By type
Skipping self-checking
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
2021-07-06 14:24:02.639421 I | etcdmain: etcd Version: 3.2.24
2021-07-06 14:24:02.639611 I | etcdmain: Git SHA: 420a45226
2021-07-06 14:24:02.639628 I | etcdmain: Go Version: go1.8.7
2021-07-06 14:24:02.639634 I | etcdmain: Go OS/Arch: linux/amd64
2021-07-06 14:24:02.639638 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-07-06 14:24:02.639813 I | embed: listening for peers on http://0.0.0.0:2380
2021-07-06 14:24:02.639899 I | embed: listening for client requests on 0.0.0.0:2379
2021-07-06 14:24:02.652537 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd:2380 to 10.233.70.144:2380
2021-07-06 14:24:02.653150 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd:2380 to 10.233.70.144:2380
2021-07-06 14:24:02.996329 I | etcdserver: name = onap-oof-has-etcd-0
2021-07-06 14:24:02.996425 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-07-06 14:24:02.996439 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-07-06 14:24:02.996447 I | etcdserver: heartbeat = 100ms
2021-07-06 14:24:02.996455 I | etcdserver: election = 1000ms
2021-07-06 14:24:02.996463 I | etcdserver: snapshot count = 100000
2021-07-06 14:24:02.996499 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-0.oof-has-etcd:2379
2021-07-06 14:24:02.996511 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-0.oof-has-etcd:2380
2021-07-06 14:24:02.996576 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-07-06 14:24:03.008569 I | etcdserver: starting member 8aae4c350a2413a5 in cluster e8b03869cbf54258
2021-07-06 14:24:03.008725 I | raft: 8aae4c350a2413a5 became follower at term 0
2021-07-06 14:24:03.008790 I | raft: newRaft 8aae4c350a2413a5 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-07-06 14:24:03.008816 I | raft: 8aae4c350a2413a5 became follower at term 1
2021-07-06 14:24:03.037303 W | auth: simple token is not cryptographically signed
2021-07-06 14:24:03.040719 I | rafthttp: starting peer 2d249ba41c7e44fa...
2021-07-06 14:24:03.040805 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa
2021-07-06 14:24:03.041728 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-07-06 14:24:03.041833 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-07-06 14:24:03.137736 I | rafthttp: started peer 2d249ba41c7e44fa
2021-07-06 14:24:03.137869 I | rafthttp: added peer 2d249ba41c7e44fa
2021-07-06 14:24:03.137950 I | rafthttp: starting peer 72b38cc930a2fa6f...
2021-07-06 14:24:03.138306 I | rafthttp: started HTTP pipelining with peer 72b38cc930a2fa6f
2021-07-06 14:24:03.138376 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-07-06 14:24:03.138400 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader)
2021-07-06 14:24:03.236845 I | rafthttp: peer 2d249ba41c7e44fa became active
2021-07-06 14:24:03.236891 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-07-06 14:24:03.236996 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message reader)
2021-07-06 14:24:03.239034 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-07-06 14:24:03.241095 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-07-06 14:24:03.341467 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream Message reader)
2021-07-06 14:24:03.341684 I | rafthttp: started peer 72b38cc930a2fa6f
2021-07-06 14:24:03.341831 I | rafthttp: added peer 72b38cc930a2fa6f
2021-07-06 14:24:03.341935 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-07-06 14:24:03.342266 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-07-06 14:24:03.345830 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-07-06 14:24:03.346069 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-07-06 14:24:03.346253 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-07-06 14:24:03.346913 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 writer)
2021-07-06 14:24:03.437411 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message writer)
2021-07-06 14:24:03.837115 I | raft: 8aae4c350a2413a5 [term: 1] received a MsgVote message with higher term from 2d249ba41c7e44fa [term: 2]
2021-07-06 14:24:03.837165 I | raft: 8aae4c350a2413a5 became follower at term 2
2021-07-06 14:24:03.837181 I | raft: 8aae4c350a2413a5 [logterm: 1, index: 3, vote: 0] cast MsgVote for 2d249ba41c7e44fa [logterm: 1, index: 3] at term 2
2021-07-06 14:24:03.839947 I | raft: raft.node: 8aae4c350a2413a5 elected leader 2d249ba41c7e44fa at term 2
2021-07-06 14:24:03.938569 I | etcdserver: published {Name:onap-oof-has-etcd-0 ClientURLs:[http://onap-oof-has-etcd-0.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-07-06 14:24:03.938606 I | embed: ready to serve client requests
2021-07-06 14:24:03.938964 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-07-06 14:24:03.939118 N | etcdserver/membership: set the initial cluster version to 3.0
2021-07-06 14:24:03.939279 I | etcdserver/api: enabled capabilities for version 3.0
2021-07-06 14:24:08.343271 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:13.343931 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:18.344267 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:23.344452 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:28.344770 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:33.345001 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:38.345282 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:43.345466 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:48.345808 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:53.346028 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:58.346308 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:03.346552 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:08.346866 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:13.347186 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:18.347471 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:23.347885 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:28.348246 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:33.348478 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:38.348747 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:43.349035 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:48.349350 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:53.349601 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:58.350070 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:01.938088 N | auth: added a new user: root
2021-07-06 14:26:01.938259 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.566365377s) to execute
2021-07-06 14:26:03.350331 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:03.638680 N | auth: added a new user: conductor
2021-07-06 14:26:03.638747 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.524376388s) to execute
2021-07-06 14:26:03.801084 N | auth: Role conductor is created
2021-07-06 14:26:04.004038 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-07-06 14:26:04.204591 N | auth: granted role conductor to user conductor
2021-07-06 14:26:04.505685 N | auth: Role root is created
2021-07-06 14:26:04.509366 N | auth: granted role root to user root
2021-07-06 14:26:04.537962 N | auth: Authentication enabled
2021-07-06 14:26:08.350631 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:13.351072 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:18.351385 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:23.351692 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:28.352005 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:33.352293 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:38.352587 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:43.352843 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:48.353208 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:53.353491 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:58.353794 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:03.354068 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:08.354355 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:13.354708 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:18.355073 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:23.355381 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:28.355934 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:33.356232 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:35.243010 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.448843294s) to execute
2021-07-06 14:27:37.139304 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (300.625977ms) to execute
2021-07-06 14:27:38.356612 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:39.041687 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (747.527245ms) to execute
2021-07-06 14:27:40.937738 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.892380634s) to execute
2021-07-06 14:27:43.436782 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:44.641294 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.802234241s) to execute
2021-07-06 14:27:46.440175 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (303.286721ms) to execute
2021-07-06 14:27:48.437091 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:48.738353 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.198904444s) to execute
2021-07-06 14:27:50.337594 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.142698029s) to execute
2021-07-06 14:27:53.437327 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:55.444099 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.506034111s) to execute
2021-07-06 14:27:58.437544 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:00.543152 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.903635936s) to execute
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-07-06 14:28:02.341136 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.601774827s) to execute
2021-07-06 14:28:03.437849 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:03.842969 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.498823291s) to execute
2021-07-06 14:28:05.444282 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.598555087s) to execute
2021-07-06 14:28:05.537188 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.691560285s) to execute
2021-07-06 14:28:08.438090 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:10.737627 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.200744588s) to execute
2021-07-06 14:28:10.900994 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (160.214018ms) to execute
2021-07-06 14:28:12.539376 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.741064274s) to execute
2021-07-06 14:28:12.539559 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.20255902s) to execute
2021-07-06 14:28:13.438403 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:14.741715 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.103647864s) to execute
2021-07-06 14:28:16.738608 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.993982555s) to execute
2021-07-06 14:28:16.738801 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.901867581s) to execute
2021-07-06 14:28:18.438729 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:18.637050 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.799990236s) to execute
2021-07-06 14:28:18.637120 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (943.178398ms) to execute
2021-07-06 14:28:20.437135 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.643022997s) to execute
2021-07-06 14:28:22.039913 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.598763867s) to execute
2021-07-06 14:28:23.439424 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:23.838504 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (3.398384495s) to execute
2021-07-06 14:28:23.838702 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.700883449s) to execute
2021-07-06 14:28:23.838881 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.794749933s) to execute
2021-07-06 14:28:28.439784 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:30.837702 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (5.290387685s) to execute
2021-07-06 14:28:33.440141 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:34.137255 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.800245758s) to execute
2021-07-06 14:28:35.943343 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (504.150761ms) to execute
2021-07-06 14:28:36.393920 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:364" took too long (296.868386ms) to execute
2021-07-06 14:28:38.440469 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:43.440751 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:48.441168 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:50.942559 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.902877717s) to execute
2021-07-06 14:28:51.194574 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (249.490586ms) to execute
2021-07-06 14:28:51.196019 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (148.416171ms) to execute
2021-07-06 14:28:53.441444 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:54.440250 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.639248872s) to execute
2021-07-06 14:28:57.743203 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.10603414s) to execute
2021-07-06 14:28:57.743543 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.206590715s) to execute
2021-07-06 14:28:58.441784 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:59.740345 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (402.467523ms) to execute
2021-07-06 14:29:01.642815 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (848.851113ms) to execute
2021-07-06 14:29:03.442019 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:04.838384 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.339780207s) to execute
2021-07-06 14:29:06.543384 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.549170572s) to execute
2021-07-06 14:29:06.694824 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (148.575127ms) to execute
2021-07-06 14:29:08.442281 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:10.738463 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.499324865s) to execute
2021-07-06 14:29:12.538804 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701860168s) to execute
2021-07-06 14:29:12.539015 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.798137129s) to execute
2021-07-06 14:29:13.442593 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:15.936964 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.84309493s) to execute
2021-07-06 14:29:16.095441 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.019274ms) to execute
2021-07-06 14:29:17.737513 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (643.684911ms) to execute
2021-07-06 14:29:18.442821 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:21.041202 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.603780347s) to execute
2021-07-06 14:29:23.536776 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:24.339247 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.240279526s) to execute
2021-07-06 14:29:28.140702 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.60261207s) to execute
2021-07-06 14:29:28.537179 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:31.837684 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.599506152s) to execute
2021-07-06 14:29:31.994207 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (153.561856ms) to execute
2021-07-06 14:29:32.094594 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (153.801597ms) to execute
2021-07-06 14:29:33.537527 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:38.537943 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:43.538262 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:48.538573 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:51.543175 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.505410761s) to execute
2021-07-06 14:29:51.695205 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.211679ms) to execute
2021-07-06 14:29:53.538905 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:55.239094 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.141862533s) to execute
2021-07-06 14:29:55.394135 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (151.676629ms) to execute
2021-07-06 14:29:58.539089 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:59.441621 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (447.753086ms) to execute
2021-07-06 14:30:03.539359 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:08.539688 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:13.539864 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:13.639584 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (100.865243ms) to execute
2021-07-06 14:30:18.540199 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:23.540558 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:24.637802 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.990690046s) to execute
2021-07-06 14:30:26.440673 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (244.623524ms) to execute
2021-07-06 14:30:28.038407 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (344.700322ms) to execute
2021-07-06 14:30:28.540804 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:31.242412 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.105511636s) to execute
2021-07-06 14:30:32.837311 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.400331894s) to execute
2021-07-06 14:30:32.837626 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (642.306747ms) to execute
2021-07-06 14:30:33.541076 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:36.238097 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.243527809s) to execute
2021-07-06 14:30:36.393784 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.68734ms) to execute
2021-07-06 14:30:38.541383 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:40.137446 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.197899902s) to execute
2021-07-06 14:30:41.938061 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701129188s) to execute
2021-07-06 14:30:43.541608 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:43.844338 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.704787367s) to execute
2021-07-06 14:30:43.936807 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.90321021s) to execute
2021-07-06 14:30:43.937025 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.995601043s) to execute
2021-07-06 14:30:47.742617 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.305308401s) to execute
2021-07-06 14:30:48.542600 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:49.937522 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.243729225s) to execute
2021-07-06 14:30:53.543026 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:54.041852 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.105104874s) to execute
2021-07-06 14:30:55.639535 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.445528294s) to execute
2021-07-06 14:30:57.639473 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.745645704s) to execute
2021-07-06 14:30:58.543307 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:59.142257 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.499851394s) to execute
2021-07-06 14:30:59.294040 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.288912ms) to execute
2021-07-06 14:31:03.543591 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:06.541171 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.647210199s) to execute
2021-07-06 14:31:08.341683 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.797417098s) to execute
2021-07-06 14:31:08.341897 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.79757083s) to execute
2021-07-06 14:31:08.543964 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:10.243264 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.89874459s) to execute
2021-07-06 14:31:10.243483 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.899348032s) to execute
2021-07-06 14:31:13.544302 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:15.338028 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.298707455s) to execute
2021-07-06 14:31:16.842683 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.404791797s) to execute
2021-07-06 14:31:16.842946 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.404024911s) to execute
2021-07-06 14:31:16.938676 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.499744865s) to execute
2021-07-06 14:31:18.544832 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:18.843936 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.806637248s) to execute
2021-07-06 14:31:20.738054 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.30117163s) to execute
2021-07-06 14:31:22.242028 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.501275769s) to execute
2021-07-06 14:31:22.242176 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.501419735s) to execute
2021-07-06 14:31:22.394000 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (148.757013ms) to execute
2021-07-06 14:31:23.545047 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:23.939103 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.598762271s) to execute
2021-07-06 14:31:23.939310 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (545.313226ms) to execute
2021-07-06 14:31:25.642828 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.700081763s) to execute
2021-07-06 14:31:27.442539 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.79651974s) to execute
2021-07-06 14:31:27.442906 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.797048408s) to execute
2021-07-06 14:31:28.545292 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:29.142128 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.697139095s) to execute
2021-07-06 14:31:29.142194 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.695015767s) to execute
2021-07-06 14:31:30.743125 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.504188097s) to execute
2021-07-06 14:31:33.545607 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:34.343433 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.504017332s) to execute
2021-07-06 14:31:34.436705 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.599761947s) to execute
2021-07-06 14:31:38.545923 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:42.041722 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (204.774889ms) to execute
2021-07-06 14:31:43.546213 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:43.841033 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (644.763013ms) to execute
2021-07-06 14:31:46.738364 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (400.38487ms) to execute
2021-07-06 14:31:48.546509 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:52.439792 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (100.856361ms) to execute
2021-07-06 14:31:53.546826 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:54.144970 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (451.015087ms) to execute
2021-07-06 14:31:58.636725 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:00.441871 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.743365968s) to execute
2021-07-06 14:32:02.140800 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.603752436s) to execute
2021-07-06 14:32:02.141066 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.696423725s) to execute
2021-07-06 14:32:02.143810 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.699085285s) to execute
2021-07-06 14:32:03.637013 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:06.343153 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.342561926s) to execute
2021-07-06 14:32:08.640781 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:08.647026 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (753.156227ms) to execute
2021-07-06 14:32:10.544146 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.748917387s) to execute
2021-07-06 14:32:12.437662 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.800737073s) to execute
2021-07-06 14:32:12.594078 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.43989ms) to execute
2021-07-06 14:32:12.595968 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (152.784295ms) to execute
2021-07-06 14:32:13.641080 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:15.947857 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.249619632s) to execute
2021-07-06 14:32:16.137186 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (186.351882ms) to execute
2021-07-06 14:32:18.641406 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:22.443518 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (344.190704ms) to execute
2021-07-06 14:32:23.641682 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:24.240171 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.702155633s) to execute
2021-07-06 14:32:28.736752 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:29.938633 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.69503165s) to execute
2021-07-06 14:32:29.938952 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (5.69663824s) to execute
2021-07-06 14:32:33.538418 I | auth: deleting token yneAJKrReAScponv.17 for user conductor
2021-07-06 14:32:33.736923 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:35.538285 I | auth: deleting token vfyMNfMiLnnwmHhY.19 for user conductor
2021-07-06 14:32:35.538327 I | auth: deleting token StGFqmraHMXaFgGg.21 for user conductor
2021-07-06 14:32:35.538337 I | auth: deleting token EmKtTdfOEraBtCjk.22 for user conductor
2021-07-06 14:32:36.742394 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.104022738s) to execute
2021-07-06 14:32:37.538371 I | auth: deleting token zjIJOSkiQLSVfwOH.27 for user conductor
2021-07-06 14:32:37.538421 I | auth: deleting token IoXjGBgHljjzAhdb.25 for user conductor
2021-07-06 14:32:38.737256 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:38.737562 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.980337567s) to execute
2021-07-06 14:32:38.737818 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.980509516s) to execute
2021-07-06 14:32:38.741652 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.804668429s) to execute
2021-07-06 14:32:38.741797 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.984302445s) to execute
2021-07-06 14:32:39.538357 I | auth: deleting token uFwkmjDeNoFNqCko.29 for user conductor
2021-07-06 14:32:41.538319 I | auth: deleting token AIWxiyUeyHdHCOrA.32 for user conductor
2021-07-06 14:32:41.538382 I | auth: deleting token segpSkKGEoNxEOFX.31 for user conductor
2021-07-06 14:32:43.737512 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:44.238318 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.044456424s) to execute
2021-07-06 14:32:44.393922 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.694316ms) to execute
2021-07-06 14:32:44.394105 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (150.291577ms) to execute
2021-07-06 14:32:45.538420 I | auth: deleting token GYxAUtqHwOusqFpG.34 for user conductor
2021-07-06 14:32:45.538468 I | auth: deleting token nmHqgTDFORScpOAt.35 for user conductor
2021-07-06 14:32:46.243858 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (149.983224ms) to execute
2021-07-06 14:32:46.494810 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.71145ms) to execute
2021-07-06 14:32:46.538393 I | auth: deleting token DgXbcEHSfAuRXJQU.38 for user conductor
2021-07-06 14:32:47.538358 I | auth: deleting token kBEjBsnXDCwbhMhR.40 for user conductor
2021-07-06 14:32:48.737777 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:49.538227 I | auth: deleting token JKyupigZcWrLQllV.42 for user conductor
2021-07-06 14:32:49.538270 I | auth: deleting token hVAxqIHgQgkHJDeY.44 for user conductor
2021-07-06 14:32:50.238426 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.336858906s) to execute
2021-07-06 14:32:50.538426 I | auth: deleting token vUjBzGfXnFvIyREH.48 for user conductor
2021-07-06 14:32:50.538481 I | auth: deleting token ccrjQKCPOpjTTuyC.46 for user conductor
2021-07-06 14:32:51.538357 I | auth: deleting token OLKgENLWXwrLfSTt.50 for user conductor
2021-07-06 14:32:52.538425 I | auth: deleting token ZbrgDwSONYGiQXcZ.52 for user conductor
2021-07-06 14:32:53.342756 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.545105637s) to execute
2021-07-06 14:32:53.494495 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (148.737584ms) to execute
2021-07-06 14:32:53.738062 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:55.538371 I | auth: deleting token nITmyJdYAjoTXhzE.54 for user conductor
2021-07-06 14:32:56.538295 I | auth: deleting token PQAvFvcZSReAWlJN.55 for user conductor
2021-07-06 14:32:57.042264 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.303121667s) to execute
2021-07-06 14:32:58.738465 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:58.839826 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.646118953s) to execute
2021-07-06 14:32:58.840013 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.727912206s) to execute
2021-07-06 14:33:00.844559 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.848096165s) to execute
2021-07-06 14:33:01.538301 I | auth: deleting token uSiLtLgabtGbNwZZ.59 for user conductor
2021-07-06 14:33:01.538356 I | auth: deleting token RdGSauZyweUGQRoY.57 for user conductor
2021-07-06 14:33:01.538371 I | auth: deleting token nAbjsewLXzgqzrBt.58 for user conductor
2021-07-06 14:33:02.836872 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.498468596s) to execute
2021-07-06 14:33:03.738905 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:04.639041 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.799625227s) to execute
2021-07-06 14:33:04.639170 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.743367643s) to execute
2021-07-06 14:33:05.538388 I | auth: deleting token wUPdciMBFZqfCeaU.61 for user conductor
2021-07-06 14:33:06.440418 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.798408081s) to execute
2021-07-06 14:33:06.637082 I | auth: deleting token cuUWncfRHzaUTPSe.62 for user conductor
2021-07-06 14:33:06.637123 I | auth: deleting token HXjZhYQtdyaFqbIH.63 for user conductor
2021-07-06 14:33:08.439570 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.899542723s) to execute
2021-07-06 14:33:08.439696 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.996074993s) to execute
2021-07-06 14:33:08.440052 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.798559879s) to execute
2021-07-06 14:33:08.739139 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:11.538345 I | auth: deleting token stAfWiuGAEwGrepN.68 for user conductor
2021-07-06 14:33:11.538398 I | auth: deleting token icFxFlCYdYrEhxjU.65 for user conductor
2021-07-06 14:33:11.538405 I | auth: deleting token klMdqKqbtuxGhIhK.67 for user conductor
2021-07-06 14:33:11.538413 I | auth: deleting token GbuipOkvsOKjQxRQ.64 for user conductor
2021-07-06 14:33:11.538420 I | auth: deleting token dnesRKzLzOXtbAbb.70 for user conductor
2021-07-06 14:33:12.041275 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.60244875s) to execute
2021-07-06 14:33:13.538340 I | auth: deleting token EsfZIRdvOeWonkOg.71 for user conductor
2021-07-06 14:33:13.739422 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:15.341000 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.245375553s) to execute
2021-07-06 14:33:15.341309 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.29711415s) to execute
2021-07-06 14:33:15.494092 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (150.085203ms) to execute
2021-07-06 14:33:15.538381 I | auth: deleting token IwiucDJejzvLwbgK.76 for user conductor
2021-07-06 14:33:15.538446 I | auth: deleting token dvPwFXXyYJrKhxbq.74 for user conductor
2021-07-06 14:33:15.539275 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (194.893263ms) to execute
2021-07-06 14:33:17.437094 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.600210265s) to execute
2021-07-06 14:33:17.538270 I | auth: deleting token QeDLOUABfunGQEuR.79 for user conductor
2021-07-06 14:33:17.538403 I | auth: deleting token nkpZVGAZqCIxCrjk.73 for user conductor
2021-07-06 14:33:17.538435 I | auth: deleting token oBQXppDJviuWVLot.78 for user conductor
2021-07-06 14:33:18.739753 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:19.538350 I | auth: deleting token syyEsjmCVYEeAfXu.80 for user conductor
2021-07-06 14:33:19.548222 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.05452172s) to execute
2021-07-06 14:33:19.794802 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (155.499799ms) to execute
2021-07-06 14:33:20.538500 I | auth: deleting token EPBocxlkEZCyGWUt.82 for user conductor
2021-07-06 14:33:21.545184 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.347153987s) to execute
2021-07-06 14:33:22.538384 I | auth: deleting token UQTaEURDtpiXnIQM.81 for user conductor
2021-07-06 14:33:23.443340 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.706511214s) to execute
2021-07-06 14:33:23.740091 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:24.538305 I | auth: deleting token MuQXjCXLZYWYJtsM.83 for user conductor
2021-07-06 14:33:24.538337 I | auth: deleting token dGUYxfYxQUCPJEhU.85 for user conductor
2021-07-06 14:33:24.538351 I | auth: deleting token ucuaBoleTogKBrmZ.84 for user conductor
2021-07-06 14:33:27.241514 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.604366761s) to execute
2021-07-06 14:33:27.241919 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.794882999s) to execute
2021-07-06 14:33:28.740444 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:31.139082 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701665511s) to execute
2021-07-06 14:33:31.538281 I | auth: deleting token YxxqBbjcKZxIlYIb.86 for user conductor
2021-07-06 14:33:31.538325 I | auth: deleting token xMJLTguIzNnKsTpQ.88 for user conductor
2021-07-06 14:33:31.538345 I | auth: deleting token ZgYNXOcLXpLWpgnV.89 for user conductor
2021-07-06 14:33:31.538352 I | auth: deleting token fpUSgHTLKfiADmin.87 for user conductor
2021-07-06 14:33:32.839930 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.546014383s) to execute
2021-07-06 14:33:32.840072 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.602783444s) to execute
2021-07-06 14:33:32.996656 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (153.953721ms) to execute
2021-07-06 14:33:33.740637 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:34.538346 I | auth: deleting token LdIvqOwxzSiSewhY.90 for user conductor
2021-07-06 14:33:34.538437 I | auth: deleting token CYvRzfEFTmzvNGga.93 for user conductor
2021-07-06 14:33:34.538458 I | auth: deleting token NydrZsrzOxPYbAYG.91 for user conductor
2021-07-06 14:33:34.538469 I | auth: deleting token MYbSiUFTvZfrkoIS.92 for user conductor
2021-07-06 14:33:34.939914 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.902600189s) to execute
2021-07-06 14:33:36.538319 I | auth: deleting token gxkYwURrONKcKlZI.94 for user conductor
2021-07-06 14:33:36.538368 I | auth: deleting token XdUXexCgfDXNbIUu.95 for user conductor
2021-07-06 14:33:36.743176 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.942284717s) to execute
2021-07-06 14:33:37.538317 I | auth: deleting token EEulXJxSciEfvLbc.96 for user conductor
2021-07-06 14:33:38.443067 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.506328277s) to execute
2021-07-06 14:33:38.443152 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.686349342s) to execute
2021-07-06 14:33:38.740910 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:39.538290 I | auth: deleting token pJqJKJnuQPXGnIgM.97 for user conductor
2021-07-06 14:33:40.042651 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (348.993035ms) to execute
2021-07-06 14:33:40.538367 I | auth: deleting token fzpwbAlwBOnvOShQ.98 for user conductor
2021-07-06 14:33:41.538301 I | auth: deleting token fHQPBJXBYCTBNkmd.99 for user conductor
2021-07-06 14:33:43.538364 I | auth: deleting token FYwqvKmCZkyomPDO.100 for user conductor
2021-07-06 14:33:43.741326 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:44.538390 I | auth: deleting token LxfwVEvbVUstyxIN.101 for user conductor
2021-07-06 14:33:45.538256 I | auth: deleting token aaPmvCOSAMVnhstv.102 for user conductor
2021-07-06 14:33:46.442380 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.14858586s) to execute
2021-07-06 14:33:48.139965 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.602152171s) to execute
2021-07-06 14:33:48.294505 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (151.921934ms) to execute
2021-07-06 14:33:48.741677 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:51.538285 I | auth: deleting token MoATRRXOYfGXjVvw.109 for user conductor
2021-07-06 14:33:51.538349 I | auth: deleting token drGgVHIHPFVIFyyt.105 for user conductor
2021-07-06 14:33:51.538361 I | auth: deleting token gCuTQDwMsSQvVRpk.106 for user conductor
2021-07-06 14:33:51.538375 I | auth: deleting token JxTkLkLWlwUmGTuU.104 for user conductor
2021-07-06 14:33:51.538386 I | auth: deleting token TZbsXTpvEGLBLCon.108 for user conductor
2021-07-06 14:33:52.037592 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.143453362s) to execute
2021-07-06 14:33:53.741869 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:54.538243 I | auth: deleting token UJzlEYyKwRCcpXIX.110 for user conductor
2021-07-06 14:33:56.641040 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.804119658s) to execute
2021-07-06 14:33:56.793771 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (150.295908ms) to execute
2021-07-06 14:33:56.903429 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (259.930765ms) to execute
2021-07-06 14:33:56.905404 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (109.086112ms) to execute
2021-07-06 14:33:58.538399 I | auth: deleting token nyBfQQDrSeMhrXfi.113 for user conductor
2021-07-06 14:33:58.538446 I | auth: deleting token cnEYIzXwUoHzFlXC.111 for user conductor
2021-07-06 14:33:58.538461 I | auth: deleting token OrNTBclVCRtpHjQu.114 for user conductor
2021-07-06 14:33:58.538475 I | auth: deleting token iuSVjfmTwfzHaRYT.112 for user conductor
2021-07-06 14:33:58.742080 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:59.843299 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.306387895s) to execute
2021-07-06 14:34:00.538334 I | auth: deleting token GGaxktgZWOGppJMK.116 for user conductor
2021-07-06 14:34:00.538397 I | auth: deleting token UkHjctrXmJbPdPeX.115 for user conductor
2021-07-06 14:34:01.743966 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.804656251s) to execute
2021-07-06 14:34:01.744160 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.807210459s) to execute
2021-07-06 14:34:02.538360 I | auth: deleting token RreMWTNiIuuQfcSG.118 for user conductor
2021-07-06 14:34:02.538414 I | auth: deleting token zFHrZCECqwXNvIxf.119 for user conductor
2021-07-06 14:34:02.538434 I | auth: deleting token mhnfEyjPgEDIdpBQ.117 for user conductor
2021-07-06 14:34:03.742333 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:05.538253 I | auth: deleting token qRgFLMTiwXkkOhRC.120 for user conductor
2021-07-06 14:34:07.538250 I | auth: deleting token pETtjSZPohAFcIKq.122 for user conductor
2021-07-06 14:34:07.538319 I | auth: deleting token CCarahZGmsTsRupP.123 for user conductor
2021-07-06 14:34:07.538334 I | auth: deleting token CanJZIEYCnFAdYgV.121 for user conductor
2021-07-06 14:34:07.538346 I | auth: deleting token wtOhLreulWoYyhYK.124 for user conductor
2021-07-06 14:34:08.836753 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:09.241622 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.347927504s) to execute
2021-07-06 14:34:11.239159 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.802134206s) to execute
2021-07-06 14:34:11.239416 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.902533149s) to execute
2021-07-06 14:34:11.239471 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.90257034s) to execute
2021-07-06 14:34:11.242311 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.804812494s) to execute
2021-07-06 14:34:11.538339 I | auth: deleting token TPjkKvkqcEUyIKcC.127 for user conductor
2021-07-06 14:34:11.538384 I | auth: deleting token GanFwohjCNdhBwVc.125 for user conductor
2021-07-06 14:34:13.538289 I | auth: deleting token vnOWsnjzNEVSAfDd.130 for user conductor
2021-07-06 14:34:13.538329 I | auth: deleting token HEbixqnFGPZHdFPz.126 for user conductor
2021-07-06 14:34:13.538341 I | auth: deleting token nEwnjkasoTTmUzdq.129 for user conductor
2021-07-06 14:34:13.538347 I | auth: deleting token VqVUeaFZPrXTjeqt.128 for user conductor
2021-07-06 14:34:13.837156 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:14.937952 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.596901561s) to execute
2021-07-06 14:34:16.538491 I | auth: deleting token sCfRHdiGsXyIiqQh.134 for user conductor
2021-07-06 14:34:16.538541 I | auth: deleting token qSUESlxZtdRhfDcX.132 for user conductor
2021-07-06 14:34:16.538556 I | auth: deleting token fTgUFCECUEMuGznt.133 for user conductor
2021-07-06 14:34:16.538563 I | auth: deleting token HdMXoyhPFRqOLWaV.131 for user conductor
2021-07-06 14:34:16.640895 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.001632384s) to execute
2021-07-06 14:34:18.537279 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.893887055s) to execute
2021-07-06 14:34:18.537394 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.741902331s) to execute
2021-07-06 14:34:18.537600 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.893748447s) to execute
2021-07-06 14:34:18.538250 I | auth: deleting token zKoyfTbXyTCfdSuj.136 for user conductor
2021-07-06 14:34:18.538285 I | auth: deleting token qIFRRrxZvmwCToJQ.135 for user conductor
2021-07-06 14:34:18.694959 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (153.599866ms) to execute
2021-07-06 14:34:18.837476 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:21.538401 I | auth: deleting token EaLVqAhcNWnFhFTJ.138 for user conductor
2021-07-06 14:34:21.538450 I | auth: deleting token xvYjNMIzPpRBUMQB.137 for user conductor
2021-07-06 14:34:21.538462 I | auth: deleting token vstTMvBIuFGspkEX.139 for user conductor
2021-07-06 14:34:21.538471 I | auth: deleting token alVZTPuksiKuUUWU.140 for user conductor
2021-07-06 14:34:23.837893 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:24.044353 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.806420682s) to execute
2021-07-06 14:34:24.538341 I | auth: deleting token YkjyrZBufmFSlRLt.143 for user conductor
2021-07-06 14:34:24.538396 I | auth: deleting token VPkJZCREIOQOGztq.144 for user conductor
2021-07-06 14:34:24.538409 I | auth: deleting token SmfnauQGeDSufgpP.141 for user conductor
2021-07-06 14:34:24.538435 I | auth: deleting token ykrhBcfFmkApgXvB.142 for user conductor
2021-07-06 14:34:25.538300 I | auth: deleting token jYojsnLywJTAhCXe.145 for user conductor
2021-07-06 14:34:25.737575 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.599331145s) to execute
2021-07-06 14:34:25.737791 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.6904097s) to execute
2021-07-06 14:34:25.740312 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.692853124s) to execute
2021-07-06 14:34:27.637834 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.896939723s) to execute
2021-07-06 14:34:27.638064 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.897371043s) to execute
2021-07-06 14:34:27.794421 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.421304ms) to execute
2021-07-06 14:34:28.538367 I | auth: deleting token BIbMcsQpsGRlqSgY.147 for user conductor
2021-07-06 14:34:28.538432 I | auth: deleting token IfIgVbNzaxIDomEZ.146 for user conductor
2021-07-06 14:34:28.838160 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:29.541963 W | etcdserver: request "header: