By type
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Skipping self-checking
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
2021-10-09 23:26:01.823815 I | etcdmain: etcd Version: 3.2.24
2021-10-09 23:26:01.824025 I | etcdmain: Git SHA: 420a45226
2021-10-09 23:26:01.824032 I | etcdmain: Go Version: go1.8.7
2021-10-09 23:26:01.824039 I | etcdmain: Go OS/Arch: linux/amd64
2021-10-09 23:26:01.824045 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-10-09 23:26:01.824312 I | embed: listening for peers on http://0.0.0.0:2380
2021-10-09 23:26:01.824389 I | embed: listening for client requests on 0.0.0.0:2379
2021-10-09 23:26:01.839685 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.74.239:2380
2021-10-09 23:26:01.924221 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.74.239:2380
2021-10-09 23:26:01.928866 I | etcdserver: name = onap-oof-has-etcd-1
2021-10-09 23:26:01.928881 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-10-09 23:26:01.928887 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-10-09 23:26:01.928891 I | etcdserver: heartbeat = 100ms
2021-10-09 23:26:01.928924 I | etcdserver: election = 1000ms
2021-10-09 23:26:01.928930 I | etcdserver: snapshot count = 100000
2021-10-09 23:26:01.928968 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2379
2021-10-09 23:26:01.928974 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2380
2021-10-09 23:26:01.928990 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-10-09 23:26:01.943941 I | etcdserver: starting member 72b38cc930a2fa6f in cluster e8b03869cbf54258
2021-10-09 23:26:01.944028 I | raft: 72b38cc930a2fa6f became follower at term 0
2021-10-09 23:26:01.944043 I | raft: newRaft 72b38cc930a2fa6f [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-10-09 23:26:01.944055 I | raft: 72b38cc930a2fa6f became follower at term 1
2021-10-09 23:26:02.031203 W | auth: simple token is not cryptographically signed
2021-10-09 23:26:02.127053 I | rafthttp: starting peer 2d249ba41c7e44fa...
2021-10-09 23:26:02.127166 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa
2021-10-09 23:26:02.128382 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-10-09 23:26:02.128549 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-10-09 23:26:02.226793 I | rafthttp: started peer 2d249ba41c7e44fa
2021-10-09 23:26:02.226885 I | rafthttp: added peer 2d249ba41c7e44fa
2021-10-09 23:26:02.226905 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-10-09 23:26:02.227131 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader)
2021-10-09 23:26:02.227334 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-10-09 23:26:02.227360 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-10-09 23:26:02.325869 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-09 23:26:02.326277 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-09 23:26:02.423976 I | rafthttp: started peer 8aae4c350a2413a5
2021-10-09 23:26:02.424073 I | rafthttp: added peer 8aae4c350a2413a5
2021-10-09 23:26:02.424161 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-10-09 23:26:02.424218 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-10-09 23:26:02.424337 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-10-09 23:26:02.425717 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-09 23:26:02.425929 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-09 23:26:02.426099 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-09 23:26:03.724590 I | raft: 72b38cc930a2fa6f is starting a new election at term 1
2021-10-09 23:26:03.724694 I | raft: 72b38cc930a2fa6f became candidate at term 2
2021-10-09 23:26:03.724715 I | raft: 72b38cc930a2fa6f received MsgVoteResp from 72b38cc930a2fa6f at term 2
2021-10-09 23:26:03.724725 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 8aae4c350a2413a5 at term 2
2021-10-09 23:26:03.724734 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 2d249ba41c7e44fa at term 2
2021-10-09 23:26:04.925219 I | raft: 72b38cc930a2fa6f is starting a new election at term 2
2021-10-09 23:26:04.925290 I | raft: 72b38cc930a2fa6f became candidate at term 3
2021-10-09 23:26:04.925307 I | raft: 72b38cc930a2fa6f received MsgVoteResp from 72b38cc930a2fa6f at term 3
2021-10-09 23:26:04.925320 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 2d249ba41c7e44fa at term 3
2021-10-09 23:26:04.925331 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 8aae4c350a2413a5 at term 3
2021-10-09 23:26:06.058719 I | rafthttp: peer 2d249ba41c7e44fa became active
2021-10-09 23:26:06.058772 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-10-09 23:26:06.355733 E | rafthttp: failed to dial 2d249ba41c7e44fa on stream Message (peer 2d249ba41c7e44fa failed to find local node 72b38cc930a2fa6f)
2021-10-09 23:26:06.355759 I | rafthttp: peer 2d249ba41c7e44fa became inactive
2021-10-09 23:26:06.355785 I | rafthttp: peer 2d249ba41c7e44fa became active
2021-10-09 23:26:06.355803 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message writer)
2021-10-09 23:26:06.356142 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 writer)
2021-10-09 23:26:06.459512 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message reader)
2021-10-09 23:26:06.524595 I | raft: 72b38cc930a2fa6f is starting a new election at term 3
2021-10-09 23:26:06.524655 I | raft: 72b38cc930a2fa6f became candidate at term 4
2021-10-09 23:26:06.524688 I | raft: 72b38cc930a2fa6f received MsgVoteResp from 72b38cc930a2fa6f at term 4
2021-10-09 23:26:06.524715 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 2d249ba41c7e44fa at term 4
2021-10-09 23:26:06.524727 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 8aae4c350a2413a5 at term 4
2021-10-09 23:26:07.170667 I | raft: 72b38cc930a2fa6f [term: 4] received a MsgVote message with higher term from 2d249ba41c7e44fa [term: 271]
2021-10-09 23:26:07.170730 I | raft: 72b38cc930a2fa6f became follower at term 271
2021-10-09 23:26:07.170759 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3, vote: 0] cast MsgVote for 2d249ba41c7e44fa [logterm: 1, index: 3] at term 271
2021-10-09 23:26:07.174771 I | raft: raft.node: 72b38cc930a2fa6f elected leader 2d249ba41c7e44fa at term 271
