:45:34.352064 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:38.154000 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (616.056974ms) to execute
2021-11-01 02:45:38.160064 I | auth: deleting token nUqRShqcisuMQaiE.1633 for user conductor
2021-11-01 02:45:39.352409 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:41.160101 I | auth: deleting token TYPpborUmHIUChSy.1634 for user conductor
2021-11-01 02:45:41.256247 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.005683016s) to execute
2021-11-01 02:45:43.160047 I | auth: deleting token pVYIcVVNDiqwNZxl.1636 for user conductor
2021-11-01 02:45:43.160092 I | auth: deleting token AlcEJbdUQNNchDNn.1635 for user conductor
2021-11-01 02:45:43.257212 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.519133071s) to execute
2021-11-01 02:45:44.250519 I | auth: deleting token XeMMYRZwnikqQbTE.1638 for user conductor
2021-11-01 02:45:44.250596 I | auth: deleting token pSuyKBUxnSzSVauJ.1637 for user conductor
2021-11-01 02:45:44.352701 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:49.352955 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:51.250701 I | auth: deleting token VmsRoSIEYTmMkIZj.1641 for user conductor
2021-11-01 02:45:51.250759 I | auth: deleting token DSxopaZQLscNgDNo.1644 for user conductor
2021-11-01 02:45:51.250788 I | auth: deleting token IGISRIuhuwwCaHsg.1645 for user conductor
2021-11-01 02:45:51.250805 I | auth: deleting token VchbEfRCXoIxXoCY.1640 for user conductor
2021-11-01 02:45:51.250816 I | auth: deleting token gEWVCWBgmEwEuJfc.1643 for user conductor
2021-11-01 02:45:51.250830 I | auth: deleting token JdCukJGpgwGXyBPJ.1642 for user conductor
2021-11-01 02:45:51.250841 I | auth: deleting token IftmBhkYstxlEBye.1639 for user conductor
2021-11-01 02:45:52.250395 I | auth: deleting token NMXxbawQMGcoyNfB.1646 for user conductor
2021-11-01 02:45:53.752221 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (10.399232682s) to execute
2021-11-01 02:45:53.951848 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (196.7941ms) to execute
2021-11-01 02:45:53.951998 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (101.175659ms) to execute
2021-11-01 02:45:54.353254 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:45:56.360491 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.209209551s) to execute
2021-11-01 02:45:59.160221 I | auth: deleting token GxqaFXGvQczSByrR.1647 for user conductor
2021-11-01 02:45:59.160278 I | auth: deleting token TcjaAsGQrgypPCMU.1648 for user conductor
2021-11-01 02:45:59.353578 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:01.160247 I | auth: deleting token uwKgoKpyCPkEkViN.1649 for user conductor
2021-11-01 02:46:04.353856 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:06.160228 I | auth: deleting token bXFakWKpeQoTELln.1650 for user conductor
2021-11-01 02:46:07.556587 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.118602238s) to execute
2021-11-01 02:46:09.160084 I | auth: deleting token WsBEnLWtfIPkYHsI.1651 for user conductor
2021-11-01 02:46:09.160173 I | auth: deleting token ZBpCoqJBALDFVMnT.1654 for user conductor
2021-11-01 02:46:09.160187 I | auth: deleting token wRAOSoFnegXdwGqI.1652 for user conductor
2021-11-01 02:46:09.160199 I | auth: deleting token GqNOguRyXxVsonas.1653 for user conductor
2021-11-01 02:46:09.354280 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:10.354142 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.703190233s) to execute
2021-11-01 02:46:10.540663 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (184.155998ms) to execute
2021-11-01 02:46:13.051140 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.508303975s) to execute
2021-11-01 02:46:13.051409 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.013085532s) to execute
2021-11-01 02:46:14.354557 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:15.755997 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.304384174s) to execute
2021-11-01 02:46:17.250455 I | auth: deleting token KAzXUDUJSzyXoNLf.1655 for user conductor
2021-11-01 02:46:17.250535 I | auth: deleting token MDqNlnETPtxQrNnl.1657 for user conductor
2021-11-01 02:46:17.250578 I | auth: deleting token audtaiSIMlMiLZAn.1661 for user conductor
2021-11-01 02:46:17.250616 I | auth: deleting token QIEIdySjkSrCocCz.1656 for user conductor
2021-11-01 02:46:17.250632 I | auth: deleting token sYcitwBXrKEMRXMS.1658 for user conductor
2021-11-01 02:46:17.250651 I | auth: deleting token sNMTHsNeWBBXjlUG.1659 for user conductor
2021-11-01 02:46:17.250666 I | auth: deleting token EtWdNwyeiPUyufCZ.1660 for user conductor
2021-11-01 02:46:19.354909 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:22.251463 I | auth: deleting token WtNDWJQfBmKKNaQe.1666 for user conductor
2021-11-01 02:46:22.251588 I | auth: deleting token ciZGGmNhSMvYjEbD.1665 for user conductor
2021-11-01 02:46:22.251605 I | auth: deleting token BRUfHQAEfaAKqqbQ.1663 for user conductor
2021-11-01 02:46:22.251620 I | auth: deleting token kaZkWjJYViiQoxiH.1664 for user conductor
2021-11-01 02:46:22.251641 I | auth: deleting token EKBLwnxolJbAyVAE.1662 for user conductor
2021-11-01 02:46:23.855998 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.003179986s) to execute
2021-11-01 02:46:24.450394 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:25.854528 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.803603461s) to execute
2021-11-01 02:46:25.854666 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.803691922s) to execute
2021-11-01 02:46:25.854901 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.902065256s) to execute
2021-11-01 02:46:27.160062 I | auth: deleting token odwFDFNXyATJQqLK.1668 for user conductor
2021-11-01 02:46:27.160122 I | auth: deleting token kwHBDLQFnksSEYwY.1671 for user conductor
2021-11-01 02:46:27.160137 I | auth: deleting token yWedgtvjlpmOqwKi.1667 for user conductor
2021-11-01 02:46:27.160162 I | auth: deleting token PnqCmedtrlhtnGCy.1670 for user conductor
2021-11-01 02:46:28.351647 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.298462471s) to execute
2021-11-01 02:46:29.450615 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:30.250423 I | auth: deleting token oTDBobMDDxSqOqEE.1669 for user conductor
2021-11-01 02:46:30.354787 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.003052239s) to execute
2021-11-01 02:46:32.250534 I | auth: deleting token WvZNNvFCsefIhOrU.1672 for user conductor
2021-11-01 02:46:32.250585 I | auth: deleting token rBwNzuZVAWZGBRxk.1675 for user conductor
2021-11-01 02:46:32.250593 I | auth: deleting token nGAnQlxctOXfdyhF.1673 for user conductor
2021-11-01 02:46:33.160061 I | auth: deleting token HljVwZvaglfaujUa.1676 for user conductor
2021-11-01 02:46:33.160163 I | auth: deleting token QcNMmvPZATnAdPbh.1674 for user conductor
2021-11-01 02:46:34.451043 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:36.450978 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.312684017s) to execute
2021-11-01 02:46:38.160186 I | auth: deleting token TaBpgkfkCqqWNKAN.1679 for user conductor
2021-11-01 02:46:38.160233 I | auth: deleting token cfRrGOpCxljJysGY.1680 for user conductor
2021-11-01 02:46:38.160246 I | auth: deleting token hEwseRrHZxVNWMce.1678 for user conductor
2021-11-01 02:46:38.160259 I | auth: deleting token xQxLBQcrCVADnKaj.1681 for user conductor
2021-11-01 02:46:38.160286 I | auth: deleting token abviKjmdPPgOuADf.1677 for user conductor
2021-11-01 02:46:39.160097 I | auth: deleting token HuLUrOLiAVHRQkzE.1682 for user conductor
2021-11-01 02:46:39.451781 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:40.160275 I | auth: deleting token CXEXKuMAosErnEqc.1683 for user conductor
2021-11-01 02:46:40.352467 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601775464s) to execute
