Results

By type

          Skipping self-checking
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-1.oof-has-etcd'
Waiting for onap-oof-has-etcd-1.oof-has-etcd to come up
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
2021-07-06 14:24:02.639421 I | etcdmain: etcd Version: 3.2.24
2021-07-06 14:24:02.639611 I | etcdmain: Git SHA: 420a45226
2021-07-06 14:24:02.639628 I | etcdmain: Go Version: go1.8.7
2021-07-06 14:24:02.639634 I | etcdmain: Go OS/Arch: linux/amd64
2021-07-06 14:24:02.639638 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-07-06 14:24:02.639813 I | embed: listening for peers on http://0.0.0.0:2380
2021-07-06 14:24:02.639899 I | embed: listening for client requests on 0.0.0.0:2379
2021-07-06 14:24:02.652537 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd:2380 to 10.233.70.144:2380
2021-07-06 14:24:02.653150 I | pkg/netutil: resolving onap-oof-has-etcd-0.oof-has-etcd:2380 to 10.233.70.144:2380
2021-07-06 14:24:02.996329 I | etcdserver: name = onap-oof-has-etcd-0
2021-07-06 14:24:02.996425 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-07-06 14:24:02.996439 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-07-06 14:24:02.996447 I | etcdserver: heartbeat = 100ms
2021-07-06 14:24:02.996455 I | etcdserver: election = 1000ms
2021-07-06 14:24:02.996463 I | etcdserver: snapshot count = 100000
2021-07-06 14:24:02.996499 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-0.oof-has-etcd:2379
2021-07-06 14:24:02.996511 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-0.oof-has-etcd:2380
2021-07-06 14:24:02.996576 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-07-06 14:24:03.008569 I | etcdserver: starting member 8aae4c350a2413a5 in cluster e8b03869cbf54258
2021-07-06 14:24:03.008725 I | raft: 8aae4c350a2413a5 became follower at term 0
2021-07-06 14:24:03.008790 I | raft: newRaft 8aae4c350a2413a5 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-07-06 14:24:03.008816 I | raft: 8aae4c350a2413a5 became follower at term 1
2021-07-06 14:24:03.037303 W | auth: simple token is not cryptographically signed
2021-07-06 14:24:03.040719 I | rafthttp: starting peer 2d249ba41c7e44fa...
2021-07-06 14:24:03.040805 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa
2021-07-06 14:24:03.041728 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-07-06 14:24:03.041833 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-07-06 14:24:03.137736 I | rafthttp: started peer 2d249ba41c7e44fa
2021-07-06 14:24:03.137869 I | rafthttp: added peer 2d249ba41c7e44fa
2021-07-06 14:24:03.137950 I | rafthttp: starting peer 72b38cc930a2fa6f...
2021-07-06 14:24:03.138306 I | rafthttp: started HTTP pipelining with peer 72b38cc930a2fa6f
2021-07-06 14:24:03.138376 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-07-06 14:24:03.138400 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader)
2021-07-06 14:24:03.236845 I | rafthttp: peer 2d249ba41c7e44fa became active
2021-07-06 14:24:03.236891 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-07-06 14:24:03.236996 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message reader)
2021-07-06 14:24:03.239034 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-07-06 14:24:03.241095 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (writer)
2021-07-06 14:24:03.341467 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream Message reader)
2021-07-06 14:24:03.341684 I | rafthttp: started peer 72b38cc930a2fa6f
2021-07-06 14:24:03.341831 I | rafthttp: added peer 72b38cc930a2fa6f
2021-07-06 14:24:03.341935 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-07-06 14:24:03.342266 I | rafthttp: started streaming with peer 72b38cc930a2fa6f (stream MsgApp v2 reader)
2021-07-06 14:24:03.345830 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-07-06 14:24:03.346069 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-07-06 14:24:03.346253 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-07-06 14:24:03.346913 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 writer)
2021-07-06 14:24:03.437411 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message writer)
2021-07-06 14:24:03.837115 I | raft: 8aae4c350a2413a5 [term: 1] received a MsgVote message with higher term from 2d249ba41c7e44fa [term: 2]
2021-07-06 14:24:03.837165 I | raft: 8aae4c350a2413a5 became follower at term 2
2021-07-06 14:24:03.837181 I | raft: 8aae4c350a2413a5 [logterm: 1, index: 3, vote: 0] cast MsgVote for 2d249ba41c7e44fa [logterm: 1, index: 3] at term 2
2021-07-06 14:24:03.839947 I | raft: raft.node: 8aae4c350a2413a5 elected leader 2d249ba41c7e44fa at term 2
2021-07-06 14:24:03.938569 I | etcdserver: published {Name:onap-oof-has-etcd-0 ClientURLs:[http://onap-oof-has-etcd-0.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-07-06 14:24:03.938606 I | embed: ready to serve client requests
2021-07-06 14:24:03.938964 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-07-06 14:24:03.939118 N | etcdserver/membership: set the initial cluster version to 3.0
2021-07-06 14:24:03.939279 I | etcdserver/api: enabled capabilities for version 3.0
2021-07-06 14:24:08.343271 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:13.343931 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:18.344267 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:23.344452 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:28.344770 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:33.345001 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:38.345282 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:43.345466 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:48.345808 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:53.346028 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:24:58.346308 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:03.346552 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:08.346866 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:13.347186 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:18.347471 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:23.347885 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:28.348246 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:33.348478 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:38.348747 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:43.349035 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:48.349350 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:53.349601 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:25:58.350070 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:01.938088 N | auth: added a new user: root
2021-07-06 14:26:01.938259 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.566365377s) to execute
2021-07-06 14:26:03.350331 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:03.638680 N | auth: added a new user: conductor
2021-07-06 14:26:03.638747 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (1.524376388s) to execute
2021-07-06 14:26:03.801084 N | auth: Role conductor is created
2021-07-06 14:26:04.004038 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-07-06 14:26:04.204591 N | auth: granted role conductor to user conductor
2021-07-06 14:26:04.505685 N | auth: Role root is created
2021-07-06 14:26:04.509366 N | auth: granted role root to user root
2021-07-06 14:26:04.537962 N | auth: Authentication enabled
2021-07-06 14:26:08.350631 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:13.351072 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:18.351385 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:23.351692 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:28.352005 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:33.352293 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:38.352587 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:43.352843 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:48.353208 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:53.353491 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:26:58.353794 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:03.354068 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:08.354355 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:13.354708 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:18.355073 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:23.355381 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:28.355934 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:33.356232 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:35.243010 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.448843294s) to execute
2021-07-06 14:27:37.139304 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (300.625977ms) to execute
2021-07-06 14:27:38.356612 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:39.041687 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (747.527245ms) to execute
2021-07-06 14:27:40.937738 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.892380634s) to execute
2021-07-06 14:27:43.436782 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:44.641294 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.802234241s) to execute
2021-07-06 14:27:46.440175 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (303.286721ms) to execute
2021-07-06 14:27:48.437091 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:48.738353 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.198904444s) to execute
2021-07-06 14:27:50.337594 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.142698029s) to execute
2021-07-06 14:27:53.437327 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:27:55.444099 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.506034111s) to execute
2021-07-06 14:27:58.437544 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:00.543152 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.903635936s) to execute
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-07-06 14:28:02.341136 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.601774827s) to execute
2021-07-06 14:28:03.437849 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:03.842969 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.498823291s) to execute
2021-07-06 14:28:05.444282 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.598555087s) to execute
2021-07-06 14:28:05.537188 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.691560285s) to execute
2021-07-06 14:28:08.438090 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:10.737627 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.200744588s) to execute
2021-07-06 14:28:10.900994 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (160.214018ms) to execute
2021-07-06 14:28:12.539376 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.741064274s) to execute
2021-07-06 14:28:12.539559 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.20255902s) to execute
2021-07-06 14:28:13.438403 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:14.741715 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.103647864s) to execute
2021-07-06 14:28:16.738608 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.993982555s) to execute
2021-07-06 14:28:16.738801 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.901867581s) to execute
2021-07-06 14:28:18.438729 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:18.637050 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.799990236s) to execute
2021-07-06 14:28:18.637120 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (943.178398ms) to execute
2021-07-06 14:28:20.437135 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.643022997s) to execute
2021-07-06 14:28:22.039913 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.598763867s) to execute
2021-07-06 14:28:23.439424 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:23.838504 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (3.398384495s) to execute
2021-07-06 14:28:23.838702 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.700883449s) to execute
2021-07-06 14:28:23.838881 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.794749933s) to execute
2021-07-06 14:28:28.439784 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:30.837702 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (5.290387685s) to execute
2021-07-06 14:28:33.440141 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:34.137255 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.800245758s) to execute
2021-07-06 14:28:35.943343 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (504.150761ms) to execute
2021-07-06 14:28:36.393920 W | etcdserver: read-only range request "key:\"conductor/plans/healthcheck\" " with result "range_response_count:1 size:364" took too long (296.868386ms) to execute
2021-07-06 14:28:38.440469 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:43.440751 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:48.441168 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:50.942559 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.902877717s) to execute
2021-07-06 14:28:51.194574 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (249.490586ms) to execute
2021-07-06 14:28:51.196019 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (148.416171ms) to execute
2021-07-06 14:28:53.441444 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:54.440250 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.639248872s) to execute
2021-07-06 14:28:57.743203 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.10603414s) to execute
2021-07-06 14:28:57.743543 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.206590715s) to execute
2021-07-06 14:28:58.441784 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:28:59.740345 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (402.467523ms) to execute
2021-07-06 14:29:01.642815 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (848.851113ms) to execute
2021-07-06 14:29:03.442019 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:04.838384 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.339780207s) to execute
2021-07-06 14:29:06.543384 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.549170572s) to execute
2021-07-06 14:29:06.694824 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (148.575127ms) to execute
2021-07-06 14:29:08.442281 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:10.738463 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.499324865s) to execute
2021-07-06 14:29:12.538804 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701860168s) to execute
2021-07-06 14:29:12.539015 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.798137129s) to execute
2021-07-06 14:29:13.442593 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:15.936964 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.84309493s) to execute
2021-07-06 14:29:16.095441 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.019274ms) to execute
2021-07-06 14:29:17.737513 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (643.684911ms) to execute
2021-07-06 14:29:18.442821 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:21.041202 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.603780347s) to execute
2021-07-06 14:29:23.536776 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:24.339247 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.240279526s) to execute
2021-07-06 14:29:28.140702 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.60261207s) to execute
2021-07-06 14:29:28.537179 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:31.837684 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.599506152s) to execute
2021-07-06 14:29:31.994207 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (153.561856ms) to execute
2021-07-06 14:29:32.094594 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (153.801597ms) to execute
2021-07-06 14:29:33.537527 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:38.537943 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:43.538262 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:48.538573 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:51.543175 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.505410761s) to execute
2021-07-06 14:29:51.695205 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.211679ms) to execute
2021-07-06 14:29:53.538905 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:55.239094 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.141862533s) to execute
2021-07-06 14:29:55.394135 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (151.676629ms) to execute
2021-07-06 14:29:58.539089 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:29:59.441621 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (447.753086ms) to execute
2021-07-06 14:30:03.539359 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:08.539688 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:13.539864 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:13.639584 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (100.865243ms) to execute
2021-07-06 14:30:18.540199 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:23.540558 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:24.637802 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.990690046s) to execute
2021-07-06 14:30:26.440673 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (244.623524ms) to execute
2021-07-06 14:30:28.038407 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (344.700322ms) to execute
2021-07-06 14:30:28.540804 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:31.242412 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.105511636s) to execute
2021-07-06 14:30:32.837311 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.400331894s) to execute
2021-07-06 14:30:32.837626 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (642.306747ms) to execute
2021-07-06 14:30:33.541076 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:36.238097 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.243527809s) to execute
2021-07-06 14:30:36.393784 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.68734ms) to execute
2021-07-06 14:30:38.541383 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:40.137446 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.197899902s) to execute
2021-07-06 14:30:41.938061 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701129188s) to execute
2021-07-06 14:30:43.541608 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:43.844338 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.704787367s) to execute
2021-07-06 14:30:43.936807 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.90321021s) to execute
2021-07-06 14:30:43.937025 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.995601043s) to execute
2021-07-06 14:30:47.742617 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.305308401s) to execute
2021-07-06 14:30:48.542600 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:49.937522 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.243729225s) to execute
2021-07-06 14:30:53.543026 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:54.041852 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.105104874s) to execute
2021-07-06 14:30:55.639535 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.445528294s) to execute
2021-07-06 14:30:57.639473 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.745645704s) to execute
2021-07-06 14:30:58.543307 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:30:59.142257 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.499851394s) to execute
2021-07-06 14:30:59.294040 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.288912ms) to execute
2021-07-06 14:31:03.543591 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:06.541171 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.647210199s) to execute
2021-07-06 14:31:08.341683 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.797417098s) to execute
2021-07-06 14:31:08.341897 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.79757083s) to execute
2021-07-06 14:31:08.543964 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:10.243264 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.89874459s) to execute
2021-07-06 14:31:10.243483 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.899348032s) to execute
2021-07-06 14:31:13.544302 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:15.338028 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.298707455s) to execute
2021-07-06 14:31:16.842683 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.404791797s) to execute
2021-07-06 14:31:16.842946 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.404024911s) to execute
2021-07-06 14:31:16.938676 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.499744865s) to execute
2021-07-06 14:31:18.544832 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:18.843936 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.806637248s) to execute
2021-07-06 14:31:20.738054 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.30117163s) to execute
2021-07-06 14:31:22.242028 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.501275769s) to execute
2021-07-06 14:31:22.242176 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.501419735s) to execute
2021-07-06 14:31:22.394000 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (148.757013ms) to execute
2021-07-06 14:31:23.545047 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:23.939103 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.598762271s) to execute
2021-07-06 14:31:23.939310 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (545.313226ms) to execute
2021-07-06 14:31:25.642828 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.700081763s) to execute
2021-07-06 14:31:27.442539 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.79651974s) to execute
2021-07-06 14:31:27.442906 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.797048408s) to execute
2021-07-06 14:31:28.545292 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:29.142128 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.697139095s) to execute
2021-07-06 14:31:29.142194 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.695015767s) to execute
2021-07-06 14:31:30.743125 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.504188097s) to execute
2021-07-06 14:31:33.545607 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:34.343433 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.504017332s) to execute
2021-07-06 14:31:34.436705 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.599761947s) to execute
2021-07-06 14:31:38.545923 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:42.041722 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (204.774889ms) to execute
2021-07-06 14:31:43.546213 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:43.841033 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (644.763013ms) to execute
2021-07-06 14:31:46.738364 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (400.38487ms) to execute
2021-07-06 14:31:48.546509 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:52.439792 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (100.856361ms) to execute
2021-07-06 14:31:53.546826 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:31:54.144970 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (451.015087ms) to execute
2021-07-06 14:31:58.636725 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:00.441871 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.743365968s) to execute
2021-07-06 14:32:02.140800 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.603752436s) to execute
2021-07-06 14:32:02.141066 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.696423725s) to execute
2021-07-06 14:32:02.143810 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.699085285s) to execute
2021-07-06 14:32:03.637013 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:06.343153 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.342561926s) to execute
2021-07-06 14:32:08.640781 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:08.647026 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (753.156227ms) to execute
2021-07-06 14:32:10.544146 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.748917387s) to execute
2021-07-06 14:32:12.437662 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.800737073s) to execute
2021-07-06 14:32:12.594078 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.43989ms) to execute
2021-07-06 14:32:12.595968 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (152.784295ms) to execute
2021-07-06 14:32:13.641080 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:15.947857 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.249619632s) to execute
2021-07-06 14:32:16.137186 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (186.351882ms) to execute
2021-07-06 14:32:18.641406 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:22.443518 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (344.190704ms) to execute
2021-07-06 14:32:23.641682 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:24.240171 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.702155633s) to execute
2021-07-06 14:32:28.736752 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:29.938633 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.69503165s) to execute
2021-07-06 14:32:29.938952 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (5.69663824s) to execute
2021-07-06 14:32:33.538418 I | auth: deleting token yneAJKrReAScponv.17 for user conductor
2021-07-06 14:32:33.736923 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:35.538285 I | auth: deleting token vfyMNfMiLnnwmHhY.19 for user conductor
2021-07-06 14:32:35.538327 I | auth: deleting token StGFqmraHMXaFgGg.21 for user conductor
2021-07-06 14:32:35.538337 I | auth: deleting token EmKtTdfOEraBtCjk.22 for user conductor
2021-07-06 14:32:36.742394 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.104022738s) to execute
2021-07-06 14:32:37.538371 I | auth: deleting token zjIJOSkiQLSVfwOH.27 for user conductor
2021-07-06 14:32:37.538421 I | auth: deleting token IoXjGBgHljjzAhdb.25 for user conductor
2021-07-06 14:32:38.737256 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:38.737562 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.980337567s) to execute
2021-07-06 14:32:38.737818 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.980509516s) to execute
2021-07-06 14:32:38.741652 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.804668429s) to execute
2021-07-06 14:32:38.741797 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.984302445s) to execute
2021-07-06 14:32:39.538357 I | auth: deleting token uFwkmjDeNoFNqCko.29 for user conductor
2021-07-06 14:32:41.538319 I | auth: deleting token AIWxiyUeyHdHCOrA.32 for user conductor
2021-07-06 14:32:41.538382 I | auth: deleting token segpSkKGEoNxEOFX.31 for user conductor
2021-07-06 14:32:43.737512 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:44.238318 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.044456424s) to execute
2021-07-06 14:32:44.393922 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.694316ms) to execute
2021-07-06 14:32:44.394105 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (150.291577ms) to execute
2021-07-06 14:32:45.538420 I | auth: deleting token GYxAUtqHwOusqFpG.34 for user conductor
2021-07-06 14:32:45.538468 I | auth: deleting token nmHqgTDFORScpOAt.35 for user conductor
2021-07-06 14:32:46.243858 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (149.983224ms) to execute
2021-07-06 14:32:46.494810 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.71145ms) to execute
2021-07-06 14:32:46.538393 I | auth: deleting token DgXbcEHSfAuRXJQU.38 for user conductor
2021-07-06 14:32:47.538358 I | auth: deleting token kBEjBsnXDCwbhMhR.40 for user conductor
2021-07-06 14:32:48.737777 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:49.538227 I | auth: deleting token JKyupigZcWrLQllV.42 for user conductor
2021-07-06 14:32:49.538270 I | auth: deleting token hVAxqIHgQgkHJDeY.44 for user conductor
2021-07-06 14:32:50.238426 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.336858906s) to execute
2021-07-06 14:32:50.538426 I | auth: deleting token vUjBzGfXnFvIyREH.48 for user conductor
2021-07-06 14:32:50.538481 I | auth: deleting token ccrjQKCPOpjTTuyC.46 for user conductor
2021-07-06 14:32:51.538357 I | auth: deleting token OLKgENLWXwrLfSTt.50 for user conductor
2021-07-06 14:32:52.538425 I | auth: deleting token ZbrgDwSONYGiQXcZ.52 for user conductor
2021-07-06 14:32:53.342756 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.545105637s) to execute
2021-07-06 14:32:53.494495 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (148.737584ms) to execute
2021-07-06 14:32:53.738062 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:55.538371 I | auth: deleting token nITmyJdYAjoTXhzE.54 for user conductor
2021-07-06 14:32:56.538295 I | auth: deleting token PQAvFvcZSReAWlJN.55 for user conductor
2021-07-06 14:32:57.042264 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.303121667s) to execute
2021-07-06 14:32:58.738465 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:32:58.839826 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.646118953s) to execute
2021-07-06 14:32:58.840013 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.727912206s) to execute
2021-07-06 14:33:00.844559 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.848096165s) to execute
2021-07-06 14:33:01.538301 I | auth: deleting token uSiLtLgabtGbNwZZ.59 for user conductor
2021-07-06 14:33:01.538356 I | auth: deleting token RdGSauZyweUGQRoY.57 for user conductor
2021-07-06 14:33:01.538371 I | auth: deleting token nAbjsewLXzgqzrBt.58 for user conductor
2021-07-06 14:33:02.836872 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.498468596s) to execute
2021-07-06 14:33:03.738905 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:04.639041 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.799625227s) to execute
2021-07-06 14:33:04.639170 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.743367643s) to execute
2021-07-06 14:33:05.538388 I | auth: deleting token wUPdciMBFZqfCeaU.61 for user conductor
2021-07-06 14:33:06.440418 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.798408081s) to execute
2021-07-06 14:33:06.637082 I | auth: deleting token cuUWncfRHzaUTPSe.62 for user conductor
2021-07-06 14:33:06.637123 I | auth: deleting token HXjZhYQtdyaFqbIH.63 for user conductor
2021-07-06 14:33:08.439570 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.899542723s) to execute
2021-07-06 14:33:08.439696 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.996074993s) to execute
2021-07-06 14:33:08.440052 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.798559879s) to execute
2021-07-06 14:33:08.739139 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:11.538345 I | auth: deleting token stAfWiuGAEwGrepN.68 for user conductor
2021-07-06 14:33:11.538398 I | auth: deleting token icFxFlCYdYrEhxjU.65 for user conductor
2021-07-06 14:33:11.538405 I | auth: deleting token klMdqKqbtuxGhIhK.67 for user conductor
2021-07-06 14:33:11.538413 I | auth: deleting token GbuipOkvsOKjQxRQ.64 for user conductor
2021-07-06 14:33:11.538420 I | auth: deleting token dnesRKzLzOXtbAbb.70 for user conductor
2021-07-06 14:33:12.041275 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.60244875s) to execute
2021-07-06 14:33:13.538340 I | auth: deleting token EsfZIRdvOeWonkOg.71 for user conductor
2021-07-06 14:33:13.739422 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:15.341000 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.245375553s) to execute
2021-07-06 14:33:15.341309 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.29711415s) to execute
2021-07-06 14:33:15.494092 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (150.085203ms) to execute
2021-07-06 14:33:15.538381 I | auth: deleting token IwiucDJejzvLwbgK.76 for user conductor
2021-07-06 14:33:15.538446 I | auth: deleting token dvPwFXXyYJrKhxbq.74 for user conductor
2021-07-06 14:33:15.539275 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (194.893263ms) to execute
2021-07-06 14:33:17.437094 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.600210265s) to execute
2021-07-06 14:33:17.538270 I | auth: deleting token QeDLOUABfunGQEuR.79 for user conductor
2021-07-06 14:33:17.538403 I | auth: deleting token nkpZVGAZqCIxCrjk.73 for user conductor
2021-07-06 14:33:17.538435 I | auth: deleting token oBQXppDJviuWVLot.78 for user conductor
2021-07-06 14:33:18.739753 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:19.538350 I | auth: deleting token syyEsjmCVYEeAfXu.80 for user conductor
2021-07-06 14:33:19.548222 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.05452172s) to execute
2021-07-06 14:33:19.794802 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (155.499799ms) to execute
2021-07-06 14:33:20.538500 I | auth: deleting token EPBocxlkEZCyGWUt.82 for user conductor
2021-07-06 14:33:21.545184 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.347153987s) to execute
2021-07-06 14:33:22.538384 I | auth: deleting token UQTaEURDtpiXnIQM.81 for user conductor
2021-07-06 14:33:23.443340 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.706511214s) to execute
2021-07-06 14:33:23.740091 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:24.538305 I | auth: deleting token MuQXjCXLZYWYJtsM.83 for user conductor
2021-07-06 14:33:24.538337 I | auth: deleting token dGUYxfYxQUCPJEhU.85 for user conductor
2021-07-06 14:33:24.538351 I | auth: deleting token ucuaBoleTogKBrmZ.84 for user conductor
2021-07-06 14:33:27.241514 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.604366761s) to execute
2021-07-06 14:33:27.241919 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.794882999s) to execute
2021-07-06 14:33:28.740444 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:31.139082 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701665511s) to execute
2021-07-06 14:33:31.538281 I | auth: deleting token YxxqBbjcKZxIlYIb.86 for user conductor
2021-07-06 14:33:31.538325 I | auth: deleting token xMJLTguIzNnKsTpQ.88 for user conductor
2021-07-06 14:33:31.538345 I | auth: deleting token ZgYNXOcLXpLWpgnV.89 for user conductor
2021-07-06 14:33:31.538352 I | auth: deleting token fpUSgHTLKfiADmin.87 for user conductor
2021-07-06 14:33:32.839930 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.546014383s) to execute
2021-07-06 14:33:32.840072 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.602783444s) to execute
2021-07-06 14:33:32.996656 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (153.953721ms) to execute
2021-07-06 14:33:33.740637 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:34.538346 I | auth: deleting token LdIvqOwxzSiSewhY.90 for user conductor
2021-07-06 14:33:34.538437 I | auth: deleting token CYvRzfEFTmzvNGga.93 for user conductor
2021-07-06 14:33:34.538458 I | auth: deleting token NydrZsrzOxPYbAYG.91 for user conductor
2021-07-06 14:33:34.538469 I | auth: deleting token MYbSiUFTvZfrkoIS.92 for user conductor
2021-07-06 14:33:34.939914 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.902600189s) to execute
2021-07-06 14:33:36.538319 I | auth: deleting token gxkYwURrONKcKlZI.94 for user conductor
2021-07-06 14:33:36.538368 I | auth: deleting token XdUXexCgfDXNbIUu.95 for user conductor
2021-07-06 14:33:36.743176 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.942284717s) to execute
2021-07-06 14:33:37.538317 I | auth: deleting token EEulXJxSciEfvLbc.96 for user conductor
2021-07-06 14:33:38.443067 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.506328277s) to execute
2021-07-06 14:33:38.443152 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.686349342s) to execute
2021-07-06 14:33:38.740910 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:39.538290 I | auth: deleting token pJqJKJnuQPXGnIgM.97 for user conductor
2021-07-06 14:33:40.042651 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (348.993035ms) to execute
2021-07-06 14:33:40.538367 I | auth: deleting token fzpwbAlwBOnvOShQ.98 for user conductor
2021-07-06 14:33:41.538301 I | auth: deleting token fHQPBJXBYCTBNkmd.99 for user conductor
2021-07-06 14:33:43.538364 I | auth: deleting token FYwqvKmCZkyomPDO.100 for user conductor
2021-07-06 14:33:43.741326 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:44.538390 I | auth: deleting token LxfwVEvbVUstyxIN.101 for user conductor
2021-07-06 14:33:45.538256 I | auth: deleting token aaPmvCOSAMVnhstv.102 for user conductor
2021-07-06 14:33:46.442380 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.14858586s) to execute
2021-07-06 14:33:48.139965 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.602152171s) to execute
2021-07-06 14:33:48.294505 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (151.921934ms) to execute
2021-07-06 14:33:48.741677 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:51.538285 I | auth: deleting token MoATRRXOYfGXjVvw.109 for user conductor
2021-07-06 14:33:51.538349 I | auth: deleting token drGgVHIHPFVIFyyt.105 for user conductor
2021-07-06 14:33:51.538361 I | auth: deleting token gCuTQDwMsSQvVRpk.106 for user conductor
2021-07-06 14:33:51.538375 I | auth: deleting token JxTkLkLWlwUmGTuU.104 for user conductor
2021-07-06 14:33:51.538386 I | auth: deleting token TZbsXTpvEGLBLCon.108 for user conductor
2021-07-06 14:33:52.037592 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.143453362s) to execute
2021-07-06 14:33:53.741869 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:54.538243 I | auth: deleting token UJzlEYyKwRCcpXIX.110 for user conductor
2021-07-06 14:33:56.641040 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.804119658s) to execute
2021-07-06 14:33:56.793771 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (150.295908ms) to execute
2021-07-06 14:33:56.903429 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (259.930765ms) to execute
2021-07-06 14:33:56.905404 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (109.086112ms) to execute
2021-07-06 14:33:58.538399 I | auth: deleting token nyBfQQDrSeMhrXfi.113 for user conductor
2021-07-06 14:33:58.538446 I | auth: deleting token cnEYIzXwUoHzFlXC.111 for user conductor
2021-07-06 14:33:58.538461 I | auth: deleting token OrNTBclVCRtpHjQu.114 for user conductor
2021-07-06 14:33:58.538475 I | auth: deleting token iuSVjfmTwfzHaRYT.112 for user conductor
2021-07-06 14:33:58.742080 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:33:59.843299 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.306387895s) to execute
2021-07-06 14:34:00.538334 I | auth: deleting token GGaxktgZWOGppJMK.116 for user conductor
2021-07-06 14:34:00.538397 I | auth: deleting token UkHjctrXmJbPdPeX.115 for user conductor
2021-07-06 14:34:01.743966 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.804656251s) to execute
2021-07-06 14:34:01.744160 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.807210459s) to execute
2021-07-06 14:34:02.538360 I | auth: deleting token RreMWTNiIuuQfcSG.118 for user conductor
2021-07-06 14:34:02.538414 I | auth: deleting token zFHrZCECqwXNvIxf.119 for user conductor
2021-07-06 14:34:02.538434 I | auth: deleting token mhnfEyjPgEDIdpBQ.117 for user conductor
2021-07-06 14:34:03.742333 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:05.538253 I | auth: deleting token qRgFLMTiwXkkOhRC.120 for user conductor
2021-07-06 14:34:07.538250 I | auth: deleting token pETtjSZPohAFcIKq.122 for user conductor
2021-07-06 14:34:07.538319 I | auth: deleting token CCarahZGmsTsRupP.123 for user conductor
2021-07-06 14:34:07.538334 I | auth: deleting token CanJZIEYCnFAdYgV.121 for user conductor
2021-07-06 14:34:07.538346 I | auth: deleting token wtOhLreulWoYyhYK.124 for user conductor
2021-07-06 14:34:08.836753 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:09.241622 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.347927504s) to execute
2021-07-06 14:34:11.239159 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.802134206s) to execute
2021-07-06 14:34:11.239416 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.902533149s) to execute
2021-07-06 14:34:11.239471 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.90257034s) to execute
2021-07-06 14:34:11.242311 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.804812494s) to execute
2021-07-06 14:34:11.538339 I | auth: deleting token TPjkKvkqcEUyIKcC.127 for user conductor
2021-07-06 14:34:11.538384 I | auth: deleting token GanFwohjCNdhBwVc.125 for user conductor
2021-07-06 14:34:13.538289 I | auth: deleting token vnOWsnjzNEVSAfDd.130 for user conductor
2021-07-06 14:34:13.538329 I | auth: deleting token HEbixqnFGPZHdFPz.126 for user conductor
2021-07-06 14:34:13.538341 I | auth: deleting token nEwnjkasoTTmUzdq.129 for user conductor
2021-07-06 14:34:13.538347 I | auth: deleting token VqVUeaFZPrXTjeqt.128 for user conductor
2021-07-06 14:34:13.837156 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:14.937952 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.596901561s) to execute
2021-07-06 14:34:16.538491 I | auth: deleting token sCfRHdiGsXyIiqQh.134 for user conductor
2021-07-06 14:34:16.538541 I | auth: deleting token qSUESlxZtdRhfDcX.132 for user conductor
2021-07-06 14:34:16.538556 I | auth: deleting token fTgUFCECUEMuGznt.133 for user conductor
2021-07-06 14:34:16.538563 I | auth: deleting token HdMXoyhPFRqOLWaV.131 for user conductor
2021-07-06 14:34:16.640895 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.001632384s) to execute
2021-07-06 14:34:18.537279 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.893887055s) to execute
2021-07-06 14:34:18.537394 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.741902331s) to execute
2021-07-06 14:34:18.537600 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.893748447s) to execute
2021-07-06 14:34:18.538250 I | auth: deleting token zKoyfTbXyTCfdSuj.136 for user conductor
2021-07-06 14:34:18.538285 I | auth: deleting token qIFRRrxZvmwCToJQ.135 for user conductor
2021-07-06 14:34:18.694959 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (153.599866ms) to execute