2021-10-09 23:26:07.255082 I | etcdserver: published {Name:onap-oof-has-etcd-1 ClientURLs:[http://onap-oof-has-etcd-1.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-10-09 23:26:07.255144 I | embed: ready to serve client requests
2021-10-09 23:26:07.255606 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-10-09 23:26:07.524577 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:09.527161 N | auth: added a new user: root
2021-10-09 23:26:09.527350 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (2.003808004s) to execute
2021-10-09 23:26:09.527415 N | etcdserver/membership: set the initial cluster version to 3.0
2021-10-09 23:26:09.527482 I | etcdserver/api: enabled capabilities for version 3.0
2021-10-09 23:26:11.928198 N | auth: added a new user: conductor
2021-10-09 23:26:11.928293 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (2.170727625s) to execute
2021-10-09 23:26:12.254817 N | auth: Role conductor is created
2021-10-09 23:26:12.454801 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-10-09 23:26:12.524907 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:12.557416 N | auth: granted role conductor to user conductor
2021-10-09 23:26:12.854608 N | auth: Role root is created
2021-10-09 23:26:12.859265 N | auth: granted role root to user root
2021-10-09 23:26:12.957382 N | auth: Authentication enabled
2021-10-09 23:26:17.525268 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:22.525705 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:27.526041 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:32.526376 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:37.526741 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:42.527144 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:47.527525 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:52.527783 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:57.528033 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:02.528312 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:07.528681 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:12.529144 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:17.529390 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:22.529655 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:27.426033 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.994498696s) to execute
2021-10-09 23:27:27.529867 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:31.125620 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.602273689s) to execute
2021-10-09 23:27:32.569278 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:35.229065 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.994729573s) to execute
2021-10-09 23:27:37.623287 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:40.123780 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.898916114s) to execute
2021-10-09 23:27:42.131408 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.003254753s) to execute
2021-10-09 23:27:42.131684 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.005048724s) to execute
2021-10-09 23:27:42.623606 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:47.623897 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:48.523523 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.568501783s) to execute
2021-10-09 23:27:50.624205 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.000636495s) to execute
2021-10-09 23:27:52.624277 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:57.127230 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.202336252s) to execute
2021-10-09 23:27:57.723182 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:01.228017 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.80331696s) to execute
2021-10-09 23:28:02.723573 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:03.125206 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.700428249s) to execute
2021-10-09 23:28:05.130045 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.001531142s) to execute
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-10-09 23:28:07.327481 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (4.071716698s) to execute
2021-10-09 23:28:07.723977 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:09.524307 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:14" took too long (2.066626449s) to execute
2021-10-09 23:28:12.724373 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:13.227436 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (3.502498424s) to execute
2021-10-09 23:28:15.328049 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.004643859s) to execute
2021-10-09 23:28:17.430602 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.906914795s) to execute
2021-10-09 23:28:17.555237 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (121.320502ms) to execute
2021-10-09 23:28:17.724646 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:21.625687 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.470979345s) to execute
2021-10-09 23:28:22.724999 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:27.424654 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.669733091s) to execute
2021-10-09 23:28:27.725360 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:27.755329 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.455391ms) to execute
2021-10-09 23:28:29.426758 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (703.22117ms) to execute
2021-10-09 23:28:32.725673 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:33.429687 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.605992384s) to execute
2021-10-09 23:28:37.823287 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:39.428300 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (5.904738135s) to execute
2021-10-09 23:28:39.555863 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (124.816915ms) to execute
2021-10-09 23:28:39.557497 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (126.156182ms) to execute
2021-10-09 23:28:42.823660 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:44.624580 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.370040852s) to execute
2021-10-09 23:28:47.724053 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.469385009s) to execute
2021-10-09 23:28:47.824068 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:49.723800 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (868.297205ms) to execute
2021-10-09 23:28:52.727405 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (772.569719ms) to execute
2021-10-09 23:28:52.824433 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:54.730310 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.9037004s) to execute
2021-10-09 23:28:57.824674 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:58.423991 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.700689283s) to execute
2021-10-09 23:29:00.524529 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.969982074s) to execute
2021-10-09 23:29:00.524709 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.00031198s) to execute
2021-10-09 23:29:02.824941 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:02.856685 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (199.501706ms) to execute
2021-10-09 23:29:07.825281 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:12.825594 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:17.825848 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:18.425976 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.602660709s) to execute
2021-10-09 23:29:22.823608 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.26881629s) to execute
2021-10-09 23:29:22.826091 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:24.630495 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.707135095s) to execute
2021-10-09 23:29:24.630676 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.804393837s) to execute
2021-10-09 23:29:26.623577 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.69996819s) to execute
2021-10-09 23:29:26.623798 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.895369452s) to execute
2021-10-09 23:29:26.623886 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.90051894s) to execute
2021-10-09 23:29:26.726628 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.11234ms) to execute
2021-10-09 23:29:27.826585 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:28.527491 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.798708916s) to execute
2021-10-09 23:29:30.523703 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.268785593s) to execute
2021-10-09 23:29:30.755205 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (126.52363ms) to execute
2021-10-09 23:29:32.826793 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:37.827167 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:42.827414 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:47.827810 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:49.027756 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.604442248s) to execute
2021-10-09 23:29:49.355116 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (196.055429ms) to execute
2021-10-09 23:29:52.828065 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:54.930788 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.873722473s) to execute
2021-10-09 23:29:57.828368 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:59.126146 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.102624801s) to execute
2021-10-09 23:29:59.126444 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.193347823s) to execute
2021-10-09 23:29:59.126696 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.19321232s) to execute
2021-10-09 23:30:00.925255 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.695481126s) to execute
2021-10-09 23:30:02.923150 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:04.826987 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.703676574s) to execute
2021-10-09 23:30:04.931826 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.395971ms) to execute
2021-10-09 23:30:06.826743 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.071376097s) to execute
2021-10-09 23:30:07.923453 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:12.032144 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.408633841s) to execute
2021-10-09 23:30:12.223668 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (188.321976ms) to execute
2021-10-09 23:30:13.023380 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:18.023665 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:18.969152 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.94587641s) to execute
2021-10-09 23:30:19.156342 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (132.949914ms) to execute
2021-10-09 23:30:19.158419 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (135.014979ms) to execute
2021-10-09 23:30:23.024156 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:24.623328 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.668454975s) to execute
2021-10-09 23:30:26.924069 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.297566074s) to execute
2021-10-09 23:30:28.024427 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:28.730509 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.104802921s) to execute
2021-10-09 23:30:28.730591 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.104867567s) to execute
2021-10-09 23:30:28.730704 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.802600328s) to execute
2021-10-09 23:30:28.730838 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.803733744s) to execute
2021-10-09 23:30:33.024607 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:34.924598 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.0994491s) to execute
2021-10-09 23:30:35.055511 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.376727ms) to execute
2021-10-09 23:30:35.056891 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.24537ms) to execute
2021-10-09 23:30:35.254887 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (197.187456ms) to execute
2021-10-09 23:30:37.123653 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.568868429s) to execute
2021-10-09 23:30:38.024844 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:41.030081 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (274.885943ms) to execute