2021-11-01 02:46:42.160310 I | auth: deleting token IjwTlACwYQpcZvAa.1684 for user conductor
2021-11-01 02:46:43.250409 I | auth: deleting token yptwabeHcfACEvUK.1685 for user conductor
2021-11-01 02:46:44.452115 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:45.160128 I | auth: deleting token BnfuXjeOAmeCmDju.1686 for user conductor
2021-11-01 02:46:45.852106 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.999838105s) to execute
2021-11-01 02:46:49.452295 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:52.250369 I | auth: deleting token NehpXrHbiusTTLEO.1689 for user conductor
2021-11-01 02:46:52.250423 I | auth: deleting token dXIljzOkaEIwuwyV.1691 for user conductor
2021-11-01 02:46:52.250436 I | auth: deleting token OMdIhNYXjqIwIMSq.1693 for user conductor
2021-11-01 02:46:52.250457 I | auth: deleting token HTijGjxIJRDaHCNA.1690 for user conductor
2021-11-01 02:46:52.250469 I | auth: deleting token LZDharqEyZhkdzpx.1688 for user conductor
2021-11-01 02:46:52.250483 I | auth: deleting token vkSqXgxMGNEBxrpU.1692 for user conductor
2021-11-01 02:46:52.250508 I | auth: deleting token TxzIihwWWFhOAbkt.1687 for user conductor
2021-11-01 02:46:52.553031 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.697394169s) to execute
2021-11-01 02:46:52.553416 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (6.699066435s) to execute
2021-11-01 02:46:54.452562 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:55.354172 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.300438873s) to execute
2021-11-01 02:46:59.452802 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:46:59.851870 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.613814385s) to execute
2021-11-01 02:47:01.160113 I | auth: deleting token zczzDYYypoHetXfM.1696 for user conductor
2021-11-01 02:47:01.160174 I | auth: deleting token ayCSVEYmwuGFBezy.1694 for user conductor
2021-11-01 02:47:01.160195 I | auth: deleting token aDLOLYWLOzftUbkH.1699 for user conductor
2021-11-01 02:47:01.160219 I | auth: deleting token XbDHlNWJQgEkXloM.1697 for user conductor
2021-11-01 02:47:02.054633 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.104080834s) to execute
2021-11-01 02:47:03.160153 I | auth: deleting token XegEHWLZLubKEQXd.1695 for user conductor
2021-11-01 02:47:03.160222 I | auth: deleting token NqXdCTNoErXZyiOJ.1698 for user conductor
2021-11-01 02:47:04.452741 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.301949471s) to execute
2021-11-01 02:47:04.452990 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.396128512s) to execute
2021-11-01 02:47:04.453031 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:05.250548 I | auth: deleting token iPrsSMSQpFiKYFRE.1700 for user conductor
2021-11-01 02:47:07.160079 I | auth: deleting token airdJoRwMUrXsgbK.1701 for user conductor
2021-11-01 02:47:09.453257 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:10.160073 I | auth: deleting token HiCRXugGVSosVcRP.1702 for user conductor
2021-11-01 02:47:10.959966 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.008272781s) to execute
2021-11-01 02:47:12.250401 I | auth: deleting token jfHiINZCDjAukNCb.1704 for user conductor
2021-11-01 02:47:12.250434 I | auth: deleting token RFVWWidfPrftbsrQ.1703 for user conductor
2021-11-01 02:47:13.653884 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.693805427s) to execute
2021-11-01 02:47:13.654392 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.603482776s) to execute
2021-11-01 02:47:14.453435 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:17.250517 I | auth: deleting token rVwUHyrRuoSlWDLa.1705 for user conductor
2021-11-01 02:47:17.250586 I | auth: deleting token lQlCpIcBdCjrhzZF.1708 for user conductor
2021-11-01 02:47:17.250604 I | auth: deleting token GDUVibuGTrdreryl.1709 for user conductor
2021-11-01 02:47:17.250621 I | auth: deleting token jzGUWWpgEKTjaJYM.1707 for user conductor
2021-11-01 02:47:17.250642 I | auth: deleting token TslrKDgBKBQjSdML.1706 for user conductor
2021-11-01 02:47:18.553615 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.415333869s) to execute
2021-11-01 02:47:19.453626 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:21.253601 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.30288195s) to execute
2021-11-01 02:47:23.855385 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.402640957s) to execute
2021-11-01 02:47:24.453952 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:27.250506 I | auth: deleting token sBcNkhyoOEqEcSbS.1711 for user conductor
2021-11-01 02:47:27.250592 I | auth: deleting token vBYpxWSCfzwLyrMD.1710 for user conductor
2021-11-01 02:47:28.250533 I | auth: deleting token XlsYdGjlmfpvaMGV.1712 for user conductor
2021-11-01 02:47:29.454200 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:30.160181 I | auth: deleting token icpYjXaSJtxaJRJy.1713 for user conductor
2021-11-01 02:47:30.160228 I | auth: deleting token EobVRwXZHpbHroiH.1717 for user conductor
2021-11-01 02:47:30.160248 I | auth: deleting token TFZGfBouMKvqZnxb.1715 for user conductor
2021-11-01 02:47:30.160256 I | auth: deleting token MDwFujFuPubQAIPI.1714 for user conductor
2021-11-01 02:47:30.453086 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.501314196s) to execute
2021-11-01 02:47:30.453407 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (6.577200645s) to execute
2021-11-01 02:47:32.160094 I | auth: deleting token TLvjBpCHcphwhskn.1718 for user conductor
2021-11-01 02:47:33.351945 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.401284072s) to execute
2021-11-01 02:47:34.454468 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:35.160156 I | auth: deleting token DskcIMsJQiuNtsSn.1721 for user conductor
2021-11-01 02:47:35.160214 I | auth: deleting token WLtynckVkpMOSwua.1720 for user conductor
2021-11-01 02:47:35.160229 I | auth: deleting token PeGrnCDSAiLzHQFw.1719 for user conductor
2021-11-01 02:47:35.752317 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200023011s) to execute
2021-11-01 02:47:38.160080 I | auth: deleting token GxAcqJONXehuIsOf.1725 for user conductor
2021-11-01 02:47:38.160164 I | auth: deleting token EiQYwlRMlrGsrdVP.1723 for user conductor
2021-11-01 02:47:38.160194 I | auth: deleting token zoOoslfpYpLLgrmM.1722 for user conductor
2021-11-01 02:47:38.160211 I | auth: deleting token hysQXSynkehIetVG.1724 for user conductor
2021-11-01 02:47:39.454625 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:39.853451 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.515771664s) to execute
2021-11-01 02:47:40.050760 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (194.089507ms) to execute
2021-11-01 02:47:43.250479 I | auth: deleting token pzFzVNWfJGUYTaZM.1727 for user conductor
2021-11-01 02:47:43.250542 I | auth: deleting token wQRDCyFnoABoAeyE.1728 for user conductor
2021-11-01 02:47:43.250562 I | auth: deleting token vkMhhcXsbpHBahZV.1726 for user conductor
2021-11-01 02:47:43.250572 I | auth: deleting token HlEgyFikYDBIaBav.1729 for user conductor
2021-11-01 02:47:44.160190 I | auth: deleting token XjsDKElbkzCHaqPU.1731 for user conductor
2021-11-01 02:47:44.160257 I | auth: deleting token lDbpyXFnrAORrRez.1730 for user conductor
2021-11-01 02:47:44.455063 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:44.955668 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.005008561s) to execute
2021-11-01 02:47:45.138173 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (179.914042ms) to execute
2021-11-01 02:47:45.160020 I | auth: deleting token ZtCNYuZTNIqjHQqe.1732 for user conductor
2021-11-01 02:47:47.160183 I | auth: deleting token TGOMEnMRbjQRGrgW.1733 for user conductor
2021-11-01 02:47:48.054966 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.0107705s) to execute
2021-11-01 02:47:48.250405 I | auth: deleting token PhyIruTluJKXDndY.1734 for user conductor
2021-11-01 02:47:49.456215 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:50.160099 I | auth: deleting token tYDHNIXlALVHyACb.1735 for user conductor
2021-11-01 02:47:52.160050 I | auth: deleting token ZriGbhMkDJJJOSra.1736 for user conductor
2021-11-01 02:47:53.053637 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.902196765s) to execute
2021-11-01 02:47:54.160029 I | auth: deleting token ChCIDUxfCTiyZeCO.1737 for user conductor
2021-11-01 02:47:54.456515 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:47:55.160088 I | auth: deleting token iavTpQUlnBzQbjpK.1738 for user conductor
2021-11-01 02:47:55.655048 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.40437965s) to execute
2021-11-01 02:47:55.655197 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.504463737s) to execute
2021-11-01 02:47:55.655375 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.504537835s) to execute
2021-11-01 02:47:55.851947 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (101.059135ms) to execute
2021-11-01 02:47:57.250576 I | auth: deleting token dhiehUrBVbUNXuJe.1739 for user conductor
2021-11-01 02:47:57.952203 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.101390403s) to execute
2021-11-01 02:47:57.952493 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (701.901147ms) to execute
2021-11-01 02:47:58.160067 I | auth: deleting token gZWDbzoJHsdLgCaE.1740 for user conductor
2021-11-01 02:47:59.456816 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:02.160132 I | auth: deleting token anDxLKrVnABLejNE.1742 for user conductor
2021-11-01 02:48:02.160188 I | auth: deleting token IeiyuoAxjSdSKblF.1741 for user conductor
2021-11-01 02:48:02.160206 I | auth: deleting token uZxRiTpwhogCSxjV.1743 for user conductor
2021-11-01 02:48:02.959696 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.92168274s) to execute
2021-11-01 02:48:04.160110 I | auth: deleting token qgAjbebWlMjiOvAJ.1744 for user conductor
2021-11-01 02:48:04.457218 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:05.250496 I | auth: deleting token YrsfJhiWBPYpoMTt.1745 for user conductor
2021-11-01 02:48:05.250559 I | auth: deleting token OEsewTsrRatVdLca.1746 for user conductor
2021-11-01 02:48:05.351560 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.113322195s) to execute
2021-11-01 02:48:05.351734 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.300923547s) to execute
2021-11-01 02:48:08.554216 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.903613013s) to execute
2021-11-01 02:48:09.550554 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:11.053741 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.402200546s) to execute
2021-11-01 02:48:13.251390 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.10067181s) to execute
2021-11-01 02:48:14.550816 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:15.455260 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.203734846s) to execute
2021-11-01 02:48:15.550708 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.494657828s) to execute
2021-11-01 02:48:15.551082 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.296433897s) to execute
2021-11-01 02:48:15.653471 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (100.487096ms) to execute
2021-11-01 02:48:18.250603 I | auth: deleting token bXwZovfYmcmAkHdI.1748 for user conductor
2021-11-01 02:48:18.250637 I | auth: deleting token XunvhUArjnBGDtHM.1747 for user conductor
2021-11-01 02:48:18.250643 I | auth: deleting token GfZMGdrFIuxXYENQ.1751 for user conductor
2021-11-01 02:48:19.551128 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:19.854457 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.916529723s) to execute
2021-11-01 02:48:21.250506 I | auth: deleting token BgPRXJgYyCAKCuyG.1756 for user conductor
2021-11-01 02:48:21.250571 I | auth: deleting token oQEtrjEXIerdHmyH.1754 for user conductor
2021-11-01 02:48:21.250584 I | auth: deleting token pgSHDVKNWklxhpxd.1749 for user conductor
2021-11-01 02:48:21.250597 I | auth: deleting token rIvXczmoPRBeiGlu.1753 for user conductor
2021-11-01 02:48:21.250612 I | auth: deleting token ELEfypOaHFHltibC.1750 for user conductor
2021-11-01 02:48:21.250635 I | auth: deleting token wNCcwyRVCshMItfa.1755 for user conductor
2021-11-01 02:48:24.160025 I | auth: deleting token BKFFbllHxEkOZeOS.1757 for user conductor
2021-11-01 02:48:24.160056 I | auth: deleting token MkiFRddFFUxHFRQr.1758 for user conductor
2021-11-01 02:48:24.551319 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:26.160115 I | auth: deleting token olbODRvjUTeIAyXC.1762 for user conductor
2021-11-01 02:48:26.160173 I | auth: deleting token XHUyNUKbNzOLuveg.1759 for user conductor
2021-11-01 02:48:26.160199 I | auth: deleting token GZMhEeuWMeacSJdR.1760 for user conductor
2021-11-01 02:48:26.160218 I | auth: deleting token PHEFwKXGrHnMbtMX.1761 for user conductor
2021-11-01 02:48:26.651483 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.59816383s) to execute
2021-11-01 02:48:29.160166 I | auth: deleting token RcLZYfCEHsRAjjqw.1763 for user conductor
2021-11-01 02:48:29.160233 I | auth: deleting token cODWwXkqVakWKJDE.1764 for user conductor
2021-11-01 02:48:29.160259 I | auth: deleting token BPuhjrhKENvqLdTS.1765 for user conductor
2021-11-01 02:48:29.551699 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:31.160121 I | auth: deleting token aqxvNLbbyzLlsbRK.1767 for user conductor
2021-11-01 02:48:31.160194 I | auth: deleting token gOOmuclSyqHlfCbN.1766 for user conductor
2021-11-01 02:48:31.253683 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.501546891s) to execute
2021-11-01 02:48:31.253939 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.600170658s) to execute
2021-11-01 02:48:31.254075 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.60049566s) to execute
2021-11-01 02:48:32.160070 I | auth: deleting token sSylixMbmbFHSdbd.1768 for user conductor
2021-11-01 02:48:33.160115 I | auth: deleting token OaazOPRTolKfcXpi.1769 for user conductor
2021-11-01 02:48:34.160074 I | auth: deleting token xrLPEtONGvnqiixO.1770 for user conductor
2021-11-01 02:48:34.551996 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:37.553566 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.098378234s) to execute
2021-11-01 02:48:38.160099 I | auth: deleting token vNkxOciyOrxwVqcp.1772 for user conductor
2021-11-01 02:48:38.160162 I | auth: deleting token OiACQANBOJZRAkml.1771 for user conductor
2021-11-01 02:48:39.552328 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:39.759725 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.107608896s) to execute
2021-11-01 02:48:39.759921 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.20387653s) to execute
2021-11-01 02:48:39.760194 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.204091242s) to execute
2021-11-01 02:48:40.160045 I | auth: deleting token LeXbeymfvMQBlUEJ.1774 for user conductor
2021-11-01 02:48:42.250421 I | auth: deleting token cXwMpCbwTwmukYJN.1775 for user conductor
2021-11-01 02:48:42.250512 I | auth: deleting token VbvAIkoOAkopiOii.1776 for user conductor
2021-11-01 02:48:42.250532 I | auth: deleting token FwMOIySTJzqGmqDA.1778 for user conductor
2021-11-01 02:48:42.250548 I | auth: deleting token hjgCfeuUESHDmeIl.1777 for user conductor
2021-11-01 02:48:42.250570 I | auth: deleting token cGVRAFiRwntDCdlb.1773 for user conductor
2021-11-01 02:48:42.452490 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.501674708s) to execute
2021-11-01 02:48:43.250500 I | auth: deleting token GUlTnHuvJrKeUKBn.1779 for user conductor
2021-11-01 02:48:44.552795 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:45.250556 I | auth: deleting token ZSEzRVkyaLdUnDuo.1781 for user conductor
2021-11-01 02:48:45.250666 I | auth: deleting token YjsxoDLGCEgeRIiA.1780 for user conductor
2021-11-01 02:48:47.450964 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.994940813s) to execute
2021-11-01 02:48:48.160051 I | auth: deleting token pDUZAuCSQpmGeVsW.1782 for user conductor
2021-11-01 02:48:48.160129 I | auth: deleting token rVytwIwVGunTJBdD.1783 for user conductor
2021-11-01 02:48:49.456154 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.001515297s) to execute
2021-11-01 02:48:49.456282 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.002919783s) to execute
2021-11-01 02:48:49.650469 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:49.651974 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.19772457s) to execute
2021-11-01 02:48:49.739130 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (188.471113ms) to execute
2021-11-01 02:48:52.160065 I | auth: deleting token flokQlGFjvNnkecV.1786 for user conductor
2021-11-01 02:48:52.160117 I | auth: deleting token VYfVxlUxSWOVNikk.1784 for user conductor
2021-11-01 02:48:52.160128 I | auth: deleting token pyOOBERjStRkzMhP.1789 for user conductor
2021-11-01 02:48:52.160156 I | auth: deleting token UeAbFAkgUPArbEUA.1787 for user conductor
2021-11-01 02:48:52.160166 I | auth: deleting token JlSWqkPrmNVYZIrK.1788 for user conductor
2021-11-01 02:48:52.160194 I | auth: deleting token PiAgdiUXIrtZOAVC.1785 for user conductor
2021-11-01 02:48:54.650818 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:48:55.250688 I | auth: deleting token ZYaPDKNSURNrDhVu.1791 for user conductor
2021-11-01 02:48:55.250763 I | auth: deleting token EQDfJuSbFREfSimB.1792 for user conductor
2021-11-01 02:48:55.250787 I | auth: deleting token FNTfLUngqqJDEVri.1790 for user conductor
2021-11-01 02:48:56.160117 I | auth: deleting token JqlhZOlbtMogaubo.1793 for user conductor
2021-11-01 02:48:56.556259 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.204124562s) to execute
2021-11-01 02:48:57.160127 I | auth: deleting token JbfgOGERmXMWZAOc.1794 for user conductor
2021-11-01 02:48:58.856059 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.105424367s) to execute
2021-11-01 02:48:58.856472 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.297583539s) to execute
2021-11-01 02:48:58.953191 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.30054159s) to execute
2021-11-01 02:48:59.250360 I | auth: deleting token MRnFLlGOpmweUHWo.1795 for user conductor
2021-11-01 02:48:59.651139 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:00.160036 I | auth: deleting token GALkIYoHCqHCOFut.1796 for user conductor
2021-11-01 02:49:00.753482 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.802583353s) to execute
2021-11-01 02:49:00.753612 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.797958815s) to execute
2021-11-01 02:49:03.160088 I | auth: deleting token QyomUKVFrtmwvwAT.1797 for user conductor
2021-11-01 02:49:03.254425 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.497105306s) to execute
2021-11-01 02:49:04.651457 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:05.753615 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.401879282s) to execute
2021-11-01 02:49:05.753730 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.497137482s) to execute
2021-11-01 02:49:06.160015 I | auth: deleting token QduJaDsjneHumvck.1799 for user conductor
2021-11-01 02:49:06.160068 I | auth: deleting token bcFcwwMYHhUowOey.1800 for user conductor
2021-11-01 02:49:09.257075 I | auth: deleting token rLGEjzupZPxPzSUw.1798 for user conductor
2021-11-01 02:49:09.651719 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:10.655794 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.898851059s) to execute
2021-11-01 02:49:10.656604 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.900365808s) to execute
2021-11-01 02:49:11.250434 I | auth: deleting token nTASmDUSxyGJtVJR.1802 for user conductor
2021-11-01 02:49:13.352945 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601279175s) to execute
2021-11-01 02:49:13.353268 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.69458665s) to execute
2021-11-01 02:49:14.160105 I | auth: deleting token WcsyzOSLBpUXciOR.1805 for user conductor
2021-11-01 02:49:14.160287 I | auth: deleting token uMKUsKzwBhlFlFsX.1803 for user conductor
2021-11-01 02:49:14.160356 I | auth: deleting token vtPEbALSFdVCKHFx.1806 for user conductor
2021-11-01 02:49:14.160422 I | auth: deleting token SkYSnLVcqbBTHQBm.1804 for user conductor
2021-11-01 02:49:14.160486 I | auth: deleting token QzVfCuPpmzsGLriC.1801 for user conductor
2021-11-01 02:49:14.651970 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:15.950647 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.199131902s) to execute
2021-11-01 02:49:15.950732 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.49891936s) to execute
2021-11-01 02:49:15.950832 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.595902216s) to execute
2021-11-01 02:49:18.160104 I | auth: deleting token SRsmsStbBGRGjJbh.1809 for user conductor
2021-11-01 02:49:18.160170 I | auth: deleting token BKHlXuzAXXvgqyGj.1807 for user conductor
2021-11-01 02:49:18.160185 I | auth: deleting token kQKkRwvvLoeqcOwp.1811 for user conductor
2021-11-01 02:49:18.160199 I | auth: deleting token OsqmOccwRemYnbrn.1808 for user conductor
2021-11-01 02:49:19.160124 I | auth: deleting token zLcOqnNIRaaLbjSc.1810 for user conductor
2021-11-01 02:49:19.457015 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.006413095s) to execute
2021-11-01 02:49:19.652227 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:19.737989 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (185.105475ms) to execute
2021-11-01 02:49:21.753391 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.800728253s) to execute
2021-11-01 02:49:23.160160 I | auth: deleting token UZYHzrDSpmZzWJSP.1813 for user conductor
2021-11-01 02:49:23.160246 I | auth: deleting token eThsNTNtVaXFEDJB.1815 for user conductor
2021-11-01 02:49:23.160283 I | auth: deleting token PHRNpLCLYTmAvlqi.1814 for user conductor
2021-11-01 02:49:23.160307 I | auth: deleting token RrEXNlikWddWYRvR.1812 for user conductor
2021-11-01 02:49:24.052260 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.201711465s) to execute
2021-11-01 02:49:24.250553 I | auth: deleting token xtGHODntlDpdkMgT.1816 for user conductor
2021-11-01 02:49:24.652355 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:28.750792 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.598838554s) to execute
2021-11-01 02:49:29.160101 I | auth: deleting token cmYKDfYqkHLddKEk.1820 for user conductor
2021-11-01 02:49:29.160157 I | auth: deleting token tBHllOOwEjnHzKNt.1818 for user conductor
2021-11-01 02:49:29.160195 I | auth: deleting token GCEPMUfnjLIgDWzQ.1817 for user conductor
2021-11-01 02:49:29.652580 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:30.656398 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.905444173s) to execute
2021-11-01 02:49:30.656826 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.903371639s) to execute
2021-11-01 02:49:30.656926 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (6.60233965s) to execute
2021-11-01 02:49:33.354438 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.603576954s) to execute
2021-11-01 02:49:33.354718 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.602026151s) to execute
2021-11-01 02:49:34.250490 I | auth: deleting token xffwsbvERDpKERFc.1824 for user conductor
2021-11-01 02:49:34.250558 I | auth: deleting token zkYOJCMvemciKumG.1823 for user conductor
2021-11-01 02:49:34.250578 I | auth: deleting token GOhFFIUmEWLUcSux.1819 for user conductor
2021-11-01 02:49:34.250599 I | auth: deleting token UawdOdXVuQoMnXRP.1825 for user conductor
2021-11-01 02:49:34.250614 I | auth: deleting token QIgyTjtAPMbsewIr.1821 for user conductor
2021-11-01 02:49:34.250626 I | auth: deleting token mxdgjbJFDpFNnwDi.1826 for user conductor
2021-11-01 02:49:34.250637 I | auth: deleting token qJEPGSfEACKtKhWN.1822 for user conductor
2021-11-01 02:49:34.652749 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:37.250491 I | auth: deleting token wqdnTTcafmwIfbGe.1827 for user conductor
2021-11-01 02:49:37.250584 I | auth: deleting token MsauJfyKfFOQOEKT.1829 for user conductor
2021-11-01 02:49:37.250625 I | auth: deleting token qZFEPXisNdhavObU.1828 for user conductor
2021-11-01 02:49:37.852385 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.494715039s) to execute
2021-11-01 02:49:38.140229 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (189.303048ms) to execute
2021-11-01 02:49:38.140319 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (184.825741ms) to execute
2021-11-01 02:49:38.160181 I | auth: deleting token chKQsouJcxfPrYCe.1830 for user conductor
2021-11-01 02:49:39.653030 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:40.160051 I | auth: deleting token pOYlWeWqiHBvNutb.1833 for user conductor
2021-11-01 02:49:40.160110 I | auth: deleting token lLTlLdsqeAprMVtY.1831 for user conductor
2021-11-01 02:49:40.160123 I | auth: deleting token XxOxGGmBbSqZDFXg.1832 for user conductor
2021-11-01 02:49:42.950869 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.410080596s) to execute
2021-11-01 02:49:43.160122 I | auth: deleting token CXxdGUIzyrTHDOrc.1834 for user conductor
2021-11-01 02:49:43.160191 I | auth: deleting token VzAZyukmngmjbAEe.1835 for user conductor
2021-11-01 02:49:44.160033 I | auth: deleting token gKtyNSNcpnhpFols.1836 for user conductor
2021-11-01 02:49:44.750399 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:45.851579 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.198827211s) to execute
2021-11-01 02:49:46.160032 I | auth: deleting token uGZMBOQaazatABAV.1837 for user conductor
2021-11-01 02:49:46.160233 I | auth: deleting token CNUNmsASthPzhVir.1838 for user conductor
2021-11-01 02:49:48.250438 I | auth: deleting token fUrHKjqmWudkDCLp.1840 for user conductor
2021-11-01 02:49:48.252987 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.215072587s) to execute
2021-11-01 02:49:49.750791 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:52.552875 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.699644235s) to execute
2021-11-01 02:49:54.751255 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:49:55.055775 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.499750168s) to execute
2021-11-01 02:49:55.055893 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.500599595s) to execute
2021-11-01 02:49:56.160131 I | auth: deleting token eQxXsFpbLlXGgHKb.1843 for user conductor
2021-11-01 02:49:56.160217 I | auth: deleting token RxpdLhmXcjDNQnTO.1844 for user conductor
2021-11-01 02:49:56.160237 I | auth: deleting token mwTQzXbwPoZEpOOR.1839 for user conductor
2021-11-01 02:49:56.160248 I | auth: deleting token bwXNSCmbJzanjskQ.1842 for user conductor
2021-11-01 02:49:56.160272 I | auth: deleting token jQWqSvdiBmXZdWzQ.1841 for user conductor
2021-11-01 02:49:59.751561 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:50:03.250439 I | auth: deleting token lyRdScXLvtvDCagg.1845 for user conductor
2021-11-01 02:50:03.250503 I | auth: deleting token pepfCmrGcGqInYQp.1852 for user conductor
2021-11-01 02:50:03.250524 I | auth: deleting token rYkvJgsVQMCpDHvK.1846 for user conductor
2021-11-01 02:50:03.250538 I | auth: deleting token yuuEYBqyvEdFEwJt.1851 for user conductor
2021-11-01 02:50:03.250553 I | auth: deleting token dnkhsNmMbHBFKNjh.1849 for user conductor
2021-11-01 02:50:03.250568 I | auth: deleting token MCmIYzxYHfMifcpn.1850 for user conductor
2021-11-01 02:50:03.250580 I | auth: deleting token QjSxCRzpjWXvtGES.1847 for user conductor
2021-11-01 02:50:03.250593 I | auth: deleting token fnhiPWDDrSxTiGJa.1848 for user conductor
2021-11-01 02:50:04.652117 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.001394527s) to execute
2021-11-01 02:50:04.752042 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:50:06.160180 I | auth: deleting token wRJECXzVWaNeLOTu.1853 for user conductor
2021-11-01 02:50:06.160258 I | auth: deleting token JgFHtqxTTBMMziHa.1854 for user conductor
2021-11-01 02:50:07.551593 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.798336542s) to execute
2021-11-01 02:50:07.551873 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.896957469s) to execute
2021-11-01 02:50:07.654059 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.999071847s) to execute
2021-11-01 02:50:07.752376 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (198.237601ms) to execute
2021-11-01 02:50:09.161434 I | auth: deleting token PrNkbGgNgfBblyTD.1856 for user conductor
2021-11-01 02:50:09.161485 I | auth: deleting token KCxFlLktwQhgiTZF.1855 for user conductor
2021-11-01 02:50:09.161497 I | auth: deleting token DTQCDiTrmmFxClLm.1858 for user conductor
2021-11-01 02:50:09.161515 I | auth: deleting token nSAvREPZJZKGCsjW.1857 for user conductor
2021-11-01 02:50:09.752282 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:50:10.351041 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.695618357s) to execute
2021-11-01 02:50:10.351334 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (798.232574ms) to execute
2021-11-01 02:50:14.752504 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:50:15.956649 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.599266668s) to execute
2021-11-01 02:50:18.551557 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.498723076s) to execute
2021-11-01 02:50:18.551680 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.501119292s) to execute
2021-11-01 02:50:19.160101 I | auth: deleting token eDNCdMOwkkMqslkK.1859 for user conductor
2021-11-01 02:50:19.752790 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:50:20.160113 I | auth: deleting token KbszVcmlUqdHYkXk.1861 for user conductor
2021-11-01 02:50:20.160169 I | auth: deleting token wBRjZBfzPvJurJse.1860 for user conductor
2021-11-01 02:50:20.160193 I | auth: deleting token TTBEhzhmAwagXDDj.1862 for user conductor
2021-11-01 02:50:20.852916 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.801965706s) to execute
2021-11-01 02:50:20.853074 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.1995249s) to execute
2021-11-01 02:50:20.853236 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.202500034s) to execute
2021-11-01 02:50:21.038425 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (183.59993ms) to execute
2021-11-01 02:50:22.160158 I | auth: deleting token McSCdNloSAiaUDRW.1864 for user conductor
2021-11-01 02:50:22.160221 I | auth: deleting token LtyPlwqkGsrozKaW.1866 for user conductor
2021-11-01 02:50:22.160254 I | auth: deleting token gilqQnsnaYHZgWzy.1867 for user conductor
2021-11-01 02:50:22.160267 I | auth: deleting token BEoBAgMsIgmjJnsa.1865 for user conductor
2021-11-01 02:50:22.160282 I | auth: deleting token BTpmUcxhBpsoZKGs.1863 for user conductor
2021-11-01 02:50:24.753016 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:50:26.053510 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.01327988s) to execute
2021-11-01 02:50:28.250369 I | auth: deleting token bioYcJhIAQAGncgD.1869 for user conductor
2021-11-01 02:50:28.250416 I | auth: deleting token kMXJSpXHqECoUFJB.1868 for user conductor
2021-11-01 02:50:28.754570 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.002196634s) to execute
2021-11-01 02:50:29.753255 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:50:30.160024 I | auth: deleting token MHDDVrmGyQyHoOww.1875 for user conductor
2021-11-01 02:50:30.160085 I | auth: deleting token ZEikMcdkOFqCpDNx.1873 for user conductor
2021-11-01 02:50:30.160113 I | auth: deleting token cctlGmSShPTGDvPv.1872 for user conductor
2021-11-01 02:50:30.160126 I | auth: deleting token ObVbybSPnyBVSTGz.1871 for user conductor
2021-11-01 02:50:30.160138 I | auth: deleting token WbvULGdDtfeOPqaP.1874 for user conductor
2021-11-01 02:50:30.160149 I | auth: deleting token xbInCoYjHtgaozth.1870 for user conductor
2021-11-01 02:50:31.250408 I | auth: deleting token gZwjxQoqwvjxbwzY.1876 for user conductor
2021-11-01 02:50:31.555293 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.702803889s) to execute
2021-11-01 02:50:31.556050 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.705428132s) to execute
2021-11-01 02:50:31.657028 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.806105289s) to execute
2021-11-01 02:50:32.160172 I | auth: deleting token hIYMVSGoXHFbVNfK.1877 for user conductor
2021-11-01 02:50:34.160043 I | auth: deleting token zjafauvSqFVkfYwZ.1878 for user conductor
2021-11-01 02:50:34.653696 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.00251968s) to execute
2021-11-01 02:50:34.654212 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.995282338s) to execute
2021-11-01 02:50:34.753498 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:50:35.250532 I | auth: deleting token JsdaIOkEzDlLWosZ.1879 for user conductor
2021-11-01 02:50:36.250493 I | auth: deleting token IdSzJEmtzzqJSPZR.1880 for user conductor
2021-11-01 02:50:36.954491 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.716401376s) to execute
2021-11-01 02:50:38.160074 I | auth: deleting token DCjgrsPzbxuNzvae.1881 for user conductor
2021-11-01 02:50:39.160077 I | auth: deleting token djjBHAHjrVXgCQfj.1882 for user conductor
2021-11-01 02:50:39.160146 I | auth: deleting token NZyZVAqBGmxqlYoJ.1883 for user conductor
2021-11-01 02:50:39.753834 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:50:41.956601 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.903906568s) to execute
2021-11-01 02:50:41.957009 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.00021561s) to execute
2021-11-01 02:50:42.152287 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (101.168476ms) to execute
2021-11-01 02:50:42.160164 I | auth: deleting token MZMMDVTcTIEpvElB.1884 for user conductor
2021-11-01 02:50:42.160218 I | auth: deleting token PViYwLeWbAlIqZYO.1885 for user conductor
2021-11-01 02:50:44.160180 I | auth: deleting token OBBVkPlDNlFUxRaI.1887 for user conductor
2021-11-01 02:50:44.160291 I | auth: deleting token YlZBDSUVTUBUEoeM.1886 for user conductor
2021-11-01 02:50:44.754112 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:50:45.351131 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (3.299840776s) to execute
2021-11-01 02:50:45.351894 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.198819651s) to execute
2021-11-01 02:50:48.153520 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.802636485s) to execute
2021-11-01 02:50:49.754350 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:50:50.755502 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601839168s) to execute
2021-11-01 02:50:50.755739 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.600065281s) to execute
2021-11-01 02:50:54.160254 I | auth: deleting token XlebBZwHnKqTiGxI.1892 for user conductor
2021-11-01 02:50:54.160288 I | auth: deleting token dwZdxQtYyOjnPdeC.1893 for user conductor
2021-11-01 02:50:54.160296 I | auth: deleting token YnjWftiCQXVCrWDh.1888 for user conductor
2021-11-01 02:50:54.160302 I | auth: deleting token iFlzGjahPSHhDbFk.1889 for user conductor
2021-11-01 02:50:54.160312 I | auth: deleting token EhTDOMZxhuBLTerr.1890 for user conductor
2021-11-01 02:50:54.160319 I | auth: deleting token qVnAECdfinCxwjaS.1891 for user conductor
2021-11-01 02:50:54.754599 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:50:55.255233 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.404415171s) to execute
2021-11-01 02:50:55.255365 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.302854059s) to execute
2021-11-01 02:50:57.160045 I | auth: deleting token trrQUdLZABzQjfRs.1897 for user conductor
2021-11-01 02:50:57.160085 I | auth: deleting token qbnMYHlbkKVCkaxQ.1895 for user conductor
2021-11-01 02:50:57.160091 I | auth: deleting token jERoQWampMLTPRvj.1896 for user conductor
2021-11-01 02:50:57.160101 I | auth: deleting token JYGcWJrWLYNrqIKG.1894 for user conductor
2021-11-01 02:50:57.752179 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.300197912s) to execute
2021-11-01 02:50:57.752503 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.401727978s) to execute
2021-11-01 02:50:57.852934 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.402101158s) to execute
2021-11-01 02:50:57.939562 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (185.289025ms) to execute
2021-11-01 02:50:59.160101 I | auth: deleting token smhPWfejFnynuNyL.1898 for user conductor
2021-11-01 02:50:59.754852 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:00.160113 I | auth: deleting token kwHQXBonauPaDctB.1900 for user conductor
2021-11-01 02:51:00.253446 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.51346738s) to execute
2021-11-01 02:51:01.160086 I | auth: deleting token RmEfqvdDsHYJgULS.1901 for user conductor
2021-11-01 02:51:03.250477 I | auth: deleting token SUGKChWvPcQswdMR.1902 for user conductor
2021-11-01 02:51:03.253423 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.500931414s) to execute
2021-11-01 02:51:04.160133 I | auth: deleting token RtxgjJdygvmlCYiX.1904 for user conductor
2021-11-01 02:51:04.755739 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:05.160133 I | auth: deleting token qSPlFZpLLiOvUmOb.1905 for user conductor
2021-11-01 02:51:06.251570 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.699954193s) to execute
2021-11-01 02:51:08.160036 I | auth: deleting token itsgXVMmENAOddTZ.1906 for user conductor
2021-11-01 02:51:08.453414 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.198724688s) to execute
2021-11-01 02:51:09.756023 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:11.250394 I | auth: deleting token lGdwPoNUySdtsOUr.1909 for user conductor
2021-11-01 02:51:11.250436 I | auth: deleting token uLDZrSlgKLKOWCbz.1907 for user conductor
2021-11-01 02:51:11.250446 I | auth: deleting token imjseFgHmYVFidZO.1911 for user conductor
2021-11-01 02:51:11.250453 I | auth: deleting token WnmTPCIZpcluTjrS.1908 for user conductor
2021-11-01 02:51:11.250461 I | auth: deleting token MCFjgTqvppvLrJfT.1910 for user conductor
2021-11-01 02:51:13.160178 I | auth: deleting token FTAmzBYpHIakpxsj.1913 for user conductor
2021-11-01 02:51:13.160237 I | auth: deleting token BljYHWjCJuVAXPWy.1912 for user conductor
2021-11-01 02:51:14.756414 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:16.160215 I | auth: deleting token wtSrzKwhCeYGPJbp.1915 for user conductor
2021-11-01 02:51:16.160293 I | auth: deleting token PuvMQQgfCRjBydha.1914 for user conductor
2021-11-01 02:51:17.056641 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.01530551s) to execute
2021-11-01 02:51:19.453634 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.300347647s) to execute
2021-11-01 02:51:19.756836 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:22.057842 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (4.983624733s) to execute
2021-11-01 02:51:22.057992 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.904637166s) to execute
2021-11-01 02:51:22.058147 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601197861s) to execute
2021-11-01 02:51:22.058278 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.602619673s) to execute
2021-11-01 02:51:22.251649 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.75903ms) to execute
2021-11-01 02:51:24.160150 I | auth: deleting token OpCPskpaZoCZvEwN.1920 for user conductor
2021-11-01 02:51:24.160225 I | auth: deleting token buJxjAkUsSWNunPv.1921 for user conductor
2021-11-01 02:51:24.160242 I | auth: deleting token CeVrEqJjfUVGgrAS.1917 for user conductor
2021-11-01 02:51:24.160254 I | auth: deleting token TlHsPAKSYNyxsxxm.1916 for user conductor
2021-11-01 02:51:24.160265 I | auth: deleting token CNMxIKdmVbQYTuaw.1922 for user conductor
2021-11-01 02:51:24.160288 I | auth: deleting token WojAeDwnzFPSOxbA.1923 for user conductor
2021-11-01 02:51:24.160305 I | auth: deleting token SRdtPGJhVfDxRhqD.1918 for user conductor
2021-11-01 02:51:24.757123 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:26.250388 I | auth: deleting token nkILPUfJxvsxVOJP.1925 for user conductor
2021-11-01 02:51:26.250479 I | auth: deleting token KeCEfYKvQDmUUTbQ.1919 for user conductor
2021-11-01 02:51:26.250513 I | auth: deleting token sfPHnfykRhcdNBRH.1924 for user conductor
2021-11-01 02:51:27.555274 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (5.302720497s) to execute
2021-11-01 02:51:29.850430 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:30.055141 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.501591464s) to execute
2021-11-01 02:51:31.160073 I | auth: deleting token qHlcqElzJAEJNUSN.1931 for user conductor
2021-11-01 02:51:31.160142 I | auth: deleting token kLoIgidupwOCrUQX.1929 for user conductor
2021-11-01 02:51:31.160158 I | auth: deleting token qUXCwtIQjSsiNnkr.1932 for user conductor
2021-11-01 02:51:31.160171 I | auth: deleting token USeVWQyFgfFqsuCi.1927 for user conductor
2021-11-01 02:51:31.160182 I | auth: deleting token UwSmRWBsPJBYEhTF.1930 for user conductor
2021-11-01 02:51:31.160197 I | auth: deleting token nwwFetVnYztkaGGR.1928 for user conductor
2021-11-01 02:51:32.854214 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.700649174s) to execute
2021-11-01 02:51:32.854406 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.700790867s) to execute
2021-11-01 02:51:32.854492 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.700774629s) to execute
2021-11-01 02:51:32.854667 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.416450506s) to execute
2021-11-01 02:51:34.850677 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:37.160122 I | auth: deleting token mgWxQTqDKZqVYINX.1935 for user conductor
2021-11-01 02:51:37.160313 I | auth: deleting token YBAWYzpEgObyPYdA.1937 for user conductor
2021-11-01 02:51:37.160367 I | auth: deleting token LPvoSJVKJywlJbFd.1933 for user conductor
2021-11-01 02:51:37.160416 I | auth: deleting token BGJtMRNlVGKgSERE.1936 for user conductor
2021-11-01 02:51:37.160473 I | auth: deleting token LwaTGSZBXIZoDPFI.1938 for user conductor
2021-11-01 02:51:37.160521 I | auth: deleting token HXxcSwQLomMifenS.1939 for user conductor
2021-11-01 02:51:39.950440 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:41.160078 I | auth: deleting token OlODNlIqfAVUiDnI.1942 for user conductor
2021-11-01 02:51:41.160144 I | auth: deleting token OCUboaGGyRtovYRN.1944 for user conductor
2021-11-01 02:51:41.160164 I | auth: deleting token rkILyMPJhYuvnlQc.1940 for user conductor
2021-11-01 02:51:41.160191 I | auth: deleting token lCDXpOZJTvTTbZQL.1941 for user conductor
2021-11-01 02:51:41.160203 I | auth: deleting token mWtNgrfrymXjhwrD.1943 for user conductor
2021-11-01 02:51:44.652896 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (10.002176462s) to execute
2021-11-01 02:51:44.950765 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:46.160152 I | auth: deleting token tqNZOXrwTlhpJvTb.1945 for user conductor
2021-11-01 02:51:46.160206 I | auth: deleting token sirZcxYZtZihtDpM.1947 for user conductor
2021-11-01 02:51:47.353970 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.601089256s) to execute
2021-11-01 02:51:47.354203 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.603539899s) to execute
2021-11-01 02:51:47.539312 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.788637227s) to execute
2021-11-01 02:51:49.951101 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:49.952785 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.501962533s) to execute
2021-11-01 02:51:49.952935 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.412440302s) to execute
2021-11-01 02:51:49.953029 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.102418684s) to execute
2021-11-01 02:51:52.757131 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.703539004s) to execute
2021-11-01 02:51:53.160141 I | auth: deleting token CUDutScTCHDtmMnB.1946 for user conductor
2021-11-01 02:51:53.160183 I | auth: deleting token tTpLWFKZYVxHcptJ.1949 for user conductor
2021-11-01 02:51:53.160191 I | auth: deleting token HHfMkpjkPXODEQyW.1948 for user conductor
2021-11-01 02:51:53.160200 I | auth: deleting token GKedUcLBYstzYmxy.1951 for user conductor
2021-11-01 02:51:53.160207 I | auth: deleting token gWPXMurQgWdqVVuo.1950 for user conductor
2021-11-01 02:51:54.951338 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:51:55.355127 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.202521973s) to execute
2021-11-01 02:51:56.160154 I | auth: deleting token SHZmHvXEHvcTQmiD.1952 for user conductor
2021-11-01 02:51:56.160230 I | auth: deleting token bqrECLPMiDLgbepD.1953 for user conductor
2021-11-01 02:51:56.160257 I | auth: deleting token mLGypPHzuIxqitsy.1954 for user conductor
2021-11-01 02:51:57.160047 I | auth: deleting token TBjcBgrWTAdyBDsc.1955 for user conductor
2021-11-01 02:51:58.051589 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.501008176s) to execute
2021-11-01 02:51:58.051833 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.601070223s) to execute
2021-11-01 02:51:59.951742 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:00.160154 I | auth: deleting token sHIXqJxlvviPeTLZ.1957 for user conductor
2021-11-01 02:52:00.160224 I | auth: deleting token flgRIDDnqzMPunBm.1956 for user conductor
2021-11-01 02:52:02.160086 I | auth: deleting token IElGDjQDtlAWZPva.1959 for user conductor
2021-11-01 02:52:04.952112 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:05.160133 I | auth: deleting token ATdkUYYfodjhIYmV.1962 for user conductor
2021-11-01 02:52:05.160176 I | auth: deleting token OdUwaQsnWNXKRRYy.1961 for user conductor
2021-11-01 02:52:05.160194 I | auth: deleting token AdWpHDJtEnhprrhf.1958 for user conductor
2021-11-01 02:52:05.160211 I | auth: deleting token ONItOpfysgZEWRom.1960 for user conductor
2021-11-01 02:52:05.160225 I | auth: deleting token GUWSccBZhoJMPprR.1963 for user conductor
2021-11-01 02:52:09.952499 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:10.250897 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.099326646s) to execute
2021-11-01 02:52:11.160238 I | auth: deleting token yCuECBZwbYwImYkm.1964 for user conductor
2021-11-01 02:52:14.159995 I | auth: deleting token orSWsODNzQmwXTBc.1972 for user conductor
2021-11-01 02:52:14.160027 I | auth: deleting token gajgyFxidAZTnXWW.1968 for user conductor
2021-11-01 02:52:14.160039 I | auth: deleting token qeDrpuARrluMPPAb.1966 for user conductor
2021-11-01 02:52:14.160045 I | auth: deleting token CLwLqTtAusNMhlvP.1967 for user conductor
2021-11-01 02:52:14.160050 I | auth: deleting token LUIXZCJpjbfNIvCK.1969 for user conductor
2021-11-01 02:52:14.160055 I | auth: deleting token ePqeOvFKHInmTEFh.1970 for user conductor
2021-11-01 02:52:14.160061 I | auth: deleting token YwuoJwQTxGdrMSWY.1965 for user conductor
2021-11-01 02:52:14.160069 I | auth: deleting token ABCrGssiniixAILD.1971 for user conductor
2021-11-01 02:52:14.952750 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:19.160080 I | auth: deleting token OjIvRtvMZbpTsdSe.1977 for user conductor
2021-11-01 02:52:19.160148 I | auth: deleting token fAHRvZhtXfZBgDTi.1975 for user conductor
2021-11-01 02:52:19.160178 I | auth: deleting token OtvRqGhVLhHwgZpF.1973 for user conductor
2021-11-01 02:52:19.160197 I | auth: deleting token pnsVzpVdFOpvoYxt.1974 for user conductor
2021-11-01 02:52:19.160208 I | auth: deleting token nxtZsgBGOadFqvzb.1976 for user conductor
2021-11-01 02:52:19.953003 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:24.160089 I | auth: deleting token nDyxREcOnxMCFVjX.1979 for user conductor
2021-11-01 02:52:24.160155 I | auth: deleting token XNRTRYYbQeEdPDYI.1978 for user conductor
2021-11-01 02:52:24.953463 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:26.754909 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.815818325s) to execute
2021-11-01 02:52:29.255793 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.405177687s) to execute
2021-11-01 02:52:29.256071 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.498363671s) to execute
2021-11-01 02:52:29.352978 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.594739852s) to execute
2021-11-01 02:52:29.953731 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:31.160034 I | auth: deleting token oKYJRJzXsLAnyZoe.1980 for user conductor
2021-11-01 02:52:31.160126 I | auth: deleting token uWSCtkDUWTOMELwY.1983 for user conductor
2021-11-01 02:52:31.160170 I | auth: deleting token PtRUfrSPXnLnvuCT.1981 for user conductor
2021-11-01 02:52:31.160194 I | auth: deleting token hqscDIKCnNaKCMNO.1982 for user conductor
2021-11-01 02:52:31.160217 I | auth: deleting token wjyfOSgClNhACKKC.1984 for user conductor
2021-11-01 02:52:34.160102 I | auth: deleting token ejxkxFcqybGEvyCL.1985 for user conductor
2021-11-01 02:52:34.160218 I | auth: deleting token DxRxtVQKCedZazfO.1987 for user conductor
2021-11-01 02:52:34.160251 I | auth: deleting token HxgDwlTFWUnRykLm.1986 for user conductor
2021-11-01 02:52:34.953961 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:35.451628 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (613.532062ms) to execute
2021-11-01 02:52:36.250477 I | auth: deleting token smTQnBKBpwfDprsz.1989 for user conductor
2021-11-01 02:52:36.250528 I | auth: deleting token GoPBOgScSbQrKPRN.1988 for user conductor
2021-11-01 02:52:36.250549 I | auth: deleting token uIJIUNCGIvddCiMT.1990 for user conductor
2021-11-01 02:52:38.052610 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.614060682s) to execute
2021-11-01 02:52:39.954226 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:40.160057 I | auth: deleting token LjmInINQITHEYGhH.1992 for user conductor
2021-11-01 02:52:40.160094 I | auth: deleting token FFjPKvYvRwNqwMrR.1994 for user conductor
2021-11-01 02:52:40.160100 I | auth: deleting token TtAvBBGEHCGHWrHB.1991 for user conductor
2021-11-01 02:52:40.160105 I | auth: deleting token ZzqNQkfLfAHqGeEM.1995 for user conductor
2021-11-01 02:52:40.160112 I | auth: deleting token BkQZQPlnrvDcPkmY.1993 for user conductor
2021-11-01 02:52:40.657223 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.506495093s) to execute
2021-11-01 02:52:44.954411 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:45.160094 I | auth: deleting token cyAWHEcGXsgorbxt.1999 for user conductor
2021-11-01 02:52:45.160162 I | auth: deleting token RQJnqlkQKPuMPCmS.1996 for user conductor
2021-11-01 02:52:45.160190 I | auth: deleting token mHXsQLAIshmAhWFE.1998 for user conductor
2021-11-01 02:52:45.160220 I | auth: deleting token pPnRWbMODOrovgpv.2000 for user conductor
2021-11-01 02:52:45.160250 I | auth: deleting token OFMmXqCkEhFDJREV.1997 for user conductor
2021-11-01 02:52:45.656536 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.903461238s) to execute
2021-11-01 02:52:45.656864 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.803819626s) to execute
2021-11-01 02:52:48.160070 I | auth: deleting token yKmECAzrHCBPSDJM.2001 for user conductor
2021-11-01 02:52:48.160144 I | auth: deleting token xsucAskXKRPUrgQM.2002 for user conductor
2021-11-01 02:52:48.252464 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.501710991s) to execute
2021-11-01 02:52:48.252682 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.501350436s) to execute
2021-11-01 02:52:48.252869 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.497020574s) to execute
2021-11-01 02:52:49.954638 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:52.658262 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.303520634s) to execute
2021-11-01 02:52:52.658475 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.507661599s) to execute
2021-11-01 02:52:53.160138 I | auth: deleting token qSTYZCtPJvrZhplh.2007 for user conductor
2021-11-01 02:52:53.160190 I | auth: deleting token NhZpPVfQtsMsJccb.2008 for user conductor
2021-11-01 02:52:53.160202 I | auth: deleting token VEvkmuAgBfbfrpok.2004 for user conductor
2021-11-01 02:52:53.160216 I | auth: deleting token BxIxhHZuPmhTjFLR.2005 for user conductor
2021-11-01 02:52:54.160071 I | auth: deleting token fwOemXLaoxGIjAvi.2003 for user conductor
2021-11-01 02:52:54.160132 I | auth: deleting token gWomqIvlXgUDwHhF.2006 for user conductor
2021-11-01 02:52:54.954901 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:52:56.250453 I | auth: deleting token rhckUvrXzrDxfDOf.2011 for user conductor
2021-11-01 02:52:56.250629 I | auth: deleting token BrZYSdsIctOdrUig.2010 for user conductor
2021-11-01 02:52:56.250712 I | auth: deleting token XfBBvGnBDdgQsixS.2009 for user conductor
2021-11-01 02:52:56.250759 I | auth: deleting token endmXsciiRJiGriA.2012 for user conductor
2021-11-01 02:52:58.159992 I | auth: deleting token jFzGgqFZNcgGRHaY.2013 for user conductor
2021-11-01 02:52:58.160020 I | auth: deleting token ziQwrdrTOystfHUz.2014 for user conductor
2021-11-01 02:52:59.160066 I | auth: deleting token jevXFnGjlUtFJPuO.2015 for user conductor
2021-11-01 02:52:59.955196 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:53:00.456031 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.1034071s) to execute
2021-11-01 02:53:03.150694 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.597389879s) to execute
2021-11-01 02:53:03.150965 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.600314766s) to execute
2021-11-01 02:53:03.160067 I | auth: deleting token oAmDJhrjdiOpwFHe.2018 for user conductor
2021-11-01 02:53:03.160141 I | auth: deleting token oJPGBTzxqePXUPEK.2016 for user conductor
2021-11-01 02:53:03.160222 I | auth: deleting token fhFLOjWsLXAzymhh.2019 for user conductor
2021-11-01 02:53:03.339279 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.788531041s) to execute
2021-11-01 02:53:03.350555 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (196.933354ms) to execute
2021-11-01 02:53:04.160098 I | auth: deleting token uNRUDCgthMasPGEO.2017 for user conductor
2021-11-01 02:53:04.955527 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:53:06.160090 I | auth: deleting token XMkzYPuCDoQOaGTv.2022 for user conductor
2021-11-01 02:53:06.160143 I | auth: deleting token UXYoJviSbwtyQaMc.2020 for user conductor
2021-11-01 02:53:06.160154 I | auth: deleting token aGmqaHwmqKWqoHTn.2021 for user conductor
2021-11-01 02:53:06.455075 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.60131925s) to execute
2021-11-01 02:53:08.851913 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.298701179s) to execute
2021-11-01 02:53:09.160088 I | auth: deleting token GxoAEMtvMJxMqdMl.2024 for user conductor
2021-11-01 02:53:09.160178 I | auth: deleting token gfWQXFcmSGGlzcoP.2023 for user conductor
2021-11-01 02:53:09.955896 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:53:11.160060 I | auth: deleting token KXQoGVjVcDJTdxEX.2026 for user conductor
2021-11-01 02:53:13.851554 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.513440541s) to execute
2021-11-01 02:53:14.160091 I | auth: deleting token nfaaOzDaQTzFMNWB.2025 for user conductor
2021-11-01 02:53:14.956091 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:53:16.051788 W | etcdserver: r