2021-07-06 14:34:18.837476 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:21.538401 I | auth: deleting token EaLVqAhcNWnFhFTJ.138 for user conductor
2021-07-06 14:34:21.538450 I | auth: deleting token xvYjNMIzPpRBUMQB.137 for user conductor
2021-07-06 14:34:21.538462 I | auth: deleting token vstTMvBIuFGspkEX.139 for user conductor
2021-07-06 14:34:21.538471 I | auth: deleting token alVZTPuksiKuUUWU.140 for user conductor
2021-07-06 14:34:23.837893 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:24.044353 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.806420682s) to execute
2021-07-06 14:34:24.538341 I | auth: deleting token YkjyrZBufmFSlRLt.143 for user conductor
2021-07-06 14:34:24.538396 I | auth: deleting token VPkJZCREIOQOGztq.144 for user conductor
2021-07-06 14:34:24.538409 I | auth: deleting token SmfnauQGeDSufgpP.141 for user conductor
2021-07-06 14:34:24.538435 I | auth: deleting token ykrhBcfFmkApgXvB.142 for user conductor
2021-07-06 14:34:25.538300 I | auth: deleting token jYojsnLywJTAhCXe.145 for user conductor
2021-07-06 14:34:25.737575 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.599331145s) to execute
2021-07-06 14:34:25.737791 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.6904097s) to execute
2021-07-06 14:34:25.740312 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.692853124s) to execute
2021-07-06 14:34:27.637834 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.896939723s) to execute
2021-07-06 14:34:27.638064 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.897371043s) to execute
2021-07-06 14:34:27.794421 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.421304ms) to execute
2021-07-06 14:34:28.538367 I | auth: deleting token BIbMcsQpsGRlqSgY.147 for user conductor
2021-07-06 14:34:28.538432 I | auth: deleting token IfIgVbNzaxIDomEZ.146 for user conductor
2021-07-06 14:34:28.838160 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:29.541963 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (848.292386ms) to execute
2021-07-06 14:34:31.542999 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.548928134s) to execute
2021-07-06 14:34:32.538267 I | auth: deleting token aSahtjBHmhaFHiNc.149 for user conductor
2021-07-06 14:34:32.538329 I | auth: deleting token KIxcwyVyIBSJnJjC.150 for user conductor
2021-07-06 14:34:32.538341 I | auth: deleting token QzsXwPSdEIOOJbgX.148 for user conductor
2021-07-06 14:34:32.538357 I | auth: deleting token jqnqCbyeIWEBvrxV.151 for user conductor
2021-07-06 14:34:33.538360 I | auth: deleting token QEOaJqPTRgBriGCb.152 for user conductor
2021-07-06 14:34:33.838463 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:34.538236 I | auth: deleting token PqoYwzuUWYIkCcQy.153 for user conductor
2021-07-06 14:34:35.039860 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.345870481s) to execute
2021-07-06 14:34:36.538299 I | auth: deleting token NUUDsuardWyCOqlY.154 for user conductor
2021-07-06 14:34:36.739228 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.695700742s) to execute
2021-07-06 14:34:36.739376 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.697194551s) to execute
2021-07-06 14:34:37.538377 I | auth: deleting token pbrweeFrIVCYvPxT.155 for user conductor
2021-07-06 14:34:38.643428 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.601055572s) to execute
2021-07-06 14:34:38.643615 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.901514183s) to execute
2021-07-06 14:34:38.643705 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.806630878s) to execute
2021-07-06 14:34:38.838727 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:39.538293 I | auth: deleting token IlitcMBYHzPnabDO.156 for user conductor
2021-07-06 14:34:40.440195 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.793445841s) to execute
2021-07-06 14:34:40.538376 I | auth: deleting token THZTcbwQygGyAezQ.157 for user conductor
2021-07-06 14:34:41.538276 I | auth: deleting token QfOrFxPRGVsEQduh.158 for user conductor
2021-07-06 14:34:41.940745 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.497750458s) to execute
2021-07-06 14:34:43.343955 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.403106929s) to execute
2021-07-06 14:34:43.344084 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.900618205s) to execute
2021-07-06 14:34:43.344215 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.400254271s) to execute
2021-07-06 14:34:43.538283 I | auth: deleting token dRFfundkuApKHCQu.159 for user conductor
2021-07-06 14:34:43.838998 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:44.538268 I | auth: deleting token KQRDNZAeilcwknHV.160 for user conductor
2021-07-06 14:34:45.539046 I | auth: deleting token eInqhKxjFUiKEsuB.161 for user conductor
2021-07-06 14:34:46.238158 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.395796755s) to execute
2021-07-06 14:34:47.538385 I | auth: deleting token koTziCzVgWSIbNDw.162 for user conductor
2021-07-06 14:34:47.939507 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.602515186s) to execute
2021-07-06 14:34:47.939643 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.445949701s) to execute
2021-07-06 14:34:48.094770 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.55144ms) to execute
2021-07-06 14:34:48.538308 I | auth: deleting token jQuBIbWQOigBmBsy.163 for user conductor
2021-07-06 14:34:48.839211 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:52.538275 I | auth: deleting token MqnCEEjttrUyOEaY.164 for user conductor
2021-07-06 14:34:52.538304 I | auth: deleting token ZLTBIaUyhCZmKftB.165 for user conductor
2021-07-06 14:34:52.538314 I | auth: deleting token zDcjGhVcxmLXLfKq.166 for user conductor
2021-07-06 14:34:53.046178 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.747557393s) to execute
2021-07-06 14:34:53.839554 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:54.541054 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.492428738s) to execute
2021-07-06 14:34:54.541288 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.347760468s) to execute
2021-07-06 14:34:54.541480 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.404488957s) to execute
2021-07-06 14:34:55.538372 I | auth: deleting token XsauGMDoByRWnPyf.169 for user conductor
2021-07-06 14:34:55.538422 I | auth: deleting token JILUoSSotMNlnUOy.170 for user conductor
2021-07-06 14:34:55.538444 I | auth: deleting token EvpySrdrdmhhbtsR.167 for user conductor
2021-07-06 14:34:55.538453 I | auth: deleting token VWHaExVLcyJUykpT.168 for user conductor
2021-07-06 14:34:56.538336 I | auth: deleting token JpHXjxTNAFpendnc.171 for user conductor
2021-07-06 14:34:56.542404 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.901745601s) to execute
2021-07-06 14:34:58.538300 I | auth: deleting token sSovwZjPAcYjXdzd.173 for user conductor
2021-07-06 14:34:58.538371 I | auth: deleting token oFVCFhrSWqYhdHfP.172 for user conductor
2021-07-06 14:34:58.839840 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:34:59.538317 I | auth: deleting token OVZgsaSUWdQECqTH.174 for user conductor
2021-07-06 14:35:00.139735 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.445800364s) to execute
2021-07-06 14:35:00.394042 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (157.042504ms) to execute
2021-07-06 14:35:00.538214 I | auth: deleting token epqBtazzMaYUjWGI.175 for user conductor
2021-07-06 14:35:00.538250 I | auth: deleting token xdiyfgPLPECtYFOu.176 for user conductor
2021-07-06 14:35:02.538285 I | auth: deleting token uitULcoCLWrnSpeL.177 for user conductor
2021-07-06 14:35:03.538368 I | auth: deleting token gZpccsSOmVBADruv.178 for user conductor
2021-07-06 14:35:03.840224 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:04.942016 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.29948164s) to execute
2021-07-06 14:35:05.538259 I | auth: deleting token TznVtgSNXXibgSLw.179 for user conductor
2021-07-06 14:35:06.440142 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.495261421s) to execute
2021-07-06 14:35:06.440440 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.495880122s) to execute
2021-07-06 14:35:06.440489 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.495898308s) to execute
2021-07-06 14:35:06.538396 I | auth: deleting token NPKYBhuVOfLLhXYo.180 for user conductor
2021-07-06 14:35:06.596300 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (153.627767ms) to execute
2021-07-06 14:35:08.538373 I | auth: deleting token aLufHKbefrLIbjRi.181 for user conductor
2021-07-06 14:35:08.840452 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:09.538347 I | auth: deleting token MptqIkzmjFKCtQae.182 for user conductor
2021-07-06 14:35:11.538411 I | auth: deleting token vAVfPMuXFYcOfbpr.183 for user conductor
2021-07-06 14:35:11.844424 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.907383643s) to execute
2021-07-06 14:35:12.095085 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (154.238605ms) to execute
2021-07-06 14:35:12.538264 I | auth: deleting token VtbJRvlGOVkRSiEO.184 for user conductor
2021-07-06 14:35:13.840738 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:14.538330 I | auth: deleting token mnJmEnLaAkZtytqe.185 for user conductor
2021-07-06 14:35:14.538417 I | auth: deleting token JtEwJozRBenFhvfJ.186 for user conductor
2021-07-06 14:35:15.139695 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.20255501s) to execute
2021-07-06 14:35:15.538275 I | auth: deleting token bbFWRzKYsJJaAEmD.187 for user conductor
2021-07-06 14:35:16.538299 I | auth: deleting token vzYAuJnCLbPlNONI.188 for user conductor
2021-07-06 14:35:16.541156 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (802.504155ms) to execute
2021-07-06 14:35:18.439086 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.200600299s) to execute
2021-07-06 14:35:18.538347 I | auth: deleting token nHnHfwMERepyCwLy.189 for user conductor
2021-07-06 14:35:18.840979 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:23.243177 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.547929271s) to execute
2021-07-06 14:35:23.493757 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (156.629426ms) to execute
2021-07-06 14:35:23.841298 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:25.142230 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (205.328917ms) to execute
2021-07-06 14:35:25.538423 I | auth: deleting token uWmVouTWPOxSMvBf.192 for user conductor
2021-07-06 14:35:25.538529 I | auth: deleting token qAzuqUvyHavMoTkK.190 for user conductor
2021-07-06 14:35:25.538584 I | auth: deleting token ZBSBQPfBLlqXTfAa.193 for user conductor
2021-07-06 14:35:25.538600 I | auth: deleting token cXUNVpihuMFuEZLX.191 for user conductor
2021-07-06 14:35:26.538396 I | auth: deleting token kipatlWSjlXpXjSO.194 for user conductor
2021-07-06 14:35:27.538256 I | auth: deleting token fOSpCRbriJCUikHY.195 for user conductor
2021-07-06 14:35:27.544098 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.043435018s) to execute
2021-07-06 14:35:28.538503 I | auth: deleting token RKnwABYtEJpDDBpW.196 for user conductor
2021-07-06 14:35:28.889505 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:29.837999 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.900101568s) to execute
2021-07-06 14:35:31.538283 I | auth: deleting token OuBAXhPSxKLkiUGz.198 for user conductor
2021-07-06 14:35:31.538339 I | auth: deleting token XShkFLabBDreVPvF.197 for user conductor
2021-07-06 14:35:31.538347 I | auth: deleting token ModxWmWaRxogLpyC.201 for user conductor
2021-07-06 14:35:31.538355 I | auth: deleting token QqmJjRZuZtxSusyc.202 for user conductor
2021-07-06 14:35:31.538363 I | auth: deleting token exNJnnpvGfoUJart.200 for user conductor
2021-07-06 14:35:33.538403 I | auth: deleting token oIROXIkFTdldTujT.203 for user conductor
2021-07-06 14:35:33.889914 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:35.738458 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.345125147s) to execute
2021-07-06 14:35:36.538398 I | auth: deleting token XnAvBLClqSlheRft.208 for user conductor
2021-07-06 14:35:36.538462 I | auth: deleting token PRsirbkzZDlfbGiD.207 for user conductor
2021-07-06 14:35:36.538476 I | auth: deleting token HTnNTItfACNxBrLb.209 for user conductor
2021-07-06 14:35:36.538507 I | auth: deleting token PQRhqXXSoljARNjz.205 for user conductor
2021-07-06 14:35:36.538518 I | auth: deleting token elotmursTjPWlwUs.206 for user conductor
2021-07-06 14:35:37.243530 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.304839523s) to execute
2021-07-06 14:35:37.243710 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.502223729s) to execute
2021-07-06 14:35:37.244094 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.502900481s) to execute
2021-07-06 14:35:38.936784 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:39.041025 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.701816735s) to execute
2021-07-06 14:35:40.538294 I | auth: deleting token jioJarFRZASsalcb.210 for user conductor
2021-07-06 14:35:40.738070 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.044149787s) to execute
2021-07-06 14:35:42.442052 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.703776025s) to execute
2021-07-06 14:35:42.442318 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.70036523s) to execute
2021-07-06 14:35:42.538423 I | auth: deleting token hFkzMRtbFuyAzKor.211 for user conductor
2021-07-06 14:35:42.593498 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (147.745419ms) to execute
2021-07-06 14:35:43.936958 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:44.538389 I | auth: deleting token GdievLmksQalATkO.212 for user conductor
2021-07-06 14:35:44.538474 I | auth: deleting token plDAfaBXGytNsIWI.213 for user conductor
2021-07-06 14:35:44.538493 I | auth: deleting token XBcqqmsPtZcPBunK.214 for user conductor
2021-07-06 14:35:46.438894 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.702067646s) to execute
2021-07-06 14:35:47.940687 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.403673266s) to execute
2021-07-06 14:35:47.940970 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.499713973s) to execute
2021-07-06 14:35:48.193928 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (156.874844ms) to execute
2021-07-06 14:35:48.538227 I | auth: deleting token tYrWTPBvqFlCaiPg.217 for user conductor
2021-07-06 14:35:48.538280 I | auth: deleting token MvsPflcPYiCJsuus.216 for user conductor
2021-07-06 14:35:48.538291 I | auth: deleting token aKBxRUaZdVeNORNM.215 for user conductor
2021-07-06 14:35:48.538303 I | auth: deleting token vFXAKQWMhhBRMrkO.218 for user conductor
2021-07-06 14:35:48.937200 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:50.538270 I | auth: deleting token ttFAiCPnJFAzRpLM.221 for user conductor
2021-07-06 14:35:50.538321 I | auth: deleting token eARRJtYjOnNDNFTd.219 for user conductor
2021-07-06 14:35:50.538348 I | auth: deleting token mxDRjzSmdAWbjXcE.220 for user conductor
2021-07-06 14:35:51.440711 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.946777632s) to execute
2021-07-06 14:35:51.538578 I | auth: deleting token QvfbKprdGaJeVxBo.222 for user conductor
2021-07-06 14:35:53.038848 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.594782648s) to execute
2021-07-06 14:35:53.038979 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.595160369s) to execute
2021-07-06 14:35:53.937348 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:54.538251 I | auth: deleting token okiGjgsjoOnwaAlS.223 for user conductor
2021-07-06 14:35:56.538204 I | auth: deleting token lZkJYHWIvcgZDrnR.226 for user conductor
2021-07-06 14:35:56.538248 I | auth: deleting token VewJRuGdnAYZKbkj.225 for user conductor
2021-07-06 14:35:56.538260 I | auth: deleting token ghsoGXUiTgzOdfRo.224 for user conductor
2021-07-06 14:35:58.538289 I | auth: deleting token verptQtCjPyDPBee.228 for user conductor
2021-07-06 14:35:58.538334 I | auth: deleting token uStGyeZVDvwGFhzJ.227 for user conductor
2021-07-06 14:35:58.937646 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:35:59.538312 I | auth: deleting token WhfujHsMjQMRLmzm.230 for user conductor
2021-07-06 14:35:59.538395 I | auth: deleting token DILHGtSXpGrfSmMi.229 for user conductor
2021-07-06 14:35:59.538422 I | auth: deleting token ulGlQGLcJBNhWbRX.231 for user conductor
2021-07-06 14:35:59.543626 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.606532864s) to execute
2021-07-06 14:36:00.538556 I | auth: deleting token ETZngqjrBOCSLNRK.232 for user conductor
2021-07-06 14:36:02.538490 I | auth: deleting token RptYqVNFeIgyUoCh.233 for user conductor
2021-07-06 14:36:03.538422 I | auth: deleting token LSzXoEpsZVECFWss.234 for user conductor
2021-07-06 14:36:03.937881 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:04.636968 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.300192355s) to execute
2021-07-06 14:36:04.795193 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (155.133246ms) to execute
2021-07-06 14:36:04.797574 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.796806ms) to execute
2021-07-06 14:36:07.538333 I | auth: deleting token QewhDwExMqwbornr.237 for user conductor
2021-07-06 14:36:07.538378 I | auth: deleting token haWYNLOnFpTevrmr.236 for user conductor
2021-07-06 14:36:08.539580 I | auth: deleting token feAcXdrdbwEGswRC.235 for user conductor
2021-07-06 14:36:08.938270 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:10.343819 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (249.896734ms) to execute
2021-07-06 14:36:10.538231 I | auth: deleting token NdqSHEZjcnwGeWEl.241 for user conductor
2021-07-06 14:36:10.538272 I | auth: deleting token EzdXLnHrkQaWhumD.239 for user conductor
2021-07-06 14:36:10.538287 I | auth: deleting token ZGQxffyGcJJRxBnx.240 for user conductor
2021-07-06 14:36:10.538296 I | auth: deleting token MZmmJsYXJEVcElrV.238 for user conductor
2021-07-06 14:36:11.940901 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.302835505s) to execute
2021-07-06 14:36:13.843090 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (847.006828ms) to execute
2021-07-06 14:36:13.938496 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:15.343822 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.45004792s) to execute
2021-07-06 14:36:15.538252 I | auth: deleting token rdutiDWmarRxMpgP.243 for user conductor
2021-07-06 14:36:15.538361 I | auth: deleting token GWiUBjiYhWpqkaYn.245 for user conductor
2021-07-06 14:36:17.036896 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.586116373s) to execute
2021-07-06 14:36:17.037332 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.598065308s) to execute
2021-07-06 14:36:17.538348 I | auth: deleting token DVWRRzDuFHhHTWGz.247 for user conductor
2021-07-06 14:36:17.538450 I | auth: deleting token ycyAAhIXInZJIKYV.244 for user conductor
2021-07-06 14:36:17.538468 I | auth: deleting token ZPLSjPDyAVcYHkcI.246 for user conductor
2021-07-06 14:36:17.538476 I | auth: deleting token xrAKkbbTszvgXVRi.242 for user conductor
2021-07-06 14:36:18.938741 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:19.038421 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.923535129s) to execute
2021-07-06 14:36:19.038728 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.54493753s) to execute
2021-07-06 14:36:20.837669 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.641620947s) to execute
2021-07-06 14:36:20.837815 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (237.746789ms) to execute
2021-07-06 14:36:21.538397 I | auth: deleting token KmQMcSVhZKplSrqi.250 for user conductor
2021-07-06 14:36:21.538477 I | auth: deleting token sQJplTMUnQyWeMCG.248 for user conductor
2021-07-06 14:36:22.538431 I | auth: deleting token PqsSOgsjMbOUETCt.249 for user conductor
2021-07-06 14:36:22.538532 I | auth: deleting token TGbMLYrhLBDgvjGk.252 for user conductor
2021-07-06 14:36:22.538549 I | auth: deleting token AzILgWFXtQJWDADQ.251 for user conductor
2021-07-06 14:36:23.939114 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:24.538383 I | auth: deleting token KGkndiDUmWFFSLKm.253 for user conductor
2021-07-06 14:36:27.538269 I | auth: deleting token ehqOTNgarpMyYsXc.254 for user conductor
2021-07-06 14:36:28.538392 I | auth: deleting token LgOSPcBXiKTcFmXR.255 for user conductor
2021-07-06 14:36:28.538479 I | auth: deleting token DUQsBJACbvsnoRHm.256 for user conductor
2021-07-06 14:36:28.939482 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:30.642849 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.406123842s) to execute
2021-07-06 14:36:32.443563 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (505.354843ms) to execute
2021-07-06 14:36:33.939810 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:33.947235 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.451340001s) to execute
2021-07-06 14:36:34.538374 I | auth: deleting token urbrkMlzGupNPbJx.259 for user conductor
2021-07-06 14:36:34.538443 I | auth: deleting token hUnBrMmkznSiBlmX.260 for user conductor
2021-07-06 14:36:34.538459 I | auth: deleting token ajVikWhoxdPQZWGT.258 for user conductor
2021-07-06 14:36:34.538473 I | auth: deleting token ClNAScbLBuvkUXhY.257 for user conductor
2021-07-06 14:36:35.643101 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.604311912s) to execute
2021-07-06 14:36:35.643292 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.606253402s) to execute
2021-07-06 14:36:36.541067 I | auth: deleting token PqgvqbrQeePWqiFP.261 for user conductor
2021-07-06 14:36:37.538358 I | auth: deleting token quWhPvbwXSGSdSnL.262 for user conductor
2021-07-06 14:36:37.838502 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.498807917s) to execute
2021-07-06 14:36:38.940150 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:39.538315 I | auth: deleting token BckNnBkGXyLQdVzb.263 for user conductor
2021-07-06 14:36:39.543922 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.604482733s) to execute
2021-07-06 14:36:40.538369 I | auth: deleting token SlwIdEFrNnztsSRL.264 for user conductor
2021-07-06 14:36:42.538266 I | auth: deleting token miNYdCYutUMAHIqg.265 for user conductor
2021-07-06 14:36:42.538749 I | auth: deleting token YOduvRDmWpwPErXc.266 for user conductor
2021-07-06 14:36:42.940515 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.393570432s) to execute
2021-07-06 14:36:42.940718 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.202796403s) to execute
2021-07-06 14:36:43.094265 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (150.95383ms) to execute
2021-07-06 14:36:43.095731 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (152.010618ms) to execute
2021-07-06 14:36:43.940471 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:44.538374 I | auth: deleting token TToFnpIWkCdjIzDF.268 for user conductor
2021-07-06 14:36:44.538446 I | auth: deleting token SYbyGIblCsnxRQAM.267 for user conductor
2021-07-06 14:36:45.538296 I | auth: deleting token cPqjOTjOqOnZwMif.269 for user conductor
2021-07-06 14:36:46.440045 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.201707605s) to execute
2021-07-06 14:36:46.593939 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (151.07781ms) to execute
2021-07-06 14:36:47.538298 I | auth: deleting token WjVaOFexfxOcxTCw.270 for user conductor
2021-07-06 14:36:47.538337 I | auth: deleting token VHHpITEZgTlqrerr.271 for user conductor
2021-07-06 14:36:48.636697 I | auth: deleting token FBFjdQmSOQnSiAkb.272 for user conductor
2021-07-06 14:36:48.940761 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:49.438300 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (801.512054ms) to execute
2021-07-06 14:36:49.538496 I | auth: deleting token OPsHpKPkxCsDkzOI.273 for user conductor
2021-07-06 14:36:51.147157 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.651832519s) to execute
2021-07-06 14:36:51.538266 I | auth: deleting token PUWSYKWsmeHZSTtA.274 for user conductor
2021-07-06 14:36:52.538354 I | auth: deleting token ZKPGYtlNzlzqhgIb.275 for user conductor
2021-07-06 14:36:52.742616 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.365955336s) to execute
2021-07-06 14:36:52.742868 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.505896845s) to execute
2021-07-06 14:36:53.538306 I | auth: deleting token KTDXtjnuUTNfGSXY.276 for user conductor
2021-07-06 14:36:53.940968 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:36:54.538217 I | auth: deleting token vzLPLGodFWyAJcwc.277 for user conductor
2021-07-06 14:36:54.538266 I | auth: deleting token ctZcVcqPwjhKwIdF.278 for user conductor
2021-07-06 14:36:55.538345 I | auth: deleting token AxrVqJEwlvRLIYKm.279 for user conductor
2021-07-06 14:36:56.343054 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.949474044s) to execute
2021-07-06 14:36:58.342591 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.305565594s) to execute
2021-07-06 14:36:58.593876 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (152.041869ms) to execute
2021-07-06 14:36:58.941260 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:00.136920 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (235.399781ms) to execute
2021-07-06 14:37:00.538290 I | auth: deleting token UgzNzZyCdUhDtkgS.282 for user conductor
2021-07-06 14:37:00.538363 I | auth: deleting token kwWsWhbQGfulICQy.280 for user conductor
2021-07-06 14:37:01.840321 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (541.698903ms) to execute
2021-07-06 14:37:02.538418 I | auth: deleting token MaDvILOIGBojLAwQ.281 for user conductor
2021-07-06 14:37:02.538499 I | auth: deleting token weBiOUNUqKuOUMwt.283 for user conductor
2021-07-06 14:37:02.538526 I | auth: deleting token IouoIJMJKtnaqFHW.284 for user conductor
2021-07-06 14:37:02.538541 I | auth: deleting token fkPFhXBfzMLXKOrJ.285 for user conductor
2021-07-06 14:37:04.036905 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:04.538345 I | auth: deleting token RodyaOFSwiKQsdaY.286 for user conductor
2021-07-06 14:37:06.538426 I | auth: deleting token YIjkdSUbumBGmuFr.288 for user conductor
2021-07-06 14:37:06.538545 I | auth: deleting token coIYkjQCtniwyRDF.289 for user conductor
2021-07-06 14:37:06.538582 I | auth: deleting token qPJkxqCpTpvjVsxb.287 for user conductor
2021-07-06 14:37:07.737210 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.497849295s) to execute
2021-07-06 14:37:09.063211 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:09.344054 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.603882841s) to execute
2021-07-06 14:37:09.344665 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.604522769s) to execute
2021-07-06 14:37:09.395957 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.655326197s) to execute
2021-07-06 14:37:09.495036 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (148.926078ms) to execute
2021-07-06 14:37:09.538410 I | auth: deleting token MsWcaiJIZbqSzuby.291 for user conductor
2021-07-06 14:37:11.538399 I | auth: deleting token FlcYmpJijgjgIRIP.292 for user conductor
2021-07-06 14:37:11.538471 I | auth: deleting token SgaAXKfqyawVEYhp.293 for user conductor
2021-07-06 14:37:12.538524 I | auth: deleting token uXCuHPcGIMmQNlNW.296 for user conductor
2021-07-06 14:37:12.538734 I | auth: deleting token sawMZtleowJsYzwr.297 for user conductor
2021-07-06 14:37:13.636824 I | auth: deleting token sbRVJbGeSVpwcryU.294 for user conductor
2021-07-06 14:37:13.636925 I | auth: deleting token XmqIaACKqbEPswrY.298 for user conductor
2021-07-06 14:37:13.839510 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.345842569s) to execute
2021-07-06 14:37:14.063594 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:15.740145 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (303.248282ms) to execute
2021-07-06 14:37:16.538319 I | auth: deleting token leRcByPHIfbBOpCN.302 for user conductor
2021-07-06 14:37:16.538371 I | auth: deleting token fzQRfySYIhVFsbMP.300 for user conductor
2021-07-06 14:37:16.538384 I | auth: deleting token IZkpFqlAtaDNnvWp.301 for user conductor
2021-07-06 14:37:16.538403 I | auth: deleting token jloWnkrscFMVSsGY.299 for user conductor
2021-07-06 14:37:17.538248 I | auth: deleting token VoUxunlBrypAdXpC.303 for user conductor
2021-07-06 14:37:18.538205 I | auth: deleting token fkZfAFERDKgfvqvP.304 for user conductor
2021-07-06 14:37:19.063896 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:19.538422 I | auth: deleting token JtsPEPwAKGKTNmzK.305 for user conductor
2021-07-06 14:37:20.244817 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.04809607s) to execute
2021-07-06 14:37:21.538256 I | auth: deleting token kMwlYydRrHWQscGu.306 for user conductor
2021-07-06 14:37:22.538310 I | auth: deleting token AuSScyPqwUpiBFir.307 for user conductor
2021-07-06 14:37:23.543094 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.149656686s) to execute
2021-07-06 14:37:23.694019 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (148.771734ms) to execute
2021-07-06 14:37:24.064164 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:26.543717 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (941.122259ms) to execute
2021-07-06 14:37:28.244167 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.10511911s) to execute
2021-07-06 14:37:29.064524 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:30.538340 I | auth: deleting token lobuAxoRtZtytQGb.312 for user conductor
2021-07-06 14:37:30.538397 I | auth: deleting token RTkEVgUYLSvAekgI.309 for user conductor
2021-07-06 14:37:30.538409 I | auth: deleting token KzrXiBPHgMrRmqLD.308 for user conductor
2021-07-06 14:37:30.538418 I | auth: deleting token WMlRfotDWWTFleXB.311 for user conductor
2021-07-06 14:37:30.538429 I | auth: deleting token zNvncySUCtbLiCiI.310 for user conductor
2021-07-06 14:37:32.641981 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.540656701s) to execute
2021-07-06 14:37:34.064903 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:34.448235 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.551040583s) to execute
2021-07-06 14:37:37.538419 I | auth: deleting token qCTrCISAWAMiERBX.318 for user conductor
2021-07-06 14:37:37.538473 I | auth: deleting token wMhEjNmMCLiDWfjy.314 for user conductor
2021-07-06 14:37:37.538503 I | auth: deleting token sTuGkIVfRRrKVZFZ.316 for user conductor
2021-07-06 14:37:37.942863 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.404689471s) to execute
2021-07-06 14:37:38.095965 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (137.228088ms) to execute
2021-07-06 14:37:38.100721 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (141.762344ms) to execute
2021-07-06 14:37:39.065308 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:39.538426 I | auth: deleting token AIxVamLKAvPqLKds.319 for user conductor
2021-07-06 14:37:39.538473 I | auth: deleting token yaXDIWZCwRQieQkV.315 for user conductor
2021-07-06 14:37:39.538503 I | auth: deleting token aktyfyOuVleuSKgH.320 for user conductor
2021-07-06 14:37:39.538514 I | auth: deleting token AsUhRfWnUAprrZhy.313 for user conductor
2021-07-06 14:37:39.538527 I | auth: deleting token SgMjIIzbAxOMbpZb.317 for user conductor
2021-07-06 14:37:39.943440 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (224.012983ms) to execute
2021-07-06 14:37:43.738089 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.301081766s) to execute
2021-07-06 14:37:44.065579 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:44.538376 I | auth: deleting token UTxjEhrFNBXnNvbN.322 for user conductor
2021-07-06 14:37:44.538446 I | auth: deleting token NOaVZKpJQRCIztkP.321 for user conductor
2021-07-06 14:37:44.538466 I | auth: deleting token caxRzypdGLWPzqJv.326 for user conductor
2021-07-06 14:37:44.538478 I | auth: deleting token ZEaUzOHcxspmHeZQ.327 for user conductor
2021-07-06 14:37:44.538493 I | auth: deleting token onzxNhIiwIqvMvuW.324 for user conductor
2021-07-06 14:37:44.538509 I | auth: deleting token STBhJmVfWZiyVIdB.325 for user conductor
2021-07-06 14:37:44.538520 I | auth: deleting token xJwedShutBglsMbg.323 for user conductor
2021-07-06 14:37:46.538291 I | auth: deleting token ooXHfEZffQnwSuQw.328 for user conductor
2021-07-06 14:37:46.538357 I | auth: deleting token mClpObwodZCPaDbT.329 for user conductor
2021-07-06 14:37:47.538281 I | auth: deleting token kZhnXdgJmYVlSVHD.330 for user conductor
2021-07-06 14:37:48.739765 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.243942325s) to execute
2021-07-06 14:37:49.065949 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:50.538338 I | auth: deleting token TlBTHykiYsUEoscg.333 for user conductor
2021-07-06 14:37:50.538381 I | auth: deleting token WzwPJhNfhKXyxude.332 for user conductor
2021-07-06 14:37:50.538410 I | auth: deleting token CuWAgGrnfpDxVPoy.331 for user conductor
2021-07-06 14:37:53.538234 I | auth: deleting token PFKjxJrXxZtBocYf.337 for user conductor
2021-07-06 14:37:53.538278 I | auth: deleting token UbcTXbxkFrGKNufE.334 for user conductor
2021-07-06 14:37:53.538301 I | auth: deleting token JSliEQeJFlzMzOof.335 for user conductor
2021-07-06 14:37:53.538311 I | auth: deleting token iRarMwHcXbPFrUBv.336 for user conductor
2021-07-06 14:37:53.840991 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.602676944s) to execute
2021-07-06 14:37:54.066296 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:55.638258 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.499851807s) to execute
2021-07-06 14:37:55.638463 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.7951371s) to execute
2021-07-06 14:37:55.638613 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.795149413s) to execute
2021-07-06 14:37:57.538292 I | auth: deleting token UeJNXIAMZCXpdMmz.340 for user conductor
2021-07-06 14:37:57.538370 I | auth: deleting token wwfarXjAcpJOPEYd.338 for user conductor
2021-07-06 14:37:59.066705 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:37:59.241718 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.504939341s) to execute
2021-07-06 14:37:59.538416 I | auth: deleting token jcLVLWzGeGJNREyC.339 for user conductor
2021-07-06 14:37:59.538479 I | auth: deleting token hOvoCsYOGiDUkwfl.342 for user conductor
2021-07-06 14:37:59.538496 I | auth: deleting token EPWrbJIMLUrPPjvh.343 for user conductor
2021-07-06 14:37:59.538511 I | auth: deleting token hrZjYxUjqeEiLZDx.341 for user conductor
2021-07-06 14:38:00.844260 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.307271261s) to execute
2021-07-06 14:38:02.737867 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.700925012s) to execute
2021-07-06 14:38:03.538277 I | auth: deleting token ZPhJEEbYRzljVJaR.347 for user conductor
2021-07-06 14:38:03.538349 I | auth: deleting token JxNIcMlyXpMEJQDf.345 for user conductor
2021-07-06 14:38:03.538365 I | auth: deleting token aGSAkgXTZuFGnGmG.344 for user conductor
2021-07-06 14:38:03.538375 I | auth: deleting token SARtyVToMISRSQbt.346 for user conductor
2021-07-06 14:38:04.110922 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:04.442745 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.595786257s) to execute
2021-07-06 14:38:04.442864 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.595817737s) to execute
2021-07-06 14:38:04.443061 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.604944053s) to execute
2021-07-06 14:38:04.443171 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.702494747s) to execute
2021-07-06 14:38:05.538289 I | auth: deleting token WExDDMKkIyvEhvdt.349 for user conductor
2021-07-06 14:38:06.041056 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.500259001s) to execute
2021-07-06 14:38:06.538293 I | auth: deleting token lptzOVclgiJcOlTd.348 for user conductor
2021-07-06 14:38:07.538293 I | auth: deleting token tPnswdTXtabEEdyD.350 for user conductor
2021-07-06 14:38:08.540602 I | auth: deleting token WplUUZabZuvboxzY.351 for user conductor
2021-07-06 14:38:08.540683 I | auth: deleting token pIAzTFQuTmncsnUj.352 for user conductor
2021-07-06 14:38:09.111237 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:09.538355 I | auth: deleting token iRfXyYtneFhsEEYj.353 for user conductor
2021-07-06 14:38:09.643024 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.599188871s) to execute
2021-07-06 14:38:11.542764 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.804011567s) to execute
2021-07-06 14:38:11.542911 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.897368701s) to execute
2021-07-06 14:38:12.538474 I | auth: deleting token xNsjMOCpHVzNcXVE.356 for user conductor
2021-07-06 14:38:12.538532 I | auth: deleting token xDQVjmBopwXwPGYO.354 for user conductor
2021-07-06 14:38:13.438584 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.791622676s) to execute
2021-07-06 14:38:13.438728 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.799769602s) to execute
2021-07-06 14:38:13.439212 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.802065994s) to execute
2021-07-06 14:38:14.136721 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:15.238476 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.795452193s) to execute
2021-07-06 14:38:15.239008 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.701970079s) to execute
2021-07-06 14:38:15.538380 I | auth: deleting token YQlvltHpoaRvZbyC.358 for user conductor
2021-07-06 14:38:15.538430 I | auth: deleting token CmhpWpjjdWOTWCZs.357 for user conductor
2021-07-06 14:38:15.538441 I | auth: deleting token FYsogWIMmIxTeQZL.355 for user conductor
2021-07-06 14:38:16.538247 I | auth: deleting token EGUtPCAxkymTZTEj.360 for user conductor
2021-07-06 14:38:16.538302 I | auth: deleting token paFEpAaLmPfJYsod.359 for user conductor
2021-07-06 14:38:17.538249 I | auth: deleting token hYvLmNdTcohlGeRC.361 for user conductor
2021-07-06 14:38:17.538298 I | auth: deleting token TpXawSrNSBxgHvtJ.362 for user conductor
2021-07-06 14:38:19.041572 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.80020266s) to execute
2021-07-06 14:38:19.137454 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:19.636915 I | auth: deleting token XoZoIdqQGkjWukIf.364 for user conductor
2021-07-06 14:38:20.538449 I | auth: deleting token lXyRNBXlhQmfofiB.365 for user conductor
2021-07-06 14:38:20.538506 I | auth: deleting token bUkQxtQGgdxcwOCq.363 for user conductor
2021-07-06 14:38:22.340111 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.201121529s) to execute
2021-07-06 14:38:22.340764 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.296513143s) to execute
2021-07-06 14:38:22.340946 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.202767505s) to execute
2021-07-06 14:38:22.538345 I | auth: deleting token ZGmaFPaVconUXKZu.366 for user conductor
2021-07-06 14:38:23.538277 I | auth: deleting token KPnIIiWPkODPQpUo.369 for user conductor
2021-07-06 14:38:23.538320 I | auth: deleting token EGTnpkedZfcfRtTA.367 for user conductor
2021-07-06 14:38:24.042197 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.698982055s) to execute
2021-07-06 14:38:24.042609 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.605626411s) to execute
2021-07-06 14:38:24.137832 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:25.445934 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.108246257s) to execute
2021-07-06 14:38:26.944453 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (850.606943ms) to execute
2021-07-06 14:38:27.538406 I | auth: deleting token IhQPFvuCGqyXwwlo.374 for user conductor
2021-07-06 14:38:27.538473 I | auth: deleting token kssYbiQIchXXHKTA.370 for user conductor
2021-07-06 14:38:27.538485 I | auth: deleting token mTSlkQWIUKbEOrBs.372 for user conductor
2021-07-06 14:38:27.538493 I | auth: deleting token HbUrvkrVFSaueCKL.373 for user conductor
2021-07-06 14:38:27.538504 I | auth: deleting token UzxyHdzohNOHkYxU.371 for user conductor
2021-07-06 14:38:27.538519 I | auth: deleting token WXcygHGnxUukvIEO.368 for user conductor
2021-07-06 14:38:29.138126 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:29.837569 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (738.408145ms) to execute
2021-07-06 14:38:31.441100 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.504215703s) to execute
2021-07-06 14:38:31.538332 I | auth: deleting token KgllANuyvopLLlWo.376 for user conductor
2021-07-06 14:38:31.538373 I | auth: deleting token ScijqsLFFeQyHSXX.377 for user conductor
2021-07-06 14:38:33.040839 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.504023028s) to execute
2021-07-06 14:38:33.041054 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.597593993s) to execute
2021-07-06 14:38:33.636739 I | auth: deleting token vORJzMvHUoYKMNbH.380 for user conductor
2021-07-06 14:38:33.636786 I | auth: deleting token yGVuXYkjjJbLUINz.379 for user conductor
2021-07-06 14:38:33.636800 I | auth: deleting token uJNmVUbZhHbHGQNK.375 for user conductor
2021-07-06 14:38:33.636827 I | auth: deleting token iOYUimZNlBGYHowO.378 for user conductor
2021-07-06 14:38:34.138409 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:34.738577 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.544733752s) to execute
2021-07-06 14:38:34.738719 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.695613781s) to execute
2021-07-06 14:38:36.538187 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.398962788s) to execute
2021-07-06 14:38:37.564453 I | auth: deleting token EndIZvpwNmcUgHQZ.384 for user conductor
2021-07-06 14:38:37.564711 I | auth: deleting token GOHlSwBlBPIprlhq.382 for user conductor
2021-07-06 14:38:37.564932 I | auth: deleting token SaJzkFnXHszHaJsc.383 for user conductor
2021-07-06 14:38:37.565080 I | auth: deleting token lndPhkFtVqSFEebX.381 for user conductor
2021-07-06 14:38:38.238838 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.499559847s) to execute
2021-07-06 14:38:38.538296 I | auth: deleting token NWeiEKeDZGRnpSDq.386 for user conductor
2021-07-06 14:38:39.138614 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:39.538376 I | auth: deleting token TonSVmwTdOeqmuMp.387 for user conductor
2021-07-06 14:38:39.538641 I | auth: deleting token QItcnSMMxgDdpOdd.385 for user conductor
2021-07-06 14:38:40.538248 I | auth: deleting token AHJCEdeoWQnlTyEd.388 for user conductor
2021-07-06 14:38:40.538301 I | auth: deleting token pWKNsrqUydPXKAHu.389 for user conductor
2021-07-06 14:38:41.538153 I | auth: deleting token KTYTKnSwbrZvBjuh.390 for user conductor
2021-07-06 14:38:41.637643 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.396347609s) to execute
2021-07-06 14:38:41.637953 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.39616517s) to execute
2021-07-06 14:38:42.538242 I | auth: deleting token OELeyjSYTIgxBcRZ.391 for user conductor
2021-07-06 14:38:43.342005 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701258477s) to execute
2021-07-06 14:38:43.342422 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.702341637s) to execute
2021-07-06 14:38:43.439605 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.798667856s) to execute
2021-07-06 14:38:44.138846 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:44.538354 I | auth: deleting token CyOtrZQrrEzpnahn.392 for user conductor
2021-07-06 14:38:45.137061 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.699887575s) to execute
2021-07-06 14:38:45.137216 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.600199639s) to execute
2021-07-06 14:38:46.538291 I | auth: deleting token lmuTrZMZVfaGjFrW.393 for user conductor
2021-07-06 14:38:46.737209 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.043863304s) to execute
2021-07-06 14:38:48.538284 I | auth: deleting token mTUlPfYOUXQEbdaV.396 for user conductor
2021-07-06 14:38:48.538332 I | auth: deleting token bUaTgJLGtVcqZPGk.394 for user conductor
2021-07-06 14:38:48.538347 I | auth: deleting token PRvybUXwiIujAIWP.397 for user conductor
2021-07-06 14:38:48.538367 I | auth: deleting token JapQRYoMdBqOWByg.395 for user conductor
2021-07-06 14:38:49.139060 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:50.439680 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.545881134s) to execute
2021-07-06 14:38:50.440694 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.700741726s) to execute
2021-07-06 14:38:50.594449 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (151.652618ms) to execute
2021-07-06 14:38:52.300991 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (864.009059ms) to execute
2021-07-06 14:38:52.538348 I | auth: deleting token RHPpGBZTSPtpWCmM.400 for user conductor
2021-07-06 14:38:52.538404 I | auth: deleting token hLpzAXEylZyeUtGe.399 for user conductor
2021-07-06 14:38:52.538425 I | auth: deleting token OviSLxkvyLiBdrEu.398 for user conductor
2021-07-06 14:38:52.538435 I | auth: deleting token OwNXjgmndoSAdKAQ.401 for user conductor
2021-07-06 14:38:54.236761 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:38:54.942932 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (549.483775ms) to execute
2021-07-06 14:38:56.541595 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (648.083152ms) to execute
2021-07-06 14:38:57.538212 I | auth: deleting token CKvEIvoqvPTbIHyT.406 for user conductor
2021-07-06 14:38:57.538246 I | auth: deleting token bcUFEcBclYVzbWkl.407 for user conductor
2021-07-06 14:38:57.538256 I | auth: deleting token vKCObLxfmVhrxNLj.402 for user conductor
2021-07-06 14:38:57.538261 I | auth: deleting token OSUzLOxkJOyDWSaH.404 for user conductor
2021-07-06 14:38:57.538268 I | auth: deleting token kAoTyfbpiItxfmne.405 for user conductor
2021-07-06 14:38:57.538274 I | auth: deleting token efzWvXkYBKAYgpjb.403 for user conductor
2021-07-06 14:38:58.245939 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.50796323s) to execute
2021-07-06 14:38:59.236981 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:00.348233 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.454548854s) to execute
2021-07-06 14:39:00.538237 I | auth: deleting token iGdoZTOvUfyGIeWD.408 for user conductor
2021-07-06 14:39:00.538286 I | auth: deleting token GwWFwfYGnkJTjqeF.410 for user conductor
2021-07-06 14:39:02.042918 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.691205722s) to execute
2021-07-06 14:39:02.538181 I | auth: deleting token OAKpjotKOAkkCEwx.412 for user conductor
2021-07-06 14:39:02.538242 I | auth: deleting token AYiJQWgrbCJuvjQX.413 for user conductor
2021-07-06 14:39:02.538256 I | auth: deleting token qAEugCUmISXyHkOi.414 for user conductor
2021-07-06 14:39:02.538269 I | auth: deleting token BPRKxYbwIOgaXUxa.411 for user conductor
2021-07-06 14:39:02.538287 I | auth: deleting token SLQqweIauiZiPVkx.409 for user conductor
2021-07-06 14:39:04.237617 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:05.442446 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.147217235s) to execute
2021-07-06 14:39:07.338565 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.045055495s) to execute
2021-07-06 14:39:09.046245 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.650935864s) to execute
2021-07-06 14:39:09.237942 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:09.538264 I | auth: deleting token XOVpfmzfcVOwBsao.416 for user conductor
2021-07-06 14:39:10.740515 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.647179603s) to execute
2021-07-06 14:39:10.740896 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.691859499s) to execute
2021-07-06 14:39:11.538236 I | auth: deleting token TLyKVRnELToilpBr.420 for user conductor
2021-07-06 14:39:11.538281 I | auth: deleting token AbWwxyXdOqHGaVbw.418 for user conductor
2021-07-06 14:39:11.538295 I | auth: deleting token LEXtVUlNCqHfilGO.417 for user conductor
2021-07-06 14:39:11.538334 I | auth: deleting token BgOvKWukrfLeNslf.415 for user conductor
2021-07-06 14:39:11.538348 I | auth: deleting token TdOHVnEXHxovWNOA.419 for user conductor
2021-07-06 14:39:14.238209 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:16.047822 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.750408819s) to execute
2021-07-06 14:39:17.538293 I | auth: deleting token RPFRdxbEdTbbwBhw.421 for user conductor
2021-07-06 14:39:17.538340 I | auth: deleting token IglGTmoLwvOtrsgM.422 for user conductor
2021-07-06 14:39:17.538350 I | auth: deleting token ZOhjaMUtsDothehK.423 for user conductor
2021-07-06 14:39:17.939613 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.702649248s) to execute
2021-07-06 14:39:17.939791 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.799663228s) to execute
2021-07-06 14:39:17.940195 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.800121119s) to execute
2021-07-06 14:39:18.193777 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (156.441938ms) to execute
2021-07-06 14:39:18.538375 I | auth: deleting token OYJsuoLqlXcOlTQx.426 for user conductor
2021-07-06 14:39:18.538452 I | auth: deleting token PuezzuofyJQamtDS.424 for user conductor
2021-07-06 14:39:19.238442 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:19.538384 I | auth: deleting token EQvnzOpIatCAULDC.427 for user conductor
2021-07-06 14:39:19.538452 I | auth: deleting token cnjYzBdDCFmRbJBx.425 for user conductor
2021-07-06 14:39:19.538478 I | auth: deleting token uxoNArcMFaNAGOPy.428 for user conductor
2021-07-06 14:39:19.940602 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.803597565s) to execute
2021-07-06 14:39:21.738566 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.342653923s) to execute
2021-07-06 14:39:23.537529 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.79641781s) to execute
2021-07-06 14:39:23.537777 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.79698778s) to execute
2021-07-06 14:39:23.693925 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (153.751058ms) to execute
2021-07-06 14:39:24.238760 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:24.538379 I | auth: deleting token xblwLNKjCaYNUvMy.429 for user conductor
2021-07-06 14:39:24.538457 I | auth: deleting token fVjlrBSkVjVJbIkN.431 for user conductor
2021-07-06 14:39:24.538500 I | auth: deleting token DAxFMTFFCGAfanes.433 for user conductor
2021-07-06 14:39:25.637927 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (901.030786ms) to execute
2021-07-06 14:39:26.538241 I | auth: deleting token AACpyJCGKgEpOAgF.432 for user conductor
2021-07-06 14:39:26.538282 I | auth: deleting token sUQBDDGRISmFrQua.430 for user conductor
2021-07-06 14:39:27.342572 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.70115464s) to execute
2021-07-06 14:39:28.538306 I | auth: deleting token MmusNfYjXalJUUMl.435 for user conductor
2021-07-06 14:39:28.538394 I | auth: deleting token GHhtsUJIGJcuaFqH.436 for user conductor
2021-07-06 14:39:28.538411 I | auth: deleting token OMYqsHNgaqOOMduT.437 for user conductor
2021-07-06 14:39:28.538424 I | auth: deleting token tVpgMeIkkBJoZCWu.434 for user conductor
2021-07-06 14:39:29.239004 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:29.342965 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.849334644s) to execute
2021-07-06 14:39:29.343343 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.906310995s) to execute
2021-07-06 14:39:30.538389 I | auth: deleting token HCxwxoWONbznlDFT.438 for user conductor
2021-07-06 14:39:30.538454 I | auth: deleting token HWhcyualjchhQurt.439 for user conductor
2021-07-06 14:39:31.238054 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.798709086s) to execute
2021-07-06 14:39:31.238296 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.892894325s) to execute
2021-07-06 14:39:32.538379 I | auth: deleting token kEzibAaoQZEshYSl.441 for user conductor
2021-07-06 14:39:32.538419 I | auth: deleting token lzbUOXSjKUbzKfDN.440 for user conductor
2021-07-06 14:39:32.839782 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.598495018s) to execute
2021-07-06 14:39:32.839989 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.598959487s) to execute
2021-07-06 14:39:34.239165 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:34.841072 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.902703102s) to execute
2021-07-06 14:39:35.538343 I | auth: deleting token YCDvkrfwfvCgfHVm.443 for user conductor
2021-07-06 14:39:35.538408 I | auth: deleting token PqfwvBdaDHmEIqza.445 for user conductor
2021-07-06 14:39:36.436735 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.496555998s) to execute
2021-07-06 14:39:37.538388 I | auth: deleting token VhoCboOBYfudqLqg.446 for user conductor
2021-07-06 14:39:37.538455 I | auth: deleting token OLrgRYoyYoOObtbQ.447 for user conductor
2021-07-06 14:39:37.538487 I | auth: deleting token TkPqgLpWeivoZAcv.442 for user conductor
2021-07-06 14:39:37.538526 I | auth: deleting token ZjoNXSgjXvpDoiLe.444 for user conductor
2021-07-06 14:39:37.538560 I | auth: deleting token iumKXaIAtDtvCClt.448 for user conductor
2021-07-06 14:39:38.336666 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.396117946s) to execute
2021-07-06 14:39:38.337025 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.492989008s) to execute
2021-07-06 14:39:39.239482 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:40.239017 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.89901063s) to execute
2021-07-06 14:39:40.239116 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.899133767s) to execute
2021-07-06 14:39:40.239311 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.899256579s) to execute
2021-07-06 14:39:40.239400 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (445.82321ms) to execute
2021-07-06 14:39:42.037162 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (340.465801ms) to execute
2021-07-06 14:39:42.538337 I | auth: deleting token JrXBGxlXpykGZLMF.449 for user conductor
2021-07-06 14:39:43.538247 I | auth: deleting token VvQCTRFGGfWPdFAL.454 for user conductor
2021-07-06 14:39:43.538302 I | auth: deleting token kdjNHnbGSsoeEPAI.453 for user conductor
2021-07-06 14:39:43.538322 I | auth: deleting token cGnCLbglGBNVvBcA.450 for user conductor
2021-07-06 14:39:43.538334 I | auth: deleting token pcMUQvgZlXSWhxGN.452 for user conductor
2021-07-06 14:39:43.538350 I | auth: deleting token kFFGswlyQzzCahoJ.451 for user conductor
2021-07-06 14:39:44.239866 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:45.737209 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.4436301s) to execute
2021-07-06 14:39:46.538251 I | auth: deleting token UZGOzFrbmncXftyh.455 for user conductor
2021-07-06 14:39:46.538295 I | auth: deleting token YfiRlejrLBDUwlOP.456 for user conductor
2021-07-06 14:39:47.342150 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.305111486s) to execute
2021-07-06 14:39:47.342427 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.602347765s) to execute
2021-07-06 14:39:48.538323 I | auth: deleting token mtkzchaGfVKLINJy.459 for user conductor
2021-07-06 14:39:48.538393 I | auth: deleting token lhHWmnOrRkYYuKjc.458 for user conductor
2021-07-06 14:39:48.538410 I | auth: deleting token WszdkVHbpfGyGlaI.460 for user conductor
2021-07-06 14:39:48.538429 I | auth: deleting token vCoxGRSZayjgXvvt.457 for user conductor
2021-07-06 14:39:49.240220 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:50.043308 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (650.270467ms) to execute
2021-07-06 14:39:53.538321 I | auth: deleting token wpvdlMhDsuHbUuvn.465 for user conductor
2021-07-06 14:39:53.538375 I | auth: deleting token CYGIILCJocqFryJM.464 for user conductor
2021-07-06 14:39:53.538403 I | auth: deleting token pMcTYLkMuEzXZpfL.463 for user conductor
2021-07-06 14:39:53.538415 I | auth: deleting token MSNJHnHNMxVVQQLA.461 for user conductor
2021-07-06 14:39:54.240537 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:39:55.538447 I | auth: deleting token tnjhHcxlZsKZZmRM.466 for user conductor
2021-07-06 14:39:55.538506 I | auth: deleting token RvXcKCIYYCaXbaal.468 for user conductor
2021-07-06 14:39:55.538526 I | auth: deleting token qAHuBhLrWAalBLFz.462 for user conductor
2021-07-06 14:39:55.538542 I | auth: deleting token DNxudNyIeRDLRztH.467 for user conductor
2021-07-06 14:39:58.943573 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.00558166s) to execute
2021-07-06 14:39:59.240810 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:00.539801 I | auth: deleting token asGzwSGjtDayltEu.470 for user conductor
2021-07-06 14:40:00.539894 I | auth: deleting token kFGWsmtkwWFZeUAa.469 for user conductor
2021-07-06 14:40:00.539916 I | auth: deleting token ikBPXvtsfiVzpRlG.472 for user conductor
2021-07-06 14:40:00.539935 I | auth: deleting token yUMRdUiWLFFomLXv.474 for user conductor
2021-07-06 14:40:00.539950 I | auth: deleting token KVPSXKtYlCDDRZCZ.471 for user conductor
2021-07-06 14:40:00.539993 I | auth: deleting token WPRuEoatGyAsaKQf.473 for user conductor
2021-07-06 14:40:00.744318 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.251127485s) to execute
2021-07-06 14:40:02.538468 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.601595553s) to execute
2021-07-06 14:40:04.336848 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:04.543699 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.005082157s) to execute
2021-07-06 14:40:04.543898 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.002463739s) to execute
2021-07-06 14:40:05.538281 I | auth: deleting token OvMjfAgMgZOTfWay.477 for user conductor
2021-07-06 14:40:05.538328 I | auth: deleting token GfZuVqdGWJFYkbev.475 for user conductor
2021-07-06 14:40:06.338753 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.699821726s) to execute
2021-07-06 14:40:06.338922 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.701802228s) to execute
2021-07-06 14:40:06.636796 I | auth: deleting token jvtQWFWWJKVKVrUE.476 for user conductor
2021-07-06 14:40:06.636844 I | auth: deleting token EpjVdihDWdMwPyLP.479 for user conductor
2021-07-06 14:40:06.636853 I | auth: deleting token oAcpzcbBlpnxgSPx.480 for user conductor
2021-07-06 14:40:06.636861 I | auth: deleting token rCNNhoinrwdbXPzj.478 for user conductor
2021-07-06 14:40:07.538386 I | auth: deleting token gAxDcTqHXtHPRBbQ.482 for user conductor
2021-07-06 14:40:07.538488 I | auth: deleting token kAkhWEGnbBTmLcNF.481 for user conductor
2021-07-06 14:40:08.238448 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.699689242s) to execute
2021-07-06 14:40:08.238697 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.801659984s) to execute
2021-07-06 14:40:08.538353 I | auth: deleting token fbnxsuLHzVHAeYmA.483 for user conductor
2021-07-06 14:40:09.337188 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:12.538339 I | auth: deleting token bfmXYhPAsvwCLJtI.484 for user conductor
2021-07-06 14:40:12.538392 I | auth: deleting token UNdYWpcTJDcXawHa.486 for user conductor
2021-07-06 14:40:12.538402 I | auth: deleting token ZWRewndVdjBvtAAQ.485 for user conductor
2021-07-06 14:40:12.538423 I | auth: deleting token IIAOiJINEIAixJdO.487 for user conductor
2021-07-06 14:40:12.843884 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.805092456s) to execute
2021-07-06 14:40:14.337473 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:14.741160 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.804219242s) to execute
2021-07-06 14:40:14.741457 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.804526607s) to execute
2021-07-06 14:40:15.538471 I | auth: deleting token voGXdcmYZvILzyOF.491 for user conductor
2021-07-06 14:40:15.538546 I | auth: deleting token SUPVtaTPQbJueeld.489 for user conductor
2021-07-06 14:40:15.538573 I | auth: deleting token OSWUesUobYgMeRaz.490 for user conductor
2021-07-06 14:40:15.538597 I | auth: deleting token yMTAiJpLpgpxaCgn.488 for user conductor
2021-07-06 14:40:16.537137 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.700394438s) to execute
2021-07-06 14:40:16.537308 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.697900041s) to execute
2021-07-06 14:40:16.537453 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (200.494132ms) to execute
2021-07-06 14:40:17.538411 I | auth: deleting token tTSTvEgEPxoVpYyl.493 for user conductor
2021-07-06 14:40:17.538488 I | auth: deleting token blXPtyCpOczUEUnS.492 for user conductor
2021-07-06 14:40:18.238802 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.644048517s) to execute
2021-07-06 14:40:18.538464 I | auth: deleting token VFeVssMWxgMjVdfu.495 for user conductor
2021-07-06 14:40:18.538507 I | auth: deleting token NSmRvbPNsmddFazW.494 for user conductor
2021-07-06 14:40:19.337811 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:19.538360 I | auth: deleting token QjsxWebHjskbLPXo.496 for user conductor
2021-07-06 14:40:20.241369 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (945.339194ms) to execute
2021-07-06 14:40:20.538363 I | auth: deleting token CTgOpPUNjCzVKGJT.497 for user conductor
2021-07-06 14:40:23.538260 I | auth: deleting token fuziowzqUTlsGZPM.500 for user conductor
2021-07-06 14:40:23.538305 I | auth: deleting token STFQWSqANKlAqIgn.498 for user conductor
2021-07-06 14:40:23.538327 I | auth: deleting token kADkSmemlqesKtYI.499 for user conductor
2021-07-06 14:40:23.538336 I | auth: deleting token HEbjvyKyEduVzLNa.501 for user conductor
2021-07-06 14:40:23.643655 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (106.806181ms) to execute
2021-07-06 14:40:23.893387 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.533351ms) to execute
2021-07-06 14:40:24.338074 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:25.442018 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (546.537412ms) to execute
2021-07-06 14:40:25.538415 I | auth: deleting token SRSrGIhZpvsmdhNk.502 for user conductor
2021-07-06 14:40:25.538470 I | auth: deleting token XOXNuDgDiPwXjuHl.503 for user conductor
2021-07-06 14:40:27.436790 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.043368429s) to execute
2021-07-06 14:40:28.538438 I | auth: deleting token UxyxyMSJDGXdXUDI.505 for user conductor
2021-07-06 14:40:28.538482 I | auth: deleting token afUSDOasMFwNQGzJ.504 for user conductor
2021-07-06 14:40:29.338385 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:30.538260 I | auth: deleting token fKopHsLctKJakWXD.507 for user conductor
2021-07-06 14:40:30.538300 I | auth: deleting token kyDhkvILuHXpgJLS.506 for user conductor
2021-07-06 14:40:30.538313 I | auth: deleting token BesjVsimzNlOoupK.508 for user conductor
2021-07-06 14:40:31.538378 I | auth: deleting token AopXhypakQCspTDr.509 for user conductor
2021-07-06 14:40:34.338676 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:36.538338 I | auth: deleting token ZyeTqTSuQEBSMdpr.513 for user conductor
2021-07-06 14:40:36.538397 I | auth: deleting token TElwelwDNYQUPXbW.510 for user conductor
2021-07-06 14:40:36.538411 I | auth: deleting token rugnIvnAumHxyGVb.512 for user conductor
2021-07-06 14:40:36.538420 I | auth: deleting token TaVMjVLJVjXAivMl.514 for user conductor
2021-07-06 14:40:37.538302 I | auth: deleting token VwYfVeIFQAqGtNsg.511 for user conductor
2021-07-06 14:40:37.538434 I | auth: deleting token XWDAKbPMUOjnoPCo.515 for user conductor
2021-07-06 14:40:37.538472 I | auth: deleting token YVHSArQTezLNtnGT.517 for user conductor
2021-07-06 14:40:37.538507 I | auth: deleting token SXjpAMnaoKzdRMPo.516 for user conductor
2021-07-06 14:40:39.338971 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:41.538398 I | auth: deleting token SxzLgnOMekLvImcx.518 for user conductor
2021-07-06 14:40:42.538360 I | auth: deleting token GQqvkWzqkrXiNHAi.520 for user conductor
2021-07-06 14:40:42.538410 I | auth: deleting token IPBwbihlJtBGbePI.522 for user conductor
2021-07-06 14:40:42.538426 I | auth: deleting token CnnSAfBGaobKnIbK.519 for user conductor
2021-07-06 14:40:43.239152 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.700129639s) to execute
2021-07-06 14:40:43.393484 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (151.279811ms) to execute
2021-07-06 14:40:43.395122 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (152.877511ms) to execute
2021-07-06 14:40:43.395288 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (152.7404ms) to execute
2021-07-06 14:40:43.538363 I | auth: deleting token LBwYQrKiYgdHnNWJ.523 for user conductor
2021-07-06 14:40:43.538424 I | auth: deleting token WOpZshfesKTZEmbl.521 for user conductor
2021-07-06 14:40:44.339237 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:46.538301 I | auth: deleting token UJkWrGoDapxqQhNb.524 for user conductor
2021-07-06 14:40:46.538346 I | auth: deleting token zKPUPqJCTSBDkIPq.526 for user conductor
2021-07-06 14:40:48.363870 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.270384537s) to execute
2021-07-06 14:40:48.538988 I | auth: deleting token xXvUUMEVMvxneLht.527 for user conductor
2021-07-06 14:40:48.636793 I | auth: deleting token GhpRtdAkPQBETrpN.530 for user conductor
2021-07-06 14:40:48.636820 I | auth: deleting token EtJDWnTGCosywdpD.529 for user conductor
2021-07-06 14:40:48.636835 I | auth: deleting token iOWrbZBpmrtTvITe.525 for user conductor
2021-07-06 14:40:48.636850 I | auth: deleting token gjUkDkhgaYDyEhHK.528 for user conductor
2021-07-06 14:40:49.339441 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:50.238921 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.699894182s) to execute
2021-07-06 14:40:50.239064 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.702030873s) to execute
2021-07-06 14:40:50.239151 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.802151981s) to execute
2021-07-06 14:40:51.538313 I | auth: deleting token gQDvksqJOhBmuBDV.533 for user conductor
2021-07-06 14:40:51.538513 I | auth: deleting token eaPfbjSKchFQzWJA.531 for user conductor
2021-07-06 14:40:51.740475 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.147406649s) to execute
2021-07-06 14:40:53.538300 I | auth: deleting token RZFtlIYtFYETfaHI.532 for user conductor
2021-07-06 14:40:53.538366 I | auth: deleting token JhkXGUgqiYbarKHg.536 for user conductor
2021-07-06 14:40:53.538384 I | auth: deleting token ynpzEZlJwQgdNHkr.535 for user conductor
2021-07-06 14:40:53.538395 I | auth: deleting token OJfUMjSaBCJKTxQG.534 for user conductor
2021-07-06 14:40:54.339716 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:40:55.940197 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.14485553s) to execute
2021-07-06 14:40:57.739740 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.745093094s) to execute
2021-07-06 14:40:59.340018 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:00.538348 I | auth: deleting token UdlJUMYjMACrmPqe.540 for user conductor
2021-07-06 14:41:00.538426 I | auth: deleting token TCDOeDWhTByiOytZ.538 for user conductor
2021-07-06 14:41:00.538439 I | auth: deleting token wEKdFFYuXjrMinHt.541 for user conductor
2021-07-06 14:41:00.538450 I | auth: deleting token YtXozDbfkECzakeb.539 for user conductor
2021-07-06 14:41:00.538460 I | auth: deleting token mJkuYjiOuDhIDZzC.542 for user conductor
2021-07-06 14:41:00.538472 I | auth: deleting token UTPUhRfkmyYLOMDK.537 for user conductor
2021-07-06 14:41:00.538485 I | auth: deleting token zJNCOfLupzoQjPwZ.543 for user conductor
2021-07-06 14:41:01.638111 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.800892828s) to execute
2021-07-06 14:41:01.638348 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.896478249s) to execute
2021-07-06 14:41:03.537171 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.895984554s) to execute
2021-07-06 14:41:03.537423 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.896448072s) to execute
2021-07-06 14:41:03.537608 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.896627199s) to execute
2021-07-06 14:41:04.340310 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:05.342355 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.802030737s) to execute
2021-07-06 14:41:05.342536 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.80298012s) to execute
2021-07-06 14:41:05.493517 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (148.991965ms) to execute
2021-07-06 14:41:05.538354 I | auth: deleting token biVZFcHXshRiKkOR.547 for user conductor
2021-07-06 14:41:05.538414 I | auth: deleting token DoHQIytBPmcYtFyD.545 for user conductor
2021-07-06 14:41:05.538431 I | auth: deleting token RTrrLwRnzYCiIzgg.546 for user conductor
2021-07-06 14:41:05.538436 I | auth: deleting token peqNESAEyUujnxbn.548 for user conductor
2021-07-06 14:41:05.538446 I | auth: deleting token uPyvxWUwMtTgPyDt.549 for user conductor
2021-07-06 14:41:05.538453 I | auth: deleting token IjbkPNJFnNqEgVOW.544 for user conductor
2021-07-06 14:41:06.538376 I | auth: deleting token gHKkrItIooFVunre.550 for user conductor
2021-07-06 14:41:07.439647 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.146349364s) to execute
2021-07-06 14:41:07.538338 I | auth: deleting token tgZbuOaXEIBnZsXv.551 for user conductor
2021-07-06 14:41:09.340666 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:09.538359 I | auth: deleting token diKMRkbkkXsahnrW.552 for user conductor
2021-07-06 14:41:10.538351 I | auth: deleting token STVDPyXSKAnEwjya.553 for user conductor
2021-07-06 14:41:12.338710 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (245.462915ms) to execute
2021-07-06 14:41:12.538325 I | auth: deleting token DLKIjrzLrHDhkQgA.554 for user conductor
2021-07-06 14:41:12.538395 I | auth: deleting token bBCqqEJyFxlLpzwW.556 for user conductor
2021-07-06 14:41:12.538410 I | auth: deleting token jbCRQnFNgrJdTnjb.555 for user conductor
2021-07-06 14:41:14.340876 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:14.538361 I | auth: deleting token fuUAPywwbuMrdUQR.557 for user conductor
2021-07-06 14:41:15.538343 I | auth: deleting token SjJTWAdUZAqSDEmt.559 for user conductor
2021-07-06 14:41:15.944469 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.441133845s) to execute
2021-07-06 14:41:17.538426 I | auth: deleting token ZEpQFWJLbYmSfLan.561 for user conductor
2021-07-06 14:41:17.538482 I | auth: deleting token AmCMssfHWDUcHapt.562 for user conductor
2021-07-06 14:41:17.538492 I | auth: deleting token ewCNqRXhfHsuaDIa.558 for user conductor
2021-07-06 14:41:17.538501 I | auth: deleting token jTeTAuFtgFiOiTjx.560 for user conductor
2021-07-06 14:41:19.341074 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:19.538405 I | auth: deleting token shqKfzweCbdSUIua.563 for user conductor
2021-07-06 14:41:19.538449 I | auth: deleting token uTlOoteQdoMLgVrJ.565 for user conductor
2021-07-06 14:41:19.538457 I | auth: deleting token qXDxzYrxKlqUJtGT.564 for user conductor
2021-07-06 14:41:19.540214 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.593436883s) to execute
2021-07-06 14:41:19.540350 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.402205629s) to execute
2021-07-06 14:41:21.144104 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.600282674s) to execute
2021-07-06 14:41:21.144684 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.601723995s) to execute
2021-07-06 14:41:21.336954 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.793932359s) to execute
2021-07-06 14:41:21.393702 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (246.814361ms) to execute
2021-07-06 14:41:21.493334 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (156.300175ms) to execute
2021-07-06 14:41:21.538306 I | auth: deleting token GCmSJokUTHHpxdfx.566 for user conductor
2021-07-06 14:41:21.538380 I | auth: deleting token gHVwUYxSDGADySij.567 for user conductor
2021-07-06 14:41:22.538303 I | auth: deleting token dNGIaIgrvbUcpbny.568 for user conductor
2021-07-06 14:41:23.241320 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (704.427764ms) to execute
2021-07-06 14:41:23.538292 I | auth: deleting token HtmjpjKIKVJNjTHj.569 for user conductor
2021-07-06 14:41:24.341388 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:24.643917 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.250846067s) to execute
2021-07-06 14:41:25.538357 I | auth: deleting token pFmKqRsSoZLOCwvU.570 for user conductor
2021-07-06 14:41:26.538905 I | auth: deleting token OPbMjqIiQMVwCoFO.571 for user conductor
2021-07-06 14:41:28.538354 I | auth: deleting token CvIhEshOqTwuQSoD.572 for user conductor
2021-07-06 14:41:28.538430 I | auth: deleting token OMRcfBUuuOWFhuJL.573 for user conductor
2021-07-06 14:41:28.542202 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.249092065s) to execute
2021-07-06 14:41:29.341705 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:30.237031 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.692064442s) to execute
2021-07-06 14:41:30.237134 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.544171178s) to execute
2021-07-06 14:41:31.538412 I | auth: deleting token OCiCTjkgFesHLVTa.574 for user conductor
2021-07-06 14:41:31.538454 I | auth: deleting token QOYLfnuXnJFMExOp.576 for user conductor
2021-07-06 14:41:31.538482 I | auth: deleting token HbFvlWkdjEQFaHrq.575 for user conductor
2021-07-06 14:41:32.137128 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.79810196s) to execute
2021-07-06 14:41:32.137290 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.144516618s) to execute
2021-07-06 14:41:32.538466 I | auth: deleting token dyDXIBRveGatWcQp.577 for user conductor
2021-07-06 14:41:34.342013 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:34.538333 I | auth: deleting token iiujJxsFqCqiyxaT.579 for user conductor
2021-07-06 14:41:35.642270 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.405292318s) to execute
2021-07-06 14:41:36.538343 I | auth: deleting token MvNmeznAUkSRHQsq.581 for user conductor
2021-07-06 14:41:36.538408 I | auth: deleting token tYSLEacctjcMUWMe.580 for user conductor
2021-07-06 14:41:36.538421 I | auth: deleting token QaMlLPzinMLgYGTs.578 for user conductor
2021-07-06 14:41:36.538451 I | auth: deleting token txWNoEZVtVFTcBxa.582 for user conductor
2021-07-06 14:41:37.440710 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.701526023s) to execute
2021-07-06 14:41:37.440846 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (242.081794ms) to execute
2021-07-06 14:41:38.538342 I | auth: deleting token yYawiUnsMallXQDN.583 for user conductor
2021-07-06 14:41:39.243965 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.703040501s) to execute
2021-07-06 14:41:39.244222 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (606.063326ms) to execute
2021-07-06 14:41:39.342680 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:40.538455 I | auth: deleting token SnKHvMUynefKwlGM.584 for user conductor
2021-07-06 14:41:40.538509 I | auth: deleting token UOwqogAMURbyvwMe.585 for user conductor
2021-07-06 14:41:41.242754 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.247611956s) to execute
2021-07-06 14:41:41.437275 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.063644ms) to execute
2021-07-06 14:41:43.538253 I | auth: deleting token bndnqrTAivLioBii.587 for user conductor
2021-07-06 14:41:43.538323 I | auth: deleting token oSwhymXtbRhkXZTY.590 for user conductor
2021-07-06 14:41:43.538339 I | auth: deleting token oRDAWqtWHOGEIZGE.586 for user conductor
2021-07-06 14:41:43.538348 I | auth: deleting token nDodbNILlfGHGuMC.589 for user conductor
2021-07-06 14:41:43.538356 I | auth: deleting token vhQUhSUSJRwUeMmG.588 for user conductor
2021-07-06 14:41:44.342969 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:46.538300 I | auth: deleting token JnfzPNwmsGIwESoz.591 for user conductor
2021-07-06 14:41:46.538362 I | auth: deleting token LWbLmSiRfpYMmBCK.593 for user conductor
2021-07-06 14:41:47.538259 I | auth: deleting token ttUgmKswBRZvNdWt.592 for user conductor
2021-07-06 14:41:47.538309 I | auth: deleting token CLInHxNceovVZYuY.594 for user conductor
2021-07-06 14:41:47.538329 I | auth: deleting token yXTWqmrcZWOcLyfp.595 for user conductor
2021-07-06 14:41:48.937114 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.944104346s) to execute
2021-07-06 14:41:49.093122 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.311644ms) to execute
2021-07-06 14:41:49.094773 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (154.859821ms) to execute
2021-07-06 14:41:49.094831 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (154.118754ms) to execute
2021-07-06 14:41:49.343488 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:49.538206 I | auth: deleting token SIGKFkUEVRlGguys.596 for user conductor
2021-07-06 14:41:51.538344 I | auth: deleting token MRaQGktkIQogXLqK.598 for user conductor
2021-07-06 14:41:53.538332 I | auth: deleting token ybFSVBnFJVGolJsU.597 for user conductor
2021-07-06 14:41:53.538416 I | auth: deleting token qDnRJEUsMPshrJTc.601 for user conductor
2021-07-06 14:41:53.538429 I | auth: deleting token cSJpaywZTFFbyHex.599 for user conductor
2021-07-06 14:41:53.538468 I | auth: deleting token fNzmqJVnBfJfxrMN.600 for user conductor
2021-07-06 14:41:54.365578 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:54.438577 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.945686044s) to execute
2021-07-06 14:41:54.593808 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (152.047673ms) to execute
2021-07-06 14:41:56.538318 I | auth: deleting token bvMvaxpijgKQhcFd.602 for user conductor
2021-07-06 14:41:56.538372 I | auth: deleting token wDChMuZZLSeqLpnb.603 for user conductor
2021-07-06 14:41:56.538387 I | auth: deleting token mFTiMchWbEzEnjAo.605 for user conductor
2021-07-06 14:41:56.538396 I | auth: deleting token fDyLoywDZHdtGGxk.604 for user conductor
2021-07-06 14:41:57.242614 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (549.762874ms) to execute
2021-07-06 14:41:58.538414 I | auth: deleting token QzfqUvkIMxKPfydB.606 for user conductor
2021-07-06 14:41:59.140495 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.001163693s) to execute
2021-07-06 14:41:59.365932 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:41:59.538313 I | auth: deleting token SkqdSExBChTshBZK.608 for user conductor
2021-07-06 14:41:59.538379 I | auth: deleting token kEfGHIrzeembSPjl.607 for user conductor
2021-07-06 14:42:00.538310 I | auth: deleting token oXSwsVjwAfZaLINC.609 for user conductor
2021-07-06 14:42:00.538349 I | auth: deleting token CvLYVhdqmkEQHEXm.610 for user conductor
2021-07-06 14:42:02.138552 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.301297617s) to execute
2021-07-06 14:42:02.538289 I | auth: deleting token OrjOiNnCNBrSPiyz.611 for user conductor
2021-07-06 14:42:02.538347 I | auth: deleting token ZCmjmpdOAumigfYt.612 for user conductor
2021-07-06 14:42:03.538264 I | auth: deleting token xAxJqRkHzwSpXkEE.613 for user conductor
2021-07-06 14:42:03.744202 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.548868993s) to execute
2021-07-06 14:42:04.366304 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:07.636922 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.892579498s) to execute
2021-07-06 14:42:07.637281 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.797620656s) to execute
2021-07-06 14:42:07.739751 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.062123ms) to execute
2021-07-06 14:42:07.741389 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (101.163691ms) to execute
2021-07-06 14:42:08.538357 I | auth: deleting token bhsNqcjhZllUOabx.614 for user conductor
2021-07-06 14:42:08.538424 I | auth: deleting token KldqlLQjGBWWDDpj.618 for user conductor
2021-07-06 14:42:08.538439 I | auth: deleting token uLXeMPaOtMPcRvyh.616 for user conductor
2021-07-06 14:42:09.366593 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:09.538310 I | auth: deleting token HODmXwndETTGfcyC.621 for user conductor
2021-07-06 14:42:09.538359 I | auth: deleting token cxaRadONleLxNiGu.617 for user conductor
2021-07-06 14:42:09.538372 I | auth: deleting token hTicPWBvlgAbELmT.620 for user conductor
2021-07-06 14:42:09.538385 I | auth: deleting token bnptXseXrssHmUBC.619 for user conductor
2021-07-06 14:42:09.538393 I | auth: deleting token cQSvaOhprlqwGsVB.615 for user conductor
2021-07-06 14:42:10.039135 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.145725642s) to execute
2021-07-06 14:42:11.538378 I | auth: deleting token ztXLxUyioRElmQKv.622 for user conductor
2021-07-06 14:42:11.538528 I | auth: deleting token exYUsazMpYjfcklW.623 for user conductor
2021-07-06 14:42:13.541605 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.401392965s) to execute
2021-07-06 14:42:14.366894 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:14.538347 I | auth: deleting token BfQDARQTMxeZbxAt.626 for user conductor
2021-07-06 14:42:14.538388 I | auth: deleting token wtCauwjWRVoMjXPP.624 for user conductor
2021-07-06 14:42:14.538434 I | auth: deleting token GHiHrHBgKgEhxjqI.625 for user conductor
2021-07-06 14:42:15.441860 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.897356488s) to execute
2021-07-06 14:42:15.442040 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.8467859s) to execute
2021-07-06 14:42:15.442168 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.805420589s) to execute
2021-07-06 14:42:16.538340 I | auth: deleting token afVTplDzxeMnuAui.627 for user conductor
2021-07-06 14:42:16.538390 I | auth: deleting token lNLfZMbwpjnxWSGf.628 for user conductor
2021-07-06 14:42:17.242318 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.701196142s) to execute
2021-07-06 14:42:17.538383 I | auth: deleting token GFvxWPVLCPCOAwNO.629 for user conductor
2021-07-06 14:42:19.141454 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.9483459s) to execute
2021-07-06 14:42:19.367270 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:20.538384 I | auth: deleting token MIfaGSKdxCstPQiT.631 for user conductor
2021-07-06 14:42:20.538447 I | auth: deleting token IdZYZUBCGcMoijGk.630 for user conductor
2021-07-06 14:42:20.538466 I | auth: deleting token ciBjDESITmkAEYdY.633 for user conductor
2021-07-06 14:42:20.538482 I | auth: deleting token OWXYLxlDCUBbjZcP.632 for user conductor
2021-07-06 14:42:22.643765 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.499213422s) to execute
2021-07-06 14:42:22.644161 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.499987071s) to execute
2021-07-06 14:42:24.367675 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:24.538358 I | auth: deleting token KmKdgXeYmvwiSYjx.635 for user conductor
2021-07-06 14:42:24.538396 I | auth: deleting token tjMnTjwgFojTRyFg.637 for user conductor
2021-07-06 14:42:24.538406 I | auth: deleting token iqJiqgENsAtCKatu.638 for user conductor
2021-07-06 14:42:24.538412 I | auth: deleting token FWyOpBXSERXRjOQk.636 for user conductor
2021-07-06 14:42:24.538421 I | auth: deleting token cuhNMCtZlYbUGxSf.634 for user conductor
2021-07-06 14:42:27.538379 I | auth: deleting token CIuZTOSKxCLGdawB.639 for user conductor
2021-07-06 14:42:27.538424 I | auth: deleting token SNAVSfsWZYhxoWsW.640 for user conductor
2021-07-06 14:42:28.538354 I | auth: deleting token rZDHGtxJszlLYxzX.641 for user conductor
2021-07-06 14:42:28.538450 I | auth: deleting token ZzYQJbGhWNvjBIDP.642 for user conductor
2021-07-06 14:42:29.368129 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:29.538234 I | auth: deleting token DoQcGFMrVZrlSdgI.643 for user conductor
2021-07-06 14:42:30.042919 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.103540466s) to execute
2021-07-06 14:42:31.837155 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.700184037s) to execute
2021-07-06 14:42:31.837415 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.79211528s) to execute
2021-07-06 14:42:31.839418 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.70237583s) to execute
2021-07-06 14:42:31.839545 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.702473347s) to execute
2021-07-06 14:42:33.538300 I | auth: deleting token UrznOPMWmHuiLFCg.647 for user conductor
2021-07-06 14:42:33.538343 I | auth: deleting token wnVgAYZaysKwLTdL.646 for user conductor
2021-07-06 14:42:33.538357 I | auth: deleting token xdzEIQhCXTkTEQgY.645 for user conductor
2021-07-06 14:42:33.538365 I | auth: deleting token TlVYYUwFFxtrfSkr.644 for user conductor
2021-07-06 14:42:33.638277 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (340.445912ms) to execute
2021-07-06 14:42:34.410895 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:34.538325 I | auth: deleting token ZbHzGbLiSSjjOMdM.649 for user conductor
2021-07-06 14:42:34.538371 I | auth: deleting token sAiQKmXfrnxxkeaG.648 for user conductor
2021-07-06 14:42:35.340350 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (547.513083ms) to execute
2021-07-06 14:42:37.042478 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (843.531374ms) to execute
2021-07-06 14:42:38.538351 I | auth: deleting token uspofhYRqvCCDKbT.652 for user conductor
2021-07-06 14:42:38.538408 I | auth: deleting token NbqyFQPkNByvjLyj.650 for user conductor
2021-07-06 14:42:38.538425 I | auth: deleting token AnoNbErYVxtXEPMu.654 for user conductor
2021-07-06 14:42:38.538446 I | auth: deleting token yJCZTuIJHsJBzCVh.653 for user conductor
2021-07-06 14:42:38.538471 I | auth: deleting token ECrlUAIOMlohPmZe.651 for user conductor
2021-07-06 14:42:39.436833 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:40.538317 I | auth: deleting token jFOPdrIecuPuqrZr.655 for user conductor
2021-07-06 14:42:40.538386 I | auth: deleting token XEXXcVgQkQlNXEDp.656 for user conductor
2021-07-06 14:42:41.443733 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.304740675s) to execute
2021-07-06 14:42:41.538292 I | auth: deleting token zttpXHchYGYBkCYh.657 for user conductor
2021-07-06 14:42:43.338219 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.801255559s) to execute
2021-07-06 14:42:44.437134 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:44.538381 I | auth: deleting token FsoMUGnrIHgTjEKf.658 for user conductor
2021-07-06 14:42:44.538460 I | auth: deleting token XPrUGlYkfzBpZNTC.660 for user conductor
2021-07-06 14:42:44.538475 I | auth: deleting token PleqWTOdbdhcaojh.659 for user conductor
2021-07-06 14:42:44.841155 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.500088305s) to execute
2021-07-06 14:42:44.841267 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.304287258s) to execute
2021-07-06 14:42:44.841413 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.500093953s) to execute
2021-07-06 14:42:46.741890 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.799950313s) to execute
2021-07-06 14:42:48.839316 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.146432844s) to execute
2021-07-06 14:42:49.437448 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:49.538278 I | auth: deleting token zLyNYCTiDnXpMqtH.662 for user conductor
2021-07-06 14:42:49.538331 I | auth: deleting token qCsYRqohNJnNJSqE.664 for user conductor
2021-07-06 14:42:49.538344 I | auth: deleting token yeazfseijKAhPgZN.665 for user conductor
2021-07-06 14:42:49.538357 I | auth: deleting token mPAzvMWFLnwzeBge.661 for user conductor
2021-07-06 14:42:49.538367 I | auth: deleting token PnsIfTwHiqYUAiIN.666 for user conductor
2021-07-06 14:42:49.538376 I | auth: deleting token nXJwQHuMQWLUKilZ.663 for user conductor
2021-07-06 14:42:50.541010 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.548183318s) to execute
2021-07-06 14:42:50.541425 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.69908367s) to execute
2021-07-06 14:42:52.339045 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (746.306556ms) to execute
2021-07-06 14:42:54.043910 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.05106361s) to execute
2021-07-06 14:42:54.437779 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:42:54.538354 I | auth: deleting token lTAhRcsxZxjFMkzB.669 for user conductor
2021-07-06 14:42:54.538399 I | auth: deleting token vckIqfWnbljSETXX.667 for user conductor
2021-07-06 14:42:54.538414 I | auth: deleting token RtdPSiZkvfAznhnp.668 for user conductor
2021-07-06 14:42:54.538423 I | auth: deleting token RBEwxuhITOoBeUms.671 for user conductor
2021-07-06 14:42:56.538352 I | auth: deleting token FvfUwdunWfIqmSbN.672 for user conductor
2021-07-06 14:42:56.538427 I | auth: deleting token bXmHPEkbrTcLnMhj.670 for user conductor
2021-07-06 14:42:56.538441 I | auth: deleting token hMKfVAMRojjymoib.673 for user conductor
2021-07-06 14:42:56.538457 I | auth: deleting token MLPeBVUXPKzbWDtE.674 for user conductor
2021-07-06 14:42:59.438126 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:01.538528 I | auth: deleting token NZrguPhNhbZMAVEf.675 for user conductor
2021-07-06 14:43:03.538364 I | auth: deleting token QtPotGBhRsBNeuSE.677 for user conductor
2021-07-06 14:43:03.538498 I | auth: deleting token eIlFXetqjJxQpwBm.676 for user conductor
2021-07-06 14:43:04.438318 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:04.538257 I | auth: deleting token BHbxbwGELTzeeqJc.678 for user conductor
2021-07-06 14:43:05.242776 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (903.769663ms) to execute
2021-07-06 14:43:05.538415 I | auth: deleting token LCFKdVeOWspGeJqp.679 for user conductor
2021-07-06 14:43:05.538566 I | auth: deleting token pKFEhDqhqyrmBdtJ.680 for user conductor
2021-07-06 14:43:07.039322 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.202301184s) to execute
2021-07-06 14:43:09.438525 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:10.140949 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.641809354s) to execute
2021-07-06 14:43:11.939547 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.744642745s) to execute
2021-07-06 14:43:12.195376 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (252.760181ms) to execute
2021-07-06 14:43:12.538295 I | auth: deleting token ByRGepXnzedXgpRW.681 for user conductor
2021-07-06 14:43:12.538372 I | auth: deleting token pqzcqmipAcDPUHuE.682 for user conductor
2021-07-06 14:43:13.538340 I | auth: deleting token AqSetPXPDSSfXpUp.683 for user conductor
2021-07-06 14:43:13.538392 I | auth: deleting token izXeTDBYgFLqxOMA.684 for user conductor
2021-07-06 14:43:14.438792 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:14.538423 I | auth: deleting token UASLpzLiyimlqVNH.685 for user conductor
2021-07-06 14:43:15.544411 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.307455137s) to execute
2021-07-06 14:43:15.692683 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (145.685941ms) to execute
2021-07-06 14:43:18.641406 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.148466705s) to execute
2021-07-06 14:43:19.440123 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:22.538401 I | auth: deleting token FzNVtzgdhCjPfqKo.687 for user conductor
2021-07-06 14:43:22.538561 I | auth: deleting token xUVLJfxjoJJtpxAl.686 for user conductor
2021-07-06 14:43:22.538601 I | auth: deleting token fTNDeONLWxIcDufI.690 for user conductor
2021-07-06 14:43:22.538632 I | auth: deleting token amkZcNLMGyMLYMDR.689 for user conductor
2021-07-06 14:43:22.538659 I | auth: deleting token jbRXoiycNqWNJfXa.688 for user conductor
2021-07-06 14:43:24.440533 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:25.605791 I | auth: deleting token RCrYgZhVzaMSytgD.693 for user conductor
2021-07-06 14:43:25.605837 I | auth: deleting token SnZApVzoknQvZhZT.692 for user conductor
2021-07-06 14:43:25.605858 I | auth: deleting token VKcMvZLEFVHZFAaW.691 for user conductor
2021-07-06 14:43:26.143354 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (248.038373ms) to execute
2021-07-06 14:43:27.538322 I | auth: deleting token JandKUkYMVoBRodh.695 for user conductor
2021-07-06 14:43:27.538407 I | auth: deleting token IEhtOMQxRLbztQDy.694 for user conductor
2021-07-06 14:43:27.842548 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.547950464s) to execute
2021-07-06 14:43:28.538382 I | auth: deleting token UhWrpeanZuobuhZb.696 for user conductor
2021-07-06 14:43:29.440811 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:29.741888 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.802623148s) to execute
2021-07-06 14:43:29.742018 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.805118897s) to execute
2021-07-06 14:43:30.538479 I | auth: deleting token uIbKeYLoYEDEVuuB.697 for user conductor
2021-07-06 14:43:31.636923 I | auth: deleting token tIQPmEYcILkwhiFN.699 for user conductor
2021-07-06 14:43:33.538326 I | auth: deleting token VIqsvzRZCrBEoJQY.701 for user conductor
2021-07-06 14:43:33.538420 I | auth: deleting token BMxfEltFzSJfDTFC.698 for user conductor
2021-07-06 14:43:34.441107 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:35.538368 I | auth: deleting token VlbTHVuGwBdWOILQ.700 for user conductor
2021-07-06 14:43:35.538413 I | auth: deleting token jQadYBixTNxCFJsX.702 for user conductor
2021-07-06 14:43:35.538422 I | auth: deleting token BvqLxarhJlZhYYZc.704 for user conductor
2021-07-06 14:43:35.538439 I | auth: deleting token CQXaQlYMHjCXYhlr.703 for user conductor
2021-07-06 14:43:36.538330 I | auth: deleting token nsrdACwWtdXWMRAC.705 for user conductor
2021-07-06 14:43:37.144511 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.906388637s) to execute
2021-07-06 14:43:38.538285 I | auth: deleting token WDQpnEwumTRWRJaI.707 for user conductor
2021-07-06 14:43:38.538330 I | auth: deleting token eBJWXUShkQWUJmvW.708 for user conductor
2021-07-06 14:43:39.242953 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.096187231s) to execute
2021-07-06 14:43:39.243017 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.003610461s) to execute
2021-07-06 14:43:39.243231 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.096215945s) to execute
2021-07-06 14:43:39.243296 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.096283877s) to execute
2021-07-06 14:43:39.438243 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (178.824189ms) to execute
2021-07-06 14:43:39.441385 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:42.538263 I | auth: deleting token zSZCZbWpqYfCIIVa.706 for user conductor
2021-07-06 14:43:42.538318 I | auth: deleting token kFQiZOwDZxtqGiEU.711 for user conductor
2021-07-06 14:43:43.042826 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.603153686s) to execute
2021-07-06 14:43:43.538310 I | auth: deleting token ZYCtsLvECYTuFPce.710 for user conductor
2021-07-06 14:43:43.538353 I | auth: deleting token BkxQllDNJLujBXeM.712 for user conductor
2021-07-06 14:43:43.538368 I | auth: deleting token upgIOtBXlsUvWANX.709 for user conductor
2021-07-06 14:43:44.441640 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:44.538374 I | auth: deleting token kVCyKDJaxFFQFPtu.713 for user conductor
2021-07-06 14:43:44.837170 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.197933307s) to execute
2021-07-06 14:43:46.437774 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.600033137s) to execute
2021-07-06 14:43:46.438106 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.597740332s) to execute
2021-07-06 14:43:46.495182 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.654797933s) to execute
2021-07-06 14:43:46.593023 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (152.297184ms) to execute
2021-07-06 14:43:46.693253 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (156.380837ms) to execute
2021-07-06 14:43:47.538314 I | auth: deleting token uSWqdDQTrdcFYcWI.714 for user conductor
2021-07-06 14:43:47.538371 I | auth: deleting token tytwYVNmGyDPDynR.716 for user conductor
2021-07-06 14:43:49.441901 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:50.138793 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.636835462s) to execute
2021-07-06 14:43:50.292777 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (145.82404ms) to execute
2021-07-06 14:43:50.538253 I | auth: deleting token RtEvfBdcmnGPwrXI.715 for user conductor
2021-07-06 14:43:50.538297 I | auth: deleting token mclluTYnvtoCViqa.718 for user conductor
2021-07-06 14:43:50.538315 I | auth: deleting token GtMlXSdlHsdeVaJa.717 for user conductor
2021-07-06 14:43:51.538284 I | auth: deleting token DveacscsNuoMmzgx.720 for user conductor
2021-07-06 14:43:51.538333 I | auth: deleting token BTKfYtDVGfzyBplp.719 for user conductor
2021-07-06 14:43:51.937203 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (699.045051ms) to execute
2021-07-06 14:43:52.538312 I | auth: deleting token dscInveDJVPihCjU.721 for user conductor
2021-07-06 14:43:52.538375 I | auth: deleting token NGchZAkFcmAnhzVl.722 for user conductor
2021-07-06 14:43:53.538312 I | auth: deleting token uvxEqlBbbIMneeOC.723 for user conductor
2021-07-06 14:43:53.743565 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.705380739s) to execute
2021-07-06 14:43:54.442173 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:43:55.538258 I | auth: deleting token OtXDfDEeIxGkiADF.725 for user conductor
2021-07-06 14:43:55.538292 I | auth: deleting token WYfgEHAWZwoIXrNP.724 for user conductor
2021-07-06 14:43:55.639821 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.302840587s) to execute
2021-07-06 14:43:57.538402 I | auth: deleting token IVBtVQrBINfrNTli.726 for user conductor
2021-07-06 14:43:58.538342 I | auth: deleting token DpDqcwTKyXVMuNWg.727 for user conductor
2021-07-06 14:43:58.538378 I | auth: deleting token tiIhwOrioewtVBVZ.728 for user conductor
2021-07-06 14:43:58.538385 I | auth: deleting token gusVlEhCrWmwWatq.729 for user conductor
2021-07-06 14:43:58.939904 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.603031638s) to execute
2021-07-06 14:43:59.092989 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.939659ms) to execute
2021-07-06 14:43:59.442500 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:00.538459 I | auth: deleting token nyseKzEhoBJEIEhg.730 for user conductor
2021-07-06 14:44:00.538588 I | auth: deleting token gJbYvFEaZWDqhccc.731 for user conductor
2021-07-06 14:44:00.837362 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (840.049468ms) to execute
2021-07-06 14:44:02.538312 I | auth: deleting token vqmkXByuFhlspCXL.734 for user conductor
2021-07-06 14:44:02.538465 I | auth: deleting token dgfZkDDCbEJrSpbU.732 for user conductor
2021-07-06 14:44:02.538547 I | auth: deleting token flCpRcibWULMOfGU.733 for user conductor
2021-07-06 14:44:02.737421 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.896549945s) to execute
2021-07-06 14:44:04.343030 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.602255222s) to execute
2021-07-06 14:44:04.343150 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.603567593s) to execute
2021-07-06 14:44:04.442760 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:05.538358 I | auth: deleting token mvPzEzVEcoZjZNrI.737 for user conductor
2021-07-06 14:44:05.538441 I | auth: deleting token RRVluuUzzndbIdos.735 for user conductor
2021-07-06 14:44:06.538389 I | auth: deleting token tUDVRWgAoJRfXucV.738 for user conductor
2021-07-06 14:44:06.538498 I | auth: deleting token LZzxgZZlMKXpRBoe.736 for user conductor
2021-07-06 14:44:07.538391 I | auth: deleting token YZGqKcNXsXnHEPNt.739 for user conductor
2021-07-06 14:44:07.641531 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.103530054s) to execute
2021-07-06 14:44:07.641750 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.204683209s) to execute
2021-07-06 14:44:09.442001 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.704862387s) to execute
2021-07-06 14:44:09.442424 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.798338315s) to execute
2021-07-06 14:44:09.443012 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:09.538322 I | auth: deleting token QhLnBYRMDPNVLGDd.741 for user conductor
2021-07-06 14:44:09.592813 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.855721438s) to execute
2021-07-06 14:44:11.239595 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.794550913s) to execute
2021-07-06 14:44:11.239697 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.644559892s) to execute
2021-07-06 14:44:11.239833 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (741.980186ms) to execute
2021-07-06 14:44:11.538269 I | auth: deleting token NklXFcQJUrxyuitX.744 for user conductor
2021-07-06 14:44:11.538322 I | auth: deleting token bnedmqPMeLikiNsl.742 for user conductor
2021-07-06 14:44:11.538338 I | auth: deleting token AoogRkTNAbCtZLEi.740 for user conductor
2021-07-06 14:44:11.538349 I | auth: deleting token ieVJBtNiOSDKorrK.743 for user conductor
2021-07-06 14:44:11.538358 I | auth: deleting token xqJEPgbMpdqpnqfF.745 for user conductor
2021-07-06 14:44:13.139695 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.830162694s) to execute
2021-07-06 14:44:13.139791 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (928.697442ms) to execute
2021-07-06 14:44:14.443275 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:15.043176 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.846033097s) to execute
2021-07-06 14:44:15.043502 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.350332692s) to execute
2021-07-06 14:44:16.538358 I | auth: deleting token EtVuyRBKNDrgGcNl.748 for user conductor
2021-07-06 14:44:16.538428 I | auth: deleting token WCSanesqZdxKODkx.749 for user conductor
2021-07-06 14:44:16.538443 I | auth: deleting token ytwgsghMmzDkRcBx.746 for user conductor
2021-07-06 14:44:16.538462 I | auth: deleting token kNlnYvDnVMTbCTZh.747 for user conductor
2021-07-06 14:44:16.538475 I | auth: deleting token MzUCpGdEgkthmqHq.750 for user conductor
2021-07-06 14:44:18.538388 I | auth: deleting token iHEHUgxeHGPXkKbu.753 for user conductor
2021-07-06 14:44:18.538428 I | auth: deleting token enrvbtMBqDjhBPoB.752 for user conductor
2021-07-06 14:44:18.538439 I | auth: deleting token meVItNizbkvgHCqY.751 for user conductor
2021-07-06 14:44:19.443551 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:20.138735 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.092807905s) to execute
2021-07-06 14:44:21.542510 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.401172331s) to execute
2021-07-06 14:44:21.542861 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.401429211s) to execute
2021-07-06 14:44:21.638862 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.496571778s) to execute
2021-07-06 14:44:21.638908 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.497419055s) to execute
2021-07-06 14:44:22.538447 I | auth: deleting token auIsMTjutXqpSxIC.754 for user conductor
2021-07-06 14:44:22.538522 I | auth: deleting token LLWIPWJSuIRjVooc.755 for user conductor
2021-07-06 14:44:23.340213 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.698385414s) to execute
2021-07-06 14:44:23.538375 I | auth: deleting token zEhRMBrfnsEBNfFb.758 for user conductor
2021-07-06 14:44:23.538543 I | auth: deleting token aXRBrGOlqEitfzSz.756 for user conductor
2021-07-06 14:44:24.443849 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:24.538280 I | auth: deleting token bSPbPTMjPbpbtOSR.759 for user conductor
2021-07-06 14:44:24.538353 I | auth: deleting token FBzNyjkggDeVzUoq.757 for user conductor
2021-07-06 14:44:26.538357 I | auth: deleting token xnIrESKBJsGwJGYn.760 for user conductor
2021-07-06 14:44:27.538421 I | auth: deleting token PAyJzCZJXfghGibd.762 for user conductor
2021-07-06 14:44:28.646804 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.009739098s) to execute
2021-07-06 14:44:29.444212 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:29.538294 I | auth: deleting token MpoqJxahkzUMTIbI.764 for user conductor
2021-07-06 14:44:29.538384 I | auth: deleting token tuNJuNTRINWWrKfg.761 for user conductor
2021-07-06 14:44:29.538412 I | auth: deleting token ctVfnzMXMddYdEmn.765 for user conductor
2021-07-06 14:44:30.238207 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.5878188s) to execute
2021-07-06 14:44:30.238350 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.589202977s) to execute
2021-07-06 14:44:30.240708 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.591423011s) to execute
2021-07-06 14:44:30.240766 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.591444845s) to execute
2021-07-06 14:44:31.538495 I | auth: deleting token cDoqzBosnPbTrDzC.767 for user conductor
2021-07-06 14:44:31.538703 I | auth: deleting token YImFztaruRRfVcJe.763 for user conductor
2021-07-06 14:44:33.538405 I | auth: deleting token xlOyVFYoUZKbHkxi.766 for user conductor
2021-07-06 14:44:33.540460 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.745393034s) to execute
2021-07-06 14:44:34.536627 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:35.143128 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.406149026s) to execute
2021-07-06 14:44:35.143381 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.506521031s) to execute
2021-07-06 14:44:35.292955 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (147.02154ms) to execute
2021-07-06 14:44:35.538319 I | auth: deleting token tJEtjpwskKpILLtn.768 for user conductor
2021-07-06 14:44:36.939727 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.643700104s) to execute
2021-07-06 14:44:38.538294 I | auth: deleting token KdNrkDjPUgwLBvat.771 for user conductor
2021-07-06 14:44:38.538362 I | auth: deleting token LSTZjMpcAsMzQqHD.769 for user conductor
2021-07-06 14:44:38.538390 I | auth: deleting token sUNktLWmTEHMgcBc.770 for user conductor
2021-07-06 14:44:38.538402 I | auth: deleting token YZPqTdBsNepANZHQ.772 for user conductor
2021-07-06 14:44:38.747255 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.551247468s) to execute
2021-07-06 14:44:39.536981 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:40.538499 I | auth: deleting token BFPXxOORQJJeHGVp.773 for user conductor
2021-07-06 14:44:40.538575 I | auth: deleting token wxUmguIAGFXPpKVI.774 for user conductor
2021-07-06 14:44:40.837353 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.900481109s) to execute
2021-07-06 14:44:42.438809 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.627751216s) to execute
2021-07-06 14:44:42.438988 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.546635988s) to execute
2021-07-06 14:44:42.439243 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.599473664s) to execute
2021-07-06 14:44:42.538441 I | auth: deleting token gyXAOepSuACveNqb.775 for user conductor
2021-07-06 14:44:42.538480 I | auth: deleting token rGrPkKBPJMCeKVyq.776 for user conductor
2021-07-06 14:44:44.537360 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:45.842045 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.002514729s) to execute
2021-07-06 14:44:46.538397 I | auth: deleting token dtjJFFwquQPtTMSt.777 for user conductor
2021-07-06 14:44:46.538470 I | auth: deleting token qgKmKKpKANZSUdje.779 for user conductor
2021-07-06 14:44:47.538396 I | auth: deleting token MxbLhgbLGYPQQCla.780 for user conductor
2021-07-06 14:44:47.538452 I | auth: deleting token uBgBkixTHMbLGrID.781 for user conductor
2021-07-06 14:44:47.538463 I | auth: deleting token rIddNzpbaymhUhhO.778 for user conductor
2021-07-06 14:44:47.538488 I | auth: deleting token qqcjwqBqpkqMkJPP.782 for user conductor
2021-07-06 14:44:47.637265 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (500.268499ms) to execute
2021-07-06 14:44:48.538513 I | auth: deleting token sqoNijFYrbBvPIHD.783 for user conductor
2021-07-06 14:44:49.338729 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.646189398s) to execute
2021-07-06 14:44:49.537633 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:50.538353 I | auth: deleting token fiRmdkgIEEjplkYL.784 for user conductor
2021-07-06 14:44:50.538429 I | auth: deleting token GIWkAwFAgojgowJA.785 for user conductor
2021-07-06 14:44:51.042629 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.547831852s) to execute
2021-07-06 14:44:51.042820 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.640174781s) to execute
2021-07-06 14:44:51.538258 I | auth: deleting token cdAEMVsPcZSqYqGW.786 for user conductor
2021-07-06 14:44:52.538479 I | auth: deleting token RblnjFmRakLbVbMP.787 for user conductor
2021-07-06 14:44:53.137052 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.627437859s) to execute
2021-07-06 14:44:54.537963 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:54.538322 I | auth: deleting token RCcjwprOusfJWJrN.788 for user conductor
2021-07-06 14:44:54.738485 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.544397387s) to execute
2021-07-06 14:44:55.538281 I | auth: deleting token pkefMEJQLxLBBoqD.789 for user conductor
2021-07-06 14:44:56.538443 I | auth: deleting token pnnsZQRmbQgZAlGG.790 for user conductor
2021-07-06 14:44:58.639583 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.89970054s) to execute
2021-07-06 14:44:59.538262 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:44:59.538306 I | auth: deleting token eUHnTHfUxLXOldRX.792 for user conductor
2021-07-06 14:44:59.538360 I | auth: deleting token jHGEcgAMhHORFiBx.791 for user conductor
2021-07-06 14:45:01.538287 I | auth: deleting token cvGNhTkAaXJZLBZj.793 for user conductor
2021-07-06 14:45:03.538393 I | auth: deleting token vFFTnxpvDhekBlCM.795 for user conductor
2021-07-06 14:45:03.639166 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.599628401s) to execute
2021-07-06 14:45:04.538546 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:45:05.237247 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.594056217s) to execute
2021-07-06 14:45:05.237456 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.595563458s) to execute
2021-07-06 14:45:05.339338 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.697399579s) to execute
2021-07-06 14:45:05.538359 I | auth: deleting token BkhuMfVPSUPinMcm.796 for user conductor
2021-07-06 14:45:05.538424 I | auth: deleting token QCfRknPFzWgirLuS.794 for user conductor
2021-07-06 14:45:05.538433 I | auth: deleting token ffDDGnSSCrlklsEM.798 for user conductor
2021-07-06 14:45:06.538283 I | auth: deleting token zyLdisIXOSJkUujD.797 for user conductor
2021-07-06 14:45:06.943091 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.606134289s) to execute
2021-07-06 14:45:06.943245 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.506112846s) to execute
2021-07-06 14:45:08.537866 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.400961315s) to execute
2021-07-06 14:45:08.538340 I | auth: deleting token pffjuXgwKuOECbVO.801 for user conductor
2021-07-06 14:45:08.538361 I | auth: deleting token LWygLxqysHEOrqSt.802 for user conductor
2021-07-06 14:45:08.538379 I | auth: deleting token yHpVZZEJZjOAuKjz.799 for user conductor
2021-07-06 14:45:08.538388 I | auth: deleting token xVnGQmkeVChomVFL.800 for user conductor
2021-07-06 14:45:09.538369 I | auth: deleting token YXYRvUSBTIzTzqWw.803 for user conductor
2021-07-06 14:45:09.538959 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:45:10.139975 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.547463053s) to execute
2021-07-06 14:45:13.245838 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.705257938s) to execute
2021-07-06 14:45:13.246176 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.008445184s) to execute
2021-07-06 14:45:13.246744 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.104194195s) to execute
2021-07-06 14:45:13.538302 I | auth: deleting token rRLvMJftbLlbnwBi.804 for user conductor
2021-07-06 14:45:13.538374 I | auth: deleting token bDFQfijVQHkRiTvd.806 for user conductor
2021-07-06 14:45:14.539268 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:45:15.538280 I | auth: deleting token ymFNcjYUiFyacNmn.807 for user conductor
2021-07-06 14:45:15.538346 I | auth: deleting token GEKzQjtTdtuTClbh.808 for user conductor
2021-07-06 14:45:15.538359 I | auth: deleting token iNAArAyeaASlaLSR.810 for user conductor
2021-07-06 14:45:15.538387 I | auth: deleting token SGlPNoKwzsLsWQLP.805 for user conductor
2021-07-06 14:45:15.538399 I | auth: deleting token ZniokaGgyJaZHqnv.809 for user conductor
2021-07-06 14:45:16.538398 I | auth: deleting token yJMMYjzBiLFOJHzl.811 for user conductor
2021-07-06 14:45:16.841168 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.142813564s) to execute
2021-07-06 14:45:17.092758 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (152.062241ms) to execute
2021-07-06 14:45:18.538309 I | auth: deleting token gnxXjeboIjRUuHcF.812 for user conductor
2021-07-06 14:45:18.538352 I | auth: deleting token ihwDsIZxbUIRfoTV.814 for user conductor
2021-07-06 14:45:18.538361 I | auth: deleting token WfntDaFIeMDQeUvS.813 for user conductor
2021-07-06 14:45:19.598860 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:45:20.538337 I | auth: deleting token cdJxViyjqvAXQJIT.816 for user conductor
2021-07-06 14:45:20.538371 I | auth: deleting token YrHSEZMwcjvTZegi.815 for user conductor
2021-07-06 14:45:20.737091 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.144439382s) to execute
2021-07-06 14:45:21.538389 I | auth: deleting token gMaHGvPaLVqmiVlb.817 for user conductor
2021-07-06 14:45:22.538468 I | auth: deleting token otvVsAYKAhEgAQLk.818 for user conductor
2021-07-06 14:45:22.636735 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (844.038615ms) to execute
2021-07-06 14:45:24.636925 I | auth: deleting token UuLBnRdmvZmwGyGI.819 for user conductor
2021-07-06 14:45:24.636959 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:45:24.637001 I | auth: deleting token NcGcMkYBpStforyf.820 for user conductor
2021-07-06 14:45:25.538279 I | auth: deleting token lARLNmBeTzjbrADz.822 for user conductor
2021-07-06 14:45:25.538342 I | auth: deleting token TBgtGZFazIKPYwVg.821 for user conductor
2021-07-06 14:45:26.143115 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.503092435s) to execute
2021-07-06 14:45:27.538339 I | auth: deleting token AzMDKZwDoOixhrXl.823 for user conductor
2021-07-06 14:45:27.538375 I | auth: deleting token OdaQQRGCGIzbLhTs.824 for user conductor
2021-07-06 14:45:28.538346 I | auth: deleting token UFLkebTDHhQflukM.825 for user conductor
2021-07-06 14:45:29.538463 I | auth: deleting token qRvOinOddPkjBRKW.826 for user conductor
2021-07-06 14:45:29.637253 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:45:30.139485 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.802537612s) to execute
2021-07-06 14:45:30.139591 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.802664316s) to execute
2021-07-06 14:45:30.139727 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.80280875s) to execute
2021-07-06 14:45:30.139850 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.000933973s) to execute
2021-07-06 14:45:30.538330 I | auth: deleting token BavqFpJdrkcdxwSb.827 for user conductor
2021-07-06 14:45:32.538401 I | auth: deleting token gESPehMlhgmaDEpf.828 for user conductor
2021-07-06 14:45:33.538308 I | auth: deleting token hKHYaGruSbgkacGj.829 for user conductor
2021-07-06 14:45:33.744095 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.10707193s) to execute
2021-07-06 14:45:33.992763 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (152.166082ms) to execute
2021-07-06 14:45:34.538366 I | auth: deleting token MnCNqbjJNWPecNRz.830 for user conductor
2021-07-06 14:45:34.637457 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:45:35.638201 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (701.045197ms) to execute
2021-07-06 14:45:36.538317 I | auth: deleting token ZetMYpqOBheETupo.831 for user conductor
2021-07-06 14:45:37.247596 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.553145129s) to execute
2021-07-06 14:45:37.493751 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (156.770962ms) to execute
2021-07-06 14:45:37.593750 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (152.175955ms) to execute
2021-07-06 14:45:39.638073 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:45:41.437700 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.241740184s) to execute
2021-07-06 14:45:43.339626 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.800505043s) to execute
2021-07-06 14:45:43.339841 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.899556132s) to execute
2021-07-06 14:45:43.493648 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (151.29893ms) to execute
2021-07-06 14:45:43.538310 I | auth: deleting token JPriQaKvZvmQmrWz.833 for user conductor
2021-07-06 14:45:43.538344 I | auth: deleting token NLtXSGisnFWAGgjB.835 for user conductor
2021-07-06 14:45:43.538357 I | auth: deleting token tTNyfWADquhwMHBt.838 for user conductor
2021-07-06 14:45:43.538370 I | auth: deleting token vuNnBimaFaiBjAPP.837 for user conductor
2021-07-06 14:45:43.538417 I | auth: deleting token pjsprBuaScneLkuQ.832 for user conductor
2021-07-06 14:45:43.538428 I | auth: deleting token iBQJgdOrCxxBlIJr.834 for user conductor
2021-07-06 14:45:43.538444 I | auth: deleting token xOfNzYchdmzzNAmr.836 for user conductor
2021-07-06 14:45:44.638437 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:45:45.339131 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.546812544s) to execute
2021-07-06 14:45:48.538407 I | auth: deleting token hdPhRknykFPzdRxo.843 for user conductor
2021-07-06 14:45:48.538465 I | auth: deleting token PQvWlQSVQFtyuEDF.839 for user conductor
2021-07-06 14:45:48.538486 I | auth: deleting token yQapYdyYmbnaBPsg.841 for user conductor
2021-07-06 14:45:49.341341 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (945.811786ms) to execute
2021-07-06 14:45:49.538287 I | auth: deleting token qFZpQpvwgXzPbbaj.842 for user conductor
2021-07-06 14:45:49.638771 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:45:50.538442 I | auth: deleting token hPDVMaScZajfZzaM.845 for user conductor
2021-07-06 14:45:50.538496 I | auth: deleting token cacodDMHtNOMFAsk.844 for user conductor
2021-07-06 14:45:50.538513 I | auth: deleting token kyFXsBeHBLxBcBKI.840 for user conductor
2021-07-06 14:45:51.639882 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.702898821s) to execute
2021-07-06 14:45:52.538372 I | auth: deleting token pLbHiZirGOBPeGnN.848 for user conductor
2021-07-06 14:45:52.538561 I | auth: deleting token cjzOdvgHfviEHyVZ.847 for user conductor
2021-07-06 14:45:52.538601 I | auth: deleting token lQeVhQvmYGPAMoyv.846 for user conductor
2021-07-06 14:45:53.538478 I | auth: deleting token hJaxMEVNEVDTbQMZ.849 for user conductor
2021-07-06 14:45:53.639415 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.901074896s) to execute
2021-07-06 14:45:54.639055 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:45:56.538291 I | auth: deleting token iJLJiyRRlyYDnRWM.850 for user conductor
2021-07-06 14:45:57.539797 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.897389976s) to execute
2021-07-06 14:45:57.540071 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.897827528s) to execute
2021-07-06 14:45:57.743561 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (201.081671ms) to execute
2021-07-06 14:45:58.538335 I | auth: deleting token hCokRgQqbHNZimJp.853 for user conductor
2021-07-06 14:45:58.538379 I | auth: deleting token EmTCMpDmZUUxUwHq.852 for user conductor
2021-07-06 14:45:59.639344 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:45:59.642520 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.902549738s) to execute
2021-07-06 14:45:59.642744 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.005944286s) to execute
2021-07-06 14:46:01.537482 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.744827284s) to execute
2021-07-06 14:46:02.538345 I | auth: deleting token YtzFTcKCpayuMwyZ.851 for user conductor
2021-07-06 14:46:03.337456 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.644755265s) to execute
2021-07-06 14:46:03.337662 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.796811755s) to execute
2021-07-06 14:46:03.492757 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (152.811348ms) to execute
2021-07-06 14:46:03.538281 I | auth: deleting token LykxghISKQmwXlTN.855 for user conductor
2021-07-06 14:46:03.538324 I | auth: deleting token XWpYWjgNEfQyLPuw.854 for user conductor
2021-07-06 14:46:04.639608 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:05.538359 I | auth: deleting token kQQyWlnUOiPrNngl.856 for user conductor
2021-07-06 14:46:05.538420 I | auth: deleting token iSytAvmHdhYiEhTp.858 for user conductor
2021-07-06 14:46:05.538461 I | auth: deleting token CwIBnPGVHYAtCTbp.857 for user conductor
2021-07-06 14:46:06.538271 I | auth: deleting token tElCmXjoEpgmnKnZ.859 for user conductor
2021-07-06 14:46:06.840475 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.403563286s) to execute
2021-07-06 14:46:07.538348 I | auth: deleting token KrLxjGFhgRibnbWa.860 for user conductor
2021-07-06 14:46:08.538251 I | auth: deleting token QaGDyQgSRbKncMXc.861 for user conductor
2021-07-06 14:46:08.538309 I | auth: deleting token YhTPcAWMQdRbPZUa.862 for user conductor
2021-07-06 14:46:09.538395 I | auth: deleting token BMFrTCWasVoVkGli.863 for user conductor
2021-07-06 14:46:09.639930 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:11.538344 I | auth: deleting token bHVuRdypzgqdLtBL.864 for user conductor
2021-07-06 14:46:12.538426 I | auth: deleting token dIWBaPFQhResnMCu.865 for user conductor
2021-07-06 14:46:12.538479 I | auth: deleting token mieZLhfKzbJCZplt.866 for user conductor
2021-07-06 14:46:14.640221 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:16.538406 I | auth: deleting token QsszqefWsyFBaPTK.867 for user conductor
2021-07-06 14:46:16.538467 I | auth: deleting token YKvkKABhQicaQLfu.868 for user conductor
2021-07-06 14:46:16.538517 I | auth: deleting token SuEvJmHNbgDyvDTt.869 for user conductor
2021-07-06 14:46:19.640460 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:21.538336 I | auth: deleting token mHPKANupVUnnlbaX.872 for user conductor
2021-07-06 14:46:21.538397 I | auth: deleting token XDYiJkTgzSFDgniu.871 for user conductor
2021-07-06 14:46:21.538422 I | auth: deleting token nSwNmQTbCrsWoPEc.874 for user conductor
2021-07-06 14:46:21.538432 I | auth: deleting token JBNHITvcGGkNHuXv.870 for user conductor
2021-07-06 14:46:21.538442 I | auth: deleting token YVSpTSLDsNHlxCiT.873 for user conductor
2021-07-06 14:46:23.538250 I | auth: deleting token grLTuhtCLICuitqA.875 for user conductor
2021-07-06 14:46:24.640717 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:25.538270 I | auth: deleting token tqejonGGLCTRWqeM.877 for user conductor
2021-07-06 14:46:25.538314 I | auth: deleting token oTcydSBTHksuDCAQ.876 for user conductor
2021-07-06 14:46:25.538336 I | auth: deleting token TexKaXYNTVEbCxja.878 for user conductor
2021-07-06 14:46:28.542715 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.350087854s) to execute
2021-07-06 14:46:29.538400 I | auth: deleting token YtDOVxxILfidnwjm.882 for user conductor
2021-07-06 14:46:29.538522 I | auth: deleting token EvzBfgddGZmKifZV.880 for user conductor
2021-07-06 14:46:29.538551 I | auth: deleting token tgGaNvQQVYUdVuUM.881 for user conductor
2021-07-06 14:46:29.538566 I | auth: deleting token MZvUVvZsYkpchgtc.879 for user conductor
2021-07-06 14:46:29.640972 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:30.344101 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.701434392s) to execute
2021-07-06 14:46:30.344364 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.787349956s) to execute
2021-07-06 14:46:30.492852 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.93577157s) to execute
2021-07-06 14:46:30.538212 I | auth: deleting token eHqzsliGQiAtuvGd.883 for user conductor
2021-07-06 14:46:30.538251 I | auth: deleting token ysnwxdnHcetywoZw.885 for user conductor
2021-07-06 14:46:30.538265 I | auth: deleting token cKLUXcslRgNElHNJ.884 for user conductor
2021-07-06 14:46:32.242293 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.249397891s) to execute
2021-07-06 14:46:32.538299 I | auth: deleting token wOyJPAJerVKkYOKY.886 for user conductor
2021-07-06 14:46:32.538386 I | auth: deleting token ZIiZwhVVezWssvHe.887 for user conductor
2021-07-06 14:46:33.538497 I | auth: deleting token gDrsOGPeeaxLKsKi.888 for user conductor
2021-07-06 14:46:34.139800 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.746743265s) to execute
2021-07-06 14:46:34.292959 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.819185ms) to execute
2021-07-06 14:46:34.641249 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:36.538216 I | auth: deleting token NQYavMStxlxyXkNh.889 for user conductor
2021-07-06 14:46:36.538253 I | auth: deleting token AcHKUcjvUWOywCOG.890 for user conductor
2021-07-06 14:46:36.538269 I | auth: deleting token MsxBaBEKxjcvlElK.891 for user conductor
2021-07-06 14:46:37.538227 I | auth: deleting token DPyZCLOqhOJnYPYo.892 for user conductor
2021-07-06 14:46:37.848418 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.155816497s) to execute
2021-07-06 14:46:38.038632 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (187.371863ms) to execute
2021-07-06 14:46:38.538341 I | auth: deleting token stdNfVCVBaobPhog.893 for user conductor
2021-07-06 14:46:39.538270 I | auth: deleting token ReirPGjfeVNaWrsJ.895 for user conductor
2021-07-06 14:46:39.538365 I | auth: deleting token rDluYCAzkOIrytsj.894 for user conductor
2021-07-06 14:46:39.641468 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:40.237715 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.598001586s) to execute
2021-07-06 14:46:41.538421 I | auth: deleting token uIthoEZFNHRFKnCp.896 for user conductor
2021-07-06 14:46:41.538594 I | auth: deleting token HNBocQoiTXzBaPtu.898 for user conductor
2021-07-06 14:46:41.538715 I | auth: deleting token hktuKObBkBlBiWVT.897 for user conductor
2021-07-06 14:46:42.443424 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (643.275962ms) to execute
2021-07-06 14:46:44.242088 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.649764282s) to execute
2021-07-06 14:46:44.392419 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (147.624253ms) to execute
2021-07-06 14:46:44.641655 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:48.342288 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.445163671s) to execute
2021-07-06 14:46:49.538346 I | auth: deleting token zrNdVrRXUcFkHoYv.905 for user conductor
2021-07-06 14:46:49.538377 I | auth: deleting token fXBdVxWFwCuqJOuB.901 for user conductor
2021-07-06 14:46:49.538387 I | auth: deleting token cGkDbTPmWBktuybW.900 for user conductor
2021-07-06 14:46:49.538393 I | auth: deleting token vsLtULpadiJeERcO.899 for user conductor
2021-07-06 14:46:49.538400 I | auth: deleting token EoKIMajDxvxKMcPG.904 for user conductor
2021-07-06 14:46:49.538406 I | auth: deleting token eggJnNSSfHefldGA.902 for user conductor
2021-07-06 14:46:49.538413 I | auth: deleting token NHNvtBYLQqERvdxM.903 for user conductor
2021-07-06 14:46:49.641799 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:50.344043 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (548.920498ms) to execute
2021-07-06 14:46:52.243671 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (851.516215ms) to execute
2021-07-06 14:46:54.538395 I | auth: deleting token vUmCHHCocnwxQAXS.910 for user conductor
2021-07-06 14:46:54.538444 I | auth: deleting token UKqKEJpeJCCddOpW.907 for user conductor
2021-07-06 14:46:54.538459 I | auth: deleting token oOSlLZVOxBiPvEvo.906 for user conductor
2021-07-06 14:46:54.538471 I | auth: deleting token QppzXmHaVQLrOTqF.909 for user conductor
2021-07-06 14:46:54.538501 I | auth: deleting token SxUiaJqVDzExdBPG.911 for user conductor
2021-07-06 14:46:54.642078 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:46:55.540999 I | auth: deleting token AYcmCkyyhrnOFKEX.908 for user conductor
2021-07-06 14:46:55.541136 I | auth: deleting token xslHUIgVbUhgYSjx.913 for user conductor
2021-07-06 14:46:55.541201 I | auth: deleting token vAhbUxbTcdZJCgWY.912 for user conductor
2021-07-06 14:46:57.538344 I | auth: deleting token bhhXWUnhnrFDWttP.914 for user conductor
2021-07-06 14:46:57.538394 I | auth: deleting token oODhzYpMNKQkHYEn.915 for user conductor
2021-07-06 14:46:59.538405 I | auth: deleting token UMcerrUGQqBddXuM.917 for user conductor
2021-07-06 14:46:59.538485 I | auth: deleting token gxRZDAsYZXyvAHBP.916 for user conductor
2021-07-06 14:46:59.538501 I | auth: deleting token eiLdiXOIItvwAXAe.918 for user conductor
2021-07-06 14:46:59.642386 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:02.143989 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.006970614s) to execute
2021-07-06 14:47:02.293957 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.533499ms) to execute
2021-07-06 14:47:02.392682 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (153.73553ms) to execute
2021-07-06 14:47:02.392848 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.778675ms) to execute
2021-07-06 14:47:02.538335 I | auth: deleting token lASgqsaDFCxRdqYR.919 for user conductor
2021-07-06 14:47:04.642718 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:08.538388 I | auth: deleting token nztRjtbJFoMJihNU.925 for user conductor
2021-07-06 14:47:08.538458 I | auth: deleting token KomFPhAbvUMIHEHv.920 for user conductor
2021-07-06 14:47:08.538471 I | auth: deleting token MAisxFUSkkTxZEAx.921 for user conductor
2021-07-06 14:47:08.538489 I | auth: deleting token mOMjiGPLEtsuvEWx.924 for user conductor
2021-07-06 14:47:08.538501 I | auth: deleting token vgfekGDRFpsgTtPL.923 for user conductor
2021-07-06 14:47:08.538510 I | auth: deleting token uTNdLwAYUVqzuZdn.922 for user conductor
2021-07-06 14:47:08.538519 I | auth: deleting token rLgecVBHdqhDXbiC.926 for user conductor
2021-07-06 14:47:09.659753 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:10.538367 I | auth: deleting token AehvuyNeQeQCPkqm.927 for user conductor
2021-07-06 14:47:14.538462 I | auth: deleting token ZggCFpmAmbHmdgnJ.928 for user conductor
2021-07-06 14:47:14.538554 I | auth: deleting token cSEbDpryjyOuahvE.930 for user conductor
2021-07-06 14:47:14.538568 I | auth: deleting token HlOnFUZkTJJFAvjg.932 for user conductor
2021-07-06 14:47:14.538578 I | auth: deleting token yNiCptGxpWpwppyN.929 for user conductor
2021-07-06 14:47:14.660050 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:15.538351 I | auth: deleting token VFLVaGaGkAnLnLGJ.931 for user conductor
2021-07-06 14:47:15.538406 I | auth: deleting token oelbkpLTfFqQyTLo.934 for user conductor
2021-07-06 14:47:16.537494 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.545087224s) to execute
2021-07-06 14:47:16.538194 I | auth: deleting token dFeysVUhnmoeUENs.933 for user conductor
2021-07-06 14:47:16.538258 I | auth: deleting token dISsWMQAYYvEGkew.935 for user conductor
2021-07-06 14:47:18.438857 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.89029864s) to execute
2021-07-06 14:47:18.439141 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.899309018s) to execute
2021-07-06 14:47:18.441321 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.900528437s) to execute
2021-07-06 14:47:18.441451 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.900661741s) to execute
2021-07-06 14:47:18.592604 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (148.401755ms) to execute
2021-07-06 14:47:19.538359 I | auth: deleting token hzhuUaxLERTZiVSN.938 for user conductor
2021-07-06 14:47:19.538431 I | auth: deleting token IeuWsanJhXFdzNuy.936 for user conductor
2021-07-06 14:47:19.660348 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:21.340607 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.144002939s) to execute
2021-07-06 14:47:23.439509 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (247.120414ms) to execute
2021-07-06 14:47:23.538301 I | auth: deleting token lOqRGqGahlVOficC.939 for user conductor
2021-07-06 14:47:23.538351 I | auth: deleting token dYQSvaAPHnlbcECb.940 for user conductor
2021-07-06 14:47:23.538375 I | auth: deleting token BfNOQWsqxQTGyfOV.942 for user conductor
2021-07-06 14:47:23.538395 I | auth: deleting token MZVIZkltkUTwiiIZ.943 for user conductor
2021-07-06 14:47:23.538403 I | auth: deleting token nwulixPRVNKtuNqK.937 for user conductor
2021-07-06 14:47:23.538415 I | auth: deleting token mNUjbLcKgKMDoSsF.941 for user conductor
2021-07-06 14:47:24.660739 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:28.943999 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.551505564s) to execute
2021-07-06 14:47:29.661051 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:30.538318 I | auth: deleting token bnsyZqgGDaSleYKX.944 for user conductor
2021-07-06 14:47:30.538380 I | auth: deleting token XJAOcTCavFWsCiNA.946 for user conductor
2021-07-06 14:47:31.037057 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.090362358s) to execute
2021-07-06 14:47:32.538333 I | auth: deleting token URLDUXTBklufWaLE.945 for user conductor
2021-07-06 14:47:32.538392 I | auth: deleting token SPerhuRWpmVRzviW.947 for user conductor
2021-07-06 14:47:32.538404 I | auth: deleting token BeOOxkycAhWmBcVJ.948 for user conductor
2021-07-06 14:47:32.538419 I | auth: deleting token FmPywEYgjZhVJezb.949 for user conductor
2021-07-06 14:47:32.538431 I | auth: deleting token XARArFfnlkHTxRiY.950 for user conductor
2021-07-06 14:47:32.938116 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.900938489s) to execute
2021-07-06 14:47:32.938244 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.991169829s) to execute
2021-07-06 14:47:32.938416 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.899099111s) to execute
2021-07-06 14:47:34.538238 I | auth: deleting token ESCMvITbKqcDllCm.951 for user conductor
2021-07-06 14:47:34.538322 I | auth: deleting token ChhBfbXEaHWsIUzO.952 for user conductor
2021-07-06 14:47:34.736927 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:34.836964 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (142.372147ms) to execute
2021-07-06 14:47:35.538433 I | auth: deleting token VNGbADlilDZBzIqI.954 for user conductor
2021-07-06 14:47:35.538505 I | auth: deleting token DKMFThSMvtntTIbN.953 for user conductor
2021-07-06 14:47:37.538483 I | auth: deleting token BNukHCVRehiZObEk.956 for user conductor
2021-07-06 14:47:37.538604 I | auth: deleting token yKczFLLKDtGreBOF.955 for user conductor
2021-07-06 14:47:38.538429 I | auth: deleting token YizOEwLsqnNhVxeJ.957 for user conductor
2021-07-06 14:47:39.737177 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:41.538393 I | auth: deleting token eRAuQNsWbMxKnbEQ.958 for user conductor
2021-07-06 14:47:43.538272 I | auth: deleting token ZloBrGLUaodDWrGc.959 for user conductor
2021-07-06 14:47:43.538311 I | auth: deleting token xUmqcidNHzKdMhpC.962 for user conductor
2021-07-06 14:47:43.538329 I | auth: deleting token RYOJxALHPMRbtBWG.960 for user conductor
2021-07-06 14:47:44.537190 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.100099978s) to execute
2021-07-06 14:47:44.692623 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (152.803736ms) to execute
2021-07-06 14:47:44.737469 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:45.538300 I | auth: deleting token vsYkUcsTWSzkcfYT.963 for user conductor
2021-07-06 14:47:45.538404 I | auth: deleting token EcgJpxDAhwHPFyAb.961 for user conductor
2021-07-06 14:47:45.538428 I | auth: deleting token fGXAJHmwFNnWPwab.964 for user conductor
2021-07-06 14:47:46.741634 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.348949245s) to execute
2021-07-06 14:47:48.537434 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.600395528s) to execute
2021-07-06 14:47:49.538309 I | auth: deleting token UcIlusYNjnKJfpIG.968 for user conductor
2021-07-06 14:47:49.538379 I | auth: deleting token qJwXVzxIUCUyoytd.967 for user conductor
2021-07-06 14:47:49.538405 I | auth: deleting token msAfTpfngLpgCrjV.965 for user conductor
2021-07-06 14:47:49.538419 I | auth: deleting token FRuYpopyzTBpOXSb.966 for user conductor
2021-07-06 14:47:49.737800 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:50.543991 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (707.036929ms) to execute
2021-07-06 14:47:51.538334 I | auth: deleting token GMXPrUukNyQbNqzq.970 for user conductor
2021-07-06 14:47:51.538381 I | auth: deleting token wkvJJxEpasvrvDzY.971 for user conductor
2021-07-06 14:47:51.538394 I | auth: deleting token uzNaDcKTDyohxOcP.969 for user conductor
2021-07-06 14:47:52.538252 I | auth: deleting token GODHrIJSSNyqUuPA.972 for user conductor
2021-07-06 14:47:52.538298 I | auth: deleting token uouNCCNrCmxrZPAP.973 for user conductor
2021-07-06 14:47:54.538266 I | auth: deleting token ShQhrtvhEKKqzNyr.974 for user conductor
2021-07-06 14:47:54.538325 I | auth: deleting token gMroIXorVkCLKnBw.975 for user conductor
2021-07-06 14:47:54.538346 I | auth: deleting token BAlgTxrxMGGvARHx.976 for user conductor
2021-07-06 14:47:54.738055 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:47:55.037577 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.599611349s) to execute
2021-07-06 14:47:56.538334 I | auth: deleting token vDVJuzALaLFooJpA.977 for user conductor
2021-07-06 14:47:57.538348 I | auth: deleting token gczbLIhfzytberUo.978 for user conductor
2021-07-06 14:47:59.344255 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.202388121s) to execute
2021-07-06 14:47:59.538393 I | auth: deleting token ZUEzlprDyOcIruNx.979 for user conductor
2021-07-06 14:47:59.738309 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:00.538359 I | auth: deleting token DHkfBEAbZTITiHUU.980 for user conductor
2021-07-06 14:48:01.337425 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.644794942s) to execute
2021-07-06 14:48:01.538356 I | auth: deleting token pyLZFjygutMNOmDW.981 for user conductor
2021-07-06 14:48:03.042158 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.7012407s) to execute
2021-07-06 14:48:03.538364 I | auth: deleting token XpgkEtLiIFfpIfCH.982 for user conductor
2021-07-06 14:48:04.738529 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:04.842526 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.50251337s) to execute
2021-07-06 14:48:04.842967 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.502954674s) to execute
2021-07-06 14:48:04.843193 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.70387944s) to execute
2021-07-06 14:48:04.843487 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.799298708s) to execute
2021-07-06 14:48:05.538307 I | auth: deleting token TixsemdmaTyiIvep.984 for user conductor
2021-07-06 14:48:05.538353 I | auth: deleting token DsjSmTZYRuOuQIOO.983 for user conductor
2021-07-06 14:48:07.538406 I | auth: deleting token RPsLNMjvMcDPRhZC.986 for user conductor
2021-07-06 14:48:07.538458 I | auth: deleting token PKmooNKxdwNDdvTe.987 for user conductor
2021-07-06 14:48:07.538480 I | auth: deleting token DXhbNWitpsAKhODI.985 for user conductor
2021-07-06 14:48:08.837737 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.945223225s) to execute
2021-07-06 14:48:09.738818 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:10.538355 I | auth: deleting token LCnKNbeMXwHLxFiE.989 for user conductor
2021-07-06 14:48:10.538410 I | auth: deleting token qQcfmzeLItKcKZkv.988 for user conductor
2021-07-06 14:48:12.538351 I | auth: deleting token SFJPndgYJbuDDEFX.992 for user conductor
2021-07-06 14:48:12.538405 I | auth: deleting token DpoaTPvRjQaxTelE.991 for user conductor
2021-07-06 14:48:12.538427 I | auth: deleting token gTXhqNXmdnHnmEqh.990 for user conductor
2021-07-06 14:48:12.737812 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.1433417s) to execute
2021-07-06 14:48:14.739097 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:16.538321 I | auth: deleting token eJJBWzfDqXLdtqqF.994 for user conductor
2021-07-06 14:48:16.538366 I | auth: deleting token YSOVcIpCpVPYnGjH.996 for user conductor
2021-07-06 14:48:16.538377 I | auth: deleting token RpYVwPXqvZWkVTpB.997 for user conductor
2021-07-06 14:48:16.538384 I | auth: deleting token xzfxRzVPtJfdUeFT.993 for user conductor
2021-07-06 14:48:16.538396 I | auth: deleting token VTLtuKmKEOvtxuKZ.995 for user conductor
2021-07-06 14:48:18.242987 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.450840316s) to execute
2021-07-06 14:48:19.538385 I | auth: deleting token AhOosFCssezdzrZZ.999 for user conductor
2021-07-06 14:48:19.538450 I | auth: deleting token QFcnkkyQKopXYEyf.998 for user conductor
2021-07-06 14:48:19.538466 I | auth: deleting token CZQpaiPjClTrIEPa.1000 for user conductor
2021-07-06 14:48:19.739432 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:20.041214 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.794661807s) to execute
2021-07-06 14:48:20.041335 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.794919466s) to execute
2021-07-06 14:48:20.041478 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.795064948s) to execute
2021-07-06 14:48:20.137073 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.800395424s) to execute
2021-07-06 14:48:20.538443 I | auth: deleting token ClfzCslHqCdwszIJ.1001 for user conductor
2021-07-06 14:48:22.538416 I | auth: deleting token PwChQBausggKmfRc.1002 for user conductor
2021-07-06 14:48:23.538441 I | auth: deleting token RbHxKcwOKPFYaobn.1003 for user conductor
2021-07-06 14:48:24.739768 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:25.538350 I | auth: deleting token itZcDicIzjzmxHWA.1004 for user conductor
2021-07-06 14:48:26.538392 I | auth: deleting token QrDWAaNRbEJZdWwz.1005 for user conductor
2021-07-06 14:48:28.538318 I | auth: deleting token vQePWaFAotfMjxhk.1007 for user conductor
2021-07-06 14:48:29.739990 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:30.538402 I | auth: deleting token oFFbqDDTzRPQxiBM.1009 for user conductor
2021-07-06 14:48:30.538467 I | auth: deleting token LMeqpOBZaSsfmzML.1008 for user conductor
2021-07-06 14:48:30.538482 I | auth: deleting token QOscJBwJKgAUQPfu.1010 for user conductor
2021-07-06 14:48:30.538505 I | auth: deleting token XGICihbfXxcfDLIn.1006 for user conductor
2021-07-06 14:48:33.337042 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.744454419s) to execute
2021-07-06 14:48:34.740266 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:36.140838 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (303.78074ms) to execute
2021-07-06 14:48:37.538276 I | auth: deleting token DknZUnGwRuBeCZLD.1014 for user conductor
2021-07-06 14:48:37.538315 I | auth: deleting token oMhieCJLGdGCfMCF.1013 for user conductor
2021-07-06 14:48:37.538321 I | auth: deleting token sgPyaOlPCfmmwaTW.1012 for user conductor
2021-07-06 14:48:37.538329 I | auth: deleting token ypnjSjhopCYRvlWx.1011 for user conductor
2021-07-06 14:48:38.640266 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.2475294s) to execute
2021-07-06 14:48:38.992835 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (197.229951ms) to execute
2021-07-06 14:48:39.538343 I | auth: deleting token BsgJwhPRgSqLfIwO.1015 for user conductor
2021-07-06 14:48:39.538400 I | auth: deleting token paAolTHLDlPfvolN.1016 for user conductor
2021-07-06 14:48:39.740474 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:43.342244 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.846753833s) to execute
2021-07-06 14:48:44.740685 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:45.538288 I | auth: deleting token dVvtRKwyVWTGTjsk.1017 for user conductor
2021-07-06 14:48:46.538374 I | auth: deleting token XXOtleQlnxVGBeqG.1020 for user conductor
2021-07-06 14:48:46.538453 I | auth: deleting token iyCGDCuKQnUmgcZs.1022 for user conductor
2021-07-06 14:48:46.538473 I | auth: deleting token sljGBKojxeiLVvsw.1019 for user conductor
2021-07-06 14:48:46.538484 I | auth: deleting token DTOClgQQjfWKTHoj.1018 for user conductor
2021-07-06 14:48:47.443805 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.506914166s) to execute
2021-07-06 14:48:47.538240 I | auth: deleting token nRWgDfVSbKhgROSt.1021 for user conductor
2021-07-06 14:48:47.538290 I | auth: deleting token vIlcDCmheNBmbsgf.1023 for user conductor
2021-07-06 14:48:47.538323 I | auth: deleting token YOeXISGkojNOXOUc.1024 for user conductor
2021-07-06 14:48:49.540390 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.003386796s) to execute
2021-07-06 14:48:49.740993 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:50.538238 I | auth: deleting token AjAInTTrHiOjNaik.1027 for user conductor
2021-07-06 14:48:50.538282 I | auth: deleting token BkzGpywLPHtjdlvq.1025 for user conductor
2021-07-06 14:48:50.538290 I | auth: deleting token haUPldbUzNxUhpWN.1026 for user conductor
2021-07-06 14:48:52.538336 I | auth: deleting token RqkaKPSXjpsIjRjC.1028 for user conductor
2021-07-06 14:48:53.338842 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (5.892266475s) to execute
2021-07-06 14:48:53.339631 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.795508987s) to execute
2021-07-06 14:48:53.340190 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.795975419s) to execute
2021-07-06 14:48:54.538340 I | auth: deleting token CsjqNMseyBfuZPnY.1029 for user conductor
2021-07-06 14:48:54.538392 I | auth: deleting token cCFJpfgOktUfEdEw.1030 for user conductor
2021-07-06 14:48:54.538405 I | auth: deleting token yfVUklCwItlRJPsV.1031 for user conductor
2021-07-06 14:48:54.741238 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:48:56.538212 I | auth: deleting token VGdhQRwpDKgOVldU.1033 for user conductor
2021-07-06 14:48:56.538258 I | auth: deleting token kqHuDNJnfpRyWuIY.1034 for user conductor
2021-07-06 14:48:56.538295 I | auth: deleting token baTrbbEfvpkSFgaV.1032 for user conductor
2021-07-06 14:48:59.538283 I | auth: deleting token ogeBJHFchSlxVGVa.1038 for user conductor
2021-07-06 14:48:59.538353 I | auth: deleting token EytynsWUhwnMJtSk.1035 for user conductor
2021-07-06 14:48:59.538387 I | auth: deleting token VTvYTbuCvKDozcKG.1036 for user conductor
2021-07-06 14:48:59.538482 I | auth: deleting token TrdceRahWbUlJwDc.1037 for user conductor
2021-07-06 14:48:59.807162 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:00.943274 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.951072731s) to execute
2021-07-06 14:49:01.193095 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (155.944356ms) to execute
2021-07-06 14:49:01.538270 I | auth: deleting token rQKUbWpEnxOfueju.1039 for user conductor
2021-07-06 14:49:03.141194 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (949.36104ms) to execute
2021-07-06 14:49:04.538977 I | auth: deleting token ZnNuahxtdguKnGZL.1040 for user conductor
2021-07-06 14:49:04.807534 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:06.342393 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.143960576s) to execute
2021-07-06 14:49:08.538483 I | auth: deleting token njqmNSswgyqEgqTx.1041 for user conductor
2021-07-06 14:49:08.943344 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (406.33051ms) to execute
2021-07-06 14:49:09.538313 I | auth: deleting token NPCgjQhgFtksPTLh.1045 for user conductor
2021-07-06 14:49:09.538398 I | auth: deleting token PpRlnijRhhgbLgyH.1043 for user conductor
2021-07-06 14:49:09.807839 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:10.538325 I | auth: deleting token pvkQfLBgDVjKfyIC.1044 for user conductor
2021-07-06 14:49:10.538386 I | auth: deleting token rXrjbhoWLpDNdVur.1046 for user conductor
2021-07-06 14:49:10.538407 I | auth: deleting token pVhHVRcbxBklVSFv.1042 for user conductor
2021-07-06 14:49:11.137495 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (940.94645ms) to execute
2021-07-06 14:49:11.538323 I | auth: deleting token IuJdetAGiPWUHyBh.1047 for user conductor
2021-07-06 14:49:11.538402 I | auth: deleting token NcUrNOqGhVyRitgC.1048 for user conductor
2021-07-06 14:49:13.040354 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.248073768s) to execute
2021-07-06 14:49:13.292600 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.526691ms) to execute
2021-07-06 14:49:13.538309 I | auth: deleting token lhZBBEjHAtaFtEIA.1049 for user conductor
2021-07-06 14:49:13.538341 I | auth: deleting token lAbCmuUkXVfdwTob.1050 for user conductor
2021-07-06 14:49:14.808254 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:15.538345 I | auth: deleting token TllswjWAWGusShBY.1051 for user conductor
2021-07-06 14:49:18.740901 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.245205578s) to execute
2021-07-06 14:49:19.808629 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:20.547203 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.806160492s) to execute
2021-07-06 14:49:20.547673 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.803468523s) to execute
2021-07-06 14:49:22.538427 I | auth: deleting token YSEIglqmauZODVaO.1053 for user conductor
2021-07-06 14:49:22.538479 I | auth: deleting token SRqycSdGnjcAjFxT.1052 for user conductor
2021-07-06 14:49:22.538493 I | auth: deleting token LzETLGVVFFyxrXyt.1054 for user conductor
2021-07-06 14:49:22.538505 I | auth: deleting token egolWiPjRUiVcPus.1056 for user conductor
2021-07-06 14:49:22.538516 I | auth: deleting token SzsetCbHdkGIQKIK.1055 for user conductor
2021-07-06 14:49:23.839861 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.10283681s) to execute
2021-07-06 14:49:24.808907 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:26.192248 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (197.705511ms) to execute
2021-07-06 14:49:28.937399 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.300380735s) to execute
2021-07-06 14:49:29.837009 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:30.636794 I | auth: deleting token FaFISEmzqKOwlkJO.1058 for user conductor
2021-07-06 14:49:30.636877 I | auth: deleting token EOxzdatmhSVpTbZf.1061 for user conductor
2021-07-06 14:49:30.636957 I | auth: deleting token KvqAqewGdULFbIDI.1057 for user conductor
2021-07-06 14:49:30.637514 I | auth: deleting token DeIGuZiybKjPzuBw.1059 for user conductor
2021-07-06 14:49:30.637568 I | auth: deleting token EnBfysvpPVQenrwS.1060 for user conductor
2021-07-06 14:49:31.242026 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (504.976881ms) to execute
2021-07-06 14:49:32.839889 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.54589533s) to execute
2021-07-06 14:49:34.538414 I | auth: deleting token iNIaTSzYdYXFKHZq.1064 for user conductor
2021-07-06 14:49:34.538510 I | auth: deleting token QFJEbBJVlOyzLUYP.1062 for user conductor
2021-07-06 14:49:34.642398 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.729243067s) to execute
2021-07-06 14:49:34.642508 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.7034239s) to execute
2021-07-06 14:49:34.642592 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (850.315799ms) to execute
2021-07-06 14:49:34.837291 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:35.538354 I | auth: deleting token LPDDqxwuDUpgBNNF.1066 for user conductor
2021-07-06 14:49:35.538436 I | auth: deleting token wTruXzSAtaKXYhya.1063 for user conductor
2021-07-06 14:49:35.538469 I | auth: deleting token JGfIBnSQPnSHZKQO.1065 for user conductor
2021-07-06 14:49:35.538497 I | auth: deleting token AADMmmhBjUITWILv.1067 for user conductor
2021-07-06 14:49:37.036960 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (499.884208ms) to execute
2021-07-06 14:49:39.138916 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.244170841s) to execute
2021-07-06 14:49:39.392685 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (196.05519ms) to execute
2021-07-06 14:49:39.538361 I | auth: deleting token qLpbSSFptcuZqNoX.1068 for user conductor
2021-07-06 14:49:39.837587 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:41.538400 I | auth: deleting token RQXHgKMmniFSOxiR.1071 for user conductor
2021-07-06 14:49:41.538468 I | auth: deleting token bmOpipRlecplCvyC.1069 for user conductor
2021-07-06 14:49:41.538493 I | auth: deleting token KRtxwQBBrFkLCYFy.1070 for user conductor
2021-07-06 14:49:42.538374 I | auth: deleting token mvubisRJMXtawljF.1073 for user conductor
2021-07-06 14:49:43.592346 I | auth: deleting token sBPitdudxDXiPKzC.1072 for user conductor
2021-07-06 14:49:43.636803 I | auth: deleting token sHwlZDWlYyomevix.1074 for user conductor
2021-07-06 14:49:44.537758 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (100.849405ms) to execute
2021-07-06 14:49:44.837877 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:46.339578 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (346.511109ms) to execute
2021-07-06 14:49:46.538287 I | auth: deleting token QkPRQohCBrmcioHO.1075 for user conductor
2021-07-06 14:49:46.538393 I | auth: deleting token uwkTluWRTXQGVVKf.1077 for user conductor
2021-07-06 14:49:46.538420 I | auth: deleting token UmtkGEMSAFXhfmHo.1078 for user conductor
2021-07-06 14:49:46.538445 I | auth: deleting token SKxCdBYHSthIEwsT.1079 for user conductor
2021-07-06 14:49:46.538462 I | auth: deleting token GOZXvFzrfMzlXOEW.1076 for user conductor
2021-07-06 14:49:48.538329 I | auth: deleting token yHGbeEqgpNVSCXnR.1080 for user conductor
2021-07-06 14:49:48.543188 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (849.211224ms) to execute
2021-07-06 14:49:49.538628 I | auth: deleting token DzrolltKzvTXELby.1082 for user conductor
2021-07-06 14:49:49.538659 I | auth: deleting token tluauxdSqjfmajdT.1081 for user conductor
2021-07-06 14:49:49.838077 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:50.737502 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200444313s) to execute
2021-07-06 14:49:51.538393 I | auth: deleting token otONGweZjLXblowU.1083 for user conductor
2021-07-06 14:49:51.538450 I | auth: deleting token jqwFdKlLXDKoGRoJ.1084 for user conductor
2021-07-06 14:49:51.538464 I | auth: deleting token xQYMddtNOFEBDLJh.1085 for user conductor
2021-07-06 14:49:52.638792 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.842656103s) to execute
2021-07-06 14:49:52.638895 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.546686583s) to execute
2021-07-06 14:49:53.538354 I | auth: deleting token HNOsFAJFbMJqMFek.1087 for user conductor
2021-07-06 14:49:53.538411 I | auth: deleting token jzwCDnslsdUATMzh.1086 for user conductor
2021-07-06 14:49:54.737794 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.000746966s) to execute
2021-07-06 14:49:54.838265 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:49:54.892163 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.129617ms) to execute
2021-07-06 14:49:55.538254 I | auth: deleting token naFBnyDeJOTYUuod.1088 for user conductor
2021-07-06 14:49:55.538318 I | auth: deleting token cNsYuTviodriIxZh.1090 for user conductor
2021-07-06 14:49:55.538330 I | auth: deleting token mANFOvQfITeDwZDU.1089 for user conductor
2021-07-06 14:49:56.942967 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.050804234s) to execute
2021-07-06 14:49:57.192956 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (155.999208ms) to execute
2021-07-06 14:49:59.339525 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (347.302318ms) to execute
2021-07-06 14:49:59.538319 I | auth: deleting token GbJqWuIFbqWFbkiL.1091 for user conductor
2021-07-06 14:49:59.538447 I | auth: deleting token QBJRkJNutZAMGKnW.1094 for user conductor
2021-07-06 14:49:59.538500 I | auth: deleting token qdTRMCXWeAHatgng.1092 for user conductor
2021-07-06 14:49:59.538566 I | auth: deleting token GTnTUJwZBaLSooxL.1093 for user conductor
2021-07-06 14:49:59.538630 I | auth: deleting token CkNvlUiRgKwuUdTh.1095 for user conductor
2021-07-06 14:49:59.838520 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:01.337058 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.74519524s) to execute
2021-07-06 14:50:04.538552 I | auth: deleting token GnxDAhHyRBdktkZs.1100 for user conductor
2021-07-06 14:50:04.538610 I | auth: deleting token XKYBlZoBGhFwvRws.1096 for user conductor
2021-07-06 14:50:04.538622 I | auth: deleting token MRMAoeZprDwWDCsP.1098 for user conductor
2021-07-06 14:50:04.838892 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:05.243925 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.851929848s) to execute
2021-07-06 14:50:05.538441 I | auth: deleting token VaJtwYwTPwcrHnVI.1101 for user conductor
2021-07-06 14:50:05.538586 I | auth: deleting token cYUqaoRDVvfjycev.1102 for user conductor
2021-07-06 14:50:05.538634 I | auth: deleting token zidLMrKcpEIJGVGg.1097 for user conductor
2021-07-06 14:50:05.538662 I | auth: deleting token wXfTgqrGGDjxDJqd.1099 for user conductor
2021-07-06 14:50:09.840178 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:10.538303 I | auth: deleting token UgERqNdzChoTnuWu.1103 for user conductor
2021-07-06 14:50:13.538218 I | auth: deleting token JJjcpQCIqiHyPuvU.1104 for user conductor
2021-07-06 14:50:13.538262 I | auth: deleting token AiJkuLQnLwxQXCLR.1105 for user conductor
2021-07-06 14:50:13.538275 I | auth: deleting token rddGMsTRPChOtMmQ.1107 for user conductor
2021-07-06 14:50:13.538307 I | auth: deleting token zsRpSoKXuOinbFcC.1106 for user conductor
2021-07-06 14:50:14.840589 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:16.440012 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.300479881s) to execute
2021-07-06 14:50:17.538371 I | auth: deleting token VJQASkHGugollOCl.1111 for user conductor
2021-07-06 14:50:17.538424 I | auth: deleting token UozvOZqdoAipOGmZ.1109 for user conductor
2021-07-06 14:50:17.538442 I | auth: deleting token ORtWeJYIuFOdLbIl.1110 for user conductor
2021-07-06 14:50:17.538456 I | auth: deleting token mTGeusTrVQAMAFrY.1108 for user conductor
2021-07-06 14:50:19.840853 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:21.538326 I | auth: deleting token umxvJiGwZsZKsOrn.1112 for user conductor
2021-07-06 14:50:21.538381 I | auth: deleting token AuVPZVtRAbESHjXa.1115 for user conductor
2021-07-06 14:50:21.538400 I | auth: deleting token PvRKXYbgWTVSEide.1113 for user conductor
2021-07-06 14:50:21.538408 I | auth: deleting token UipjGLsolQWpYVev.1114 for user conductor
2021-07-06 14:50:21.538415 I | auth: deleting token WYHwGpVIXxUhrTnM.1116 for user conductor
2021-07-06 14:50:21.939637 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.028657408s) to execute
2021-07-06 14:50:23.538322 I | auth: deleting token ONgdbPIcdSWUHgGH.1117 for user conductor
2021-07-06 14:50:24.841141 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:25.438715 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.546681998s) to execute
2021-07-06 14:50:26.538423 I | auth: deleting token egsITbciuFLCgpXr.1120 for user conductor
2021-07-06 14:50:26.538507 I | auth: deleting token WdssIDbJsVFQKpXs.1118 for user conductor
2021-07-06 14:50:26.538524 I | auth: deleting token XFOexGTLquDVisWm.1119 for user conductor
2021-07-06 14:50:29.841473 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:30.538313 I | auth: deleting token JETmgvJgUWMSkZIo.1122 for user conductor
2021-07-06 14:50:30.538401 I | auth: deleting token HYwfeHqqTEijOFZO.1121 for user conductor
2021-07-06 14:50:32.692097 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (150.955386ms) to execute
2021-07-06 14:50:34.538339 I | auth: deleting token jTBomWVQveoQSxKh.1123 for user conductor
2021-07-06 14:50:34.538422 I | auth: deleting token gpbXEgDTHnQAQRPf.1124 for user conductor
2021-07-06 14:50:34.538448 I | auth: deleting token xNgMavprxaXTBiHA.1126 for user conductor
2021-07-06 14:50:34.538467 I | auth: deleting token HtJHmPoXvBZZwnHA.1125 for user conductor
2021-07-06 14:50:34.841878 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:35.444202 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.252507781s) to execute
2021-07-06 14:50:36.538317 I | auth: deleting token SGENFdNwkludleyf.1127 for user conductor
2021-07-06 14:50:37.339648 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.702622856s) to execute
2021-07-06 14:50:37.538290 I | auth: deleting token IOhblycZoTAgiTKn.1128 for user conductor
2021-07-06 14:50:37.538366 I | auth: deleting token TNMkyqAfoQXMBpcz.1129 for user conductor
2021-07-06 14:50:38.538340 I | auth: deleting token VgLkcWhJLXyFnKce.1130 for user conductor
2021-07-06 14:50:39.237809 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.700727334s) to execute
2021-07-06 14:50:39.237921 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.895694241s) to execute
2021-07-06 14:50:39.842170 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:40.943888 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.604088856s) to execute
2021-07-06 14:50:41.538307 I | auth: deleting token YNaYmeOEWtGUQmBi.1131 for user conductor
2021-07-06 14:50:41.538434 I | auth: deleting token kPTGYoNtOnMiiDuB.1133 for user conductor
2021-07-06 14:50:41.538448 I | auth: deleting token oxOnqeXgLgsSRedH.1134 for user conductor
2021-07-06 14:50:42.538372 I | auth: deleting token hsTSFMsBNElYEJOA.1132 for user conductor
2021-07-06 14:50:43.037188 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.300047116s) to execute
2021-07-06 14:50:43.636809 I | auth: deleting token nHSRyQCRuRtudHkh.1137 for user conductor
2021-07-06 14:50:43.636856 I | auth: deleting token eETYYoxBPFSNaUYy.1136 for user conductor
2021-07-06 14:50:43.636871 I | auth: deleting token RlVMkCwoICaySYOg.1135 for user conductor
2021-07-06 14:50:44.842415 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:44.938071 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.844332524s) to execute
2021-07-06 14:50:44.938239 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.898485761s) to execute
2021-07-06 14:50:45.538346 I | auth: deleting token SnNeDXiFAsZutwuy.1138 for user conductor
2021-07-06 14:50:45.538391 I | auth: deleting token sEqXsYntwrKgpFfY.1140 for user conductor
2021-07-06 14:50:45.538400 I | auth: deleting token eeWRWoSYCfnypWlj.1139 for user conductor
2021-07-06 14:50:47.039561 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.098745857s) to execute
2021-07-06 14:50:47.039676 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.947601581s) to execute
2021-07-06 14:50:47.538411 I | auth: deleting token CVnufAvBiPCBBOYA.1141 for user conductor
2021-07-06 14:50:49.044522 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.002163558s) to execute
2021-07-06 14:50:49.044691 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.852043731s) to execute
2021-07-06 14:50:49.538334 I | auth: deleting token wdSKIxCYzZBEeifV.1143 for user conductor
2021-07-06 14:50:49.538377 I | auth: deleting token gyYTmZcgdZmbOdzD.1142 for user conductor
2021-07-06 14:50:49.842619 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:50:50.944212 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.707265551s) to execute
2021-07-06 14:50:52.538351 I | auth: deleting token UPWkhjYCqOBvBivZ.1144 for user conductor
2021-07-06 14:50:52.538409 I | auth: deleting token kaPhJQlFTHLDdwpo.1145 for user conductor
2021-07-06 14:50:54.443134 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (251.49319ms) to execute
2021-07-06 14:50:54.538232 I | auth: deleting token DUXNEjrMGmXvyYhR.1147 for user conductor
2021-07-06 14:50:54.843038 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:50:56.539446 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (947.603897ms) to execute
2021-07-06 14:50:58.538395 I | auth: deleting token pmHMpJXjFdlkYWMe.1152 for user conductor
2021-07-06 14:50:58.538458 I | auth: deleting token taUDJuDIbFuIBsrS.1146 for user conductor
2021-07-06 14:50:58.538470 I | auth: deleting token BdiDMfIXmBvPOxBa.1150 for user conductor
2021-07-06 14:50:58.538484 I | auth: deleting token pKkDpiEcvsQnDSMI.1148 for user conductor
2021-07-06 14:50:58.538492 I | auth: deleting token WxpkqCssRVHPbZcr.1149 for user conductor
2021-07-06 14:50:58.538500 I | auth: deleting token olxEFkFANGyjQEDy.1151 for user conductor
2021-07-06 14:50:58.640662 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.645337762s) to execute
2021-07-06 14:50:59.843464 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:00.538381 I | auth: deleting token IxpyEuVolumvaeAY.1153 for user conductor
2021-07-06 14:51:01.538381 I | auth: deleting token oLhaPNwWjxUCEkJI.1155 for user conductor
2021-07-06 14:51:02.538362 I | auth: deleting token ArCCiOurvQejXYmo.1154 for user conductor
2021-07-06 14:51:03.538354 I | auth: deleting token lZrZYvTLrwrgbuDn.1156 for user conductor
2021-07-06 14:51:03.538417 I | auth: deleting token JSrETjqOCpWDHiqb.1158 for user conductor
2021-07-06 14:51:03.538428 I | auth: deleting token yLsmnZLIOLlcjoMe.1157 for user conductor
2021-07-06 14:51:04.243015 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (403.623999ms) to execute
2021-07-06 14:51:04.538262 I | auth: deleting token mxYSpBbreooySZlg.1159 for user conductor
2021-07-06 14:51:04.843750 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:05.737906 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.346025283s) to execute
2021-07-06 14:51:05.891887 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (151.799469ms) to execute
2021-07-06 14:51:07.538356 I | auth: deleting token NMZESxukksKTRAMl.1162 for user conductor
2021-07-06 14:51:07.538422 I | auth: deleting token kVHwOjwgSgpnLWyi.1160 for user conductor
2021-07-06 14:51:07.538436 I | auth: deleting token jlJkketjCYXLCisE.1161 for user conductor
2021-07-06 14:51:07.845226 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.108299476s) to execute
2021-07-06 14:51:08.538262 I | auth: deleting token SsfjQwFsqxznlgqV.1163 for user conductor
2021-07-06 14:51:09.548153 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.556330109s) to execute
2021-07-06 14:51:09.737230 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (187.04104ms) to execute
2021-07-06 14:51:09.844033 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:10.538337 I | auth: deleting token SUlSOVCsJmNgbMzO.1164 for user conductor
2021-07-06 14:51:12.538376 I | auth: deleting token lRnqRBNZdfGwChSH.1165 for user conductor
2021-07-06 14:51:13.538540 I | auth: deleting token XcUZyJafvgeFumiA.1166 for user conductor
2021-07-06 14:51:14.636718 I | auth: deleting token CIdldLIvGbTTIVdg.1167 for user conductor
2021-07-06 14:51:14.844410 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:15.144032 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.946328669s) to execute
2021-07-06 14:51:15.392160 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (153.201947ms) to execute
2021-07-06 14:51:15.492307 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (155.418868ms) to execute
2021-07-06 14:51:16.538433 I | auth: deleting token LityzPJChVoSltfe.1168 for user conductor
2021-07-06 14:51:17.538329 I | auth: deleting token mVUFHEnVmcARhdAv.1169 for user conductor
2021-07-06 14:51:19.538375 I | auth: deleting token AMWeKnHauzUzUfqL.1170 for user conductor
2021-07-06 14:51:19.844721 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:20.242976 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (245.4538ms) to execute
2021-07-06 14:51:21.538375 I | auth: deleting token yepokOoOCzUgOsCy.1171 for user conductor
2021-07-06 14:51:21.538424 I | auth: deleting token XJGMqRQMMFZwfiAy.1172 for user conductor
2021-07-06 14:51:22.538352 I | auth: deleting token OzPvRrlpOkWYuBbH.1173 for user conductor
2021-07-06 14:51:23.542809 I | auth: deleting token vgGoRINdkdaeGzKw.1174 for user conductor
2021-07-06 14:51:24.936663 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:25.239731 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.34686864s) to execute
2021-07-06 14:51:26.842804 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.59950789s) to execute
2021-07-06 14:51:26.936904 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.690838942s) to execute
2021-07-06 14:51:29.043982 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.506949733s) to execute
2021-07-06 14:51:29.538461 I | auth: deleting token HDzxiRDFeoIBNKyk.1175 for user conductor
2021-07-06 14:51:29.538535 I | auth: deleting token XoDSvFcywRgHEPOH.1178 for user conductor
2021-07-06 14:51:29.936985 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:30.538275 I | auth: deleting token ulUxMgMbxuVAXeDv.1181 for user conductor
2021-07-06 14:51:30.538323 I | auth: deleting token NMhzKxeuipyttIgo.1176 for user conductor
2021-07-06 14:51:30.538336 I | auth: deleting token hLJJMOjeVsTabVkn.1177 for user conductor
2021-07-06 14:51:30.538344 I | auth: deleting token TNzOUYkdYQCoSRWI.1179 for user conductor
2021-07-06 14:51:30.538353 I | auth: deleting token eKCQNeBEbxKsVZIe.1180 for user conductor
2021-07-06 14:51:31.843393 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (106.560698ms) to execute
2021-07-06 14:51:32.538376 I | auth: deleting token ymMLdRHYMmAaQZNo.1182 for user conductor
2021-07-06 14:51:34.538325 I | auth: deleting token PikjsWoJRaidwvrI.1185 for user conductor
2021-07-06 14:51:34.538377 I | auth: deleting token aojAZRQEeNVTgbUa.1183 for user conductor
2021-07-06 14:51:34.538396 I | auth: deleting token YOpzCCxCKyKSDHoM.1186 for user conductor
2021-07-06 14:51:34.538408 I | auth: deleting token vZiNJKcIcTIfaSmM.1184 for user conductor
2021-07-06 14:51:34.937265 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:37.643692 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.749413831s) to execute
2021-07-06 14:51:38.538332 I | auth: deleting token HfhdqufmPFCGviuN.1187 for user conductor
2021-07-06 14:51:38.538393 I | auth: deleting token HViTdqWblxAdhTKk.1188 for user conductor
2021-07-06 14:51:38.538406 I | auth: deleting token PGliyCmsetLnWPCd.1190 for user conductor
2021-07-06 14:51:38.538415 I | auth: deleting token pAmaLLYgFKuwSWlE.1189 for user conductor
2021-07-06 14:51:39.741373 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (942.562608ms) to execute
2021-07-06 14:51:39.937571 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:40.538335 I | auth: deleting token PwlChNkmuzfLBwlN.1191 for user conductor
2021-07-06 14:51:40.538425 I | auth: deleting token kuVtrPcjVKDRAZhX.1192 for user conductor
2021-07-06 14:51:40.538443 I | auth: deleting token swREKPWxOJbvqDfD.1193 for user conductor
2021-07-06 14:51:41.340418 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.448692085s) to execute
2021-07-06 14:51:41.491779 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (146.682509ms) to execute
2021-07-06 14:51:42.538302 I | auth: deleting token zBEGvuLYYzFhAGGt.1194 for user conductor
2021-07-06 14:51:43.543560 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.949832597s) to execute
2021-07-06 14:51:44.538351 I | auth: deleting token fZehsGjffYbbpnyP.1195 for user conductor
2021-07-06 14:51:44.538397 I | auth: deleting token dHyurhMxcDdTzlmE.1196 for user conductor
2021-07-06 14:51:44.538409 I | auth: deleting token AaQVpVxyerndpPwz.1197 for user conductor
2021-07-06 14:51:44.937864 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:47.137534 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.590953234s) to execute
2021-07-06 14:51:48.538290 I | auth: deleting token oVeWSamdhXLMASoE.1200 for user conductor
2021-07-06 14:51:48.538347 I | auth: deleting token jKHTzKTXjNtxPyAO.1201 for user conductor
2021-07-06 14:51:48.538373 I | auth: deleting token jxmoXTLHbELSKbAK.1198 for user conductor
2021-07-06 14:51:48.538390 I | auth: deleting token mkTsgGulNTEoaLdu.1199 for user conductor
2021-07-06 14:51:48.538410 I | auth: deleting token ISSrRhgJRokTwfoZ.1202 for user conductor
2021-07-06 14:51:48.640515 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.499889307s) to execute
2021-07-06 14:51:48.640618 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.348598163s) to execute
2021-07-06 14:51:48.640772 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.49898983s) to execute
2021-07-06 14:51:48.793671 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (150.591226ms) to execute
2021-07-06 14:51:49.938135 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:50.538282 I | auth: deleting token wtmYzKzeqHYKzZQY.1203 for user conductor
2021-07-06 14:51:51.538293 I | auth: deleting token bWjmkGtLaDSTfWvb.1204 for user conductor
2021-07-06 14:51:52.538341 I | auth: deleting token mozlhqRwebJWPckJ.1205 for user conductor
2021-07-06 14:51:52.538625 I | auth: deleting token zjKwkjQvWpiIWsQZ.1206 for user conductor
2021-07-06 14:51:52.743523 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.948382535s) to execute
2021-07-06 14:51:53.538370 I | auth: deleting token MYcJFzTkcbSOrnEd.1207 for user conductor
2021-07-06 14:51:54.538296 I | auth: deleting token yVbsdkIIeaYqKtFB.1208 for user conductor
2021-07-06 14:51:54.640319 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.80109282s) to execute
2021-07-06 14:51:54.640591 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.803358874s) to execute
2021-07-06 14:51:54.938404 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:51:56.441518 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.798661286s) to execute
2021-07-06 14:51:58.242352 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.500148092s) to execute
2021-07-06 14:51:59.938545 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.494748753s) to execute
2021-07-06 14:51:59.938707 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:01.443674 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.505031105s) to execute
2021-07-06 14:52:01.443853 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.503032788s) to execute
2021-07-06 14:52:01.837526 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (299.276138ms) to execute
2021-07-06 14:52:01.839813 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (102.690975ms) to execute
2021-07-06 14:52:01.840191 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (102.814889ms) to execute
2021-07-06 14:52:02.538418 I | auth: deleting token FDeLsnQduTHNVHCa.1210 for user conductor
2021-07-06 14:52:02.538498 I | auth: deleting token QewILAjUNPedqiaN.1212 for user conductor
2021-07-06 14:52:02.538531 I | auth: deleting token ZeYxMOauBDnerxeL.1215 for user conductor
2021-07-06 14:52:02.538546 I | auth: deleting token ZdGjnkVZufLubGpT.1211 for user conductor
2021-07-06 14:52:02.538559 I | auth: deleting token wMqXBBRqtstBVAgr.1214 for user conductor
2021-07-06 14:52:02.538576 I | auth: deleting token kYcxReRTsrWXTpgr.1213 for user conductor
2021-07-06 14:52:02.538603 I | auth: deleting token zfBVXpDvSNKGQjko.1209 for user conductor
2021-07-06 14:52:03.538338 I | auth: deleting token KNgssEaIrsOuGNOm.1216 for user conductor
2021-07-06 14:52:04.444022 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.306451881s) to execute
2021-07-06 14:52:04.938973 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:05.538380 I | auth: deleting token vPxzNTiYUfSNpiDJ.1217 for user conductor
2021-07-06 14:52:06.241694 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (547.860196ms) to execute
2021-07-06 14:52:06.538376 I | auth: deleting token DkLaAXbQaqipFKFR.1218 for user conductor
2021-07-06 14:52:08.141550 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.649703913s) to execute
2021-07-06 14:52:08.292074 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (148.082056ms) to execute
2021-07-06 14:52:08.538276 I | auth: deleting token wUgyzFbbwZvyzREc.1219 for user conductor
2021-07-06 14:52:09.538386 I | auth: deleting token SKCTNDfJiqmgULpT.1220 for user conductor
2021-07-06 14:52:09.939247 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:10.042441 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.305577198s) to execute
2021-07-06 14:52:11.843764 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (506.828011ms) to execute
2021-07-06 14:52:14.939730 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:15.737582 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.44572349s) to execute
2021-07-06 14:52:16.538302 I | auth: deleting token XXJHxLzHmRXUwJEq.1222 for user conductor
2021-07-06 14:52:17.438487 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (301.573857ms) to execute
2021-07-06 14:52:18.538330 I | auth: deleting token RcctupTXfMunLSfB.1223 for user conductor
2021-07-06 14:52:18.538371 I | auth: deleting token oLVtDxdOSNsnqUdg.1224 for user conductor
2021-07-06 14:52:18.538383 I | auth: deleting token dNXolJoOcDiePHws.1221 for user conductor
2021-07-06 14:52:18.538399 I | auth: deleting token uMObFkngcLvGHynp.1225 for user conductor
2021-07-06 14:52:19.242524 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (546.705442ms) to execute
2021-07-06 14:52:19.538279 I | auth: deleting token brOkzaArPYyuipQO.1226 for user conductor
2021-07-06 14:52:19.939944 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:20.841839 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.550234065s) to execute
2021-07-06 14:52:21.538250 I | auth: deleting token QApzbLyPNKzVckfG.1227 for user conductor
2021-07-06 14:52:22.538323 I | auth: deleting token VtWMsufxlUenwzjK.1229 for user conductor
2021-07-06 14:52:22.538406 I | auth: deleting token KGwktpMWHvRyHMph.1228 for user conductor
2021-07-06 14:52:23.538338 I | auth: deleting token GDslIEQuNgcFSKkM.1230 for user conductor
2021-07-06 14:52:24.444555 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.046214574s) to execute
2021-07-06 14:52:24.538231 I | auth: deleting token aHmokBtzeDYbTHvx.1231 for user conductor
2021-07-06 14:52:24.940344 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:25.538325 I | auth: deleting token tlKyomrLDkAMsQPx.1232 for user conductor
2021-07-06 14:52:29.538399 I | auth: deleting token trleuLoBhSOEJzQP.1233 for user conductor
2021-07-06 14:52:29.538531 I | auth: deleting token shhmoXwzCrDLgKWC.1235 for user conductor
2021-07-06 14:52:29.940595 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:31.538300 I | auth: deleting token tPVGsdCWZrPqKeDN.1234 for user conductor
2021-07-06 14:52:31.539890 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.648227003s) to execute
2021-07-06 14:52:33.237336 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.645560351s) to execute
2021-07-06 14:52:33.237610 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.694619935s) to execute
2021-07-06 14:52:33.538281 I | auth: deleting token VyZqwcmttvQXzmpU.1236 for user conductor
2021-07-06 14:52:33.538347 I | auth: deleting token jIzLDDSGjiSgaLGJ.1240 for user conductor
2021-07-06 14:52:33.538360 I | auth: deleting token OfUYEBjHXMdDnCEi.1239 for user conductor
2021-07-06 14:52:33.538373 I | auth: deleting token TSurOAxvXyVBPaBB.1238 for user conductor
2021-07-06 14:52:33.538396 I | auth: deleting token ZqZwmvsVyKOsiVxC.1237 for user conductor
2021-07-06 14:52:34.843051 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.602539234s) to execute
2021-07-06 14:52:34.843336 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.603712772s) to execute
2021-07-06 14:52:35.036741 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:35.538267 I | auth: deleting token AAKyhGNMQvIYlmhs.1242 for user conductor
2021-07-06 14:52:35.538327 I | auth: deleting token JtogxOGbCCFfXoNG.1241 for user conductor
2021-07-06 14:52:36.538405 I | auth: deleting token qjzjzMQMtjspusrD.1243 for user conductor
2021-07-06 14:52:38.538368 I | auth: deleting token OcJYaGFqHKSWKYpV.1244 for user conductor
2021-07-06 14:52:38.737958 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.799657982s) to execute
2021-07-06 14:52:38.738412 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.88105462s) to execute
2021-07-06 14:52:38.892955 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (151.91084ms) to execute
2021-07-06 14:52:39.538362 I | auth: deleting token DkKoRophgaxRjjyt.1245 for user conductor
2021-07-06 14:52:40.036999 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:40.840017 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.999625785s) to execute
2021-07-06 14:52:41.538408 I | auth: deleting token UqZMPjRzpmKJTvTA.1246 for user conductor
2021-07-06 14:52:42.447507 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.010436771s) to execute
2021-07-06 14:52:44.237144 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.698130683s) to execute
2021-07-06 14:52:44.237394 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.70048337s) to execute
2021-07-06 14:52:44.391979 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (151.974615ms) to execute
2021-07-06 14:52:44.538313 I | auth: deleting token PDCzZoRIMiwbjuhn.1247 for user conductor
2021-07-06 14:52:44.538399 I | auth: deleting token gBquhAlJEryyqJvO.1249 for user conductor
2021-07-06 14:52:45.037317 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:45.538324 I | auth: deleting token GytQdpZmfwBnfEMP.1248 for user conductor
2021-07-06 14:52:45.538368 I | auth: deleting token jJjRdLSvidFWhWKm.1250 for user conductor
2021-07-06 14:52:45.943126 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (906.167244ms) to execute
2021-07-06 14:52:46.191839 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.487369ms) to execute
2021-07-06 14:52:47.538431 I | auth: deleting token iATqfcftHbXTjRQa.1251 for user conductor
2021-07-06 14:52:48.038895 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.643443073s) to execute
2021-07-06 14:52:48.538307 I | auth: deleting token iOCZjbyticBBpLfi.1252 for user conductor
2021-07-06 14:52:48.538365 I | auth: deleting token HHKbsoMhkLEhUOpB.1254 for user conductor
2021-07-06 14:52:49.538469 I | auth: deleting token BCTjhGYFAxHpznkH.1255 for user conductor
2021-07-06 14:52:49.538510 I | auth: deleting token ngYeflJnxZFmnyCN.1253 for user conductor
2021-07-06 14:52:49.742603 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.703340974s) to execute
2021-07-06 14:52:50.037555 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:51.538243 I | auth: deleting token PgSDPwaSXCEfxEYp.1256 for user conductor
2021-07-06 14:52:51.538294 I | auth: deleting token OVHmCGPuvvgKiUzQ.1257 for user conductor
2021-07-06 14:52:51.542397 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.703341949s) to execute
2021-07-06 14:52:51.542693 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.705650531s) to execute
2021-07-06 14:52:51.692550 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (133.71693ms) to execute
2021-07-06 14:52:52.538379 I | auth: deleting token ESkUzreTMcXqrvVt.1258 for user conductor
2021-07-06 14:52:55.037810 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:52:55.337358 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.30045243s) to execute
2021-07-06 14:52:55.538327 I | auth: deleting token LEoAAOxEGzDJuxiL.1261 for user conductor
2021-07-06 14:52:55.538423 I | auth: deleting token oCgSMRaIMjMdMUfu.1260 for user conductor
2021-07-06 14:52:55.538448 I | auth: deleting token TLErDZqalKyULYMF.1259 for user conductor
2021-07-06 14:52:55.538467 I | auth: deleting token cgJmoyoNEivlfNuV.1262 for user conductor
2021-07-06 14:52:57.140806 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.703831253s) to execute
2021-07-06 14:52:59.041273 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.802297742s) to execute
2021-07-06 14:52:59.041456 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.897569602s) to execute
2021-07-06 14:53:00.038111 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:00.842266 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.705513464s) to execute
2021-07-06 14:53:00.842419 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.705545847s) to execute
2021-07-06 14:53:01.538264 I | auth: deleting token tVRaPFkvgCOiPXfW.1263 for user conductor
2021-07-06 14:53:02.643098 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.15135754s) to execute
2021-07-06 14:53:03.539174 I | auth: deleting token CAddxMtHtpYUkDQv.1265 for user conductor
2021-07-06 14:53:03.539235 I | auth: deleting token GbOhyUBAgyMHqgCY.1264 for user conductor
2021-07-06 14:53:03.539258 I | auth: deleting token rxumydZfFxmwQwgU.1266 for user conductor
2021-07-06 14:53:04.341830 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.695317293s) to execute
2021-07-06 14:53:04.341975 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.696321287s) to execute
2021-07-06 14:53:05.038295 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:05.538332 I | auth: deleting token bzYsqctoqiENPeyN.1268 for user conductor
2021-07-06 14:53:05.538431 I | auth: deleting token KwwARZbTTMitlBsM.1267 for user conductor
2021-07-06 14:53:06.140852 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.103054914s) to execute
2021-07-06 14:53:09.538436 I | auth: deleting token FdQlsKuQUXgJKcKZ.1269 for user conductor
2021-07-06 14:53:09.538516 I | auth: deleting token frNGdiPwBnfCYcgC.1271 for user conductor
2021-07-06 14:53:09.538546 I | auth: deleting token VLlxQAWPWilRrAnC.1272 for user conductor
2021-07-06 14:53:09.538557 I | auth: deleting token LDxlVmQbqdfSfbKB.1270 for user conductor
2021-07-06 14:53:10.038631 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:10.538456 I | auth: deleting token ISpRMfYqDWeqJmpQ.1273 for user conductor
2021-07-06 14:53:13.538465 I | auth: deleting token HYRBLsWxohQNhjoc.1274 for user conductor
2021-07-06 14:53:15.039004 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:17.238539 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.946563779s) to execute
2021-07-06 14:53:17.392106 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (151.020939ms) to execute
2021-07-06 14:53:17.392323 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (150.181943ms) to execute
2021-07-06 14:53:17.492658 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (155.694656ms) to execute
2021-07-06 14:53:20.039273 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:20.538258 I | auth: deleting token hJIFWAsVKDRPBSaf.1277 for user conductor
2021-07-06 14:53:20.538287 I | auth: deleting token IFrYRNpnqClmcdam.1279 for user conductor
2021-07-06 14:53:20.538297 I | auth: deleting token pLhmQlSETKPwMxGB.1278 for user conductor
2021-07-06 14:53:20.538306 I | auth: deleting token tKVuUSZUoQrQYtxl.1276 for user conductor
2021-07-06 14:53:20.538322 I | auth: deleting token NhbgaoWBegPaRyWP.1275 for user conductor
2021-07-06 14:53:22.538312 I | auth: deleting token vxpKDkynDSEfwWhk.1280 for user conductor
2021-07-06 14:53:22.740641 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.003599111s) to execute
2021-07-06 14:53:23.538271 I | auth: deleting token JuCiOlsaPsrmfgeU.1281 for user conductor
2021-07-06 14:53:24.743034 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.805982933s) to execute
2021-07-06 14:53:24.743231 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (351.455894ms) to execute
2021-07-06 14:53:25.039600 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:25.094974 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.71067ms) to execute
2021-07-06 14:53:25.538410 I | auth: deleting token MoSsmdzJRMJLwABR.1282 for user conductor
2021-07-06 14:53:26.538398 I | auth: deleting token xujPmMBJGCIWmVNo.1283 for user conductor
2021-07-06 14:53:28.538329 I | auth: deleting token RGJQScHvcTMrKabH.1284 for user conductor
2021-07-06 14:53:28.842130 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.250126737s) to execute
2021-07-06 14:53:30.039794 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:32.443753 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.952185558s) to execute
2021-07-06 14:53:32.592148 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (146.144741ms) to execute
2021-07-06 14:53:33.538332 I | auth: deleting token MpmZfzXzDBDVwvCA.1288 for user conductor
2021-07-06 14:53:33.538373 I | auth: deleting token udEUmgZoVNpqVmIM.1290 for user conductor
2021-07-06 14:53:33.538381 I | auth: deleting token xkZxiXaOavafXlLJ.1289 for user conductor
2021-07-06 14:53:33.538390 I | auth: deleting token TLVXwsYXoJpuIgGh.1285 for user conductor
2021-07-06 14:53:33.538403 I | auth: deleting token sSnRUXtrUOoshXck.1286 for user conductor
2021-07-06 14:53:33.538415 I | auth: deleting token xyMTJCUFNMQKgPDl.1287 for user conductor
2021-07-06 14:53:34.042672 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.441208891s) to execute
2021-07-06 14:53:34.042834 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (605.848969ms) to execute
2021-07-06 14:53:34.538381 I | auth: deleting token kxmOUteUOsbrztnO.1291 for user conductor
2021-07-06 14:53:35.040089 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:35.947664 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (955.972937ms) to execute
2021-07-06 14:53:36.538427 I | auth: deleting token QsdvFoDPgolSBDAD.1293 for user conductor
2021-07-06 14:53:36.538509 I | auth: deleting token oydHyJgJpEisDdHb.1292 for user conductor
2021-07-06 14:53:39.538514 I | auth: deleting token stfUCYgVYHIVrOsb.1294 for user conductor
2021-07-06 14:53:39.538581 I | auth: deleting token MmgRkcQbYeKPyZtf.1296 for user conductor
2021-07-06 14:53:39.538597 I | auth: deleting token HYFBdzbCPYGyFgcb.1295 for user conductor
2021-07-06 14:53:39.942154 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (850.285383ms) to execute
2021-07-06 14:53:40.040425 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:43.538393 I | auth: deleting token iGltUubkfvkbwfmE.1297 for user conductor
2021-07-06 14:53:43.538471 I | auth: deleting token xQayqrYWVezGEWKw.1298 for user conductor
2021-07-06 14:53:43.538485 I | auth: deleting token skSqMOuBOGiOgyBA.1299 for user conductor
2021-07-06 14:53:43.538506 I | auth: deleting token tZwmRVltfqSugfyH.1300 for user conductor
2021-07-06 14:53:45.040790 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:47.538273 I | auth: deleting token auWnqbquxnkPCnBI.1302 for user conductor
2021-07-06 14:53:47.538326 I | auth: deleting token lAKhCMsbkjNFRHri.1301 for user conductor
2021-07-06 14:53:50.041270 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:53:50.538349 I | auth: deleting token afabqNUcvHRqfssB.1303 for user conductor
2021-07-06 14:53:51.342214 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.804214582s) to execute
2021-07-06 14:53:53.538369 I | auth: deleting token mfRHfoahAxiTTdYS.1305 for user conductor
2021-07-06 14:53:53.538597 I | auth: deleting token PuCKODIQjsAHPkuA.1304 for user conductor
2021-07-06 14:53:53.538720 I | auth: deleting token GkbJsBCemxuAQOZZ.1307 for user conductor
2021-07-06 14:53:53.538862 I | auth: deleting token HrSfOJHJPhHXbtES.1306 for user conductor
2021-07-06 14:53:55.041548 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:00.041901 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:01.538387 I | auth: deleting token bhorNroyEBclAnbp.1309 for user conductor
2021-07-06 14:54:01.538452 I | auth: deleting token azSsNYBCEsubdsxk.1311 for user conductor
2021-07-06 14:54:01.538473 I | auth: deleting token SXMFLfHQsvfvKbSJ.1313 for user conductor
2021-07-06 14:54:01.538484 I | auth: deleting token mcawtfvlAICslwas.1312 for user conductor
2021-07-06 14:54:01.538498 I | auth: deleting token vHeidxEfpEYODCJe.1308 for user conductor
2021-07-06 14:54:01.538517 I | auth: deleting token UduIQMLWWRZvRVfL.1310 for user conductor
2021-07-06 14:54:01.538525 I | auth: deleting token miucIhWXwvzRxlhC.1314 for user conductor
2021-07-06 14:54:03.438637 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (701.67263ms) to execute
2021-07-06 14:54:03.538300 I | auth: deleting token wacQkWhoqDDZffTW.1316 for user conductor
2021-07-06 14:54:03.538379 I | auth: deleting token REWllEXSHRfzDCkW.1315 for user conductor
2021-07-06 14:54:04.538290 I | auth: deleting token NOiViPpxPpCkqbMJ.1317 for user conductor
2021-07-06 14:54:05.042221 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:05.241375 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.147293615s) to execute
2021-07-06 14:54:06.538296 I | auth: deleting token VQjHvgVjKKqyWtsr.1319 for user conductor
2021-07-06 14:54:06.538354 I | auth: deleting token zusbeTrczBzJNyXI.1318 for user conductor
2021-07-06 14:54:06.840891 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.449362178s) to execute
2021-07-06 14:54:07.538274 I | auth: deleting token jeggRejHmJuclXhn.1320 for user conductor
2021-07-06 14:54:08.842522 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.999055334s) to execute
2021-07-06 14:54:08.842680 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.805465631s) to execute
2021-07-06 14:54:09.538242 I | auth: deleting token uYvNKvLgHpaCDjwJ.1322 for user conductor
2021-07-06 14:54:09.538314 I | auth: deleting token wFzBQjoyCRHdzMja.1321 for user conductor
2021-07-06 14:54:10.042491 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:10.638191 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.601207736s) to execute
2021-07-06 14:54:11.538315 I | auth: deleting token rmGbKarYXwTYyfUH.1323 for user conductor
2021-07-06 14:54:11.538404 I | auth: deleting token TqAJgvZQjeZTsmNH.1324 for user conductor
2021-07-06 14:54:12.239282 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.302240994s) to execute
2021-07-06 14:54:12.239549 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.598627734s) to execute
2021-07-06 14:54:12.239734 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.502844959s) to execute
2021-07-06 14:54:12.491844 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (249.895423ms) to execute
2021-07-06 14:54:12.591458 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (251.834899ms) to execute
2021-07-06 14:54:13.538266 I | auth: deleting token MbVYYNOABOKXsdyK.1325 for user conductor
2021-07-06 14:54:13.538303 I | auth: deleting token FKKDLqqLpKzIkInp.1326 for user conductor
2021-07-06 14:54:13.538322 I | auth: deleting token NmwkqkCpAaKCcSTq.1327 for user conductor
2021-07-06 14:54:14.142001 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (649.754198ms) to execute
2021-07-06 14:54:15.042795 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:15.538390 I | auth: deleting token DqTfNIYNkjlrjQfe.1328 for user conductor
2021-07-06 14:54:19.538284 I | auth: deleting token OZpaYklxNQIVzCOB.1329 for user conductor
2021-07-06 14:54:20.043052 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:20.143407 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (851.910663ms) to execute
2021-07-06 14:54:21.538429 I | auth: deleting token lIVBqQuQpXoaaLsm.1332 for user conductor
2021-07-06 14:54:21.538617 I | auth: deleting token NIWYwImQFHzxGoJY.1333 for user conductor
2021-07-06 14:54:21.538773 I | auth: deleting token WZIhJFUePKquzRsL.1335 for user conductor
2021-07-06 14:54:21.538884 I | auth: deleting token hUKqgqRHUFJOIXvP.1330 for user conductor
2021-07-06 14:54:21.538926 I | auth: deleting token PYkqujAAeZZdfQft.1331 for user conductor
2021-07-06 14:54:21.539053 I | auth: deleting token zleQzuqibOJCrxKK.1334 for user conductor
2021-07-06 14:54:21.942849 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.546756091s) to execute
2021-07-06 14:54:23.543822 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.505570796s) to execute
2021-07-06 14:54:24.538374 I | auth: deleting token rWvYmoCiOaHzhuEB.1336 for user conductor
2021-07-06 14:54:24.538417 I | auth: deleting token aUUdAyfLLBqpURaa.1337 for user conductor
2021-07-06 14:54:24.538432 I | auth: deleting token tOWlhMIemiAWNVnE.1338 for user conductor
2021-07-06 14:54:25.043299 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:25.438398 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.701330743s) to execute
2021-07-06 14:54:26.538308 I | auth: deleting token EPdBPsBhtxfSNclx.1339 for user conductor
2021-07-06 14:54:26.538361 I | auth: deleting token ZmooAcfUxpvYykzg.1340 for user conductor
2021-07-06 14:54:27.141991 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.595347876s) to execute
2021-07-06 14:54:27.142138 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.549860125s) to execute
2021-07-06 14:54:27.142283 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.700934191s) to execute
2021-07-06 14:54:29.538375 I | auth: deleting token NxQZcTWysNGCbCni.1343 for user conductor
2021-07-06 14:54:29.538523 I | auth: deleting token SwHefqKQgRbXZnjQ.1342 for user conductor
2021-07-06 14:54:29.538555 I | auth: deleting token lTtMdvJUnKSlAwou.1341 for user conductor
2021-07-06 14:54:29.743071 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.051729344s) to execute
2021-07-06 14:54:30.043628 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:31.538459 I | auth: deleting token wpUQKzyDueXpdJzP.1344 for user conductor
2021-07-06 14:54:31.739187 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.60218525s) to execute
2021-07-06 14:54:33.538377 I | auth: deleting token beBQTMpCUZGXkHQc.1346 for user conductor
2021-07-06 14:54:33.538497 I | auth: deleting token pNfHFkOOifmQJIHk.1347 for user conductor
2021-07-06 14:54:33.538515 I | auth: deleting token usbKtwCmqLvbmOGN.1345 for user conductor
2021-07-06 14:54:35.043925 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:35.636738 I | auth: deleting token UfXMkVugkOaurfhI.1348 for user conductor
2021-07-06 14:54:35.636886 I | auth: deleting token FpGhfPqnViXcBwls.1349 for user conductor
2021-07-06 14:54:36.737241 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.300192759s) to execute
2021-07-06 14:54:37.538314 I | auth: deleting token tVDVcNMdWDwCDuYo.1350 for user conductor
2021-07-06 14:54:37.538507 I | auth: deleting token UdMLWJYmJwPAqOHg.1351 for user conductor
2021-07-06 14:54:38.638680 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.447042165s) to execute
2021-07-06 14:54:39.538458 I | auth: deleting token DnNigECayvfJutvh.1352 for user conductor
2021-07-06 14:54:39.538537 I | auth: deleting token vZXjLXmdcSAgzljm.1353 for user conductor
2021-07-06 14:54:40.044292 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:40.437649 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.74611697s) to execute
2021-07-06 14:54:40.538302 I | auth: deleting token LXabpmOwawaSndDT.1354 for user conductor
2021-07-06 14:54:41.538316 I | auth: deleting token tOlvgwsuoLEpXHiy.1355 for user conductor
2021-07-06 14:54:43.538479 I | auth: deleting token NeCgLudpIwGeoVKo.1356 for user conductor
2021-07-06 14:54:44.244866 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.553240899s) to execute
2021-07-06 14:54:44.538425 I | auth: deleting token bgaAeITlmDKqbHla.1357 for user conductor
2021-07-06 14:54:45.044526 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:45.538420 I | auth: deleting token vwjdNIycGKrMAtdK.1358 for user conductor
2021-07-06 14:54:46.238030 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.546517761s) to execute
2021-07-06 14:54:46.538328 I | auth: deleting token MdyWCAXROmjuHXuO.1359 for user conductor
2021-07-06 14:54:46.538376 I | auth: deleting token CvIPjhCvEmSAUCuI.1360 for user conductor
2021-07-06 14:54:48.137893 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.895963366s) to execute
2021-07-06 14:54:49.538392 I | auth: deleting token DyQucuHYIGoKvxpu.1362 for user conductor
2021-07-06 14:54:49.538498 I | auth: deleting token KnEfzbsTmQFCXahx.1361 for user conductor
2021-07-06 14:54:50.044849 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:51.538853 I | auth: deleting token dYGyoXLgsVQYUlzX.1364 for user conductor
2021-07-06 14:54:51.538900 I | auth: deleting token FKpSSpUVfeAZzhGd.1363 for user conductor
2021-07-06 14:54:52.142981 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.749632056s) to execute
2021-07-06 14:54:53.538383 I | auth: deleting token ESvlsavrwJhJPBOo.1366 for user conductor
2021-07-06 14:54:53.538441 I | auth: deleting token XmKyMQTGelcoXZnX.1365 for user conductor
2021-07-06 14:54:55.045238 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:54:55.538432 I | auth: deleting token GdDPzbaiJNcQZTpO.1369 for user conductor
2021-07-06 14:54:55.538512 I | auth: deleting token IFlirTqtgjGryuHU.1368 for user conductor
2021-07-06 14:54:55.538548 I | auth: deleting token vXmrOdRREPsJCgIZ.1367 for user conductor
2021-07-06 14:54:57.538352 I | auth: deleting token qoCLNszbdOgOSXqa.1372 for user conductor
2021-07-06 14:54:57.538416 I | auth: deleting token hqtXGvyYoFpSDngw.1371 for user conductor
2021-07-06 14:54:57.538438 I | auth: deleting token RNpXzMjSVhvvEQjz.1370 for user conductor
2021-07-06 14:54:59.538410 I | auth: deleting token WiIQdxkTtTrFgPGj.1373 for user conductor
2021-07-06 14:55:00.045660 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:01.042457 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.351050122s) to execute
2021-07-06 14:55:01.538319 I | auth: deleting token ExhuyecwVxQFndrs.1374 for user conductor
2021-07-06 14:55:01.538364 I | auth: deleting token yhnPVQNQgCrtDRDx.1375 for user conductor
2021-07-06 14:55:01.538399 I | auth: deleting token WDAKLuqzmRMnhAHf.1376 for user conductor
2021-07-06 14:55:02.840669 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (303.696469ms) to execute
2021-07-06 14:55:05.046026 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:05.538220 I | auth: deleting token BRTjisKfGGDGAgHw.1377 for user conductor
2021-07-06 14:55:05.538248 I | auth: deleting token gUIhFvHuRCvrvvXY.1378 for user conductor
2021-07-06 14:55:05.538272 I | auth: deleting token lCUcVqPqEiBYKhqO.1380 for user conductor
2021-07-06 14:55:05.538288 I | auth: deleting token UrsoVcnadlcjhpaB.1379 for user conductor
2021-07-06 14:55:05.743636 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (245.162346ms) to execute
2021-07-06 14:55:06.538359 I | auth: deleting token GdJMUyEkYoatDMCY.1381 for user conductor
2021-07-06 14:55:07.538379 I | auth: deleting token zdnAXKJwRoWOvHen.1382 for user conductor
2021-07-06 14:55:07.644426 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (652.698692ms) to execute
2021-07-06 14:55:09.538386 I | auth: deleting token oafuolNKXvdxBNGG.1383 for user conductor
2021-07-06 14:55:10.046406 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:10.538406 I | auth: deleting token SdpomljixsKNLgeV.1384 for user conductor
2021-07-06 14:55:10.640111 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (946.067029ms) to execute
2021-07-06 14:55:12.541547 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.249787766s) to execute
2021-07-06 14:55:12.593085 I | auth: deleting token zTTKQfCSxGjmDOti.1385 for user conductor
2021-07-06 14:55:14.538466 I | auth: deleting token fkHMwmPIPqzZDecj.1387 for user conductor
2021-07-06 14:55:14.538538 I | auth: deleting token rGhfHvqOBtltHiAh.1386 for user conductor
2021-07-06 14:55:15.046768 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:16.538341 I | auth: deleting token YIPluXUSlAZUGvjv.1388 for user conductor
2021-07-06 14:55:17.538307 I | auth: deleting token lqKvXvtGTGtmJrtG.1390 for user conductor
2021-07-06 14:55:17.538362 I | auth: deleting token sLuzLWsQWkYRzjZu.1389 for user conductor
2021-07-06 14:55:18.538326 I | auth: deleting token ySEUpVRVLTCGaByM.1391 for user conductor
2021-07-06 14:55:18.538391 I | auth: deleting token FqjXUmKvFcRiHViB.1392 for user conductor
2021-07-06 14:55:20.136755 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:20.537382 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.941998015s) to execute
2021-07-06 14:55:22.344225 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.046914226s) to execute
2021-07-06 14:55:22.538303 I | auth: deleting token IOAIcDWNpKqHqYaD.1395 for user conductor
2021-07-06 14:55:22.538360 I | auth: deleting token cwEWKkhelQlOvaiS.1396 for user conductor
2021-07-06 14:55:22.538379 I | auth: deleting token TAvHbVjtJSuEAUPK.1394 for user conductor
2021-07-06 14:55:22.538393 I | auth: deleting token iLfEpLZeuyObTAII.1393 for user conductor
2021-07-06 14:55:24.336953 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.897450219s) to execute
2021-07-06 14:55:25.137084 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:25.538292 I | auth: deleting token BTnwufoUZvpihyoN.1399 for user conductor
2021-07-06 14:55:25.538370 I | auth: deleting token saCHFySMtFKwJtJr.1397 for user conductor
2021-07-06 14:55:25.939170 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.601867074s) to execute
2021-07-06 14:55:26.538308 I | auth: deleting token AAjcHAPbBwrkyVKQ.1400 for user conductor
2021-07-06 14:55:26.538388 I | auth: deleting token JDgtbyDtkRpOqaQw.1401 for user conductor
2021-07-06 14:55:26.538413 I | auth: deleting token pEkCcvTGqVeOcALJ.1398 for user conductor
2021-07-06 14:55:28.039763 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.100421889s) to execute
2021-07-06 14:55:28.039918 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.699231071s) to execute
2021-07-06 14:55:28.538369 I | auth: deleting token egElFtbxoQVvRGsj.1402 for user conductor
2021-07-06 14:55:29.538281 I | auth: deleting token pYjuCBYBssbIIsHO.1403 for user conductor
2021-07-06 14:55:30.043590 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.906663798s) to execute
2021-07-06 14:55:30.043741 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.90499551s) to execute
2021-07-06 14:55:30.043885 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (704.852783ms) to execute
2021-07-06 14:55:30.137366 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:31.538380 I | auth: deleting token FDvpWOTZvBwzpkcI.1404 for user conductor
2021-07-06 14:55:31.944230 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.207201304s) to execute
2021-07-06 14:55:32.538337 I | auth: deleting token VqDDxmJUQWbIEmjR.1405 for user conductor
2021-07-06 14:55:33.538298 I | auth: deleting token OPLGHvmNuBLhLVZc.1406 for user conductor
2021-07-06 14:55:33.539129 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.402089734s) to execute
2021-07-06 14:55:33.539346 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.402380539s) to execute
2021-07-06 14:55:35.137614 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:35.443922 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (352.309964ms) to execute
2021-07-06 14:55:35.538318 I | auth: deleting token XvlszpVjPkNKZdZO.1407 for user conductor
2021-07-06 14:55:37.039442 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.445372628s) to execute
2021-07-06 14:55:37.039591 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (546.116166ms) to execute
2021-07-06 14:55:37.538399 I | auth: deleting token VSDpcqhHtujAmjzC.1409 for user conductor
2021-07-06 14:55:38.538335 I | auth: deleting token EInfLuAZCXtPBJJi.1408 for user conductor
2021-07-06 14:55:39.039977 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.148330674s) to execute
2021-07-06 14:55:39.538364 I | auth: deleting token KMlhYMzeOwEUqEWa.1412 for user conductor
2021-07-06 14:55:39.538411 I | auth: deleting token yxzPTtrvXuTOVkqg.1410 for user conductor
2021-07-06 14:55:39.538449 I | auth: deleting token brHrycJpbmjIahou.1411 for user conductor
2021-07-06 14:55:39.538466 I | auth: deleting token hcDYjAzYTUwXOcID.1413 for user conductor
2021-07-06 14:55:40.137846 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:40.944687 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.753210726s) to execute
2021-07-06 14:55:42.941640 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.904655651s) to execute
2021-07-06 14:55:42.941990 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.905080112s) to execute
2021-07-06 14:55:43.091499 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (147.563684ms) to execute
2021-07-06 14:55:43.191625 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (150.302556ms) to execute
2021-07-06 14:55:43.538321 I | auth: deleting token GVoTeAKCqpTSuliT.1414 for user conductor
2021-07-06 14:55:44.837916 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.046397002s) to execute
2021-07-06 14:55:45.138214 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:45.538395 I | auth: deleting token VmDPSWCNydppjZxI.1417 for user conductor
2021-07-06 14:55:45.538535 I | auth: deleting token RkfWUcqZWTTXDIsh.1416 for user conductor
2021-07-06 14:55:45.538554 I | auth: deleting token FhIjvAvGjFzMFYJs.1415 for user conductor
2021-07-06 14:55:47.538332 I | auth: deleting token YEULeqecCbSIbHGV.1418 for user conductor
2021-07-06 14:55:47.538392 I | auth: deleting token QhNCYehTmALWWpnD.1419 for user conductor
2021-07-06 14:55:47.738243 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.039907534s) to execute
2021-07-06 14:55:49.538369 I | auth: deleting token iZpdwUCUWktPiolw.1422 for user conductor
2021-07-06 14:55:49.538432 I | auth: deleting token nzVLnNLoqZEcedPS.1420 for user conductor
2021-07-06 14:55:49.538462 I | auth: deleting token eyTbrWEIXZomHEzv.1423 for user conductor
2021-07-06 14:55:49.538475 I | auth: deleting token GirwHEkzDRApQeqp.1421 for user conductor
2021-07-06 14:55:49.737158 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.445369157s) to execute
2021-07-06 14:55:50.138501 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:51.341765 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.548187891s) to execute
2021-07-06 14:55:51.538349 I | auth: deleting token KKqxsDSwLFTEDrJv.1424 for user conductor
2021-07-06 14:55:51.538395 I | auth: deleting token iOoyWtmVhfnDBQVX.1425 for user conductor
2021-07-06 14:55:53.043729 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.607014915s) to execute
2021-07-06 14:55:53.043884 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.699628232s) to execute
2021-07-06 14:55:53.538327 I | auth: deleting token bAPAMqFzFNaHrUnC.1426 for user conductor
2021-07-06 14:55:54.538421 I | auth: deleting token fcneTHNCBIGOAfMa.1427 for user conductor
2021-07-06 14:55:55.138730 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:55:55.538436 I | auth: deleting token AETqBffzrFirbmRG.1428 for user conductor
2021-07-06 14:55:56.441864 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.304858347s) to execute
2021-07-06 14:55:56.442088 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.299383863s) to execute
2021-07-06 14:55:56.442231 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.002393712s) to execute
2021-07-06 14:55:57.538352 I | auth: deleting token PPTkqhysSyVZsdOX.1430 for user conductor
2021-07-06 14:55:57.538441 I | auth: deleting token DmzUHuUmfAZwIaeo.1429 for user conductor
2021-07-06 14:55:59.538471 I | auth: deleting token pMDsBdjrGYnkefTT.1431 for user conductor
2021-07-06 14:55:59.538532 I | auth: deleting token pqADxoDBMIWuUypC.1432 for user conductor
2021-07-06 14:55:59.538595 I | auth: deleting token EjpFWavqbxAJMSCJ.1433 for user conductor
2021-07-06 14:56:00.138979 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:00.538536 I | auth: deleting token UfNHILGJsQpTHfzZ.1434 for user conductor
2021-07-06 14:56:01.538330 I | auth: deleting token TALNnABoBuXwwoRW.1435 for user conductor
2021-07-06 14:56:01.943918 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.305006426s) to execute
2021-07-06 14:56:02.538270 I | auth: deleting token GsTmloHyNDsNuhMq.1436 for user conductor
2021-07-06 14:56:03.840917 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.799965821s) to execute
2021-07-06 14:56:03.841026 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.879404804s) to execute
2021-07-06 14:56:03.841150 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.879391878s) to execute
2021-07-06 14:56:03.992398 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (148.444285ms) to execute
2021-07-06 14:56:04.538368 I | auth: deleting token IHMdQWdWEqltmdFX.1437 for user conductor
2021-07-06 14:56:05.139207 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:06.538366 I | auth: deleting token WHliUAiVhVRomGgr.1440 for user conductor
2021-07-06 14:56:06.538473 I | auth: deleting token XiRjzcBphBicqwyI.1438 for user conductor
2021-07-06 14:56:06.538511 I | auth: deleting token QlJbXHggIkJkVODa.1439 for user conductor
2021-07-06 14:56:07.339973 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.748475395s) to execute
2021-07-06 14:56:07.491814 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (149.129636ms) to execute
2021-07-06 14:56:08.538474 I | auth: deleting token yKIWufWKGHPmKosu.1441 for user conductor
2021-07-06 14:56:10.139430 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:10.564432 I | auth: deleting token gKSNgxkEMSKPWECi.1444 for user conductor
2021-07-06 14:56:10.564516 I | auth: deleting token wPsCaTVvQrWOCxcr.1445 for user conductor
2021-07-06 14:56:10.564539 I | auth: deleting token gDgriTtxpwNjECjI.1443 for user conductor
2021-07-06 14:56:10.564559 I | auth: deleting token gkoJZCgPeQoDwqUN.1442 for user conductor
2021-07-06 14:56:10.937143 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.243872403s) to execute
2021-07-06 14:56:12.544933 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.607638759s) to execute
2021-07-06 14:56:12.545497 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.605655384s) to execute
2021-07-06 14:56:14.341126 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.604081907s) to execute
2021-07-06 14:56:14.341228 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.049611403s) to execute
2021-07-06 14:56:15.139649 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:15.538358 I | auth: deleting token ahccYefAicxgNNTm.1446 for user conductor
2021-07-06 14:56:15.538404 I | auth: deleting token IiNGSKLBYqmnPizn.1450 for user conductor
2021-07-06 14:56:15.538417 I | auth: deleting token DeksUsVugfKuKWUA.1447 for user conductor
2021-07-06 14:56:15.538436 I | auth: deleting token MPCTqyMoihcJXyxH.1451 for user conductor
2021-07-06 14:56:15.538445 I | auth: deleting token VGVkNnAbjiiXlbPV.1449 for user conductor
2021-07-06 14:56:15.538451 I | auth: deleting token UuMYxQSndRNZrcFM.1448 for user conductor
2021-07-06 14:56:16.241645 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (346.843066ms) to execute
2021-07-06 14:56:16.538346 I | auth: deleting token nPQKwkUlkzDrduLi.1452 for user conductor
2021-07-06 14:56:17.636870 I | auth: deleting token LKhIpCznPYdAzEUH.1453 for user conductor
2021-07-06 14:56:19.439534 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.747950932s) to execute
2021-07-06 14:56:19.538348 I | auth: deleting token ggJmRIOzzGyGsiTS.1454 for user conductor
2021-07-06 14:56:20.140005 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:20.538248 I | auth: deleting token WthEbOERpxNMqnSL.1455 for user conductor
2021-07-06 14:56:20.538299 I | auth: deleting token mIwkxGedlNEcCdib.1456 for user conductor
2021-07-06 14:56:21.043082 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (505.999069ms) to execute
2021-07-06 14:56:21.538404 I | auth: deleting token iDcrLcTcQwMIHXKw.1457 for user conductor
2021-07-06 14:56:23.938473 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (247.160088ms) to execute
2021-07-06 14:56:25.140260 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:25.538290 I | auth: deleting token orzAszdHVrekYYhb.1458 for user conductor
2021-07-06 14:56:25.641288 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (743.867627ms) to execute
2021-07-06 14:56:27.538317 I | auth: deleting token DCpXMSHQJmFyGrhz.1460 for user conductor
2021-07-06 14:56:27.538369 I | auth: deleting token jAudFTPZrXwGcfxA.1461 for user conductor
2021-07-06 14:56:27.538394 I | auth: deleting token XxjXMWsabFEkNSGs.1463 for user conductor
2021-07-06 14:56:27.538411 I | auth: deleting token cnumqdHxREwbNtUZ.1459 for user conductor
2021-07-06 14:56:27.538423 I | auth: deleting token WadrJbGejIRwnHYW.1462 for user conductor
2021-07-06 14:56:28.744023 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (805.031447ms) to execute
2021-07-06 14:56:29.538401 I | auth: deleting token fNjoMdxjwpOVGCbM.1465 for user conductor
2021-07-06 14:56:29.538472 I | auth: deleting token IuvdvvHmIkqWlSfw.1466 for user conductor
2021-07-06 14:56:29.538522 I | auth: deleting token NTBgrcBIuftyvGpm.1464 for user conductor
2021-07-06 14:56:30.140596 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:30.341605 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.502381738s) to execute
2021-07-06 14:56:30.538346 I | auth: deleting token SZZDjWTRiTpdazCs.1467 for user conductor
2021-07-06 14:56:32.538318 I | auth: deleting token FpwIbPFXOuXrHJIj.1469 for user conductor
2021-07-06 14:56:32.538383 I | auth: deleting token PBMvTzaEBIcuChRJ.1468 for user conductor
2021-07-06 14:56:33.538454 I | auth: deleting token zPvRrgOHmyNgQEML.1470 for user conductor
2021-07-06 14:56:33.839357 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.80250902s) to execute
2021-07-06 14:56:33.991609 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (149.146359ms) to execute
2021-07-06 14:56:34.538435 I | auth: deleting token pGNShuKNFVucDgAl.1471 for user conductor
2021-07-06 14:56:35.140869 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:37.337262 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.043337949s) to execute
2021-07-06 14:56:38.538290 I | auth: deleting token yyDTcJsierXxEHGO.1473 for user conductor
2021-07-06 14:56:38.538349 I | auth: deleting token ylCgGgqBsfOraLBt.1472 for user conductor
2021-07-06 14:56:38.538363 I | auth: deleting token rsZJQrtcypusNQiq.1474 for user conductor
2021-07-06 14:56:38.538404 I | auth: deleting token sqUZhSAisItILtXI.1475 for user conductor
2021-07-06 14:56:40.141268 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:40.538330 I | auth: deleting token VHXCcOZNJzNfUIlZ.1476 for user conductor
2021-07-06 14:56:40.942196 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.550415623s) to execute
2021-07-06 14:56:40.942502 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.602950887s) to execute
2021-07-06 14:56:41.191763 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (154.669772ms) to execute
2021-07-06 14:56:41.193464 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (151.537582ms) to execute
2021-07-06 14:56:41.538344 I | auth: deleting token qvpvZtTbEVEnamWm.1478 for user conductor
2021-07-06 14:56:41.538426 I | auth: deleting token jhEJoWeKOgmNhfFK.1479 for user conductor
2021-07-06 14:56:41.538450 I | auth: deleting token YZAYrLtEqBsLHJQR.1477 for user conductor
2021-07-06 14:56:43.137140 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.399143917s) to execute
2021-07-06 14:56:44.538217 I | auth: deleting token VOgcwlGqtZZetjkD.1481 for user conductor
2021-07-06 14:56:44.538289 I | auth: deleting token GMHxOsbmwLIGsHmt.1480 for user conductor
2021-07-06 14:56:45.040549 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (546.576294ms) to execute
2021-07-06 14:56:45.141621 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:46.843021 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (804.891343ms) to execute
2021-07-06 14:56:47.538407 I | auth: deleting token kcYvcnNQvFtxikbB.1483 for user conductor
2021-07-06 14:56:47.538483 I | auth: deleting token CDrFmEULDvxpCkay.1484 for user conductor
2021-07-06 14:56:48.743941 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.052324545s) to execute
2021-07-06 14:56:49.538423 I | auth: deleting token rGpvliflqIbgrTEL.1485 for user conductor
2021-07-06 14:56:49.538474 I | auth: deleting token zHowlXugBgKGVFXJ.1486 for user conductor
2021-07-06 14:56:49.538494 I | auth: deleting token hEthnCnlBienIYOr.1487 for user conductor
2021-07-06 14:56:49.538508 I | auth: deleting token bBaUbnsTSaflmOyR.1482 for user conductor
2021-07-06 14:56:50.141955 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:50.538345 I | auth: deleting token cErnbiyYfTPzyeip.1488 for user conductor
2021-07-06 14:56:50.642633 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.451014154s) to execute
2021-07-06 14:56:52.344500 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.607612164s) to execute
2021-07-06 14:56:53.538261 I | auth: deleting token plSGfIzMNqmnIXWp.1491 for user conductor
2021-07-06 14:56:53.538390 I | auth: deleting token YOqccinrFXIQxxqo.1489 for user conductor
2021-07-06 14:56:55.142379 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:56:55.538309 I | auth: deleting token aeieAlFWQrQCzZCd.1492 for user conductor
2021-07-06 14:56:55.538355 I | auth: deleting token GrUHSHpXJrCDdVeT.1494 for user conductor
2021-07-06 14:56:55.538382 I | auth: deleting token hrZguuevHRLuXzux.1490 for user conductor
2021-07-06 14:56:55.538397 I | auth: deleting token XDQtOGmaLXFioWMH.1493 for user conductor
2021-07-06 14:56:55.744346 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.907377539s) to execute
2021-07-06 14:56:57.739943 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.848316101s) to execute
2021-07-06 14:56:57.740147 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.903265331s) to execute
2021-07-06 14:56:59.641012 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.749452791s) to execute
2021-07-06 14:57:00.142634 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:57:01.440790 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.600993979s) to execute
2021-07-06 14:57:01.441049 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.70254364s) to execute
2021-07-06 14:57:01.441252 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.797298076s) to execute
2021-07-06 14:57:01.538653 I | auth: deleting token QTHEXdxLManrLRHb.1495 for user conductor
2021-07-06 14:57:02.538409 I | auth: deleting token yeEZujLjbogrQmZT.1498 for user conductor
2021-07-06 14:57:02.538473 I | auth: deleting token dgiISYJxicxSpsEO.1499 for user conductor
2021-07-06 14:57:02.538506 I | auth: deleting token MHIGZfHlFJlsLQpX.1496 for user conductor
2021-07-06 14:57:02.538521 I | auth: deleting token UinynjdWMuJfXxQy.1497 for user conductor
2021-07-06 14:57:03.539474 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.981103492s) to execute
2021-07-06 14:57:04.538330 I | auth: deleting token iMfhaCZrFvAmaxet.1501 for user conductor
2021-07-06 14:57:04.538407 I | auth: deleting token UwZjxpxBMvhtKoBx.1500 for user conductor
2021-07-06 14:57:05.143021 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:57:05.538224 I | auth: deleting token AIfbPNjONhvdDMDo.1502 for user conductor
2021-07-06 14:57:06.538304 I | auth: deleting token rNDKxIADyDWiYNrC.1503 for user conductor
2021-07-06 14:57:06.937163 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.799075446s) to execute
2021-07-06 14:57:08.538671 I | auth: deleting token oIbZgmWjmrTkVVyG.1505 for user conductor
2021-07-06 14:57:08.538759 I | auth: deleting token WvTOZqRhYdwOvWXw.1506 for user conductor
2021-07-06 14:57:08.538883 I | auth: deleting token OKGREsGWIAfZaofM.1504 for user conductor
2021-07-06 14:57:08.938319 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.997749398s) to execute
2021-07-06 14:57:08.938533 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.998191957s) to execute
2021-07-06 14:57:08.994746 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.054384421s) to execute
2021-07-06 14:57:09.192623 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.666961ms) to execute
2021-07-06 14:57:10.143366 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:57:10.538356 I | auth: deleting token xVeYkFvWsqijGSFP.1507 for user conductor
2021-07-06 14:57:10.538420 I | auth: deleting token MJoeimFzqnqrYhmq.1508 for user conductor
2021-07-06 14:57:10.538434 I | auth: deleting token aEOGRSaYRrPCycjE.1509 for user conductor
2021-07-06 14:57:12.538356 I | auth: deleting token FXerOZqkSSZuKDAE.1511 for user conductor
2021-07-06 14:57:12.538402 I | auth: deleting token wLHyoSeASGIiuCuq.1510 for user conductor
2021-07-06 14:57:12.643278 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.151810043s) to execute
2021-07-06 14:57:13.538291 I | auth: deleting token WsNsWOUHSDixDAIL.1512 for user conductor
2021-07-06 14:57:15.238009 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:57:16.437195 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.500166477s) to execute
2021-07-06 14:57:16.538263 I | auth: deleting token keCaJvVKqRqUMSAT.1514 for user conductor
2021-07-06 14:57:16.538305 I | auth: deleting token dpxGUqDbUKNgtkVV.1515 for user conductor
2021-07-06 14:57:16.538313 I | auth: deleting token TFuEWViFQuCForOL.1513 for user conductor
2021-07-06 14:57:17.538450 I | auth: deleting token uCaEvjtuoLYXYYOL.1517 for user conductor
2021-07-06 14:57:17.538538 I | auth: deleting token HUEyxTKRqDVKKoeQ.1516 for user conductor
2021-07-06 14:57:19.538308 I | auth: deleting token aJLpYkHQIhlUOMtp.1518 for user conductor
2021-07-06 14:57:20.238370 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:57:21.538394 I | auth: deleting token lTMhXFwTdSufwyMf.1521 for user conductor
2021-07-06 14:57:21.538517 I | auth: deleting token mykmhUrRmbRWHGqq.1520 for user conductor
2021-07-06 14:57:21.538559 I | auth: deleting token ezUmcUQqePYVCRzQ.1519 for user conductor
2021-07-06 14:57:21.943090 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.151487399s) to execute
2021-07-06 14:57:24.538415 I | auth: deleting token lBAJdCIMoObhMCJW.1524 for user conductor
2021-07-06 14:57:24.538458 I | auth: deleting token LYWFUPpqREYaczzO.1522 for user conductor
2021-07-06 14:57:25.238707 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:57:25.538334 I | auth: deleting token XDMHUpRjBqkqXUmW.1523 for user conductor
2021-07-06 14:57:25.538391 I | auth: deleting token yRULvpFSMvhBCqGp.1526 for user conductor
2021-07-06 14:57:25.538411 I | auth: deleting token uDkQPVPDydonHWMT.1525 for user conductor
2021-07-06 14:57:25.742877 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.704585133s) to execute
2021-07-06 14:57:26.538329 I | auth: deleting token hWHmDnpzYOBNhPUX.1527 for user conductor
2021-07-06 14:57:27.538315 I | auth: deleting token XIwxpmvJlJwoWBBK.1528 for user conductor
2021-07-06 14:57:29.539915 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.248341852s) to execute
2021-07-06 14:57:30.239974 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:57:31.637340 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.629234825s) to execute
2021-07-06 14:57:32.538302 I | auth: deleting token IzMFicufvAHhLOSo.1529 for user conductor
2021-07-06 14:57:32.538361 I | auth: deleting token QBNjPrgJfejHUtsO.1531 for user conductor
2021-07-06 14:57:33.137926 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.497909756s) to execute
2021-07-06 14:57:33.538339 I | auth: deleting token ieyKwYFnAtelSayI.1530 for user conductor
2021-07-06 14:57:33.538425 I | auth: deleting token kazQFvHMqAVrfMKN.1533 for user conductor
2021-07-06 14:57:35.137103 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.994821773s) to execute
2021-07-06 14:57:35.137466 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.997410469s) to execute
2021-07-06 14:57:35.240283 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:57:35.538349 I | auth: deleting token AmmsMiRJNzINtuZO.1532 for user conductor
2021-07-06 14:57:36.843892 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.703738584s) to execute
2021-07-06 14:57:36.844236 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.700569375s) to execute
2021-07-06 14:57:39.538285 I | auth: deleting token SqAyIrrhciJtcNKV.1538 for user conductor
2021-07-06 14:57:39.538334 I | auth: deleting token YqZcuXTPkRfrMXSD.1536 for user conductor
2021-07-06 14:57:39.538355 I | auth: deleting token oGpaNDgjjwlnjCMq.1537 for user conductor
2021-07-06 14:57:39.538367 I | auth: deleting token yqQeCCSututMdQam.1534 for user conductor
2021-07-06 14:57:39.538376 I | auth: deleting token MAKUGWZcqxFvklKv.1535 for user conductor
2021-07-06 14:57:39.538385 I | auth: deleting token EPwKNRhQiHwczmil.1539 for user conductor
2021-07-06 14:57:40.240585 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 14:57:40.245991 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.306613992s) to execute
2021-07-06 14:57:41.941360 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.502445776s) to execute
2021-07-06 14:57:42.538232 I | auth: deleting token yxUJMdcZMATDbPMH.1542 for user conductor
2021-07-06 14:57:42.538273 I | auth: deleting token TqTavFnuCtXkaHmv.1540 for user conductor
2021-07-06 14:57:43.939136 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.902430171s) to execute
2021-07-06 14:57:43.939248 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.802239641s) to execute
2021-07-06 14:57:43.939263 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.67510408s) to execute
2021-07-06 14:57:43.939399 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.602669813s) to execute
2021-07-06 14:57:44.538244 I | auth: deleting token QoaBomtqFNhnFRZv.1544 for user conductor
2021-07-06 14:57:44.538282 I | auth: deleting token hjznHHTnmHNHkgDV.1545 for user conductor
2021-07-06 14:57:44.538300 I | auth: deleting token SwuyjiBXuBQWruQG.1541 for user conductor
2021-07-06 14:57:44.538305 I | auth: deleting token utTTDYwhxiTLQxJx.1543 for user conductor
2021-07-06 14:57:45.240882 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:57:45.742198 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.701125659s) to execute
2021-07-06 14:57:46.538396 I | auth: deleting token DqQALBJGDqQVkvRw.1546 for user conductor
2021-07-06 14:57:46.538452 I | auth: deleting token bUWmoMMFBYxjYKEF.1547 for user conductor
2021-07-06 14:57:48.538408 I | auth: deleting token txkZskeddlKPopcm.1548 for user conductor
2021-07-06 14:57:49.843047 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (944.440391ms) to execute
2021-07-06 14:57:50.241151 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:57:50.538278 I | auth: deleting token MFIkdjzQeTCJHDAa.1551 for user conductor
2021-07-06 14:57:50.538315 I | auth: deleting token qMEOUWPhzIKwOPag.1549 for user conductor
2021-07-06 14:57:52.144217 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (252.730704ms) to execute
2021-07-06 14:57:52.538361 I | auth: deleting token ATeNvImQzBuRewru.1553 for user conductor
2021-07-06 14:57:52.538413 I | auth: deleting token EhnIikJIuRGKvWIV.1555 for user conductor
2021-07-06 14:57:52.538429 I | auth: deleting token yBcVLLjWXaBQtmfA.1554 for user conductor
2021-07-06 14:57:52.538444 I | auth: deleting token sZrbzaMuVZZpOeKt.1552 for user conductor
2021-07-06 14:57:52.538455 I | auth: deleting token VmwZqTynlEFZAfHK.1550 for user conductor
2021-07-06 14:57:54.247342 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.007789022s) to execute
2021-07-06 14:57:54.491521 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (154.599013ms) to execute
2021-07-06 14:57:55.241404 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:57:55.538375 I | auth: deleting token lUbmLyQiHfHnBRio.1556 for user conductor
2021-07-06 14:57:56.337618 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.942964853s) to execute
2021-07-06 14:57:56.337744 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.400893203s) to execute
2021-07-06 14:57:57.538237 I | auth: deleting token YhrJrllsaTIEtqQy.1558 for user conductor
2021-07-06 14:57:57.538287 I | auth: deleting token NwtPrjpRZFAQbyUF.1559 for user conductor
2021-07-06 14:57:58.042752 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.603435834s) to execute
2021-07-06 14:57:58.043051 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (206.187721ms) to execute
2021-07-06 14:57:59.538408 I | auth: deleting token qiniotupiFplQueR.1560 for user conductor
2021-07-06 14:57:59.538477 I | auth: deleting token XuPDkEylbNiFlLqA.1557 for user conductor
2021-07-06 14:57:59.538493 I | auth: deleting token LjcbPzoRzhXoWbKV.1562 for user conductor
2021-07-06 14:57:59.538510 I | auth: deleting token RxNqRRcZslhLKEuQ.1561 for user conductor
2021-07-06 14:57:59.936710 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.745202725s) to execute
2021-07-06 14:58:00.091538 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (152.413204ms) to execute
2021-07-06 14:58:00.093435 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (154.003911ms) to execute
2021-07-06 14:58:00.242102 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:03.538523 I | auth: deleting token YgSpsFsnpmBMDUdS.1563 for user conductor
2021-07-06 14:58:03.538566 I | auth: deleting token hBpdXSexAifjMwEz.1565 for user conductor
2021-07-06 14:58:04.136864 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.545197789s) to execute
2021-07-06 14:58:04.538287 I | auth: deleting token UxiywzmZmvglcfyQ.1564 for user conductor
2021-07-06 14:58:04.538332 I | auth: deleting token EnwlynTDLGzwzVHb.1568 for user conductor
2021-07-06 14:58:04.538349 I | auth: deleting token NPasBhVQYmrKxlXG.1567 for user conductor
2021-07-06 14:58:04.538363 I | auth: deleting token mbiIaIDIiATVCiWp.1566 for user conductor
2021-07-06 14:58:05.336782 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:05.938562 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.701550813s) to execute
2021-07-06 14:58:06.564746 I | auth: deleting token MugRBIiOYgUSPaPQ.1569 for user conductor
2021-07-06 14:58:06.564805 I | auth: deleting token LfhdJNMHvLZBLiRe.1570 for user conductor
2021-07-06 14:58:06.564820 I | auth: deleting token OMCuXSgypeWrRQGy.1571 for user conductor
2021-07-06 14:58:08.538359 I | auth: deleting token itwLsLsajmbxsAGm.1572 for user conductor
2021-07-06 14:58:09.538284 I | auth: deleting token TvljspRuXCoefKxI.1573 for user conductor
2021-07-06 14:58:10.337019 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:11.538352 I | auth: deleting token erwEVeBSRJtSqlfa.1574 for user conductor
2021-07-06 14:58:11.742584 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.704386874s) to execute
2021-07-06 14:58:11.742841 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.705855258s) to execute
2021-07-06 14:58:13.937922 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (546.490362ms) to execute
2021-07-06 14:58:15.337357 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:16.938057 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (501.094864ms) to execute
2021-07-06 14:58:17.538328 I | auth: deleting token GfQRCkEOGBTHQcuh.1580 for user conductor
2021-07-06 14:58:17.538386 I | auth: deleting token jyGdKUDBMSSmvvKK.1578 for user conductor
2021-07-06 14:58:17.538401 I | auth: deleting token YWYejWJEFjPqsLJh.1577 for user conductor
2021-07-06 14:58:17.538416 I | auth: deleting token rOXcxNrsDNfRHHMt.1579 for user conductor
2021-07-06 14:58:17.538431 I | auth: deleting token MmTPjyPsuUKegQfo.1576 for user conductor
2021-07-06 14:58:17.538449 I | auth: deleting token tKtiNyBtjXQECLvf.1575 for user conductor
2021-07-06 14:58:17.538463 I | auth: deleting token OecHIIFnVCHTuThr.1581 for user conductor
2021-07-06 14:58:19.040025 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (948.460586ms) to execute
2021-07-06 14:58:20.337641 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:20.938788 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.746959944s) to execute
2021-07-06 14:58:22.838233 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.844829681s) to execute
2021-07-06 14:58:22.838350 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.896709067s) to execute
2021-07-06 14:58:23.538291 I | auth: deleting token EtUYgpzGqjqLgfhL.1587 for user conductor
2021-07-06 14:58:23.538326 I | auth: deleting token uOqRaGCZYgQJceqn.1585 for user conductor
2021-07-06 14:58:23.538340 I | auth: deleting token QFPRbbGQCNHOEDRh.1588 for user conductor
2021-07-06 14:58:23.538352 I | auth: deleting token eqcIAfhRzdSKBnAl.1582 for user conductor
2021-07-06 14:58:23.538360 I | auth: deleting token pAWSwQwwwWfwQccx.1584 for user conductor
2021-07-06 14:58:23.538367 I | auth: deleting token bivhEMNQxyqAxkMI.1583 for user conductor
2021-07-06 14:58:23.538401 I | auth: deleting token ioJKMXNpUgGCQDCi.1586 for user conductor
2021-07-06 14:58:24.537947 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.696918708s) to execute
2021-07-06 14:58:24.538178 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.696775034s) to execute
2021-07-06 14:58:25.436695 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:25.637380 I | auth: deleting token HHytPgGDMSvRQHbV.1590 for user conductor
2021-07-06 14:58:25.637440 I | auth: deleting token OyDmCaCWHRrughTT.1589 for user conductor
2021-07-06 14:58:26.538206 I | auth: deleting token qFfvzBvHHmmTXeqb.1591 for user conductor
2021-07-06 14:58:26.843517 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.302817727s) to execute
2021-07-06 14:58:26.843935 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.149822951s) to execute
2021-07-06 14:58:26.844159 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.805665259s) to execute
2021-07-06 14:58:27.192618 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (197.497154ms) to execute
2021-07-06 14:58:29.140261 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.003226347s) to execute
2021-07-06 14:58:29.538503 I | auth: deleting token BGIYtPiKtuHDceWk.1592 for user conductor
2021-07-06 14:58:29.538600 I | auth: deleting token QFzeuKNRDIrtsoSS.1593 for user conductor
2021-07-06 14:58:29.538645 I | auth: deleting token JKDANeRnmWSsFeGx.1594 for user conductor
2021-07-06 14:58:30.436929 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:32.147531 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.155992796s) to execute
2021-07-06 14:58:32.538338 I | auth: deleting token rahjVoOSwpXJDWfK.1595 for user conductor
2021-07-06 14:58:32.538393 I | auth: deleting token cJrssBWvJCZzHSzt.1597 for user conductor
2021-07-06 14:58:33.539004 I | auth: deleting token TTJRZxyiFSLkQsmB.1598 for user conductor
2021-07-06 14:58:33.539072 I | auth: deleting token iUrhSEVwnyxAlLSq.1596 for user conductor
2021-07-06 14:58:34.538304 I | auth: deleting token GtIuareNRvBjuvHT.1600 for user conductor
2021-07-06 14:58:34.538349 I | auth: deleting token IkYZtYqheMgehIZT.1599 for user conductor
2021-07-06 14:58:35.437162 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:35.938674 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.601823026s) to execute
2021-07-06 14:58:36.091909 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (150.501366ms) to execute
2021-07-06 14:58:36.191652 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (154.712313ms) to execute
2021-07-06 14:58:36.538472 I | auth: deleting token ajkEQsKFIlddRRmp.1601 for user conductor
2021-07-06 14:58:36.538572 I | auth: deleting token arMvaZhCuMGeCZoY.1602 for user conductor
2021-07-06 14:58:36.538587 I | auth: deleting token mjbaJPOExYDkppvL.1603 for user conductor
2021-07-06 14:58:38.538438 I | auth: deleting token LXNrmCwpsDDkvTxA.1604 for user conductor
2021-07-06 14:58:40.437530 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:40.538336 I | auth: deleting token UNnMwkmrkWJTdUbK.1606 for user conductor
2021-07-06 14:58:40.538383 I | auth: deleting token IrBgkJxFBVftictS.1605 for user conductor
2021-07-06 14:58:41.538924 I | auth: deleting token YIjluuoeOCOAEIQi.1607 for user conductor
2021-07-06 14:58:42.538408 I | auth: deleting token lZmbMkFYiGSfmcVQ.1608 for user conductor
2021-07-06 14:58:42.739885 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (742.715746ms) to execute
2021-07-06 14:58:43.538376 I | auth: deleting token XmFafYngDZhzJNki.1609 for user conductor
2021-07-06 14:58:44.537310 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.794207464s) to execute
2021-07-06 14:58:45.437917 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:45.538229 I | auth: deleting token gIxnZYRvAPqWLxSt.1610 for user conductor
2021-07-06 14:58:46.341747 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.801820448s) to execute
2021-07-06 14:58:46.341863 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.801421891s) to execute
2021-07-06 14:58:46.538321 I | auth: deleting token GVlMggYkLNCVONuU.1611 for user conductor
2021-07-06 14:58:50.337172 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.900259286s) to execute
2021-07-06 14:58:50.337415 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.900610847s) to execute
2021-07-06 14:58:50.438203 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:50.492255 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (152.274232ms) to execute
2021-07-06 14:58:51.538355 I | auth: deleting token RQsuqYcGcXLxBNnN.1612 for user conductor
2021-07-06 14:58:51.538393 I | auth: deleting token LuoKjIAtTGaEOUTT.1613 for user conductor
2021-07-06 14:58:51.538402 I | auth: deleting token NZWxPORNwjPGYkhb.1615 for user conductor
2021-07-06 14:58:51.538411 I | auth: deleting token xmkATKmaLVwbQQsN.1614 for user conductor
2021-07-06 14:58:51.538418 I | auth: deleting token zMdmXbSlfHYZCHMr.1616 for user conductor
2021-07-06 14:58:52.339826 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.902907715s) to execute
2021-07-06 14:58:52.538421 I | auth: deleting token ICHsLwQzHSHYSrub.1617 for user conductor
2021-07-06 14:58:53.538314 I | auth: deleting token syphMFEhflFTESuy.1618 for user conductor
2021-07-06 14:58:54.437922 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.000954023s) to execute
2021-07-06 14:58:54.538313 I | auth: deleting token wMXEExgXxOJEcRGa.1619 for user conductor
2021-07-06 14:58:55.438474 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:58:55.538249 I | auth: deleting token jLxzQDOeJJQAZDLt.1620 for user conductor
2021-07-06 14:58:57.538493 I | auth: deleting token oBDRCBDIEESTqxFq.1621 for user conductor
2021-07-06 14:58:58.538461 I | auth: deleting token cVlyartEstKRCirT.1622 for user conductor
2021-07-06 14:58:58.940343 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.303364848s) to execute
2021-07-06 14:58:58.940695 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.500407461s) to execute
2021-07-06 14:59:00.438748 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:00.538353 I | auth: deleting token AkZZGZiECDTypOiZ.1623 for user conductor
2021-07-06 14:59:01.538344 I | auth: deleting token VRTcGWPAIiJJhuFd.1624 for user conductor
2021-07-06 14:59:03.038514 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.347179938s) to execute
2021-07-06 14:59:03.538382 I | auth: deleting token UsAbLJprvkmvSOzh.1625 for user conductor
2021-07-06 14:59:04.538309 I | auth: deleting token HOGlwgZcSeRpPOgt.1626 for user conductor
2021-07-06 14:59:05.439016 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:05.538359 I | auth: deleting token wwsOuUkclokPLDeM.1627 for user conductor
2021-07-06 14:59:06.642080 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.905122759s) to execute
2021-07-06 14:59:06.891578 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (154.658298ms) to execute
2021-07-06 14:59:07.538371 I | auth: deleting token MMRkZeemcEpMFbLN.1628 for user conductor
2021-07-06 14:59:07.538432 I | auth: deleting token zCAtQbywGjpHjLMy.1629 for user conductor
2021-07-06 14:59:09.538283 I | auth: deleting token iezZlnXxYjrSuwlw.1631 for user conductor
2021-07-06 14:59:09.538330 I | auth: deleting token NcCjKpEMMhHJxxvc.1630 for user conductor
2021-07-06 14:59:10.439371 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:10.840346 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.548771396s) to execute
2021-07-06 14:59:11.538394 I | auth: deleting token DjdUHCubSELsVrbg.1632 for user conductor
2021-07-06 14:59:11.538488 I | auth: deleting token AbjZxJsgoBunAdJn.1633 for user conductor
2021-07-06 14:59:12.538298 I | auth: deleting token klrXmECPiUhWHayS.1634 for user conductor
2021-07-06 14:59:12.538349 I | auth: deleting token peBTMYTFNbjHqCbj.1635 for user conductor
2021-07-06 14:59:12.638203 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.699173493s) to execute
2021-07-06 14:59:12.638472 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.701407172s) to execute
2021-07-06 14:59:13.538441 I | auth: deleting token okvUyYiAwhCZVgAR.1636 for user conductor
2021-07-06 14:59:14.538322 I | auth: deleting token AQfyduXHAeUkIfMy.1637 for user conductor
2021-07-06 14:59:14.538391 I | auth: deleting token RHmCORbzrfFSodgI.1638 for user conductor
2021-07-06 14:59:14.542453 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.800364188s) to execute
2021-07-06 14:59:15.439599 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:15.538383 I | auth: deleting token jUbfWEFRIGCcJZAR.1639 for user conductor
2021-07-06 14:59:16.339551 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.102586669s) to execute
2021-07-06 14:59:16.538301 I | auth: deleting token gKYmYahEOuNoEQPY.1640 for user conductor
2021-07-06 14:59:18.538319 I | auth: deleting token IpzcMEJVIZrtZcGD.1641 for user conductor
2021-07-06 14:59:19.438235 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.446326508s) to execute
2021-07-06 14:59:20.439868 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:20.538379 I | auth: deleting token bDmXIdlyHfkertHe.1642 for user conductor
2021-07-06 14:59:20.538429 I | auth: deleting token ABqLOOuxCaAmxXgo.1643 for user conductor
2021-07-06 14:59:22.538358 I | auth: deleting token JMsmbAtzzUQNYhnF.1645 for user conductor
2021-07-06 14:59:22.538418 I | auth: deleting token QKxDBlPcboadUqxc.1644 for user conductor
2021-07-06 14:59:23.238978 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.90201138s) to execute
2021-07-06 14:59:24.538246 I | auth: deleting token VqdNMKjYGwqOdxEY.1647 for user conductor
2021-07-06 14:59:25.037679 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.700884226s) to execute
2021-07-06 14:59:25.037878 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.796180698s) to execute
2021-07-06 14:59:25.191559 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (150.68583ms) to execute
2021-07-06 14:59:25.440231 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:25.538431 I | auth: deleting token jgGiSNhZwXVwfBcp.1646 for user conductor
2021-07-06 14:59:25.538483 I | auth: deleting token nZrAnqVAhweQrmlm.1649 for user conductor
2021-07-06 14:59:26.538324 I | auth: deleting token CUZhgTaVkgzcntnL.1648 for user conductor
2021-07-06 14:59:27.538444 I | auth: deleting token uIXXSlIQxDGnzTzR.1651 for user conductor
2021-07-06 14:59:27.538553 I | auth: deleting token vWmRrnunMkAICoqu.1652 for user conductor
2021-07-06 14:59:27.538570 I | auth: deleting token STKAtGNIGvqcuMSN.1650 for user conductor
2021-07-06 14:59:30.440525 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:30.538393 I | auth: deleting token bLOFUDasKoofPxzK.1654 for user conductor
2021-07-06 14:59:30.538455 I | auth: deleting token BpxxMAiPjWcJOsFy.1653 for user conductor
2021-07-06 14:59:32.538249 I | auth: deleting token EbOxaYEfcYTWlcFB.1655 for user conductor
2021-07-06 14:59:32.538294 I | auth: deleting token OJLwogDhcRimTRxN.1656 for user conductor
2021-07-06 14:59:32.538312 I | auth: deleting token WkxQQGNuPkLJkBRt.1657 for user conductor
2021-07-06 14:59:33.538289 I | auth: deleting token xaRDkowJOcwkSWkr.1658 for user conductor
2021-07-06 14:59:35.440961 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:35.946158 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.150200728s) to execute
2021-07-06 14:59:37.538346 I | auth: deleting token TfUaMdnnkJZZgaRR.1659 for user conductor
2021-07-06 14:59:37.538409 I | auth: deleting token KoFGDPpBeAFyHkuJ.1662 for user conductor
2021-07-06 14:59:37.538430 I | auth: deleting token DCkqsUigVDttJYDn.1661 for user conductor
2021-07-06 14:59:37.538441 I | auth: deleting token PhlddXbJjrKLaRQE.1660 for user conductor
2021-07-06 14:59:37.940883 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.901767536s) to execute
2021-07-06 14:59:37.941145 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.90418839s) to execute
2021-07-06 14:59:38.092290 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (148.003757ms) to execute
2021-07-06 14:59:38.098109 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (151.790437ms) to execute
2021-07-06 14:59:39.538339 I | auth: deleting token QhULkjhKuKfSuQft.1663 for user conductor
2021-07-06 14:59:40.140161 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.244299335s) to execute
2021-07-06 14:59:40.536710 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:40.538370 I | auth: deleting token IZKmhkYufkCXPJuF.1667 for user conductor
2021-07-06 14:59:40.538423 I | auth: deleting token wnyIVjKamgpxkKXw.1665 for user conductor
2021-07-06 14:59:40.538439 I | auth: deleting token DiVMQpTpwALBMKUy.1666 for user conductor
2021-07-06 14:59:40.538455 I | auth: deleting token SEkKOBMEoNNMliaI.1664 for user conductor
2021-07-06 14:59:42.437213 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.100303866s) to execute
2021-07-06 14:59:44.338240 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.900913556s) to execute
2021-07-06 14:59:44.338739 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.801829373s) to execute
2021-07-06 14:59:44.538373 I | auth: deleting token SguAMYNEWnBjrXGM.1668 for user conductor
2021-07-06 14:59:44.538426 I | auth: deleting token WoyzHbUKzbfYciMU.1670 for user conductor
2021-07-06 14:59:44.538449 I | auth: deleting token WxvkbnSpPMeOTGGz.1669 for user conductor
2021-07-06 14:59:44.538479 I | auth: deleting token qXTRmJUYsWDZvCAh.1671 for user conductor
2021-07-06 14:59:45.536916 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:46.240579 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.801585065s) to execute
2021-07-06 14:59:46.240967 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.049768565s) to execute
2021-07-06 14:59:46.538407 I | auth: deleting token DrdpplEjtEigPxvV.1672 for user conductor
2021-07-06 14:59:46.538572 I | auth: deleting token NsCTJoPwjbXbsyFv.1673 for user conductor
2021-07-06 14:59:48.538383 I | auth: deleting token PjNnOjQuZlHjCOmH.1674 for user conductor
2021-07-06 14:59:48.538462 I | auth: deleting token weXndyjxslyrTDUd.1675 for user conductor
2021-07-06 14:59:48.538477 I | auth: deleting token BbJnXVMWvuynuEjZ.1676 for user conductor
2021-07-06 14:59:49.242522 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (951.114182ms) to execute
2021-07-06 14:59:50.537248 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:51.539592 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.745896767s) to execute
2021-07-06 14:59:52.538303 I | auth: deleting token DemPkUCOEObZQrnT.1679 for user conductor
2021-07-06 14:59:52.538367 I | auth: deleting token UpStRDNPeRXvtrhx.1680 for user conductor
2021-07-06 14:59:52.538383 I | auth: deleting token kQLejEZEmrVzReLq.1677 for user conductor
2021-07-06 14:59:52.538392 I | auth: deleting token BtwUVIeqKyuMlvVN.1678 for user conductor
2021-07-06 14:59:52.538402 I | auth: deleting token rMbHsOcqpQCKdXvc.1681 for user conductor
2021-07-06 14:59:53.240161 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.646573434s) to execute
2021-07-06 14:59:54.538457 I | auth: deleting token CElNKuYisaskyzAi.1682 for user conductor
2021-07-06 14:59:55.337501 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.097202797s) to execute
2021-07-06 14:59:55.337654 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.094867838s) to execute
2021-07-06 14:59:55.537526 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 14:59:55.538337 I | auth: deleting token iJLMOzBpLreUnTit.1683 for user conductor
2021-07-06 14:59:57.538524 I | auth: deleting token XbFRWQQJuWhQKJUc.1684 for user conductor
2021-07-06 14:59:58.538341 I | auth: deleting token lLISXHBkeqWhmiqk.1685 for user conductor
2021-07-06 15:00:00.537844 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:01.538335 I | auth: deleting token ujMGPqmssscMgeKe.1686 for user conductor
2021-07-06 15:00:01.538389 I | auth: deleting token nDtoASwGrOpGYpdY.1687 for user conductor
2021-07-06 15:00:01.538405 I | auth: deleting token PsueHOVsvQkfBoiG.1688 for user conductor
2021-07-06 15:00:01.739611 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.948526781s) to execute
2021-07-06 15:00:01.936756 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (193.49269ms) to execute
2021-07-06 15:00:01.992970 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (152.176106ms) to execute
2021-07-06 15:00:03.538276 I | auth: deleting token hDstwhMfIGAITtEy.1690 for user conductor
2021-07-06 15:00:03.538332 I | auth: deleting token sJMYMOJgwObIqJsj.1689 for user conductor
2021-07-06 15:00:04.538388 I | auth: deleting token HlHzHiebNFACrCWz.1691 for user conductor
2021-07-06 15:00:05.538140 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:06.538381 I | auth: deleting token pItogUxLqeLBfCrh.1693 for user conductor
2021-07-06 15:00:06.538497 I | auth: deleting token ckGkQnPvFzVdbUOp.1692 for user conductor
2021-07-06 15:00:08.538419 I | auth: deleting token EoKPieCHmRVcFjkj.1694 for user conductor
2021-07-06 15:00:08.538527 I | auth: deleting token VZWEpbaWgnjaYHDR.1695 for user conductor
2021-07-06 15:00:08.538552 I | auth: deleting token sAKlQmAqdheaygHN.1696 for user conductor
2021-07-06 15:00:10.538358 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:11.538286 I | auth: deleting token ceDbgibxCTdYidyT.1698 for user conductor
2021-07-06 15:00:11.538363 I | auth: deleting token OFzbtBBNfHWhVVZe.1697 for user conductor
2021-07-06 15:00:13.538304 I | auth: deleting token cuxAaWwjhMSzaSoK.1699 for user conductor
2021-07-06 15:00:13.538366 I | auth: deleting token USzzhXAwPfnJWpaq.1701 for user conductor
2021-07-06 15:00:13.538403 I | auth: deleting token tMAwPhrQxbehkrwf.1700 for user conductor
2021-07-06 15:00:14.538490 I | auth: deleting token FzkbgsiYyDvzUBIY.1702 for user conductor
2021-07-06 15:00:15.337896 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.439795952s) to execute
2021-07-06 15:00:15.538653 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:16.538441 I | auth: deleting token lWPwQTBfluqtoEEm.1703 for user conductor
2021-07-06 15:00:17.338826 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.847170457s) to execute
2021-07-06 15:00:17.338941 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.998654957s) to execute
2021-07-06 15:00:17.339014 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.998752315s) to execute
2021-07-06 15:00:17.491484 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (149.850357ms) to execute
2021-07-06 15:00:17.538495 I | auth: deleting token qRDwtkZCqtcOUppU.1704 for user conductor
2021-07-06 15:00:20.538538 I | auth: deleting token TyTyyVPPRxFilObT.1705 for user conductor
2021-07-06 15:00:20.538636 I | auth: deleting token hRYZCoxfGGdmZynb.1707 for user conductor
2021-07-06 15:00:20.538894 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:21.042285 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (348.178686ms) to execute
2021-07-06 15:00:21.538324 I | auth: deleting token MACQvQfgbnTcaZwj.1708 for user conductor
2021-07-06 15:00:21.538384 I | auth: deleting token uAsKAKEoJSqTsHcG.1706 for user conductor
2021-07-06 15:00:22.538347 I | auth: deleting token hVkUvzjaUijDAfYI.1709 for user conductor
2021-07-06 15:00:22.839347 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (602.231405ms) to execute
2021-07-06 15:00:25.539158 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:26.538294 I | auth: deleting token MjfwYWhUqiTJGvBv.1710 for user conductor
2021-07-06 15:00:26.538356 I | auth: deleting token OLEFKuybvLMnTiBk.1711 for user conductor
2021-07-06 15:00:28.538357 I | auth: deleting token BATLbXjHqFUhlxCc.1714 for user conductor
2021-07-06 15:00:28.538395 I | auth: deleting token fznsFVZjWoSxfIrc.1712 for user conductor
2021-07-06 15:00:28.538406 I | auth: deleting token CzcKIvZadxhGEaCu.1716 for user conductor
2021-07-06 15:00:28.538413 I | auth: deleting token AyASQhncuGZozrYc.1715 for user conductor
2021-07-06 15:00:28.538421 I | auth: deleting token qcnEEBfrXMkpvxIZ.1713 for user conductor
2021-07-06 15:00:30.538309 I | auth: deleting token BztaOiSuRSsxerTY.1718 for user conductor
2021-07-06 15:00:30.538404 I | auth: deleting token xUQMHlWwcKYYNRbh.1717 for user conductor
2021-07-06 15:00:30.539323 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:30.539743 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.501687645s) to execute
2021-07-06 15:00:30.837458 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (200.32727ms) to execute
2021-07-06 15:00:30.837511 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (200.344666ms) to execute
2021-07-06 15:00:30.891761 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (254.552095ms) to execute
2021-07-06 15:00:32.538527 I | auth: deleting token eFqoTfhteBhyGZeM.1719 for user conductor
2021-07-06 15:00:32.643336 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.551731974s) to execute
2021-07-06 15:00:33.540692 I | auth: deleting token fTIVSYJsmfUYYmVr.1720 for user conductor
2021-07-06 15:00:33.540766 I | auth: deleting token TlxZlDCeCwynZeVy.1722 for user conductor
2021-07-06 15:00:33.540790 I | auth: deleting token tKZYUASsoLFKDsSq.1721 for user conductor
2021-07-06 15:00:34.538236 I | auth: deleting token bRysqTeevFAsEbTi.1723 for user conductor
2021-07-06 15:00:35.538301 I | auth: deleting token BDXfVjrDuSZNPwpO.1724 for user conductor
2021-07-06 15:00:35.539602 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:35.643280 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.451464357s) to execute
2021-07-06 15:00:36.538273 I | auth: deleting token kxTgZPvxybaJhEOz.1725 for user conductor
2021-07-06 15:00:37.538387 I | auth: deleting token sjRfVgoLpOiRQHpp.1726 for user conductor
2021-07-06 15:00:37.538469 I | auth: deleting token rVEtgecijFzJmvaF.1727 for user conductor
2021-07-06 15:00:39.538370 I | auth: deleting token poqvvcMUOaTViypB.1728 for user conductor
2021-07-06 15:00:39.638516 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.046882898s) to execute
2021-07-06 15:00:40.539903 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:41.538135 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.801060846s) to execute
2021-07-06 15:00:41.538344 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.896891306s) to execute
2021-07-06 15:00:41.538535 I | auth: deleting token XMoPPLAJLcvlOWQK.1730 for user conductor
2021-07-06 15:00:41.691822 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (150.640177ms) to execute
2021-07-06 15:00:43.439209 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (847.703882ms) to execute
2021-07-06 15:00:43.538327 I | auth: deleting token OHIxcAHQlKolyXJt.1731 for user conductor
2021-07-06 15:00:43.538386 I | auth: deleting token eymoNkjiKhqyLYnx.1734 for user conductor
2021-07-06 15:00:43.538410 I | auth: deleting token VTFSJIrIhaOnhJiH.1732 for user conductor
2021-07-06 15:00:43.538423 I | auth: deleting token IkQbmTjHxLfdLFKm.1733 for user conductor
2021-07-06 15:00:43.538467 I | auth: deleting token OrLjgSkRpJRrvBEp.1729 for user conductor
2021-07-06 15:00:45.538339 I | auth: deleting token RHLqsANqquakXGQS.1737 for user conductor
2021-07-06 15:00:45.538399 I | auth: deleting token ezeojZjOidnlEdOY.1735 for user conductor
2021-07-06 15:00:45.538414 I | auth: deleting token SOPayHfXtryWnJdp.1736 for user conductor
2021-07-06 15:00:45.540201 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:46.838279 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.101441855s) to execute
2021-07-06 15:00:48.538273 I | auth: deleting token McESVxuLkvexmoXk.1738 for user conductor
2021-07-06 15:00:48.538315 I | auth: deleting token ByefbLNbGrZMdueq.1739 for user conductor
2021-07-06 15:00:48.642114 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.650562518s) to execute
2021-07-06 15:00:48.791542 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.921969ms) to execute
2021-07-06 15:00:50.538334 I | auth: deleting token UGdbHrkvQimOQeIN.1741 for user conductor
2021-07-06 15:00:50.538429 I | auth: deleting token jQLWftzojbRZWlqD.1740 for user conductor
2021-07-06 15:00:50.540402 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:52.336892 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.198006359s) to execute
2021-07-06 15:00:53.538248 I | auth: deleting token saVaUZZSPxMCCkcP.1743 for user conductor
2021-07-06 15:00:53.538297 I | auth: deleting token nWCigmYdcCpPhSMj.1745 for user conductor
2021-07-06 15:00:53.538327 I | auth: deleting token LPTLQJvUlkQZmJXC.1744 for user conductor
2021-07-06 15:00:53.538345 I | auth: deleting token FWbshcCxAmLtNhes.1742 for user conductor
2021-07-06 15:00:54.238708 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.899399367s) to execute
2021-07-06 15:00:54.238980 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.701643279s) to execute
2021-07-06 15:00:55.540562 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:00:56.044501 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.80280811s) to execute
2021-07-06 15:00:56.044569 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.607398079s) to execute
2021-07-06 15:00:56.192777 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (144.836035ms) to execute
2021-07-06 15:00:56.538369 I | auth: deleting token DnEmYBzYFPcPJmAR.1746 for user conductor
2021-07-06 15:00:56.538426 I | auth: deleting token bfMsXdhZftdYADVw.1748 for user conductor
2021-07-06 15:00:57.538358 I | auth: deleting token fjhcmGHzSgGFoqlm.1747 for user conductor
2021-07-06 15:00:57.538414 I | auth: deleting token LOclRTQkIhsWXXbg.1749 for user conductor
2021-07-06 15:00:58.341750 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.550212804s) to execute
2021-07-06 15:00:58.691322 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (197.448189ms) to execute
2021-07-06 15:01:00.540768 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:02.538339 I | auth: deleting token spxNCvmXCxbfeUhI.1750 for user conductor
2021-07-06 15:01:02.538382 I | auth: deleting token rhQneMNkEytfyyoU.1751 for user conductor
2021-07-06 15:01:02.538396 I | auth: deleting token YyrjQjMvwapFKpmU.1752 for user conductor
2021-07-06 15:01:03.239867 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (402.72389ms) to execute
2021-07-06 15:01:04.538288 I | auth: deleting token HspoDMBGSEpjTkhc.1755 for user conductor
2021-07-06 15:01:04.538335 I | auth: deleting token WsqBPzFuQxQrYaMn.1754 for user conductor
2021-07-06 15:01:04.538348 I | auth: deleting token xfRdlrdkcHGJfYmQ.1757 for user conductor
2021-07-06 15:01:04.538356 I | auth: deleting token dGECjYmumfseQONr.1753 for user conductor
2021-07-06 15:01:04.538366 I | auth: deleting token BZcRsocopctmnbZa.1756 for user conductor
2021-07-06 15:01:04.938804 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.501909593s) to execute
2021-07-06 15:01:05.091576 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (148.579936ms) to execute
2021-07-06 15:01:05.541016 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:07.538379 I | auth: deleting token VuvZRyEMsjTQcgSt.1761 for user conductor
2021-07-06 15:01:07.538426 I | auth: deleting token EaYCgwxCCUVZVscv.1758 for user conductor
2021-07-06 15:01:07.538440 I | auth: deleting token pfdBktZjvpsbpCiX.1760 for user conductor
2021-07-06 15:01:07.538456 I | auth: deleting token OliDmXdUDJgubFdg.1759 for user conductor
2021-07-06 15:01:08.042375 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (205.434017ms) to execute
2021-07-06 15:01:08.391296 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (196.740106ms) to execute
2021-07-06 15:01:10.541305 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:11.538398 I | auth: deleting token sKBcaVUSbqaElFQP.1762 for user conductor
2021-07-06 15:01:12.244604 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (153.268987ms) to execute
2021-07-06 15:01:12.592751 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (249.431244ms) to execute
2021-07-06 15:01:13.538335 I | auth: deleting token BPoVxpxZPCjWKijh.1766 for user conductor
2021-07-06 15:01:13.538385 I | auth: deleting token zTGYxHdysZzgifdx.1763 for user conductor
2021-07-06 15:01:13.538447 I | auth: deleting token TJAwZCYWxYzsJXvF.1764 for user conductor
2021-07-06 15:01:13.538467 I | auth: deleting token odtotpXsVHQRCBeK.1767 for user conductor
2021-07-06 15:01:13.538479 I | auth: deleting token pFGdWIKMvlzAxRaQ.1765 for user conductor
2021-07-06 15:01:14.538239 I | auth: deleting token SnlNkrBlGKGgHkWr.1769 for user conductor
2021-07-06 15:01:14.538286 I | auth: deleting token iJXkAsGavLUvgYPG.1770 for user conductor
2021-07-06 15:01:14.538299 I | auth: deleting token ILhoIAutjNoPDkoH.1768 for user conductor
2021-07-06 15:01:15.541688 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:16.336717 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (999.826958ms) to execute
2021-07-06 15:01:16.538299 I | auth: deleting token NvnsgULPYWnczbPF.1772 for user conductor
2021-07-06 15:01:16.538377 I | auth: deleting token jcfMGNavrOXqwGmS.1771 for user conductor
2021-07-06 15:01:18.439727 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.502741856s) to execute
2021-07-06 15:01:19.538275 I | auth: deleting token rrARKcQTMSSQJyxt.1774 for user conductor
2021-07-06 15:01:19.538327 I | auth: deleting token cRLelTSbNbyKyjJG.1773 for user conductor
2021-07-06 15:01:19.538369 I | auth: deleting token EpvcSKnVeykzlBZH.1775 for user conductor
2021-07-06 15:01:20.141638 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.55032057s) to execute
2021-07-06 15:01:20.542118 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:20.591426 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (350.235763ms) to execute
2021-07-06 15:01:21.538297 I | auth: deleting token VFtDAtJBOQPhZlrQ.1777 for user conductor
2021-07-06 15:01:21.538364 I | auth: deleting token YERGjGqkkRfjmxuS.1776 for user conductor
2021-07-06 15:01:22.538329 I | auth: deleting token lkLnTWHYBafEWkPd.1778 for user conductor
2021-07-06 15:01:23.942098 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.650666611s) to execute
2021-07-06 15:01:24.538365 I | auth: deleting token dMNhjCBUnFvxhofd.1780 for user conductor
2021-07-06 15:01:24.538432 I | auth: deleting token DwCgUhdHNJgNiidX.1779 for user conductor
2021-07-06 15:01:25.542395 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:25.841249 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.149872201s) to execute
2021-07-06 15:01:26.191907 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (197.942321ms) to execute
2021-07-06 15:01:26.538341 I | auth: deleting token SxzhsstXsAliyllt.1782 for user conductor
2021-07-06 15:01:26.538470 I | auth: deleting token kwGdzqvPlXmarpKa.1783 for user conductor
2021-07-06 15:01:26.538541 I | auth: deleting token eqlTcuEjAxDqNHTq.1781 for user conductor
2021-07-06 15:01:29.538470 I | auth: deleting token izbWcesjMwADrDPJ.1784 for user conductor
2021-07-06 15:01:30.038007 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (744.596551ms) to execute
2021-07-06 15:01:30.604588 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:30.604707 I | auth: deleting token PvcCPrTjImHvbGAn.1786 for user conductor
2021-07-06 15:01:30.604730 I | auth: deleting token zmgjoQbBmXpeTOeW.1787 for user conductor
2021-07-06 15:01:30.604756 I | auth: deleting token UjASeyFFztItHBqh.1785 for user conductor
2021-07-06 15:01:31.841986 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.800649568s) to execute
2021-07-06 15:01:33.741883 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.802573592s) to execute
2021-07-06 15:01:34.538282 I | auth: deleting token WdoPdeohOlSHMdcQ.1789 for user conductor
2021-07-06 15:01:34.538363 I | auth: deleting token iDaFjIZGxIJgydFF.1791 for user conductor
2021-07-06 15:01:34.538387 I | auth: deleting token TuAMqITrwHgLJzJa.1788 for user conductor
2021-07-06 15:01:34.538400 I | auth: deleting token JWLCShkCWLeNbPlV.1790 for user conductor
2021-07-06 15:01:34.538411 I | auth: deleting token UmFJjnAJgHrPVtvU.1792 for user conductor
2021-07-06 15:01:35.538811 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.796778766s) to execute
2021-07-06 15:01:35.539052 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.694086804s) to execute
2021-07-06 15:01:35.539144 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.793197039s) to execute
2021-07-06 15:01:35.610868 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:37.538453 I | auth: deleting token UcwHxDnWDAvmPSkT.1793 for user conductor
2021-07-06 15:01:40.636720 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:41.437882 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.700969781s) to execute
2021-07-06 15:01:41.538209 I | auth: deleting token xivIlmvJhEiIYwdo.1795 for user conductor
2021-07-06 15:01:41.538274 I | auth: deleting token xSDxGbYKPIVuIork.1794 for user conductor
2021-07-06 15:01:41.538293 I | auth: deleting token POBJyLGQGuUBFIEJ.1798 for user conductor
2021-07-06 15:01:41.538330 I | auth: deleting token wNXDAkgTNifsCmgz.1799 for user conductor
2021-07-06 15:01:41.538352 I | auth: deleting token AEHJrPIxoUZiNLXG.1797 for user conductor
2021-07-06 15:01:41.538383 I | auth: deleting token akjCCZkzQLynddaO.1796 for user conductor
2021-07-06 15:01:43.440197 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.903208987s) to execute
2021-07-06 15:01:43.538279 I | auth: deleting token TDFZWBOiuJYBwFsF.1801 for user conductor
2021-07-06 15:01:43.538335 I | auth: deleting token gfopDuyahCEUMrNF.1802 for user conductor
2021-07-06 15:01:43.538341 I | auth: deleting token EKYgclGfHBaCsfmJ.1800 for user conductor
2021-07-06 15:01:45.241347 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.704447468s) to execute
2021-07-06 15:01:45.241696 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.684520101s) to execute
2021-07-06 15:01:45.336706 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.798519667s) to execute
2021-07-06 15:01:45.337083 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.893998465s) to execute
2021-07-06 15:01:45.538308 I | auth: deleting token NWqIbWGZUDlRyElP.1803 for user conductor
2021-07-06 15:01:45.538365 I | auth: deleting token ZjLKbIIVvbQidxzz.1804 for user conductor
2021-07-06 15:01:45.636961 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:47.538464 I | auth: deleting token SNDktjOTKHxRlLCm.1805 for user conductor
2021-07-06 15:01:47.538509 I | auth: deleting token OtjorZTwNbxAkPSJ.1806 for user conductor
2021-07-06 15:01:49.538307 I | auth: deleting token ATCDyozXpMMYpJaV.1808 for user conductor
2021-07-06 15:01:49.538371 I | auth: deleting token EmwIWNRqnfnCJwVg.1807 for user conductor
2021-07-06 15:01:50.637169 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:51.538269 I | auth: deleting token nOZafnswcuStMKcU.1810 for user conductor
2021-07-06 15:01:51.538334 I | auth: deleting token ZgSjYmzVlZWIhIUv.1809 for user conductor
2021-07-06 15:01:52.538283 I | auth: deleting token hYaKyNRQugqWRTzL.1812 for user conductor
2021-07-06 15:01:52.538337 I | auth: deleting token vLCviuFArsPKcdlu.1813 for user conductor
2021-07-06 15:01:52.538357 I | auth: deleting token bvQMZRGZMUPosNTL.1811 for user conductor
2021-07-06 15:01:52.843987 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.204886746s) to execute
2021-07-06 15:01:55.637431 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:01:56.538295 I | auth: deleting token UoZJxKSjDjAtLOWX.1814 for user conductor
2021-07-06 15:01:56.538349 I | auth: deleting token UfSyTwSFnsvJsHLm.1816 for user conductor
2021-07-06 15:01:58.538336 I | auth: deleting token eyktVqphIMghmOUN.1818 for user conductor
2021-07-06 15:01:58.538402 I | auth: deleting token ilTBqRtrHDSAvPqq.1815 for user conductor
2021-07-06 15:01:58.543527 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.604284321s) to execute
2021-07-06 15:02:00.538262 I | auth: deleting token EHKlMhyNvFzTzGGV.1820 for user conductor
2021-07-06 15:02:00.538295 I | auth: deleting token rvOSExpPIXdGQoTq.1821 for user conductor
2021-07-06 15:02:00.538318 I | auth: deleting token JnzZUykGLSBmOdor.1817 for user conductor
2021-07-06 15:02:00.637665 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:00.638158 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.999136025s) to execute
2021-07-06 15:02:00.638429 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.001564424s) to execute
2021-07-06 15:02:00.892793 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.255882318s) to execute
2021-07-06 15:02:00.893003 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.155223074s) to execute
2021-07-06 15:02:00.894709 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (253.552407ms) to execute
2021-07-06 15:02:01.538330 I | auth: deleting token BuKfVwaLQCRdBPRe.1819 for user conductor
2021-07-06 15:02:02.538376 I | auth: deleting token faLAWQdolBfUGRdk.1822 for user conductor
2021-07-06 15:02:02.538428 I | auth: deleting token sIoPGAyzQJbRnDKO.1823 for user conductor
2021-07-06 15:02:05.637948 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:07.538410 I | auth: deleting token djdlDiowJltXLXYd.1826 for user conductor
2021-07-06 15:02:07.538488 I | auth: deleting token iZoPtzlGaVCABslK.1824 for user conductor
2021-07-06 15:02:07.538502 I | auth: deleting token rLtNvNvVKmlirpJj.1828 for user conductor
2021-07-06 15:02:09.538574 I | auth: deleting token LqndYusybKNTUkIs.1829 for user conductor
2021-07-06 15:02:09.538630 I | auth: deleting token laNwVGvyBFdwNCWn.1830 for user conductor
2021-07-06 15:02:09.538670 I | auth: deleting token ggpnURFBIKOJopCA.1827 for user conductor
2021-07-06 15:02:09.538721 I | auth: deleting token KwBmKqJOvlbMuakw.1825 for user conductor
2021-07-06 15:02:10.638146 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:13.538260 I | auth: deleting token gsyPnqeBmOPvoFcn.1831 for user conductor
2021-07-06 15:02:13.538304 I | auth: deleting token SCSLuyEoHBfUdTAL.1832 for user conductor
2021-07-06 15:02:13.538311 I | auth: deleting token ZSckiSqBBfpDqqtl.1833 for user conductor
2021-07-06 15:02:13.538316 I | auth: deleting token dQSurUdAnOIKkdch.1834 for user conductor
2021-07-06 15:02:13.538334 I | auth: deleting token SvGzIXViFpJsbppg.1835 for user conductor
2021-07-06 15:02:15.638381 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:16.538274 I | auth: deleting token kzeDLGgpJVQkLnPX.1837 for user conductor
2021-07-06 15:02:16.538333 I | auth: deleting token TXUkBWEINWmtynjZ.1838 for user conductor
2021-07-06 15:02:16.538347 I | auth: deleting token OKBCvHoZiruYjyMQ.1836 for user conductor
2021-07-06 15:02:17.538264 I | auth: deleting token wodvrdOoIPuVEklu.1840 for user conductor
2021-07-06 15:02:17.538323 I | auth: deleting token pVvjOpaiumodNUHX.1839 for user conductor
2021-07-06 15:02:18.143168 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.404164914s) to execute
2021-07-06 15:02:18.338046 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.9456ms) to execute
2021-07-06 15:02:18.338115 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (101.008088ms) to execute
2021-07-06 15:02:18.338281 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (101.140616ms) to execute
2021-07-06 15:02:18.538531 I | auth: deleting token eAjiReeXaxLcJghZ.1841 for user conductor
2021-07-06 15:02:19.538386 I | auth: deleting token cCyJtTblrvHzxdls.1842 for user conductor
2021-07-06 15:02:20.638682 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:22.538371 I | auth: deleting token jYUPugyUoySOsspZ.1843 for user conductor
2021-07-06 15:02:25.638982 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:26.538357 I | auth: deleting token xINbgnKihWeBIgPe.1847 for user conductor
2021-07-06 15:02:26.538415 I | auth: deleting token JiyNReagywktHury.1845 for user conductor
2021-07-06 15:02:26.538431 I | auth: deleting token kzxQmhAascgmXycp.1846 for user conductor
2021-07-06 15:02:26.538443 I | auth: deleting token bbmIPVqaTFnFowPT.1848 for user conductor
2021-07-06 15:02:26.538466 I | auth: deleting token zapfsyZPtsCFLplT.1849 for user conductor
2021-07-06 15:02:26.538536 I | auth: deleting token BLRGUhkAXGYlzDSm.1844 for user conductor
2021-07-06 15:02:28.941653 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.104564974s) to execute
2021-07-06 15:02:29.191284 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (247.115812ms) to execute
2021-07-06 15:02:30.538255 I | auth: deleting token MQjGQpqkZeViydUt.1851 for user conductor
2021-07-06 15:02:30.538324 I | auth: deleting token OCwiQUHWWIZLvlkN.1850 for user conductor
2021-07-06 15:02:30.538358 I | auth: deleting token mGvdCCFouLyVMcDp.1853 for user conductor
2021-07-06 15:02:30.538382 I | auth: deleting token EYuztasydodskFSJ.1852 for user conductor
2021-07-06 15:02:30.639299 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:30.844229 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (991.002835ms) to execute
2021-07-06 15:02:32.538318 I | auth: deleting token mEWypNdxxDyFaNPX.1854 for user conductor
2021-07-06 15:02:33.138568 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.201827546s) to execute
2021-07-06 15:02:33.538441 I | auth: deleting token tTpzEHCWQAayVkyA.1857 for user conductor
2021-07-06 15:02:33.538504 I | auth: deleting token ZiXDbqNRIoFnOXkZ.1855 for user conductor
2021-07-06 15:02:35.538321 I | auth: deleting token BcPYZqZnjgdpvSqE.1858 for user conductor
2021-07-06 15:02:35.538416 I | auth: deleting token xyHsYOunEBUdKmXW.1860 for user conductor
2021-07-06 15:02:35.538443 I | auth: deleting token WdHWvrSivTyFvPTX.1856 for user conductor
2021-07-06 15:02:35.538463 I | auth: deleting token IIcdjicteSUPDZcW.1859 for user conductor
2021-07-06 15:02:35.639638 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:36.842248 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.601825293s) to execute
2021-07-06 15:02:36.842470 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.701291701s) to execute
2021-07-06 15:02:37.091797 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (154.772474ms) to execute
2021-07-06 15:02:37.093147 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (148.946875ms) to execute
2021-07-06 15:02:39.043070 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (445.81972ms) to execute
2021-07-06 15:02:40.639890 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:41.137370 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.945894071s) to execute
2021-07-06 15:02:42.538519 I | auth: deleting token AiwqjjlQIpMzhOvU.1862 for user conductor
2021-07-06 15:02:42.538576 I | auth: deleting token lQWuBmcrQsnYHyJf.1861 for user conductor
2021-07-06 15:02:43.243730 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.947799425s) to execute
2021-07-06 15:02:43.243878 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.652460157s) to execute
2021-07-06 15:02:44.538342 I | auth: deleting token GIVAVkQkLynKBEym.1864 for user conductor
2021-07-06 15:02:44.538386 I | auth: deleting token RERtgazmZwzqdSPd.1863 for user conductor
2021-07-06 15:02:44.538393 I | auth: deleting token qwyxuGCqfFbvOZbl.1865 for user conductor
2021-07-06 15:02:45.039262 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.746665345s) to execute
2021-07-06 15:02:45.191631 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (149.962563ms) to execute
2021-07-06 15:02:45.640127 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:46.538261 I | auth: deleting token ZfHusndYXfcSjibC.1866 for user conductor
2021-07-06 15:02:46.538312 I | auth: deleting token XMWLRnvRpnwvixtR.1867 for user conductor
2021-07-06 15:02:47.538340 I | auth: deleting token ieMHoZUoWFvcoCVs.1868 for user conductor
2021-07-06 15:02:48.938011 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.646497853s) to execute
2021-07-06 15:02:50.538328 I | auth: deleting token qBPxTHnVybSsiAXL.1869 for user conductor
2021-07-06 15:02:50.538518 I | auth: deleting token NnECrEONhgZuDlWq.1870 for user conductor
2021-07-06 15:02:50.538538 I | auth: deleting token xirQoaCtWVOjwquL.1871 for user conductor
2021-07-06 15:02:50.640426 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp: lookup onap-oof-has-etcd-1.oof-has-etcd on 169.254.25.10:53: no such host
2021-07-06 15:02:52.538441 I | auth: deleting token FSiBDjkbqorXiyuy.1872 for user conductor
2021-07-06 15:02:53.043094 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.046952584s) to execute
2021-07-06 15:02:54.538178 I | auth: deleting token PWtgOxlbkCGkASGP.1874 for user conductor
2021-07-06 15:02:54.538221 I | auth: deleting token TPMCkqPJeAQNTUmE.1873 for user conductor
2021-07-06 15:02:54.937673 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.644017556s) to execute
2021-07-06 15:02:55.538299 I | auth: deleting token sZTmvIwWLmFuxXQY.1875 for user conductor
2021-07-06 15:02:55.640728 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:02:56.538461 I | auth: deleting token fNxFcuhcBHKNhUzM.1876 for user conductor
2021-07-06 15:02:56.538556 I | auth: deleting token KteqDABkIHbicSHG.1878 for user conductor
2021-07-06 15:02:56.538594 I | auth: deleting token oGTNnWVLTfOAdtoE.1877 for user conductor
2021-07-06 15:02:56.939738 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (702.835384ms) to execute
2021-07-06 15:02:58.538364 I | auth: deleting token ljMIdTzWQDIpkTVL.1879 for user conductor
2021-07-06 15:02:59.037259 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.093433642s) to execute
2021-07-06 15:02:59.393476 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (250.795089ms) to execute
2021-07-06 15:03:00.538419 I | auth: deleting token kyrbbnDZcKOtSSaW.1880 for user conductor
2021-07-06 15:03:00.538485 I | auth: deleting token cCqfptShuzpDBGaC.1882 for user conductor
2021-07-06 15:03:00.538498 I | auth: deleting token EjDUPMOTgwtyLvTo.1881 for user conductor
2021-07-06 15:03:00.736674 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:01.436980 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (699.299879ms) to execute
2021-07-06 15:03:01.538432 I | auth: deleting token huHEQXWmHitEGwLm.1883 for user conductor
2021-07-06 15:03:03.244742 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.107852206s) to execute
2021-07-06 15:03:03.336792 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.840298717s) to execute
2021-07-06 15:03:04.538360 I | auth: deleting token OavmOzxjESlztPib.1884 for user conductor
2021-07-06 15:03:05.740559 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:06.538342 I | auth: deleting token edEJwzqQrPYFRzPu.1887 for user conductor
2021-07-06 15:03:06.538390 I | auth: deleting token wlIPXhPgxfBThneS.1885 for user conductor
2021-07-06 15:03:07.041219 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.249974347s) to execute
2021-07-06 15:03:08.945329 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.808410859s) to execute
2021-07-06 15:03:08.945475 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.901145406s) to execute
2021-07-06 15:03:09.092896 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (133.380792ms) to execute
2021-07-06 15:03:10.740870 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:12.538353 I | auth: deleting token umvHHVgQaGoiJnTC.1888 for user conductor
2021-07-06 15:03:12.538381 I | auth: deleting token sopPAETZdpPwQzRk.1886 for user conductor
2021-07-06 15:03:12.538398 I | auth: deleting token FVLewrxOSKeunLcn.1890 for user conductor
2021-07-06 15:03:12.538408 I | auth: deleting token ZWELbcRHKaAafVdI.1889 for user conductor
2021-07-06 15:03:12.538418 I | auth: deleting token fJVrJJLDxWsLVNCG.1891 for user conductor
2021-07-06 15:03:12.936965 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (833.763917ms) to execute
2021-07-06 15:03:14.538424 I | auth: deleting token IOTsCZbmfNSDvcwt.1892 for user conductor
2021-07-06 15:03:14.538473 I | auth: deleting token cHEAyRmAUkTlMvBX.1893 for user conductor
2021-07-06 15:03:14.739666 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.148140093s) to execute
2021-07-06 15:03:15.538356 I | auth: deleting token NEFWtDfPzQKNMIWc.1894 for user conductor
2021-07-06 15:03:15.837047 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:17.538303 I | auth: deleting token LZyxZqMNfuwjKyED.1895 for user conductor
2021-07-06 15:03:17.538380 I | auth: deleting token zUgiANJyWeTRLiQL.1896 for user conductor
2021-07-06 15:03:18.936786 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (852.819977ms) to execute
2021-07-06 15:03:19.538383 I | auth: deleting token UGjSVQMBsLndcfBP.1897 for user conductor
2021-07-06 15:03:20.837333 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:20.843239 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.351761011s) to execute
2021-07-06 15:03:21.538384 I | auth: deleting token kzlYdRUmSOgVheJr.1899 for user conductor
2021-07-06 15:03:23.538290 I | auth: deleting token waPKOAfzvkJEpAPV.1898 for user conductor
2021-07-06 15:03:23.538359 I | auth: deleting token ZiAXNsLTtTntAnyJ.1901 for user conductor
2021-07-06 15:03:24.538229 I | auth: deleting token pHHuRvVmmrKldlrt.1900 for user conductor
2021-07-06 15:03:24.641421 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.2044249s) to execute
2021-07-06 15:03:24.792101 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (145.729079ms) to execute
2021-07-06 15:03:25.538445 I | auth: deleting token vGujarDdcANQnsiv.1903 for user conductor
2021-07-06 15:03:25.538522 I | auth: deleting token wWKSxnHRhkWLqzSZ.1902 for user conductor
2021-07-06 15:03:25.837661 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:26.736970 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.443104905s) to execute
2021-07-06 15:03:27.538397 I | auth: deleting token VaBWeWNEccFzcRXK.1906 for user conductor
2021-07-06 15:03:27.538457 I | auth: deleting token oFNdSIKhzzsuPtKy.1904 for user conductor
2021-07-06 15:03:27.538476 I | auth: deleting token AMACnduEmGeINAKV.1905 for user conductor
2021-07-06 15:03:28.739842 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (248.358257ms) to execute
2021-07-06 15:03:29.538377 I | auth: deleting token fqNStKABvcXXmaPE.1908 for user conductor
2021-07-06 15:03:29.538440 I | auth: deleting token samtEUuXWeLlsuvT.1909 for user conductor
2021-07-06 15:03:29.538475 I | auth: deleting token sctAzpRMkyjTyAxk.1907 for user conductor
2021-07-06 15:03:30.739740 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (848.230762ms) to execute
2021-07-06 15:03:30.837974 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:32.538541 I | auth: deleting token igihgpNabQnMFfXv.1910 for user conductor
2021-07-06 15:03:33.244347 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (252.820484ms) to execute
2021-07-06 15:03:35.838286 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:36.538310 I | auth: deleting token BmjpIMUXaShXhZiF.1911 for user conductor
2021-07-06 15:03:36.538372 I | auth: deleting token lZiJmazlWomVnavH.1915 for user conductor
2021-07-06 15:03:36.538397 I | auth: deleting token WrUJPEHQWUNSbNkV.1916 for user conductor
2021-07-06 15:03:36.538407 I | auth: deleting token UQNJeJWAPAVvyUpb.1912 for user conductor
2021-07-06 15:03:36.538417 I | auth: deleting token KzSVTYnkGaZbPQmE.1913 for user conductor
2021-07-06 15:03:36.538425 I | auth: deleting token wUCIEYnDqLosGaOe.1914 for user conductor
2021-07-06 15:03:37.144313 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.607450012s) to execute
2021-07-06 15:03:37.391869 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (150.908492ms) to execute
2021-07-06 15:03:37.538423 I | auth: deleting token iKPKXDDTKLKutrlp.1917 for user conductor
2021-07-06 15:03:39.538420 I | auth: deleting token pMTroFAJOrZFYBtu.1918 for user conductor
2021-07-06 15:03:40.838624 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:41.242007 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.305011176s) to execute
2021-07-06 15:03:41.391649 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (146.908371ms) to execute
2021-07-06 15:03:41.538390 I | auth: deleting token leqIJffPsNKnUURJ.1919 for user conductor
2021-07-06 15:03:43.343631 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.706712476s) to execute
2021-07-06 15:03:43.538345 I | auth: deleting token CoddZQLMLhRXCKTu.1920 for user conductor
2021-07-06 15:03:45.138988 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.647589482s) to execute
2021-07-06 15:03:45.291215 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (149.282082ms) to execute
2021-07-06 15:03:45.838959 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:46.538298 I | auth: deleting token oSLYpRDQRbhscldU.1921 for user conductor
2021-07-06 15:03:49.140250 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.14633255s) to execute
2021-07-06 15:03:50.538272 I | auth: deleting token lWCMlJiczjsmgSzo.1922 for user conductor
2021-07-06 15:03:50.538306 I | auth: deleting token VdbbIkWGrSCRdRbY.1925 for user conductor
2021-07-06 15:03:50.538329 I | auth: deleting token nGeWckkcJdhqYEPA.1923 for user conductor
2021-07-06 15:03:50.538343 I | auth: deleting token KHNdJLRVrDZeeqQz.1924 for user conductor
2021-07-06 15:03:50.538354 I | auth: deleting token xZaMjDUrTDndRssg.1926 for user conductor
2021-07-06 15:03:50.839188 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:51.539562 I | auth: deleting token cwUlHETntQTSwNAw.1927 for user conductor
2021-07-06 15:03:52.745541 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.602403551s) to execute
2021-07-06 15:03:52.746053 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.602882749s) to execute
2021-07-06 15:03:52.991437 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (154.311485ms) to execute
2021-07-06 15:03:54.538402 I | auth: deleting token WuagPeeIUHZIMUmo.1928 for user conductor
2021-07-06 15:03:54.538481 I | auth: deleting token CfJpPryPhzmQmJpP.1930 for user conductor
2021-07-06 15:03:55.839544 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:03:59.538422 I | auth: deleting token menVfOAsBOmWzBFZ.1932 for user conductor
2021-07-06 15:03:59.538471 I | auth: deleting token mJayuFbqMmfIroZH.1934 for user conductor
2021-07-06 15:03:59.538487 I | auth: deleting token IDvmNpnwmgMcEGYD.1935 for user conductor
2021-07-06 15:03:59.538499 I | auth: deleting token AhViCRPnZvMtwHml.1931 for user conductor
2021-07-06 15:03:59.538534 I | auth: deleting token JqrkDlBTBpNEDmZL.1933 for user conductor
2021-07-06 15:03:59.538547 I | auth: deleting token VdxQVVQkjnNHkvsE.1929 for user conductor
2021-07-06 15:04:00.839863 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:04:03.440581 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.049174031s) to execute
2021-07-06 15:04:03.538254 I | auth: deleting token XQXOPbkaOEIOfOGT.1938 for user conductor
2021-07-06 15:04:03.538312 I | auth: deleting token mlyHKlojarbrShOS.1937 for user conductor
2021-07-06 15:04:03.538336 I | auth: deleting token cpSakLNTqpocHbyI.1936 for user conductor
2021-07-06 15:04:03.538355 I | auth: deleting token sJtQLhkQAnysqUjs.1939 for user conductor
2021-07-06 15:04:05.341751 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.004886029s) to execute
2021-07-06 15:04:05.840105 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:04:07.538361 I | auth: deleting token KwTwNcdaKArYRwqW.1943 for user conductor
2021-07-06 15:04:07.538432 I | auth: deleting token xwHsplTIbIyFoVIN.1944 for user conductor
2021-07-06 15:04:07.538456 I | auth: deleting token BijnVHPaYythNEOD.1941 for user conductor
2021-07-06 15:04:07.538493 I | auth: deleting token mttLgDirjRudDEBG.1940 for user conductor
2021-07-06 15:04:07.538510 I | auth: deleting token VZhHMqLVXWqbSBrG.1942 for user conductor
2021-07-06 15:04:07.641424 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.104468087s) to execute
2021-07-06 15:04:09.342730 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.698255763s) to execute
2021-07-06 15:04:09.342903 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.698841248s) to execute
2021-07-06 15:04:10.840335 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:04:11.538388 I | auth: deleting token wnQGsoNrJtenejBn.1947 for user conductor
2021-07-06 15:04:11.538460 I | auth: deleting token wnIXAGMMrmlAoLfg.1945 for user conductor
2021-07-06 15:04:11.642783 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.842273895s) to execute
2021-07-06 15:04:13.340256 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.600949758s) to execute
2021-07-06 15:04:13.538334 I | auth: deleting token lHTuklGWiBelYaUU.1946 for user conductor
2021-07-06 15:04:13.538398 I | auth: deleting token mVNCUdMjngbDpyKH.1950 for user conductor
2021-07-06 15:04:13.538425 I | auth: deleting token mLepRWFgsLnufoFQ.1949 for user conductor
2021-07-06 15:04:13.538437 I | auth: deleting token NTJMECXVfHcpIJBq.1948 for user conductor
2021-07-06 15:04:15.246084 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.751239119s) to execute
2021-07-06 15:04:15.246344 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.054998152s) to execute
2021-07-06 15:04:15.840588 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:04:16.538364 I | auth: deleting token frywwoEKjrIhDTqw.1954 for user conductor
2021-07-06 15:04:16.538425 I | auth: deleting token iOQhwsixmZwqspIy.1951 for user conductor
2021-07-06 15:04:16.538447 I | auth: deleting token GpSVBWsXGrkPvvMq.1952 for user conductor
2021-07-06 15:04:16.538462 I | auth: deleting token ikNmBmuyYYWfPGcL.1955 for user conductor
2021-07-06 15:04:16.538474 I | auth: deleting token oMPNTwDuclQEhurI.1953 for user conductor
2021-07-06 15:04:17.143913 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.804373047s) to execute
2021-07-06 15:04:17.143987 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.602952602s) to execute
2021-07-06 15:04:18.940057 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.60130169s) to execute
2021-07-06 15:04:19.538353 I | auth: deleting token PubaFLiHnRbIkVjb.1956 for user conductor
2021-07-06 15:04:20.538319 I | auth: deleting token koHmrXdDOdLRSUEJ.1957 for user conductor
2021-07-06 15:04:20.538400 I | auth: deleting token WdxgKDaflkiNWuiU.1958 for user conductor
2021-07-06 15:04:20.840781 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:04:23.538300 I | auth: deleting token hVWyROrNKSnWKtXX.1959 for user conductor
2021-07-06 15:04:23.538397 I | auth: deleting token stNHADJAXGJXpFLR.1961 for user conductor
2021-07-06 15:04:24.137660 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.194816505s) to execute
2021-07-06 15:04:24.138226 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (5.00127571s) to execute
2021-07-06 15:04:25.538326 I | auth: deleting token dFGpKQOQVRyXKGPW.1963 for user conductor
2021-07-06 15:04:25.538377 I | auth: deleting token qYjCaDAfyhQZvooc.1962 for user conductor
2021-07-06 15:04:25.538388 I | auth: deleting token EyklMqILbidNNbwE.1964 for user conductor
2021-07-06 15:04:25.538398 I | auth: deleting token eLJjTUNwWIeNVyPn.1960 for user conductor
2021-07-06 15:04:25.841238 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:04:26.538264 I | auth: deleting token ECEVJasxbmqFvpot.1965 for user conductor
2021-07-06 15:04:28.538404 I | auth: deleting token dNJcDUchoXJMJQRN.1966 for user conductor
2021-07-06 15:04:29.563009 I | auth: deleting token oWEXRrFRqZYIwBKh.1967 for user conductor
2021-07-06 15:04:29.743497 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.104383302s) to execute
2021-07-06 15:04:30.841498 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:04:31.538288 I | auth: deleting token CSmcjvFhJFeErato.1968 for user conductor
2021-07-06 15:04:31.742940 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.806106891s) to execute
2021-07-06 15:04:31.743060 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.997160911s) to execute
2021-07-06 15:04:31.743118 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.906028542s) to execute
2021-07-06 15:04:31.891561 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (146.200448ms) to execute
2021-07-06 15:04:32.538383 I | auth: deleting token EhgbDlpaEfyaZWUH.1969 for user conductor
2021-07-06 15:04:33.743714 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.505854846s) to execute
2021-07-06 15:04:35.647490 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.81049936s) to execute
2021-07-06 15:04:35.841855 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:04:36.538375 I | auth: deleting token jQLktGhJLoBbzOwe.1970 for user conductor
2021-07-06 15:04:36.538417 I | auth: deleting token zqbhEfnjjEUvwYmO.1972 for user conductor
2021-07-06 15:04:37.543874 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.704908105s) to execute
2021-07-06 15:04:37.544101 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (952.742637ms) to execute
2021-07-06 15:04:38.538316 I | auth: deleting token TeEowwHHMHBYkHtv.1971 for user conductor
2021-07-06 15:04:38.538369 I | auth: deleting token kflRtGzGSetKGBLE.1973 for user conductor
2021-07-06 15:04:38.538386 I | auth: deleting token GzhoZrguXNFUzeyc.1974 for user conductor
2021-07-06 15:04:39.537276 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.798178413s) to execute
2021-07-06 15:04:40.538307 I | auth: deleting token QOMMlZjQHKGJJHbt.1975 for user conductor
2021-07-06 15:04:40.842117 W | rafthttp: health check for peer 72b38cc930a2fa6f could not connect: dial tcp 10.233.74.246:2380: getsockopt: connection refused
2021-07-06 15:04:41.337999 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.746350261s) to execute
2021-07-06 15:04:41.338142 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.797908413s) to execute
2021-07-06 15:04:41.491667 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" to