2021-10-09 23:30:43.025044 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:44.832072 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.797967573s) to execute
2021-10-09 23:30:45.057573 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.703458ms) to execute
2021-10-09 23:30:45.155111 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (229.105403ms) to execute
2021-10-09 23:30:45.356611 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (296.798511ms) to execute
2021-10-09 23:30:48.025323 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:49.327186 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.572372737s) to execute
2021-10-09 23:30:53.025629 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:53.227706 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (102.422228ms) to execute
2021-10-09 23:30:55.326250 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.971281132s) to execute
2021-10-09 23:30:57.427496 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.304140227s) to execute
2021-10-09 23:30:58.026014 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:59.528378 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.902277424s) to execute
2021-10-09 23:30:59.654934 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (123.795506ms) to execute
2021-10-09 23:31:02.631542 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.408236935s) to execute
2021-10-09 23:31:03.026282 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:08.026489 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:13.026751 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:13.127330 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (772.468334ms) to execute
2021-10-09 23:31:16.231117 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.576025319s) to execute
2021-10-09 23:31:18.123195 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:20.125400 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.799887678s) to execute
2021-10-09 23:31:22.125175 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.997542761s) to execute
2021-10-09 23:31:22.125371 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.67024219s) to execute
2021-10-09 23:31:22.126662 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.998305147s) to execute
2021-10-09 23:31:22.355257 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (226.194775ms) to execute
2021-10-09 23:31:23.123482 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:24.132090 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.377319714s) to execute
2021-10-09 23:31:24.455083 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (195.392225ms) to execute
2021-10-09 23:31:28.123802 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:28.326347 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (201.74194ms) to execute
2021-10-09 23:31:33.123757 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.16863015s) to execute
2021-10-09 23:31:33.124027 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:34.923885 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.600134007s) to execute
2021-10-09 23:31:38.124294 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:39.127088 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.90374574s) to execute
2021-10-09 23:31:39.127518 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.904047321s) to execute
2021-10-09 23:31:41.226689 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.096469176s) to execute
2021-10-09 23:31:41.226877 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.09700275s) to execute
2021-10-09 23:31:43.124584 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:43.331867 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.105046429s) to execute
2021-10-09 23:31:43.332222 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.005685426s) to execute
2021-10-09 23:31:45.526083 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.101298741s) to execute
2021-10-09 23:31:47.623577 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.20023797s) to execute
2021-10-09 23:31:47.623674 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.09335773s) to execute
2021-10-09 23:31:47.623844 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.000350532s) to execute
2021-10-09 23:31:47.755133 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (128.362701ms) to execute
2021-10-09 23:31:48.124960 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:51.423369 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.69993621s) to execute
2021-10-09 23:31:51.554862 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (128.934917ms) to execute
2021-10-09 23:31:53.125221 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:55.626146 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.171383743s) to execute
2021-10-09 23:31:58.125409 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:00.129564 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.706138077s) to execute
2021-10-09 23:32:02.428389 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.20231118s) to execute
2021-10-09 23:32:03.125730 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:04.523452 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.391327089s) to execute
2021-10-09 23:32:04.523773 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.900292711s) to execute
2021-10-09 23:32:04.523940 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.997920025s) to execute
2021-10-09 23:32:04.656275 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (129.461057ms) to execute
2021-10-09 23:32:08.126091 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:08.928541 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.003729352s) to execute
2021-10-09 23:32:10.725658 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (670.98815ms) to execute
2021-10-09 23:32:13.126348 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:14.926820 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701508863s) to execute
2021-10-09 23:32:15.155348 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (127.265146ms) to execute
2021-10-09 23:32:18.126635 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:21.523560 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.300198999s) to execute
2021-10-09 23:32:21.654884 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (128.193155ms) to execute
2021-10-09 23:32:21.655101 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (128.227586ms) to execute
2021-10-09 23:32:21.954735 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (297.467374ms) to execute
2021-10-09 23:32:23.126904 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:25.723393 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.668703066s) to execute
2021-10-09 23:32:25.854537 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (128.466889ms) to execute
2021-10-09 23:32:28.023255 I | auth: deleting token ddZYAnnfeUCwesly.17 for user conductor
2021-10-09 23:32:28.023340 I | auth: deleting token ERtsgETiCKOdNyIl.18 for user conductor
2021-10-09 23:32:28.127168 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:30.023478 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.968433225s) to execute
2021-10-09 23:32:31.957795 I | auth: deleting token mteorbKZMBAOfJqv.22 for user conductor
2021-10-09 23:32:31.957915 I | auth: deleting token VSfJQBFIfUtnhDAm.21 for user conductor
2021-10-09 23:32:33.127403 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:35.957894 I | auth: deleting token jQwmXFnLoaMatERO.26 for user conductor
2021-10-09 23:32:35.957969 I | auth: deleting token zAbhhDmuCTXhrBlF.25 for user conductor
2021-10-09 23:32:37.424315 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.20092592s) to execute
2021-10-09 23:32:38.127670 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:32:41.423862 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.868870024s) to execute
2021-10-09 23:32:41.424181 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.997064623s) to execute
2021-10-09 23:32:41.554931 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.17966ms) to execute
2021-10-09 23:32:41.623415 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (196.761873ms) to execute
2021-10-09 23:32:41.724765 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (101.324819ms) to execute
2021-10-09 23:32:43.023197 I | auth: deleting token vOPOKZPGeGUSDQWc.28 for user conductor
2021-10-09 23:32:43.023240 I | auth: deleting token dzaFJzUKWitDbTfn.30 for user conductor
2021-10-09 23:32:43.023247 I | auth: deleting token avZYQatzdICvUfyY.29 for user conductor
2021-10-09 23:32:43.128078 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:32:43.726782 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (462.552718ms) to execute
2021-10-09 23:32:48.128351 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:32:48.129718 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.40639023s) to execute
2021-10-09 23:32:48.957803 I | auth: deleting token dRdVLNkEhzWjLRqx.32 for user conductor
2021-10-09 23:32:48.957868 I | auth: deleting token MjuSpwFZCrWlcJXT.36 for user conductor
2021-10-09 23:32:48.957881 I | auth: deleting token PGGwmfippUOBqJGU.35 for user conductor
2021-10-09 23:32:48.957890 I | auth: deleting token MOxoAcOWsqlMXMeb.34 for user conductor
2021-10-09 23:32:50.957857 I | auth: deleting token kGwWtOVjtwLLuvJa.38 for user conductor
2021-10-09 23:32:50.957897 I | auth: deleting token qNUWoCDpEqHjqGiM.41 for user conductor
2021-10-09 23:32:53.223214 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:32:54.726762 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.969141085s) to execute
2021-10-09 23:32:57.957777 I | auth: deleting token fdpykUXqDvjyFhiQ.44 for user conductor
2021-10-09 23:32:57.957840 I | auth: deleting token OITpUywDpMmigJqt.45 for user conductor
2021-10-09 23:32:57.957852 I | auth: deleting token XotxhrMMFXhlfdbV.50 for user conductor
2021-10-09 23:32:57.957866 I | auth: deleting token IiTYUYOIsGEfEaeE.46 for user conductor
2021-10-09 23:32:57.957879 I | auth: deleting token qgDGlPwlvmFArbIn.43 for user conductor
2021-10-09 23:32:58.223535 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:32:59.126690 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.271767051s) to execute
2021-10-09 23:33:01.226652 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.971941601s) to execute
2021-10-09 23:33:02.023157 I | auth: deleting token EQzcmxhSzwvYiBgQ.52 for user conductor
2021-10-09 23:33:02.023201 I | auth: deleting token lyrZOnxjUrsvAyAg.51 for user conductor
2021-10-09 23:33:03.223813 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:03.227670 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.004295582s) to execute
2021-10-09 23:33:03.227817 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.004220351s) to execute
2021-10-09 23:33:03.227878 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.998465449s) to execute
2021-10-09 23:33:03.228019 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.804581149s) to execute
2021-10-09 23:33:03.355058 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (124.289689ms) to execute
2021-10-09 23:33:03.424860 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (101.28792ms) to execute
2021-10-09 23:33:03.957795 I | auth: deleting token CXWqyUPLbDxsdqqU.54 for user conductor
2021-10-09 23:33:03.957859 I | auth: deleting token EZMvHVktjgLXBXVa.56 for user conductor
2021-10-09 23:33:03.957873 I | auth: deleting token DbNqKWeyysMpqiTQ.58 for user conductor
2021-10-09 23:33:08.023119 I | auth: deleting token jxIXUfEGuAfFBDVn.61 for user conductor
2021-10-09 23:33:08.023179 I | auth: deleting token kBECGSMKEHOQtpvI.60 for user conductor
2021-10-09 23:33:08.224173 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:09.627769 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.001453781s) to execute
2021-10-09 23:33:09.957721 I | auth: deleting token SBVBSvrmamukaUPX.65 for user conductor
2021-10-09 23:33:09.957758 I | auth: deleting token anDYGnkQweTobnTb.64 for user conductor
2021-10-09 23:33:11.529582 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.606240144s) to execute
2021-10-09 23:33:11.623314 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.89998396s) to execute
2021-10-09 23:33:11.755178 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.031498595s) to execute
2021-10-09 23:33:11.757542 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (131.618737ms) to execute
2021-10-09 23:33:11.757591 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (131.678981ms) to execute
2021-10-09 23:33:13.224400 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:13.957739 I | auth: deleting token QJZGggxCghGaVZVn.68 for user conductor
2021-10-09 23:33:13.957794 I | auth: deleting token LVQXIfcjlnByxfRK.67 for user conductor
2021-10-09 23:33:15.930350 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.004109335s) to execute
2021-10-09 23:33:15.957812 I | auth: deleting token EDuivzyAMiUkFxLg.69 for user conductor
2021-10-09 23:33:16.256222 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (132.775251ms) to execute
2021-10-09 23:33:17.957725 I | auth: deleting token MCtKLVyrAMDKSAgQ.73 for user conductor
2021-10-09 23:33:17.957772 I | auth: deleting token FbWfDbyyzJqxViGM.71 for user conductor
2021-10-09 23:33:18.224688 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:22.023021 I | auth: deleting token RzcYxfHQgcjaHiaw.76 for user conductor
2021-10-09 23:33:22.023068 I | auth: deleting token krkcymcdQmhFiaQm.75 for user conductor
2021-10-09 23:33:22.023078 I | auth: deleting token FnfjXAviZGBudHWA.79 for user conductor
2021-10-09 23:33:22.023083 I | auth: deleting token vUOdIyOprbiJZmHj.74 for user conductor
2021-10-09 23:33:22.823526 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (367.243336ms) to execute
2021-10-09 23:33:23.224947 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:24.023189 I | auth: deleting token pzyXOJlkPviaNhGW.80 for user conductor
2021-10-09 23:33:26.624992 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.001713697s) to execute
2021-10-09 23:33:26.754823 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.996ms) to execute
2021-10-09 23:33:27.957740 I | auth: deleting token UUDjwViTdsindQdo.82 for user conductor
2021-10-09 23:33:27.957792 I | auth: deleting token ObwutKgUlZameBKM.81 for user conductor
2021-10-09 23:33:28.323273 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:29.957769 I | auth: deleting token vCwovPorFTFjqBqg.85 for user conductor
2021-10-09 23:33:29.957855 I | auth: deleting token IjMDHFirYjPTgilB.83 for user conductor
2021-10-09 23:33:30.527594 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.76966432s) to execute
2021-10-09 23:33:31.957796 I | auth: deleting token fGtoiEPnsztEhqRy.86 for user conductor
2021-10-09 23:33:33.024769 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.10116276s) to execute
2021-10-09 23:33:33.323630 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:33.957759 I | auth: deleting token PaFOoLvsItGrBUrq.87 for user conductor
2021-10-09 23:33:35.124737 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.06816993s) to execute
2021-10-09 23:33:37.330233 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.203318746s) to execute
2021-10-09 23:33:37.330372 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.105378037s) to execute
2021-10-09 23:33:38.324282 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:39.923549 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (165.230455ms) to execute
2021-10-09 23:33:39.957716 I | auth: deleting token TfjSnFamxFauxEdw.93 for user conductor
2021-10-09 23:33:39.957793 I | auth: deleting token zCBdkSrhTlzMpMcb.92 for user conductor
2021-10-09 23:33:39.957814 I | auth: deleting token UVzWdJPHpksKwdAW.90 for user conductor
2021-10-09 23:33:39.957834 I | auth: deleting token WjLlTUfMVaKectaG.91 for user conductor
2021-10-09 23:33:39.957848 I | auth: deleting token lGdHaULmtyMREqpI.89 for user conductor
2021-10-09 23:33:39.957859 I | auth: deleting token nyCSZmQcxUfivgdF.88 for user conductor
2021-10-09 23:33:40.957799 I | auth: deleting token jeYONVbNtKaNIPnQ.95 for user conductor
2021-10-09 23:33:42.228199 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.565724302s) to execute
2021-10-09 23:33:42.957713 I | auth: deleting token nMmnksRNmBnRNLfh.96 for user conductor
2021-10-09 23:33:43.324683 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:44.331855 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.276784089s) to execute
2021-10-09 23:33:44.957768 I | auth: deleting token OWyZVpQcuzLWRjRN.97 for user conductor
2021-10-09 23:33:44.957875 I | auth: deleting token zVQUMXatiXDCbUvz.98 for user conductor
2021-10-09 23:33:48.023185 I | auth: deleting token pEddgkmcgxcRFLcf.100 for user conductor
2021-10-09 23:33:48.023223 I | auth: deleting token GQSfhRVKramPquoi.99 for user conductor
2021-10-09 23:33:48.324966 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:50.023183 I | auth: deleting token RrVWGLasyLhECiOe.101 for user conductor
2021-10-09 23:33:50.023261 I | auth: deleting token SDiUnSrTdiUUlSAq.102 for user conductor
2021-10-09 23:33:52.429553 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.900698221s) to execute
2021-10-09 23:33:53.023189 I | auth: deleting token ltIrVMqdpVtThfMv.103 for user conductor
2021-10-09 23:33:53.423165 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:54.957767 I | auth: deleting token dccqQnJIYaiIXBui.105 for user conductor
2021-10-09 23:33:54.957848 I | auth: deleting token hVlPpgVVSzzHslaK.106 for user conductor
2021-10-09 23:33:54.957869 I | auth: deleting token xgjOwqwMZleBkcab.104 for user conductor
2021-10-09 23:33:56.427105 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.872141786s) to execute
2021-10-09 23:33:56.555736 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (126.136017ms) to execute
2021-10-09 23:33:56.654711 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (224.827481ms) to execute
2021-10-09 23:33:56.654800 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (224.751806ms) to execute
2021-10-09 23:33:58.423486 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:58.957834 I | auth: deleting token ILVGPJVwDklerScT.108 for user conductor
2021-10-09 23:33:59.223422 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (899.6327ms) to execute
2021-10-09 23:34:01.023124 I | auth: deleting token RgwYqapRlVFhdcEV.111 for user conductor
2021-10-09 23:34:01.023198 I | auth: deleting token JSztegzBQZGCxppS.110 for user conductor
2021-10-09 23:34:01.023213 I | auth: deleting token OVKkimfxTtcTikKI.107 for user conductor
2021-10-09 23:34:01.630184 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (806.873518ms) to execute
2021-10-09 23:34:02.957814 I | auth: deleting token AJrTXnWjVeZbEyTw.112 for user conductor
2021-10-09 23:34:02.957880 I | auth: deleting token oHufSCbKrMzKOItC.113 for user conductor
2021-10-09 23:34:03.423918 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:04.023167 I | auth: deleting token tHdaSPsmcGhijwdQ.115 for user conductor
2021-10-09 23:34:05.957784 I | auth: deleting token IlqBzTpTcxaNaber.116 for user conductor
2021-10-09 23:34:08.323465 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.368886902s) to execute
2021-10-09 23:34:08.523412 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:09.023238 I | auth: deleting token XBBoQVfLbUpTFxcF.117 for user conductor
2021-10-09 23:34:11.957840 I | auth: deleting token IqVgMCCHkftzXtcw.118 for user conductor
2021-10-09 23:34:13.523830 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:14.957770 I | auth: deleting token USknqNxqBFfYNzDj.119 for user conductor
2021-10-09 23:34:15.025195 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.570507104s) to execute
2021-10-09 23:34:15.025387 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (6.698201791s) to execute
2021-10-09 23:34:17.229486 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.099484957s) to execute
2021-10-09 23:34:18.524143 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:18.957844 I | auth: deleting token wPGvMuFRUoWptYng.120 for user conductor
2021-10-09 23:34:19.527673 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.104166051s) to execute
2021-10-09 23:34:21.228821 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.698094722s) to execute
2021-10-09 23:34:21.229196 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.604470257s) to execute
2021-10-09 23:34:22.957828 I | auth: deleting token pvGzrTKLvYHiFDUK.124 for user conductor
2021-10-09 23:34:22.957887 I | auth: deleting token gVKxPoIqLkkRLeMJ.122 for user conductor
2021-10-09 23:34:23.330339 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.906804873s) to execute
2021-10-09 23:34:23.524440 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:24.957780 I | auth: deleting token olQiFNtnDGycRvqB.123 for user conductor
2021-10-09 23:34:24.957839 I | auth: deleting token maqxNCBGcowwXzSp.121 for user conductor
2021-10-09 23:34:25.424445 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.900983193s) to execute
2021-10-09 23:34:25.424709 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.001343175s) to execute
2021-10-09 23:34:26.957733 I | auth: deleting token RdCbiqIXZXhrEJvN.125 for user conductor
2021-10-09 23:34:26.957785 I | auth: deleting token YzHukhZfGaDdOMyi.126 for user conductor
2021-10-09 23:34:26.957802 I | auth: deleting token jfePzcKTJTtKanOI.127 for user conductor
2021-10-09 23:34:27.626945 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.199394787s) to execute
2021-10-09 23:34:27.627290 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.179961885s) to execute
2021-10-09 23:34:27.627454 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (504.021915ms) to execute
2021-10-09 23:34:28.524703 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:30.957757 I | auth: deleting token QxEyHwofWsAxEloE.129 for user conductor
2021-10-09 23:34:30.957836 I | auth: deleting token nPAGkDjjKSlZzrAN.131 for user conductor
2021-10-09 23:34:30.957848 I | auth: deleting token VxIiexsRtdbOSTPr.130 for user conductor
2021-10-09 23:34:30.957860 I | auth: deleting token CzyfPNwlCAQWUJRV.128 for user conductor
2021-10-09 23:34:31.730877 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.974133206s) to execute
2021-10-09 23:34:31.731285 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.904364514s) to execute
2021-10-09 23:34:32.957789 I | auth: deleting token YChOqQTQSWfQDZKR.132 for user conductor
2021-10-09 23:34:33.525109 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:33.957799 I | auth: deleting token TjrTgeOLRabEXcxH.133 for user conductor
2021-10-09 23:34:35.957715 I | auth: deleting token lYpVulROBZWuAMWF.134 for user conductor
2021-10-09 23:34:36.425491 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.002041882s) to execute
2021-10-09 23:34:38.525346 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:38.826158 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.970981031s) to execute
2021-10-09 23:34:38.957677 I | auth: deleting token DBAZFXwEtNDsQgbR.135 for user conductor
2021-10-09 23:34:40.827164 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203778081s) to execute
2021-10-09 23:34:41.023164 I | auth: deleting token UEKdPAyRrweVkbzU.136 for user conductor
2021-10-09 23:34:42.923670 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.091726186s) to execute
2021-10-09 23:34:43.525587 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:46.527908 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.466837175s) to execute
2021-10-09 23:34:46.569730 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.546321563s) to execute
2021-10-09 23:34:48.525772 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:48.724842 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.129013214s) to execute
2021-10-09 23:34:48.725091 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.137795396s) to execute
2021-10-09 23:34:48.855042 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.229512853s) to execute
2021-10-09 23:34:48.857162 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (129.705362ms) to execute
2021-10-09 23:34:49.957741 I | auth: deleting token mkksBZOEwtsLLitt.137 for user conductor
2021-10-09 23:34:49.957796 I | auth: deleting token MBJvTahPvLuzNsdt.144 for user conductor
2021-10-09 23:34:49.957810 I | auth: deleting token mbrqXvCmYCtiIkkw.138 for user conductor
2021-10-09 23:34:49.957821 I | auth: deleting token uPuIOPzNxsMyPNbh.143 for user conductor
2021-10-09 23:34:49.957832 I | auth: deleting token HfbTPoWvyrGdpHZk.139 for user conductor
2021-10-09 23:34:49.957842 I | auth: deleting token LlkldPKibQtOJBjR.142 for user conductor
2021-10-09 23:34:49.957864 I | auth: deleting token QtvXJGKJkmLUhPQz.140 for user conductor
2021-10-09 23:34:50.725787 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.002426581s) to execute
2021-10-09 23:34:53.526035 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:55.023290 I | auth: deleting token gaWwsdXfpcBsBzmh.149 for user conductor
2021-10-09 23:34:55.023347 I | auth: deleting token jsIuGmXsXGwgZGpp.146 for user conductor
2021-10-09 23:34:55.254673 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.984182ms) to execute
2021-10-09 23:34:57.529698 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.706324223s) to execute
2021-10-09 23:34:58.526328 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:59.957815 I | auth: deleting token MpupczwddYaDDWLT.148 for user conductor
2021-10-09 23:34:59.957879 I | auth: deleting token aXmgyqjReeTnEAGK.145 for user conductor
2021-10-09 23:34:59.957891 I | auth: deleting token viwUcLUimlfALQjE.151 for user conductor
2021-10-09 23:34:59.957904 I | auth: deleting token gQXrlJlTDeAqhWQv.152 for user conductor
2021-10-09 23:34:59.957917 I | auth: deleting token hZgsPCRYpMzhTlvU.150 for user conductor
2021-10-09 23:35:02.024860 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.501598178s) to execute
2021-10-09 23:35:03.526554 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:04.026917 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.80359718s) to execute
2021-10-09 23:35:04.027070 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.903559592s) to execute
2021-10-09 23:35:04.254708 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.143768ms) to execute
2021-10-09 23:35:04.957758 I | auth: deleting token NGgxjvRawHyqTiMC.156 for user conductor
2021-10-09 23:35:04.957811 I | auth: deleting token JFHPamoxwbHUeCxe.154 for user conductor
2021-10-09 23:35:04.957823 I | auth: deleting token SvsKlfBOivXbsPny.153 for user conductor
2021-10-09 23:35:04.957834 I | auth: deleting token QoRhQQsoBumoPSam.155 for user conductor
2021-10-09 23:35:06.527518 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.304061363s) to execute
2021-10-09 23:35:06.957905 I | auth: deleting token UPVlSLmwKTRvWxcl.157 for user conductor
2021-10-09 23:35:07.957763 I | auth: deleting token adhcbnDwkKEIZuvw.158 for user conductor
2021-10-09 23:35:08.526895 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:08.629022 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.174296539s) to execute
2021-10-09 23:35:08.957800 I | auth: deleting token nirSsDkGaoUGBtMR.159 for user conductor
2021-10-09 23:35:12.957767 I | auth: deleting token vDUZDLqueDfjafmN.160 for user conductor
2021-10-09 23:35:12.957842 I | auth: deleting token ftcpQbDSnDULHPZz.162 for user conductor
2021-10-09 23:35:12.957857 I | auth: deleting token DqLAqcRVfTpsbWOd.161 for user conductor
2021-10-09 23:35:13.527407 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:15.024078 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.294179559s) to execute
2021-10-09 23:35:15.024238 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (6.391966194s) to execute
2021-10-09 23:35:18.527773 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:19.424770 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.901381885s) to execute
2021-10-09 23:35:19.555140 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (127.682063ms) to execute
2021-10-09 23:35:19.957806 I | auth: deleting token LToXfMJedBmRTcDp.164 for user conductor
2021-10-09 23:35:19.957863 I | auth: deleting token cJfcKWojmqwApHCf.165 for user conductor
2021-10-09 23:35:19.957877 I | auth: deleting token nKETNtywWEvUssWH.166 for user conductor
2021-10-09 23:35:19.957893 I | auth: deleting token fyQwlorwtMMObCSy.163 for user conductor
2021-10-09 23:35:19.957905 I | auth: deleting token cBHOkDyxoydZoFpG.167 for user conductor
2021-10-09 23:35:21.929007 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.405710958s) to execute
2021-10-09 23:35:23.528124 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:24.226847 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.07108394s) to execute
2021-10-09 23:35:24.555263 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (197.780896ms) to execute
2021-10-09 23:35:24.957740 I | auth: deleting token FUrcOQGOojQZCaKH.168 for user conductor
2021-10-09 23:35:26.755101 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (194.903822ms) to execute
2021-10-09 23:35:26.957779 I | auth: deleting token HeXkqijVdMzJfcVe.169 for user conductor
2021-10-09 23:35:26.957841 I | auth: deleting token UzQEmPfKeeeVZEzo.170 for user conductor
2021-10-09 23:35:28.528400 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:28.957688 I | auth: deleting token vUCEmwBYwOPNAEMU.172 for user conductor
2021-10-09 23:35:28.957731 I | auth: deleting token dxLjvUtgklkcFExw.171 for user conductor
2021-10-09 23:35:28.957741 I | auth: deleting token NaUfEHRsPHtqghBe.173 for user conductor
2021-10-09 23:35:33.528751 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:34.957846 I | auth: deleting token jibvQjouCNDnUThE.175 for user conductor
2021-10-09 23:35:35.957811 I | auth: deleting token MKPlPsWkXzifTgIV.176 for user conductor
2021-10-09 23:35:35.957875 I | auth: deleting token gSibOJfZtYygOTcf.174 for user conductor
2021-10-09 23:35:35.957888 I | auth: deleting token UUHuNoxcjcdLQmYL.177 for user conductor
2021-10-09 23:35:38.023670 I | auth: deleting token aaKjKikNDlSOJtMB.178 for user conductor
2021-10-09 23:35:38.023723 I | auth: deleting token NnuYZXsXKOEHwKdH.179 for user conductor
2021-10-09 23:35:38.023742 I | auth: deleting token pDfiLMmHVkKfmWph.180 for user conductor
2021-10-09 23:35:38.330928 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.076084118s) to execute
2021-10-09 23:35:38.528971 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:40.426236 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.971246022s) to execute
2021-10-09 23:35:41.957794 I | auth: deleting token jMfNNpzeGlqEvbIX.181 for user conductor
2021-10-09 23:35:43.623415 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:44.525993 W | etcdserver: request "header: