By type
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Skipping self-checking
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
2021-11-01 02:06:05.056480 I | etcdmain: etcd Version: 3.2.24
2021-11-01 02:06:05.056686 I | etcdmain: Git SHA: 420a45226
2021-11-01 02:06:05.056703 I | etcdmain: Go Version: go1.8.7
2021-11-01 02:06:05.056717 I | etcdmain: Go OS/Arch: linux/amd64
2021-11-01 02:06:05.056733 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-11-01 02:06:05.056956 I | embed: listening for peers on http://0.0.0.0:2380
2021-11-01 02:06:05.057073 I | embed: listening for client requests on 0.0.0.0:2379
2021-11-01 02:06:05.357918 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.74.197:2380
2021-11-01 02:06:05.359450 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.74.197:2380
2021-11-01 02:06:05.452792 I | etcdserver: name = onap-oof-has-etcd-1
2021-11-01 02:06:05.452838 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-11-01 02:06:05.452852 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-11-01 02:06:05.452862 I | etcdserver: heartbeat = 100ms
2021-11-01 02:06:05.452871 I | etcdserver: election = 1000ms
2021-11-01 02:06:05.452880 I | etcdserver: snapshot count = 100000
2021-11-01 02:06:05.452902 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2379
2021-11-01 02:06:05.452915 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2380
2021-11-01 02:06:05.452960 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-11-01 02:06:05.557817 I | etcdserver: starting member 72b38cc930a2fa6f in cluster e8b03869cbf54258
2021-11-01 02:06:05.557942 I | raft: 72b38cc930a2fa6f became follower at term 0
2021-11-01 02:06:05.558009 I | raft: newRaft 72b38cc930a2fa6f [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-11-01 02:06:05.558046 I | raft: 72b38cc930a2fa6f became follower at term 1
2021-11-01 02:06:05.753054 W | auth: simple token is not cryptographically signed
2021-11-01 02:06:05.755300 I | rafthttp: starting peer 2d249ba41c7e44fa...
2021-11-01 02:06:05.755402 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa
2021-11-01 02:06:05.756350 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-11-01 02:06:05.855638 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-11-01 02:06:05.951202 I | rafthttp: started peer 2d249ba41c7e44fa
2021-11-01 02:06:05.951275 I | rafthttp: added peer 2d249ba41c7e44fa
2021-11-01 02:06:05.951320 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-11-01 02:06:05.951358 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-11-01 02:06:06.050479 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader)
2021-11-01 02:06:06.050656 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-11-01 02:06:06.056906 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-11-01 02:06:06.057486 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-11-01 02:06:06.057973 I | rafthttp: started peer 8aae4c350a2413a5
2021-11-01 02:06:06.058021 I | rafthttp: added peer 8aae4c350a2413a5
2021-11-01 02:06:06.058047 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-11-01 02:06:06.058833 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-11-01 02:06:06.072550 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-11-01 02:06:06.150462 I | rafthttp: peer 8aae4c350a2413a5 became active
2021-11-01 02:06:06.150526 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message writer)
2021-11-01 02:06:06.251157 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 writer)
2021-11-01 02:06:06.251397 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-11-01 02:06:06.350557 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-11-01 02:06:06.350745 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-11-01 02:06:06.350827 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream Message reader)
2021-11-01 02:06:06.350984 I | raft: 72b38cc930a2fa6f [term: 1] received a MsgVote message with higher term from 8aae4c350a2413a5 [term: 284]
2021-11-01 02:06:06.351024 I | raft: 72b38cc930a2fa6f became follower at term 284
2021-11-01 02:06:06.351046 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3, vote: 0] cast MsgVote for 8aae4c350a2413a5 [logterm: 1, index: 3] at term 284
2021-11-01 02:06:06.452971 I | rafthttp: established a TCP streaming connection with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-11-01 02:06:06.554890 I | raft: raft.node: 72b38cc930a2fa6f elected leader 8aae4c350a2413a5 at term 284
2021-11-01 02:06:06.559827 I | etcdserver: published {Name:onap-oof-has-etcd-1 ClientURLs:[http://onap-oof-has-etcd-1.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-11-01 02:06:06.560050 I | embed: ready to serve client requests
2021-11-01 02:06:06.560686 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-11-01 02:06:06.850771 N | etcdserver/membership: set the initial cluster version to 3.0
2021-11-01 02:06:06.850879 I | etcdserver/api: enabled capabilities for version 3.0
2021-11-01 02:06:10.951784 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:15.952146 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:20.952653 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:25.953510 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:30.953782 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:35.954183 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:40.954356 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:45.954606 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:50.954876 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:06:55.955217 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:00.955651 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:05.956023 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:10.956586 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:15.956886 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:20.957373 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:25.957836 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:30.958186 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:35.958483 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:40.958838 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:45.959224 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:50.959540 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:07:55.959896 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:00.960147 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:05.960411 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:10.960719 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:13.055253 N | auth: added a new user: root
2021-11-01 02:08:13.055909 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (2.158442845s) to execute
2021-11-01 02:08:15.853650 N | auth: added a new user: conductor
2021-11-01 02:08:15.853734 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (2.575250729s) to execute
2021-11-01 02:08:15.961205 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:15.981823 N | auth: Role conductor is created
2021-11-01 02:08:16.376712 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-11-01 02:08:16.679547 N | auth: granted role conductor to user conductor
2021-11-01 02:08:17.151608 N | auth: Role root is created
2021-11-01 02:08:17.155796 N | auth: granted role root to user root
2021-11-01 02:08:17.159616 N | auth: Authentication enabled
2021-11-01 02:08:20.961544 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:25.961892 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:30.962149 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:35.964939 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:40.965216 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:45.965579 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:50.965828 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:08:55.966169 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:00.966427 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:05.966698 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:10.967049 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:15.967417 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:20.967720 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:25.968072 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:30.956047 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.000057214s) to execute
2021-11-01 02:09:31.050623 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:35.855065 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.316843785s) to execute
2021-11-01 02:09:36.050855 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:38.052813 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.101762559s) to execute
2021-11-01 02:09:39.954998 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.899526903s) to execute
2021-11-01 02:09:40.152251 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (192.050501ms) to execute
2021-11-01 02:09:41.051050 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:43.457940 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.606419464s) to execute
2021-11-01 02:09:45.551209 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.900484697s) to execute
2021-11-01 02:09:46.051422 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:48.155141 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.601302503s) to execute
2021-11-01 02:09:48.350763 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.07946ms) to execute
2021-11-01 02:09:51.051762 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:52.753188 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.199388208s) to execute
2021-11-01 02:09:55.551481 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (2.698895903s) to execute
2021-11-01 02:09:56.052121 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:09:58.555199 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.31667644s) to execute
2021-11-01 02:10:00.851732 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.213508218s) to execute
2021-11-01 02:10:01.052575 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:03.350874 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.495703698s) to execute
2021-11-01 02:10:03.353671 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.499218344s) to execute
2021-11-01 02:10:06.052805 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:07.457400 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.103385805s) to execute
2021-11-01 02:10:07.458215 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.104634554s) to execute
2021-11-01 02:10:09.857034 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.303173301s) to execute
2021-11-01 02:10:09.857272 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.306483224s) to execute
2021-11-01 02:10:11.053095 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:11.756427 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.803907745s) to execute
2021-11-01 02:10:11.756552 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.8057933s) to execute
2021-11-01 02:10:14.659154 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.906634063s) to execute
2021-11-01 02:10:16.053445 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:17.156949 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.218420291s) to execute
2021-11-01 02:10:19.750545 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.20936058s) to execute
2021-11-01 02:10:21.053675 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:24.460506 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.30032868s) to execute
2021-11-01 02:10:24.550626 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.69792138s) to execute
2021-11-01 02:10:24.551093 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.798088311s) to execute
2021-11-01 02:10:26.054162 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:31.054469 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:36.054752 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:38.555508 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (5.603290907s) to execute
2021-11-01 02:10:40.650629 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.996915786s) to execute
2021-11-01 02:10:40.650914 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (1.99793813s) to execute
2021-11-01 02:10:41.150430 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:43.051552 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:364" took too long (4.398279358s) to execute
2021-11-01 02:10:43.051626 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.398858108s) to execute
2021-11-01 02:10:43.051763 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.395787646s) to execute
2021-11-01 02:10:45.856078 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.800700388s) to execute
2021-11-01 02:10:46.150663 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:51.250550 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:53.856226 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.805557995s) to execute
2021-11-01 02:10:53.856559 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.997884042s) to execute
2021-11-01 02:10:54.051050 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (175.880731ms) to execute
2021-11-01 02:10:54.053114 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (177.706328ms) to execute
2021-11-01 02:10:56.250806 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:10:56.855781 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.80502744s) to execute
2021-11-01 02:10:56.856005 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.705202846s) to execute
2021-11-01 02:10:59.455475 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.504846031s) to execute
2021-11-01 02:11:01.251148 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:06.251599 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:09.950738 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.612240136s) to execute
2021-11-01 02:11:11.251896 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:12.554729 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.598844676s) to execute
2021-11-01 02:11:16.252344 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:20.056210 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.398392822s) to execute
2021-11-01 02:11:20.056489 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (7.497657409s) to execute
2021-11-01 02:11:21.350481 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:22.450716 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.298983284s) to execute
2021-11-01 02:11:22.450880 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.379725112s) to execute
2021-11-01 02:11:22.453498 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.382242713s) to execute
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-11-01 02:11:24.757159 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (2.193441949s) to execute
2021-11-01 02:11:26.350685 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:30.254726 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.702156988s) to execute
2021-11-01 02:11:31.350956 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:35.453174 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.01493143s) to execute
2021-11-01 02:11:35.453448 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.101499715s) to execute
2021-11-01 02:11:35.637998 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (178.224968ms) to execute
2021-11-01 02:11:36.351296 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:41.255800 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.50354586s) to execute
2021-11-01 02:11:41.351602 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:43.453458 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.015057058s) to execute
2021-11-01 02:11:43.453673 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.195558222s) to execute
2021-11-01 02:11:46.351900 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:48.554978 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.403884906s) to execute
2021-11-01 02:11:51.055498 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.499718281s) to execute
2021-11-01 02:11:51.150880 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.592725034s) to execute
2021-11-01 02:11:51.352146 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:53.556382 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.403167577s) to execute
2021-11-01 02:11:53.556490 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (915.656582ms) to execute
2021-11-01 02:11:53.556601 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.403129937s) to execute
2021-11-01 02:11:56.352327 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:11:56.450517 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.794280121s) to execute
2021-11-01 02:11:56.450572 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.297606668s) to execute
2021-11-01 02:11:59.856092 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.702571786s) to execute
2021-11-01 02:12:01.352552 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:06.352828 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:11.353086 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:12.555661 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103098738s) to execute
2021-11-01 02:12:15.256176 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.003766611s) to execute
2021-11-01 02:12:16.353368 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:19.552497 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.101692414s) to execute
2021-11-01 02:12:21.251648 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.599533457s) to execute
2021-11-01 02:12:21.251823 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.697987132s) to execute
2021-11-01 02:12:21.251980 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.601218101s) to execute
2021-11-01 02:12:21.353589 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:23.556672 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.202079868s) to execute
2021-11-01 02:12:23.556800 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.106147133s) to execute
2021-11-01 02:12:25.853453 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.199898576s) to execute
2021-11-01 02:12:25.853789 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.902909421s) to execute
2021-11-01 02:12:26.353840 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:28.160175 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.207635902s) to execute
2021-11-01 02:12:28.160292 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.208778047s) to execute
2021-11-01 02:12:31.354177 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:36.354492 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:41.354706 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:44.354663 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.30260489s) to execute
2021-11-01 02:12:46.354990 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:48.453630 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.902823034s) to execute
2021-11-01 02:12:48.453781 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.003116623s) to execute
2021-11-01 02:12:48.453952 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (3.903294399s) to execute
2021-11-01 02:12:51.450525 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:12:56.156053 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.30328109s) to execute
2021-11-01 02:12:56.352220 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (101.275333ms) to execute
2021-11-01 02:12:56.356064 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.548365ms) to execute
2021-11-01 02:12:56.450862 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:00.553173 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.508718058s) to execute
2021-11-01 02:13:01.451118 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:02.952477 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.999677056s) to execute
2021-11-01 02:13:05.554627 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.403997178s) to execute
2021-11-01 02:13:06.451478 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:08.457442 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.719419562s) to execute
2021-11-01 02:13:08.457699 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.900064673s) to execute
2021-11-01 02:13:10.860888 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.310471713s) to execute
2021-11-01 02:13:10.950340 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.310556999s) to execute
2021-11-01 02:13:11.451804 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:13.056289 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.105587873s) to execute
2021-11-01 02:13:13.056427 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (713.412343ms) to execute
2021-11-01 02:13:13.056510 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.09810405s) to execute
2021-11-01 02:13:14.852419 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.00193699s) to execute
2021-11-01 02:13:16.452020 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:17.153631 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (683.67315ms) to execute
2021-11-01 02:13:19.653611 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.509204788s) to execute
2021-11-01 02:13:21.452504 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:26.452766 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:27.051167 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.397514006s) to execute
2021-11-01 02:13:31.453107 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:34.350825 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.295995909s) to execute
2021-11-01 02:13:34.351083 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (7.296650257s) to execute
2021-11-01 02:13:36.453458 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:41.453596 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:41.755950 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.905179865s) to execute
2021-11-01 02:13:43.053968 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201364513s) to execute
2021-11-01 02:13:43.054185 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.203568851s) to execute
2021-11-01 02:13:43.054426 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.203821665s) to execute
2021-11-01 02:13:43.056154 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (1.200416687s) to execute
2021-11-01 02:13:46.453879 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:49.151950 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.601366893s) to execute
2021-11-01 02:13:51.457829 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:53.657805 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.306608465s) to execute
2021-11-01 02:13:55.853477 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.100752127s) to execute
2021-11-01 02:13:55.853695 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.103057382s) to execute
2021-11-01 02:13:56.051837 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (192.365228ms) to execute
2021-11-01 02:13:56.458045 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:13:58.455896 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.203519858s) to execute
2021-11-01 02:14:00.952364 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.413834363s) to execute
2021-11-01 02:14:01.550371 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:14:02.757975 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.805472551s) to execute
2021-11-01 02:14:04.956468 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (4.0020749s) to execute
2021-11-01 02:14:04.957486 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.103663096s) to execute
2021-11-01 02:14:04.957715 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.10635727s) to execute
2021-11-01 02:14:06.550630 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:14:07.458002 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.40716523s) to execute
2021-11-01 02:14:07.458239 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.400379742s) to execute
2021-11-01 02:14:07.464850 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (826.780413ms) to execute
2021-11-01 02:14:11.550969 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp 10.233.70.105:2380: getsockopt: connection refused
2021-11-01 02:14:16.151196 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.893548983s) to execute
2021-11-01 02:14:16.551417 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:21.357977 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.205266539s) to execute
2021-11-01 02:14:21.552059 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:25.851306 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.500576724s) to execute
2021-11-01 02:14:26.552456 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:28.156757 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (718.438952ms) to execute
2021-11-01 02:14:31.250479 I | auth: deleting token MdlMNOsvVgSIYRTS.17 for user conductor
2021-11-01 02:14:31.250573 I | auth: deleting token LrNTVKoOCdzqORQr.20 for user conductor
2021-11-01 02:14:31.250610 I | auth: deleting token zjmrpvyvJVRJxbME.18 for user conductor
2021-11-01 02:14:31.552633 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:32.656391 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.404547714s) to execute
2021-11-01 02:14:32.938306 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (182.401108ms) to execute
2021-11-01 02:14:36.159997 I | auth: deleting token ZCLKmelzZJTteHzU.29 for user conductor
2021-11-01 02:14:36.160037 I | auth: deleting token GpkbctAKBrkWsOgU.28 for user conductor
2021-11-01 02:14:36.160052 I | auth: deleting token WMiZiDbxLmphSyQi.27 for user conductor
2021-11-01 02:14:36.160059 I | auth: deleting token SiIfUpxYDSqNYGjw.23 for user conductor
2021-11-01 02:14:36.160066 I | auth: deleting token kWkDjxusXbTnxBHh.24 for user conductor
2021-11-01 02:14:36.552923 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:38.160126 I | auth: deleting token OwJtGKmQTJuuKbXk.33 for user conductor
2021-11-01 02:14:38.160183 I | auth: deleting token pYLxpaqmfFePPBGw.31 for user conductor
2021-11-01 02:14:40.160061 I | auth: deleting token VdGIWOmdtfCEmXDz.39 for user conductor
2021-11-01 02:14:40.160139 I | auth: deleting token vSiENpZEJVgFtafb.35 for user conductor
2021-11-01 02:14:40.160159 I | auth: deleting token SrFOQVQpbywOLcJR.37 for user conductor
2021-11-01 02:14:41.553204 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:42.856585 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.418048196s) to execute
2021-11-01 02:14:44.160014 I | auth: deleting token bWbUrfVMxkonWRaW.40 for user conductor
2021-11-01 02:14:44.160206 I | auth: deleting token oXnmIOCWHQJSzsvF.43 for user conductor
2021-11-01 02:14:44.160294 I | auth: deleting token IGGdGGodjMClXJfi.42 for user conductor
2021-11-01 02:14:45.655737 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.317175091s) to execute
2021-11-01 02:14:46.159990 I | auth: deleting token HMYbQCBWFvMLWUhj.45 for user conductor
2021-11-01 02:14:46.553495 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:48.160147 I | auth: deleting token jGNNaapQIynCedsX.49 for user conductor
2021-11-01 02:14:48.555978 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.896793165s) to execute
2021-11-01 02:14:49.160110 I | auth: deleting token udnoOrCdlgPGiAKY.51 for user conductor
2021-11-01 02:14:49.160174 I | auth: deleting token mdoqOxWAXHBzabNW.47 for user conductor
2021-11-01 02:14:51.553749 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:53.160307 I | auth: deleting token aGtgKpXmOTUNWNLu.61 for user conductor
2021-11-01 02:14:53.160358 I | auth: deleting token NkEUrEwMnTSIHwMo.52 for user conductor
2021-11-01 02:14:53.160371 I | auth: deleting token bqFVKCgviWkgvzGC.53 for user conductor
2021-11-01 02:14:53.160383 I | auth: deleting token TysqGnfYnHZnFSJH.58 for user conductor
2021-11-01 02:14:53.160396 I | auth: deleting token MhZZicbkEcMrDiHl.56 for user conductor
2021-11-01 02:14:53.160407 I | auth: deleting token leSXhDdWvyJeOznQ.57 for user conductor
2021-11-01 02:14:54.471940 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.629917187s) to execute
2021-11-01 02:14:56.554075 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:14:56.654644 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.916398475s) to execute
2021-11-01 02:14:59.250352 I | auth: deleting token RFzjuMMeidUVvumd.67 for user conductor
2021-11-01 02:14:59.250394 I | auth: deleting token LXepxHEQrlbZwhPy.64 for user conductor
2021-11-01 02:14:59.250410 I | auth: deleting token WwUHAaJWxHdktTBZ.62 for user conductor
2021-11-01 02:14:59.250422 I | auth: deleting token cJuiphfLUtDXpXfd.65 for user conductor
2021-11-01 02:14:59.360478 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.809840053s) to execute
2021-11-01 02:15:01.160048 I | auth: deleting token SpExsAKQGbvtRpNc.69 for user conductor
2021-11-01 02:15:01.160100 I | auth: deleting token GbqkIjHGWymJvvqu.73 for user conductor
2021-11-01 02:15:01.557563 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:01.956143 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.298193498s) to execute
2021-11-01 02:15:01.956518 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (5.205306356s) to execute
2021-11-01 02:15:04.160130 I | auth: deleting token cFGdAzdVoffLoEon.71 for user conductor
2021-11-01 02:15:06.557822 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:08.160096 I | auth: deleting token MezMGGOaAmPlTvPh.75 for user conductor
2021-11-01 02:15:08.160152 I | auth: deleting token eGdNwWERskZjwGyJ.77 for user conductor
2021-11-01 02:15:10.160096 I | auth: deleting token OEapbGlfqxVrjimr.76 for user conductor
2021-11-01 02:15:10.353004 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.713840877s) to execute
2021-11-01 02:15:11.558128 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:12.160000 I | auth: deleting token LfUYpnMlEdnucjRi.80 for user conductor
2021-11-01 02:15:12.160034 I | auth: deleting token UUnUwVmjAWOBAKDA.78 for user conductor
2021-11-01 02:15:12.160042 I | auth: deleting token uKLCOVGTAOqannCr.81 for user conductor
2021-11-01 02:15:12.160051 I | auth: deleting token FeMIuNNLyvIJpMNv.82 for user conductor
2021-11-01 02:15:12.654787 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.201944278s) to execute
2021-11-01 02:15:12.655417 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.204642405s) to execute
2021-11-01 02:15:15.160022 I | auth: deleting token okLoNEokjzCwRffg.85 for user conductor
2021-11-01 02:15:15.160067 I | auth: deleting token UbkYselbcBOBMKNR.83 for user conductor
2021-11-01 02:15:15.352322 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.90152081s) to execute
2021-11-01 02:15:15.352494 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.694727787s) to execute
2021-11-01 02:15:15.352618 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.680307791s) to execute
2021-11-01 02:15:15.352904 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (211.309966ms) to execute
2021-11-01 02:15:16.651757 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:17.160028 I | auth: deleting token iIUxFxuprmkPVnPD.87 for user conductor
2021-11-01 02:15:17.756313 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (998.436219ms) to execute
2021-11-01 02:15:20.051149 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.198733932s) to execute
2021-11-01 02:15:20.160117 I | auth: deleting token ZFqbGCooeMkgpzZC.86 for user conductor
2021-11-01 02:15:21.653602 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:25.250570 I | auth: deleting token VGKLuMUycpClANFi.91 for user conductor
2021-11-01 02:15:25.250662 I | auth: deleting token ZPiNVIeBAvnPXjuK.90 for user conductor
2021-11-01 02:15:25.250688 I | auth: deleting token KkgRqERLBSxOxKTt.88 for user conductor
2021-11-01 02:15:25.250716 I | auth: deleting token lZPMEHDcysCZPLZw.89 for user conductor
2021-11-01 02:15:26.160004 I | auth: deleting token oIeFIawpIsvwEBIK.92 for user conductor
2021-11-01 02:15:26.653756 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:27.957134 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.496380788s) to execute
2021-11-01 02:15:28.160087 I | auth: deleting token jZBFaGnwjxEuGvpG.93 for user conductor
2021-11-01 02:15:29.160106 I | auth: deleting token nBuJdWBOuYidCATS.94 for user conductor
2021-11-01 02:15:30.250448 I | auth: deleting token fLtXEZtyixpKtDKm.95 for user conductor
2021-11-01 02:15:30.752919 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.702427836s) to execute
2021-11-01 02:15:30.753467 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.602554028s) to execute
2021-11-01 02:15:31.654017 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:32.160096 I | auth: deleting token HnZRxBqtvYFyPYEX.96 for user conductor
2021-11-01 02:15:33.753498 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.901609303s) to execute
2021-11-01 02:15:33.753721 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.998620727s) to execute
2021-11-01 02:15:33.754001 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.998360783s) to execute
2021-11-01 02:15:36.560477 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.70550911s) to execute
2021-11-01 02:15:36.654606 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:39.155483 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.60489377s) to execute
2021-11-01 02:15:39.160286 I | auth: deleting token sTOGKknFUbRgyrap.102 for user conductor
2021-11-01 02:15:39.160315 I | auth: deleting token xDuaqDMUCCecEmGA.97 for user conductor
2021-11-01 02:15:39.160320 I | auth: deleting token MiOWLDgqRBOZkmBp.99 for user conductor
2021-11-01 02:15:39.160329 I | auth: deleting token MhoVMnfCwGgiVbfa.100 for user conductor
2021-11-01 02:15:41.252122 I | auth: deleting token XCUjSeuJWOcHIMaz.103 for user conductor
2021-11-01 02:15:41.252192 I | auth: deleting token fcyRkoxzmfALHVjP.101 for user conductor
2021-11-01 02:15:41.252213 I | auth: deleting token LgvVpbXSsXAgYCgg.104 for user conductor
2021-11-01 02:15:41.655932 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.305234262s) to execute
2021-11-01 02:15:41.656109 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.405339673s) to execute
2021-11-01 02:15:41.750460 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:44.451125 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.695422321s) to execute
2021-11-01 02:15:46.751797 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:49.754830 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.001908181s) to execute
2021-11-01 02:15:51.752188 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:52.456847 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.518736464s) to execute
2021-11-01 02:15:52.457171 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.686215843s) to execute
2021-11-01 02:15:52.551687 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.780704744s) to execute
2021-11-01 02:15:54.250496 I | auth: deleting token LftCoDCeprbMMvGd.108 for user conductor
2021-11-01 02:15:54.250563 I | auth: deleting token sLHriAtqStDFUuCO.106 for user conductor
2021-11-01 02:15:54.250576 I | auth: deleting token tnOqZsHHvTIdBCGF.107 for user conductor
2021-11-01 02:15:54.250590 I | auth: deleting token CnQfVeXyvFoIofXq.105 for user conductor
2021-11-01 02:15:54.250608 I | auth: deleting token VpdOuNLgQVvrZDQH.98 for user conductor
2021-11-01 02:15:54.250622 I | auth: deleting token xsAsDvtmnYqBBMFD.109 for user conductor
2021-11-01 02:15:55.354545 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.895413556s) to execute
2021-11-01 02:15:55.354970 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.799396022s) to execute
2021-11-01 02:15:55.355280 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.102911052s) to execute
2021-11-01 02:15:56.752515 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:15:57.160046 I | auth: deleting token AmbcaziiXuBQBgyi.113 for user conductor
2021-11-01 02:15:57.160078 I | auth: deleting token PjrPPVsWYcLwhvLk.110 for user conductor
2021-11-01 02:15:57.160087 I | auth: deleting token iVqWHbOyVytkIyWa.114 for user conductor
2021-11-01 02:15:58.155951 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.20522801s) to execute
2021-11-01 02:16:00.160117 I | auth: deleting token SnKapjmKKexGPrNQ.117 for user conductor
2021-11-01 02:16:00.160178 I | auth: deleting token qhsbvsffPAJvDKlx.116 for user conductor
2021-11-01 02:16:00.160196 I | auth: deleting token RXgCrkhXALKBZneP.115 for user conductor
2021-11-01 02:16:01.160043 I | auth: deleting token OCaeYGdqXRqHWAYT.118 for user conductor
2021-11-01 02:16:01.950690 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:03.160165 I | auth: deleting token oZVkvPBTFyvpIGih.119 for user conductor
2021-11-01 02:16:05.160126 I | auth: deleting token rwOxVgiNVJPIjmsf.120 for user conductor
2021-11-01 02:16:06.250909 I | auth: deleting token BDugtmDYniXsdnwO.121 for user conductor
2021-11-01 02:16:06.950930 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:07.250621 I | auth: deleting token AbPjUhGadnhJkIFH.122 for user conductor
2021-11-01 02:16:10.160087 I | auth: deleting token kIrHDPADIFcAPuAf.123 for user conductor
2021-11-01 02:16:10.451120 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.498431216s) to execute
2021-11-01 02:16:11.951196 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:13.151377 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.697604779s) to execute
2021-11-01 02:16:13.151875 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.698534726s) to execute
2021-11-01 02:16:13.250435 I | auth: deleting token BNgehAKRKzDFWiTU.125 for user conductor
2021-11-01 02:16:15.855161 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.604120492s) to execute
2021-11-01 02:16:15.855420 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.604498999s) to execute
2021-11-01 02:16:16.951450 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:18.355398 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.004703449s) to execute
2021-11-01 02:16:20.250458 I | auth: deleting token HTQHErXZOMawHabf.126 for user conductor
2021-11-01 02:16:20.451257 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.000773167s) to execute
2021-11-01 02:16:20.739866 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (183.861305ms) to execute
2021-11-01 02:16:21.952187 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:23.160016 I | auth: deleting token BhwkHJlWifiykEyd.131 for user conductor
2021-11-01 02:16:23.160296 I | auth: deleting token NGUzIkVITgVoUdzi.129 for user conductor
2021-11-01 02:16:23.160304 I | auth: deleting token KpjEXZjeODxqAUHb.128 for user conductor
2021-11-01 02:16:23.160310 I | auth: deleting token kcncWqYiMprXlqiI.127 for user conductor
2021-11-01 02:16:23.160321 I | auth: deleting token WqdRzFpKYcIqULSI.130 for user conductor
2021-11-01 02:16:25.250450 I | auth: deleting token HkToBONcrVXHyJIf.133 for user conductor
2021-11-01 02:16:25.250528 I | auth: deleting token pQZFxYyPupbOqKSV.134 for user conductor
2021-11-01 02:16:25.250557 I | auth: deleting token xRnUoMQJiKZyLwso.135 for user conductor
2021-11-01 02:16:26.952527 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:28.755779 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.603043105s) to execute
2021-11-01 02:16:31.160111 I | auth: deleting token aesOLJwTTkvlCqpF.139 for user conductor
2021-11-01 02:16:31.160201 I | auth: deleting token ZAUNwdHcnQgsjNsM.137 for user conductor
2021-11-01 02:16:31.160219 I | auth: deleting token nmNqAlMIRgFVViyI.136 for user conductor
2021-11-01 02:16:32.050493 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:33.656703 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.805052576s) to execute
2021-11-01 02:16:33.656939 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.898355872s) to execute
2021-11-01 02:16:33.656983 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (4.898602786s) to execute
2021-11-01 02:16:33.851821 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (190.5272ms) to execute
2021-11-01 02:16:36.250474 I | auth: deleting token cZpddHobFimkRcJr.143 for user conductor
2021-11-01 02:16:36.250541 I | auth: deleting token CDdvMrqJQyiLIgPU.144 for user conductor
2021-11-01 02:16:36.250568 I | auth: deleting token rcAmxbxnNfZNuTNT.141 for user conductor
2021-11-01 02:16:36.250605 I | auth: deleting token hwEyBVzsvrKeSNRS.140 for user conductor
2021-11-01 02:16:36.250648 I | auth: deleting token vXpIJfpdejrEopRd.138 for user conductor
2021-11-01 02:16:36.250684 I | auth: deleting token pALpJKegzqyLrFln.142 for user conductor
2021-11-01 02:16:36.552598 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.799357627s) to execute
2021-11-01 02:16:37.150497 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:39.452537 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.101949732s) to execute
2021-11-01 02:16:42.054653 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.403128117s) to execute
2021-11-01 02:16:42.055287 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.504531323s) to execute
2021-11-01 02:16:42.150692 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:42.159993 I | auth: deleting token wUECXiPTPotGkaxe.149 for user conductor
2021-11-01 02:16:42.160030 I | auth: deleting token krqpQgiRuvBwMOSd.146 for user conductor
2021-11-01 02:16:42.160039 I | auth: deleting token pdprkHxdHrVNpLBl.148 for user conductor
2021-11-01 02:16:42.160055 I | auth: deleting token bMYiHpxoshjKZsdb.147 for user conductor
2021-11-01 02:16:42.160067 I | auth: deleting token PSkyDkBOgMHoYPHG.145 for user conductor
2021-11-01 02:16:44.250477 I | auth: deleting token TsSaZbNnCceHiYkC.153 for user conductor
2021-11-01 02:16:44.250545 I | auth: deleting token sRTRTkOlrFcyZecM.154 for user conductor
2021-11-01 02:16:44.250564 I | auth: deleting token ExliVLKIDIHuBKWI.151 for user conductor
2021-11-01 02:16:44.250582 I | auth: deleting token fsBYqXOpcyZchEJD.152 for user conductor
2021-11-01 02:16:44.355883 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.117072569s) to execute
2021-11-01 02:16:44.450687 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.299829014s) to execute
2021-11-01 02:16:46.854830 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.38387659s) to execute
2021-11-01 02:16:46.855083 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.402730591s) to execute
2021-11-01 02:16:47.151025 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:49.156139 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (2.205015739s) to execute
2021-11-01 02:16:49.156375 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.185648984s) to execute
2021-11-01 02:16:49.156561 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.217926146s) to execute
2021-11-01 02:16:49.160089 I | auth: deleting token WGnasVQwTBybscgy.155 for user conductor
2021-11-01 02:16:49.160132 I | auth: deleting token FgDogRMCWZmOnVCL.158 for user conductor
2021-11-01 02:16:51.160036 I | auth: deleting token yeJbvyECMXCyzBPH.162 for user conductor
2021-11-01 02:16:51.160091 I | auth: deleting token CJtCKdLOeqKZzgLa.159 for user conductor
2021-11-01 02:16:51.160108 I | auth: deleting token iGWXqCeYgesqsbtT.161 for user conductor
2021-11-01 02:16:51.160153 I | auth: deleting token aMDLvlAiKIQzHXLH.157 for user conductor
2021-11-01 02:16:52.151387 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:52.160115 I | auth: deleting token AgFSQJISWNKXgKxM.160 for user conductor
2021-11-01 02:16:52.160183 I | auth: deleting token CkeDeYZLXKrCpyzT.163 for user conductor
2021-11-01 02:16:53.151810 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.911549478s) to execute
2021-11-01 02:16:54.250566 I | auth: deleting token mXhmWdhYwGeLHMYG.164 for user conductor
2021-11-01 02:16:54.250666 I | auth: deleting token bCMMoCXMvlLbnRiY.165 for user conductor
2021-11-01 02:16:55.457130 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (606.531394ms) to execute
2021-11-01 02:16:57.151691 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:16:57.160160 I | auth: deleting token xiBqWEmZHIRFHJgn.166 for user conductor
2021-11-01 02:16:57.160227 I | auth: deleting token AcrVHBJFLhwUmdal.169 for user conductor
2021-11-01 02:16:57.160252 I | auth: deleting token MWKHVygHVJunNzEg.168 for user conductor
2021-11-01 02:16:57.160296 I | auth: deleting token CvmKRHcjDRwhmHxz.167 for user conductor
2021-11-01 02:17:00.159992 I | auth: deleting token HDUTQjWyskKlebej.170 for user conductor
2021-11-01 02:17:00.160046 I | auth: deleting token xrWkTcwZZFyolmRj.171 for user conductor
2021-11-01 02:17:00.160062 I | auth: deleting token raYSowcToVhnEwOI.172 for user conductor
2021-11-01 02:17:01.160164 I | auth: deleting token gxWKWRRGCSfGmhyG.173 for user conductor
2021-11-01 02:17:02.152096 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:03.160026 I | auth: deleting token SRyKnLQQVSuqsyeq.174 for user conductor
2021-11-01 02:17:04.250397 I | auth: deleting token bOTHUegAlTbPZpyi.175 for user conductor
2021-11-01 02:17:04.556198 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (715.30106ms) to execute
2021-11-01 02:17:06.160046 I | auth: deleting token nfcFJhCZkrAmzgvM.176 for user conductor
2021-11-01 02:17:07.152460 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:07.160082 I | auth: deleting token vGXItqTcQjcMWcRc.177 for user conductor
2021-11-01 02:17:09.160042 I | auth: deleting token sylUxAONgeDnNYsq.178 for user conductor
2021-11-01 02:17:10.160070 I | auth: deleting token ynYfxhdnrioACiwS.179 for user conductor
2021-11-01 02:17:12.250475 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:13.160211 I | auth: deleting token dSKaDpTcoujelDbN.180 for user conductor
2021-11-01 02:17:13.160277 I | auth: deleting token deFGNRxuUUtIokky.181 for user conductor
2021-11-01 02:17:13.160300 I | auth: deleting token dKCuSuOckIKSucXU.182 for user conductor
2021-11-01 02:17:16.160175 I | auth: deleting token KJzOsmBiHQXsHZnt.183 for user conductor
2021-11-01 02:17:17.250766 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:19.156565 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (8.605648558s) to execute
2021-11-01 02:17:20.160052 I | auth: deleting token YCoWAbZprLntbBJi.185 for user conductor
2021-11-01 02:17:20.160093 I | auth: deleting token IHKBSpeMNxubPdbQ.188 for user conductor
2021-11-01 02:17:20.160103 I | auth: deleting token PQFPzzldEgNSXoGe.187 for user conductor
2021-11-01 02:17:20.160118 I | auth: deleting token nJfZJOOiuDWgCuIJ.186 for user conductor
2021-11-01 02:17:21.756868 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.295870851s) to execute
2021-11-01 02:17:21.757171 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.406357145s) to execute
2021-11-01 02:17:21.940007 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.588676457s) to execute
2021-11-01 02:17:22.050788 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (200.041465ms) to execute
2021-11-01 02:17:22.250346 I | auth: deleting token cBpFFwulXYayaTnV.191 for user conductor
2021-11-01 02:17:22.250418 I | auth: deleting token seCifsmFqGGKpuVW.184 for user conductor
2021-11-01 02:17:22.250437 I | auth: deleting token zwvpsDEtWmDeLSYd.190 for user conductor
2021-11-01 02:17:22.250456 I | auth: deleting token ZkrxfCKWTNUIHTzj.189 for user conductor
2021-11-01 02:17:22.251101 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:24.250424 I | auth: deleting token HDQVgimmkwmqpDmc.192 for user conductor
2021-11-01 02:17:24.250652 I | auth: deleting token cSYcaLDtjMNOIJYJ.193 for user conductor
2021-11-01 02:17:26.250398 I | auth: deleting token MjSGfEiaXvdnudoT.194 for user conductor
2021-11-01 02:17:26.250457 I | auth: deleting token BwCAcLBhmPkhvpmc.196 for user conductor
2021-11-01 02:17:26.250477 I | auth: deleting token KPQBctJgKpNUpqOi.195 for user conductor
2021-11-01 02:17:27.251660 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:27.455568 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.514600716s) to execute
2021-11-01 02:17:29.250559 I | auth: deleting token PsPzwxcafOCrqeJo.199 for user conductor
2021-11-01 02:17:29.250685 I | auth: deleting token GvbAgidbQeQbAdlW.197 for user conductor
2021-11-01 02:17:29.250708 I | auth: deleting token WsfcGzxqwRWtGHOA.198 for user conductor
2021-11-01 02:17:30.250605 I | auth: deleting token nwqWPbNSjDYhHtZg.200 for user conductor
2021-11-01 02:17:30.250736 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.699159613s) to execute
2021-11-01 02:17:32.254306 I | auth: deleting token rnsRazLWEItOUqby.201 for user conductor
2021-11-01 02:17:32.254376 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:32.654046 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (702.816093ms) to execute
2021-11-01 02:17:33.160098 I | auth: deleting token qGseDhChQHexZYKF.202 for user conductor
2021-11-01 02:17:34.159985 I | auth: deleting token dgvyCfNpQFXaWFqk.203 for user conductor
2021-11-01 02:17:35.650940 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.200355286s) to execute
2021-11-01 02:17:36.160104 I | auth: deleting token mNOlKEKSZFlpffvW.204 for user conductor
2021-11-01 02:17:37.160110 I | auth: deleting token JzzCcbkVxWpjPMmy.205 for user conductor
2021-11-01 02:17:37.254546 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:39.159982 I | auth: deleting token dhitnxzvuKNBGuoX.206 for user conductor
2021-11-01 02:17:40.052992 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.802236056s) to execute
2021-11-01 02:17:42.254823 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:42.354580 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.103568489s) to execute
2021-11-01 02:17:42.651091 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (198.22323ms) to execute
2021-11-01 02:17:45.250482 I | auth: deleting token qvguNUrFlwaqQMpJ.207 for user conductor
2021-11-01 02:17:45.250531 I | auth: deleting token fCGmvjAgQpwPqOTY.211 for user conductor
2021-11-01 02:17:45.250543 I | auth: deleting token BpNQZaSAklwzfStP.209 for user conductor
2021-11-01 02:17:47.350474 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:47.954897 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.10418098s) to execute
2021-11-01 02:17:48.138155 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (178.353394ms) to execute
2021-11-01 02:17:49.160065 I | auth: deleting token RFhaBpzjrzPLMcDn.212 for user conductor
2021-11-01 02:17:49.160120 I | auth: deleting token uHxbfjdqPIObNuPU.214 for user conductor
2021-11-01 02:17:49.160142 I | auth: deleting token eNzQDSqvkCnTFfNa.213 for user conductor
2021-11-01 02:17:49.160161 I | auth: deleting token gmIojFDuHQzSZvPH.210 for user conductor
2021-11-01 02:17:49.160200 I | auth: deleting token YTwuYGdvrLLmbMtR.208 for user conductor
2021-11-01 02:17:50.452102 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.099265519s) to execute
2021-11-01 02:17:50.639412 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (182.210222ms) to execute
2021-11-01 02:17:52.350741 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:17:53.654708 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.11559407s) to execute
2021-11-01 02:17:56.171717 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.421052019s) to execute
2021-11-01 02:17:56.250629 I | auth: deleting token WLJzSeHjXsNaxtZm.220 for user conductor
2021-11-01 02:17:56.250740 I | auth: deleting token ZPnrXSDYNdkslmli.215 for user conductor
2021-11-01 02:17:56.250793 I | auth: deleting token SatNmXlfaWypSrOm.218 for user conductor
2021-11-01 02:17:56.250811 I | auth: deleting token ldRRKYHHtxFcSswH.217 for user conductor
2021-11-01 02:17:57.160016 I | auth: deleting token ntYlnSItVVjjOHJO.221 for user conductor
2021-11-01 02:17:57.160071 I | auth: deleting token mMqmVqwEpBYaibaq.222 for user conductor
2021-11-01 02:17:57.160092 I | auth: deleting token xvoivwuauFMIfuRZ.216 for user conductor
2021-11-01 02:17:57.160105 I | auth: deleting token GsRcOFQnuxBBowna.219 for user conductor
2021-11-01 02:17:57.351001 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:01.160105 I | auth: deleting token jSDrVeRUXghbseBI.223 for user conductor
2021-11-01 02:18:01.160167 I | auth: deleting token AEGaAFWMeeYnPUJN.224 for user conductor
2021-11-01 02:18:01.160186 I | auth: deleting token GmvCPmGoVLDPGbtN.225 for user conductor
2021-11-01 02:18:01.160202 I | auth: deleting token iPTaVBdsoqGDJbka.226 for user conductor
2021-11-01 02:18:01.355331 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.002572868s) to execute
2021-11-01 02:18:01.355868 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:582" took too long (5.005184847s) to execute
2021-11-01 02:18:02.351319 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:03.250508 I | auth: deleting token ampANlheJbGZHDFF.227 for user conductor
2021-11-01 02:18:03.250584 I | auth: deleting token kZvpmJnmFwadgzKD.228 for user conductor
2021-11-01 02:18:06.250456 I | auth: deleting token ymJASmlfqPuCMIFv.230 for user conductor
2021-11-01 02:18:06.250550 I | auth: deleting token jhMMaAgJgRRRemIG.229 for user conductor
2021-11-01 02:18:06.250579 I | auth: deleting token EuTfhhBSSUIJDOeP.231 for user conductor
2021-11-01 02:18:07.351649 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:09.057190 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.206553076s) to execute
2021-11-01 02:18:09.338896 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (185.754508ms) to execute
2021-11-01 02:18:09.338987 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (185.295657ms) to execute
2021-11-01 02:18:11.160132 I | auth: deleting token ZjDJZEYAXGetYkdu.237 for user conductor
2021-11-01 02:18:11.160195 I | auth: deleting token OnlqxoCUvCTNvFfA.233 for user conductor
2021-11-01 02:18:11.160216 I | auth: deleting token ALktxNICpBvIgVIr.234 for user conductor
2021-11-01 02:18:11.160232 I | auth: deleting token sPlHhvVhrgwleHme.235 for user conductor
2021-11-01 02:18:11.160247 I | auth: deleting token VOnJichwZbnjqFOl.236 for user conductor
2021-11-01 02:18:11.160261 I | auth: deleting token QzcNJCSwxvXEMtCH.232 for user conductor
2021-11-01 02:18:12.352212 W | rafthttp: health check for peer 2d249ba41c7e44fa could not connect: dial tcp: lookup onap-oof-has-etcd-2.oof-has-etcd on 169.254.25.10:53: no such host
2021-11-01 02:18:13.160097 I | auth: deleting token eDWLzxcCCLOTmQUc.238 for user conductor
2021-11-01 02:18:14.160145 I | auth: deleting token CzCLZlZFdzEUXKDp.239 for user conductor
2021-11-01 02:18:15.160172 I | auth: deleting token rMulgWjEfpZnJRLu.240 for user conductor
2021-11-01 02:18:15.160239 I | auth: deleting token GsiztdDMBpkIDTEd.241 for user conductor
2021-11-01 02:18:15.160280 I | auth: deleting token WJrLnwiCYahBgpTF.242 for user conductor
2021-11-01 02:18:15.353753 W | etcdserver: request "header: